Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss +3 -0
- -dFAT4oBgHgl3EQfqB3j/vector_store/index.pkl +3 -0
- .gitattributes +62 -0
- 09E2T4oBgHgl3EQfigc1/content/tmp_files/2301.03958v1.pdf.txt +1608 -0
- 09E2T4oBgHgl3EQfigc1/content/tmp_files/load_file.txt +0 -0
- 09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss +3 -0
- 09FIT4oBgHgl3EQf3Sv5/vector_store/index.pkl +3 -0
- 0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss +3 -0
- 1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf +3 -0
- 1dFRT4oBgHgl3EQfmDfL/vector_store/index.pkl +3 -0
- 1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf +3 -0
- 1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss +3 -0
- 1tE2T4oBgHgl3EQfNQaE/vector_store/index.pkl +3 -0
- 2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss +3 -0
- 2dAyT4oBgHgl3EQf1fnx/content/tmp_files/2301.00738v1.pdf.txt +942 -0
- 2dAyT4oBgHgl3EQf1fnx/content/tmp_files/load_file.txt +0 -0
- 3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss +3 -0
- 5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/2301.00041v1.pdf.txt +1329 -0
- 5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/load_file.txt +0 -0
- 5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/2301.01700v1.pdf.txt +1572 -0
- 5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/load_file.txt +0 -0
- 6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf +3 -0
- 6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss +3 -0
- 7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf +3 -0
- 7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss +3 -0
- 7tE1T4oBgHgl3EQf7QXS/vector_store/index.pkl +3 -0
- 7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss +3 -0
- 89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf +3 -0
- 89E5T4oBgHgl3EQfQw7M/vector_store/index.pkl +3 -0
- 8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/2301.03535v1.pdf.txt +788 -0
- 8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/load_file.txt +456 -0
- 8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/2301.02859v1.pdf.txt +1175 -0
- 8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/load_file.txt +427 -0
- 9NA0T4oBgHgl3EQfO_8B/content/tmp_files/2301.02167v1.pdf.txt +0 -0
- 9NA0T4oBgHgl3EQfO_8B/content/tmp_files/load_file.txt +0 -0
- ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/2301.01712v1.pdf.txt +2499 -0
- ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/load_file.txt +0 -0
- BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/2301.00075v1.pdf.txt +597 -0
- BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/load_file.txt +187 -0
- DtE4T4oBgHgl3EQf6Q5X/vector_store/index.pkl +3 -0
- GNE0T4oBgHgl3EQfRQAC/content/tmp_files/2301.02203v1.pdf.txt +1210 -0
- GNE0T4oBgHgl3EQfRQAC/content/tmp_files/load_file.txt +0 -0
- H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf +3 -0
- H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss +3 -0
- IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf +3 -0
- IdE4T4oBgHgl3EQfIQyU/vector_store/index.pkl +3 -0
- JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf +3 -0
- JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss +3 -0
- JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf +3 -0
- JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss +3 -0
-dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d9de282b7373be02df68f70858ea202ebbf6481e4c0bdb0aac631550a7e8b5ef
|
| 3 |
+
size 393261
|
-dFAT4oBgHgl3EQfqB3j/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f678bbe6717b031958387f12eb56059b71c914055528c912e41ce78d6f57cae6
|
| 3 |
+
size 18226
|
.gitattributes
CHANGED
|
@@ -8846,3 +8846,65 @@ BtE1T4oBgHgl3EQfVwQu/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
| 8846 |
YtFAT4oBgHgl3EQf3h4G/content/2301.08720v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8847 |
hdFKT4oBgHgl3EQfuS7o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8848 |
EtE0T4oBgHgl3EQfywL5/content/2301.02665v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8846 |
YtFAT4oBgHgl3EQf3h4G/content/2301.08720v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8847 |
hdFKT4oBgHgl3EQfuS7o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8848 |
EtE0T4oBgHgl3EQfywL5/content/2301.02665v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8849 |
+
JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8850 |
+
JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8851 |
+
6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8852 |
+
-dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8853 |
+
3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8854 |
+
kNE0T4oBgHgl3EQfYgB_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8855 |
+
_NAzT4oBgHgl3EQf_f58/content/2301.01949v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8856 |
+
ltAyT4oBgHgl3EQf_vpQ/content/2301.00913v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8857 |
+
RtE0T4oBgHgl3EQfkgHa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8858 |
+
H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8859 |
+
0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8860 |
+
htFLT4oBgHgl3EQfaS9u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8861 |
+
otFPT4oBgHgl3EQfLDSW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8862 |
+
6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8863 |
+
YdAzT4oBgHgl3EQf1_7C/content/2301.01809v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8864 |
+
2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8865 |
+
StE5T4oBgHgl3EQfag8H/content/2301.05588v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8866 |
+
hdAzT4oBgHgl3EQfMvuF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8867 |
+
LdE3T4oBgHgl3EQfvwu2/content/2301.04697v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8868 |
+
89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8869 |
+
ytE2T4oBgHgl3EQf4AhB/content/2301.04176v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8870 |
+
JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8871 |
+
7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8872 |
+
XtFLT4oBgHgl3EQfUS83/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8873 |
+
etE4T4oBgHgl3EQfQwzS/content/2301.04985v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8874 |
+
ONE4T4oBgHgl3EQf9w4Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8875 |
+
h9AyT4oBgHgl3EQfkPiH/content/2301.00430v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8876 |
+
QdFAT4oBgHgl3EQf0B72/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8877 |
+
1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8878 |
+
vNE2T4oBgHgl3EQfgQds/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8879 |
+
7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8880 |
+
s9E2T4oBgHgl3EQffgcE/content/2301.03926v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8881 |
+
YdAzT4oBgHgl3EQf1_7C/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8882 |
+
r9E5T4oBgHgl3EQfKA7Y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8883 |
+
JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8884 |
+
1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8885 |
+
s9E2T4oBgHgl3EQffgcE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8886 |
+
RtE0T4oBgHgl3EQfkgHa/content/2301.02475v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8887 |
+
7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8888 |
+
IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8889 |
+
vNAzT4oBgHgl3EQf6_7w/content/2301.01885v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8890 |
+
LdE3T4oBgHgl3EQfvwu2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8891 |
+
eNFJT4oBgHgl3EQfSyxE/content/2301.11501v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8892 |
+
u9E2T4oBgHgl3EQfgQcG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8893 |
+
H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8894 |
+
QdFPT4oBgHgl3EQfozUy/content/2301.13135v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8895 |
+
MNAyT4oBgHgl3EQfT_ea/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8896 |
+
PdAyT4oBgHgl3EQftfm7/content/2301.00597v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8897 |
+
h9AyT4oBgHgl3EQfkPiH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8898 |
+
09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8899 |
+
mtE0T4oBgHgl3EQfZQBk/content/2301.02318v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8900 |
+
ltAyT4oBgHgl3EQf_vpQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8901 |
+
U9FOT4oBgHgl3EQf6TSQ/content/2301.12957v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8902 |
+
a9A0T4oBgHgl3EQfGP_A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8903 |
+
1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8904 |
+
tNFJT4oBgHgl3EQfdCxQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8905 |
+
pdE5T4oBgHgl3EQfJA4W/content/2301.05453v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8906 |
+
KdE3T4oBgHgl3EQfXwqt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8907 |
+
iNAzT4oBgHgl3EQfbPw2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8908 |
+
UdE4T4oBgHgl3EQfmw2j/content/2301.05171v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8909 |
+
MtAyT4oBgHgl3EQfUPcH/content/2301.00119v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8910 |
+
UdE4T4oBgHgl3EQfmw2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
09E2T4oBgHgl3EQfigc1/content/tmp_files/2301.03958v1.pdf.txt
ADDED
|
@@ -0,0 +1,1608 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.03958v1 [math.AP] 10 Jan 2023
|
| 2 |
+
Rigidity results for the p-Laplacian Poisson problem with Robin
|
| 3 |
+
boundary conditions
|
| 4 |
+
Alba Lia Masiello*, Gloria Paoli
|
| 5 |
+
Abstract
|
| 6 |
+
Let Ω ⊂ Rn be an open, bounded and Lipschitz set. We consider the Poisson problem for
|
| 7 |
+
the p−Laplace operator associated to Ω with Robin boundary conditions. In this setting, we
|
| 8 |
+
study the equality case in the Talenti-type comparison stated in [6]. We prove that the equality
|
| 9 |
+
is achieved only if Ω is a ball and both the function u and the right hand side f of the Poisson
|
| 10 |
+
equation are radial.
|
| 11 |
+
Keywords: Robin boundary conditions, p-Laplace operator, rigidity result, Talenti compari-
|
| 12 |
+
son.
|
| 13 |
+
MSC 2020: 35J92, 35J25, 46E30.
|
| 14 |
+
E-mail address, A.L. Masiello (corresponding author): albalia.masiello@unina.it
|
| 15 |
+
Dipartimento di Matematica e Applicazioni “R. Caccioppoli”, Università degli studi di Napoli
|
| 16 |
+
Federico II, Via Cintia, Complesso Universitario Monte S. Angelo, 80126 Napoli, Italy.
|
| 17 |
+
E-mail address, G. Paoli: gloria.paoli@fau.de
|
| 18 |
+
Department of Data Science (DDS) Chair in Dynamics, Control and Numerics (Alexander von
|
| 19 |
+
Humboldt-Professorship), Cauerstr. 11, 91058 Erlangen, Germany.
|
| 20 |
+
1
|
| 21 |
+
Introduction
|
| 22 |
+
Symmetrization techniques in the context of qualitative properties of solutions to second-order
|
| 23 |
+
elliptic boundary value problems are introduced by Talenti in [25]. In this seminal paper, the
|
| 24 |
+
author considers an open, bounded and Lipschitz set Ω ⊂ Rn, the ball Ω♯ with the same measure
|
| 25 |
+
as Ω and the solutions u and v to the following problems
|
| 26 |
+
®
|
| 27 |
+
−∆uD = f
|
| 28 |
+
in Ω,
|
| 29 |
+
uD = 0
|
| 30 |
+
on ∂Ω,
|
| 31 |
+
®
|
| 32 |
+
−∆vD = f ♯
|
| 33 |
+
in Ω♯,
|
| 34 |
+
vD = 0
|
| 35 |
+
on ∂Ω♯,
|
| 36 |
+
(1)
|
| 37 |
+
where f ∈ L2(Ω) is a positive function and f ♯ is its Schwarz rearrangement of f (see Definition
|
| 38 |
+
2.3). In this setting, Talenti proves the following point-wise estimate:
|
| 39 |
+
u♯
|
| 40 |
+
D(x) ≤ vD(x),
|
| 41 |
+
for all x ∈ Ω♯.
|
| 42 |
+
(2)
|
| 43 |
+
For sake of completeness, we observe that this result is proved more generally for a uniformly
|
| 44 |
+
elliptic linear operator in divergence form.
|
| 45 |
+
1
|
| 46 |
+
|
| 47 |
+
1
|
| 48 |
+
INTRODUCTION
|
| 49 |
+
2
|
| 50 |
+
A version of this result for nonlinear operators in divergence form is contained in [26], which
|
| 51 |
+
includes as a special instance the case of the p-Laplace operator. Moreover, these results are later
|
| 52 |
+
extended, for instance, to the anisotropic elliptic operators in [2], to the parabolic case in [4], and
|
| 53 |
+
to higher order operators in [9, 28].
|
| 54 |
+
Once a comparison result holds, it is natural to ask whether the equality cases can be character-
|
| 55 |
+
ized and, so, if a rigidity result is in force. In [3], the rigidity result linked to problem (1) is proved.
|
| 56 |
+
Indeed, the authors prove that if equality holds in (2), then Ω is a ball, u is radially symmetric
|
| 57 |
+
and decreasing and f = f ♯. Rigidity results for a generic linear, elliptic second order operator can
|
| 58 |
+
be found in [17] and [18]. To the best of our knowledge, rigidity results for nonlinear operators
|
| 59 |
+
with Dirichlet boundary conditions are not present in the literature. In this paper, we obtain, as a
|
| 60 |
+
corollary of our results, the rigidity for the p−Laplace operator with Dirichlet boundary conditions
|
| 61 |
+
in any dimension (see Corollary 3.3).
|
| 62 |
+
For a long time, it was believed that comparison results could not be proved by means of
|
| 63 |
+
spherical rearrangement argument when dealing with Robin boundary conditions, until the recent
|
| 64 |
+
paper [5]. The authors consider the following problems
|
| 65 |
+
|
| 66 |
+
|
| 67 |
+
|
| 68 |
+
|
| 69 |
+
|
| 70 |
+
−∆u = f
|
| 71 |
+
in Ω,
|
| 72 |
+
∂u
|
| 73 |
+
∂ν + βu = 0
|
| 74 |
+
on ∂Ω,
|
| 75 |
+
|
| 76 |
+
|
| 77 |
+
|
| 78 |
+
|
| 79 |
+
|
| 80 |
+
−∆v = f ♯
|
| 81 |
+
in Ω♯,
|
| 82 |
+
∂v
|
| 83 |
+
∂ν + βv = 0
|
| 84 |
+
on ∂Ω♯,
|
| 85 |
+
and they prove a comparison result involving Lorentz norms of u and v whenever f is a non negative
|
| 86 |
+
function in L2(Ω) and β is a positive parameter. In particular, in the case f ≡ 1, they prove
|
| 87 |
+
∥u∥Lp(Ω) ≤ ∥v∥Lp(Ω♯),
|
| 88 |
+
p = 1, 2,
|
| 89 |
+
and, if n = 2, the pointwise comparison holds:
|
| 90 |
+
u♯(x) ≤ v(x),
|
| 91 |
+
for all x ∈ Ω♯.
|
| 92 |
+
(3)
|
| 93 |
+
In [21], it is proved that (3) is rigid, i.e. the equality case is possible if and only if Ω is a ball
|
| 94 |
+
and u is a radial and decreasing function.
|
| 95 |
+
Generalizations of the results contained in [5] can be found for the anisotropic case in [24], for
|
| 96 |
+
mixed boundary conditions in [1], in the case of the Hermite operator in [13].
|
| 97 |
+
In the present paper, we focus our study on the rigidity for p−Laplace operator. In this case,
|
| 98 |
+
the comparison results are obtained in [6] and the setting is the following.
|
| 99 |
+
Let Ω be a bounded, open and Lipschitz set in Rn, with n ≥ 2. Let p ∈ (1, +∞) and let
|
| 100 |
+
f ∈ Lp′(Ω) be a positive function, where p′ = p/(p − 1). The Poisson problem for the p−Laplace
|
| 101 |
+
operator with Robin boundary conditions is
|
| 102 |
+
|
| 103 |
+
|
| 104 |
+
|
| 105 |
+
|
| 106 |
+
|
| 107 |
+
−∆pu := −div(|∇u|p−2∇u) = f
|
| 108 |
+
in Ω
|
| 109 |
+
|∇u|p−2 ∂u
|
| 110 |
+
∂ν + β|u|p−2u = 0
|
| 111 |
+
on ∂Ω,
|
| 112 |
+
(4)
|
| 113 |
+
where ν is the unit exterior normal to ∂Ω and β > 0. A function u ∈ W 1,p(Ω) is a weak solution
|
| 114 |
+
to (4) if
|
| 115 |
+
ˆ
|
| 116 |
+
Ω
|
| 117 |
+
|∇u|p−2∇u∇ϕ dx + β
|
| 118 |
+
ˆ
|
| 119 |
+
∂Ω
|
| 120 |
+
|u|p−2uϕ dHn−1(x) =
|
| 121 |
+
ˆ
|
| 122 |
+
Ω
|
| 123 |
+
fϕ dx,
|
| 124 |
+
∀ϕ ∈ W 1,p(Ω).
|
| 125 |
+
(5)
|
| 126 |
+
|
| 127 |
+
1
|
| 128 |
+
INTRODUCTION
|
| 129 |
+
3
|
| 130 |
+
The symmetrized problem associated to (4) is the following
|
| 131 |
+
|
| 132 |
+
|
| 133 |
+
|
| 134 |
+
|
| 135 |
+
|
| 136 |
+
−∆pv = f ♯
|
| 137 |
+
in Ω♯
|
| 138 |
+
|∇v|p−2 ∂v
|
| 139 |
+
∂ν + β|v|p−2v = 0
|
| 140 |
+
on ∂Ω♯.
|
| 141 |
+
(6)
|
| 142 |
+
In [6] the authors establish a comparison result between suitable Lorentz norms (see Definition
|
| 143 |
+
2.4) of the solutions u and v to problems (4) and (6) respectively. In particular, they prove
|
| 144 |
+
∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
|
| 145 |
+
∀ 0 < k ≤
|
| 146 |
+
n(p − 1)
|
| 147 |
+
(n − 2)p + n,
|
| 148 |
+
(7)
|
| 149 |
+
and in the case f ≡ 1, they prove
|
| 150 |
+
u♯(x) ≤ v(x),
|
| 151 |
+
1 ≤ p ≤
|
| 152 |
+
n
|
| 153 |
+
n − 1
|
| 154 |
+
(8)
|
| 155 |
+
and
|
| 156 |
+
∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
|
| 157 |
+
∀ 0 < k ≤
|
| 158 |
+
n(p − 1)
|
| 159 |
+
(n − 2)p + n,
|
| 160 |
+
∀p > 1.
|
| 161 |
+
(9)
|
| 162 |
+
In the present paper, we want to characterize the equality case in (7) and (9), answering to
|
| 163 |
+
the open problem contained in [21]. For simplicity, we state the main Theorem only in the case
|
| 164 |
+
f ∈ Lp′(Ω) positive, since in the case f ≡ 1 the proof is analogous, as we observe in Remark 4.1.
|
| 165 |
+
Theorem 1.1. Let Ω ⊂ Rn be a bounded, open and Lipschitz set and let Ω♯ be the ball centered at
|
| 166 |
+
the origin with the same measure as Ω. Let u be the solution to (4) and let v be a solution to (6).
|
| 167 |
+
If
|
| 168 |
+
∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
|
| 169 |
+
for some k ∈
|
| 170 |
+
ò
|
| 171 |
+
0,
|
| 172 |
+
n(p − 1)
|
| 173 |
+
(n − 2)p + n
|
| 174 |
+
ò
|
| 175 |
+
(10)
|
| 176 |
+
then, there exists x0 ∈ Rn such that
|
| 177 |
+
Ω = Ω♯ + x0,
|
| 178 |
+
u(· + x0) = v(·),
|
| 179 |
+
f(· + x0) = f ♯(·).
|
| 180 |
+
The idea of the proof of Theorem 1.1 is the following. First of all, we prove that hypothesis
|
| 181 |
+
(10) implies that the superlevel sets of u are balls. The main difficulty is to prove that these balls
|
| 182 |
+
are concentric.
|
| 183 |
+
Differently from the case of the Laplace operator with Dirichlet boundary conditions studied in
|
| 184 |
+
[4, 16], we can’t apply directly the steepest descent method introduced in [8], because it strongly
|
| 185 |
+
relays on the continuity of both the solution and of its gradient. In the case of the p−Laplace
|
| 186 |
+
equation, the continuity of the solution up to the boundary depends on the regularity of the given
|
| 187 |
+
datum f. To overcome this regularity issue we show that u is a solution to a suitable Dirichlet
|
| 188 |
+
problem and it satisfies the Pólya-Szegő inequality with equality sign. Then, we can conclude that
|
| 189 |
+
u is radially symmetric and decreasing, using the classical result contained in [10]. We make use
|
| 190 |
+
of Lemma 3.2, where the rigidity of the Poisson problem for the p-Laplace operator with Dirichlet
|
| 191 |
+
boundary condition is proved under the assumption f ∈ Lp′(Ω) and positive. Up to our knowledge,
|
| 192 |
+
Corollary 3.3 seems to be new in the literature.
|
| 193 |
+
The paper is organized as follows. In Section 2 we recall some definitions about rearrangement
|
| 194 |
+
of functions and we state some lemmas that we will need in the proof of the main theorem. Section
|
| 195 |
+
3 is dedicated to the proof of the main result and we conclude with a list of open problems.
|
| 196 |
+
|
| 197 |
+
2
|
| 198 |
+
NOTATION AND PRELIMINARIES
|
| 199 |
+
4
|
| 200 |
+
2
|
| 201 |
+
Notation and Preliminaries
|
| 202 |
+
Throughout this article we will denote by |Ω| the Lebesgue measure of an open and bounded
|
| 203 |
+
Lipschitz set of Rn, with n ≥ 2, and by P(Ω) the perimeter of Ω. Since we are assuming that
|
| 204 |
+
∂Ω is Lipschitz, we have that P(Ω) = Hn−1(∂Ω), where Hn−1 denotes the (n − 1)−dimensional
|
| 205 |
+
Hausdorff measure.
|
| 206 |
+
We recall the classical isoperimetric inequality and and we refer the reader, for example, to
|
| 207 |
+
[22, 11, 12, 27] and to the original paper by De Giorgi [15].
|
| 208 |
+
Theorem 2.1 (Isoperimetric Inequality). Let E ⊂ Rn be a set of finite perimeter. Then,
|
| 209 |
+
nω
|
| 210 |
+
1
|
| 211 |
+
nn |E|
|
| 212 |
+
n−1
|
| 213 |
+
n
|
| 214 |
+
≤ P(E),
|
| 215 |
+
(11)
|
| 216 |
+
where ωn is the measure of the unit ball in Rn. Equality occurs if and only if E is (equivalent to)
|
| 217 |
+
a Ball.
|
| 218 |
+
For the following theorem, we refer to [7].
|
| 219 |
+
Theorem 2.2 (Coarea formula). Let Ω ⊂ Rn be an open set with Lipschitz boundary. Let f ∈
|
| 220 |
+
W 1,1
|
| 221 |
+
loc (Ω) and let u : Ω → R be a measurable function. Then,
|
| 222 |
+
ˆ
|
| 223 |
+
Ω
|
| 224 |
+
u(x)|∇f(x)|dx =
|
| 225 |
+
ˆ
|
| 226 |
+
R
|
| 227 |
+
dt
|
| 228 |
+
ˆ
|
| 229 |
+
Ω∩f−1(t)
|
| 230 |
+
u(y) dHn−1(y).
|
| 231 |
+
(12)
|
| 232 |
+
Let us recall some basic notions about rearrangements. For a general overview, see, for instance,
|
| 233 |
+
[19].
|
| 234 |
+
Definition 2.1. Let u : Ω → R be a measurable function, the distribution function of u is the
|
| 235 |
+
function µ : [0, +∞[ → [0, +∞[ defined as the measure of the superlevel sets of u, i.e.
|
| 236 |
+
µ(t) = |{ x ∈ Ω : |u(x)| > t }|.
|
| 237 |
+
Definition 2.2. Let u : Ω → R be a measurable function, the decreasing rearrangement of u is
|
| 238 |
+
the distribution function of µ. We will denote it by u∗(·).
|
| 239 |
+
Remark 2.1. Let us notice that the function µ(·) is decreasing and right continuous and the
|
| 240 |
+
function u∗(·) is its generalized inverse.
|
| 241 |
+
Definition 2.3. The Schwartz rearrangement of u is the function u♯ whose superlevel sets are
|
| 242 |
+
balls with the same measure as the superlevel sets of u.
|
| 243 |
+
We have the following relation between u♯ and u∗:
|
| 244 |
+
u♯(x) = u∗(ωn|x|n),
|
| 245 |
+
where ωn is the measure of the unit ball in Rn, and one can easily check that the functions u, u∗
|
| 246 |
+
e u♯ are equi-distributed, i.e. they have the same distribution function, and it holds
|
| 247 |
+
∥u∥Lp(Ω) = ∥u∗∥Lp(0,|Ω|) = ∥u♯∥Lp(Ω♯),
|
| 248 |
+
for all p ≥ 1.
|
| 249 |
+
|
| 250 |
+
2
|
| 251 |
+
NOTATION AND PRELIMINARIES
|
| 252 |
+
5
|
| 253 |
+
We also recall the Hardy-Littlewood inequality, an important propriety of the decreasing rear-
|
| 254 |
+
rangement,
|
| 255 |
+
ˆ
|
| 256 |
+
Ω
|
| 257 |
+
|h(x)g(x)| dx ≤
|
| 258 |
+
ˆ |Ω|
|
| 259 |
+
0
|
| 260 |
+
h∗(s)g∗(s) ds.
|
| 261 |
+
So, by choosing h(·) = χ{|u|>t}, one has
|
| 262 |
+
ˆ
|
| 263 |
+
|u|>t
|
| 264 |
+
|g(x)| dx ≤
|
| 265 |
+
ˆ µ(t)
|
| 266 |
+
0
|
| 267 |
+
g∗(s) ds.
|
| 268 |
+
We now introduce the Lorentz spaces (see [28] for more details on this topic).
|
| 269 |
+
Definition 2.4. Let 0 < p < +∞ and 0 < q ≤ +∞. The Lorentz space Lp,q(Ω) is the space of
|
| 270 |
+
those functions such that the quantity:
|
| 271 |
+
∥u∥Lp,q =
|
| 272 |
+
|
| 273 |
+
|
| 274 |
+
|
| 275 |
+
|
| 276 |
+
|
| 277 |
+
|
| 278 |
+
|
| 279 |
+
p
|
| 280 |
+
1
|
| 281 |
+
q
|
| 282 |
+
ň ∞
|
| 283 |
+
0
|
| 284 |
+
tqµ(t)
|
| 285 |
+
q
|
| 286 |
+
p dt
|
| 287 |
+
t
|
| 288 |
+
ã 1
|
| 289 |
+
q
|
| 290 |
+
0 < q < ∞
|
| 291 |
+
sup
|
| 292 |
+
t>0
|
| 293 |
+
(tpµ(t))
|
| 294 |
+
q = ∞
|
| 295 |
+
is finite.
|
| 296 |
+
Let us observe that for p = q the Lorentz space coincides with the Lp space, as a consequence
|
| 297 |
+
of the Cavalieri’s Principle
|
| 298 |
+
ˆ
|
| 299 |
+
Ω
|
| 300 |
+
|u|p = p
|
| 301 |
+
ˆ +∞
|
| 302 |
+
0
|
| 303 |
+
tp−1µ(t) dt.
|
| 304 |
+
The solutions u to problem (4) and v to problem (6) are both p-superharmonic and, as a conse-
|
| 305 |
+
quence of the strong maximum principle and the lower semicontinuity (see [29, 20]), they achieve
|
| 306 |
+
their minima on the boundary. If we set
|
| 307 |
+
um = min
|
| 308 |
+
Ω u,
|
| 309 |
+
vm = min
|
| 310 |
+
Ω♯ v
|
| 311 |
+
the positiveness of β and the Robin boundary conditions leads to um ≥ 0 and vm ≥ 0. Hence, u
|
| 312 |
+
and v are strictly positive in the interior of Ω. Moreover, we can observe that
|
| 313 |
+
um = min
|
| 314 |
+
Ω u ≤ min
|
| 315 |
+
Ω♯ v = vm,
|
| 316 |
+
(13)
|
| 317 |
+
indeed,
|
| 318 |
+
vp−1
|
| 319 |
+
m P(Ω♯) =
|
| 320 |
+
ˆ
|
| 321 |
+
∂Ω♯ v(x)p−1 dHn−1(x) = 1
|
| 322 |
+
β
|
| 323 |
+
ˆ
|
| 324 |
+
Ω♯ f ♯ dx = 1
|
| 325 |
+
β
|
| 326 |
+
ˆ
|
| 327 |
+
Ω
|
| 328 |
+
f dx
|
| 329 |
+
=
|
| 330 |
+
ˆ
|
| 331 |
+
∂Ω
|
| 332 |
+
u(x)p−1 dHn−1(x)
|
| 333 |
+
≥ up−1
|
| 334 |
+
m P(Ω) ≥ ump−1P(Ω♯).
|
| 335 |
+
Moreover, it holds
|
| 336 |
+
µ(t) ≤ φ(t) = |Ω|,
|
| 337 |
+
∀t ≤ vm.
|
| 338 |
+
(14)
|
| 339 |
+
|
| 340 |
+
2
|
| 341 |
+
NOTATION AND PRELIMINARIES
|
| 342 |
+
6
|
| 343 |
+
Now, for t ≥ 0, we introduce the following notations:
|
| 344 |
+
Ut = {x ∈ Ω : u(x) > t}
|
| 345 |
+
∂Uint
|
| 346 |
+
t
|
| 347 |
+
= ∂Ut ∩ Ω,
|
| 348 |
+
∂Uext
|
| 349 |
+
t
|
| 350 |
+
= ∂Ut ∩ ∂Ω,
|
| 351 |
+
µ(t) = |Ut|
|
| 352 |
+
and
|
| 353 |
+
Vt =
|
| 354 |
+
¶
|
| 355 |
+
x ∈ Ω♯ : v(x) > t
|
| 356 |
+
©
|
| 357 |
+
,
|
| 358 |
+
∂V int
|
| 359 |
+
t
|
| 360 |
+
= ∂Vt ∩ Ω,
|
| 361 |
+
∂V ext
|
| 362 |
+
t
|
| 363 |
+
= ∂Vt ∩ ∂Ω,
|
| 364 |
+
φ(t) = |Vt|.
|
| 365 |
+
Because of the invariance of the p−Laplacian and of the Schwarz rearrangement of f by rotation,
|
| 366 |
+
the solution v to (6) is radial, so the set Vt are balls.
|
| 367 |
+
Now, we recall some technical Lemmas, proved in [6], that we need in what follows. We recall
|
| 368 |
+
the proof of Lemma 2.3 for reader’s convenience, while we omit the proof of Lemma 2.4 and Lemma
|
| 369 |
+
2.5.
|
| 370 |
+
Lemma 2.3. Let u be the solution to (4) and let v be the solution to (6). Then, for almost every
|
| 371 |
+
t > 0, we have
|
| 372 |
+
γnµ(t)(1− 1
|
| 373 |
+
n)
|
| 374 |
+
p
|
| 375 |
+
p−1 ≤
|
| 376 |
+
Lj µ(t)
|
| 377 |
+
0
|
| 378 |
+
f ∗(s) ds
|
| 379 |
+
å
|
| 380 |
+
1
|
| 381 |
+
p−1 Ç
|
| 382 |
+
−µ′(t) +
|
| 383 |
+
1
|
| 384 |
+
β
|
| 385 |
+
1
|
| 386 |
+
p−1
|
| 387 |
+
ˆ
|
| 388 |
+
∂Uext
|
| 389 |
+
t
|
| 390 |
+
1
|
| 391 |
+
u dHn−1(x)
|
| 392 |
+
å
|
| 393 |
+
(15)
|
| 394 |
+
and
|
| 395 |
+
γnφ(t)(1− 1
|
| 396 |
+
n)
|
| 397 |
+
p
|
| 398 |
+
p−1 =
|
| 399 |
+
Lj φ(t)
|
| 400 |
+
0
|
| 401 |
+
f ∗(s) ds
|
| 402 |
+
å
|
| 403 |
+
1
|
| 404 |
+
p−1 Ç
|
| 405 |
+
−φ′(t) +
|
| 406 |
+
1
|
| 407 |
+
β
|
| 408 |
+
1
|
| 409 |
+
p−1
|
| 410 |
+
ˆ
|
| 411 |
+
∂V ext
|
| 412 |
+
t
|
| 413 |
+
1
|
| 414 |
+
v dHn−1(x)
|
| 415 |
+
å
|
| 416 |
+
.
|
| 417 |
+
(16)
|
| 418 |
+
where γn =
|
| 419 |
+
Ä
|
| 420 |
+
nω1/n
|
| 421 |
+
n
|
| 422 |
+
ä
|
| 423 |
+
p
|
| 424 |
+
p−1.
|
| 425 |
+
Proof. Let t > 0 and h > 0. In the weak formulation (5), we choose the following test function
|
| 426 |
+
ϕ(x) =
|
| 427 |
+
|
| 428 |
+
|
| 429 |
+
|
| 430 |
+
|
| 431 |
+
|
| 432 |
+
0
|
| 433 |
+
if u < t
|
| 434 |
+
u − t
|
| 435 |
+
if t < u < t + h
|
| 436 |
+
h
|
| 437 |
+
if u > t + h,
|
| 438 |
+
(17)
|
| 439 |
+
obtaining
|
| 440 |
+
ˆ
|
| 441 |
+
Ut\Ut+h
|
| 442 |
+
|∇u|p dx + βh
|
| 443 |
+
ˆ
|
| 444 |
+
∂Uext
|
| 445 |
+
t+h
|
| 446 |
+
up−1 dHn−1(x) + β
|
| 447 |
+
ˆ
|
| 448 |
+
∂Uext
|
| 449 |
+
t
|
| 450 |
+
\∂Uext
|
| 451 |
+
t+h
|
| 452 |
+
up−1(u − t) dHn−1(x)
|
| 453 |
+
=
|
| 454 |
+
ˆ
|
| 455 |
+
Ut\Ut+h
|
| 456 |
+
f(u − t) dx + h
|
| 457 |
+
ˆ
|
| 458 |
+
Ut+h
|
| 459 |
+
f dx.
|
| 460 |
+
(18)
|
| 461 |
+
Dividing (18) by h, using coarea formula and letting h go to 0, we have that for a.e. t > 0
|
| 462 |
+
ˆ
|
| 463 |
+
∂Ut
|
| 464 |
+
g(x) dHn−1 =
|
| 465 |
+
ˆ
|
| 466 |
+
Ut
|
| 467 |
+
f dx,
|
| 468 |
+
where
|
| 469 |
+
®
|
| 470 |
+
|∇u|p−1
|
| 471 |
+
if x ∈ ∂Uint
|
| 472 |
+
t
|
| 473 |
+
,
|
| 474 |
+
βup−1
|
| 475 |
+
if x ∈ ∂Uext
|
| 476 |
+
t
|
| 477 |
+
.
|
| 478 |
+
(19)
|
| 479 |
+
|
| 480 |
+
2
|
| 481 |
+
NOTATION AND PRELIMINARIES
|
| 482 |
+
7
|
| 483 |
+
Using the isoperimetric inequality, for a.e. t ∈ [0, +∞) we have
|
| 484 |
+
nω
|
| 485 |
+
1
|
| 486 |
+
nn µ(t)
|
| 487 |
+
n−1
|
| 488 |
+
n
|
| 489 |
+
≤ P(Ut) =
|
| 490 |
+
ˆ
|
| 491 |
+
∂Ut
|
| 492 |
+
dHn−1
|
| 493 |
+
(20)
|
| 494 |
+
≤
|
| 495 |
+
ň
|
| 496 |
+
∂Ut
|
| 497 |
+
g dHn−1(x)
|
| 498 |
+
ã 1
|
| 499 |
+
p Lj
|
| 500 |
+
∂Ut
|
| 501 |
+
1
|
| 502 |
+
g
|
| 503 |
+
1
|
| 504 |
+
p−1
|
| 505 |
+
dHn−1(x)
|
| 506 |
+
å1− 1
|
| 507 |
+
p
|
| 508 |
+
(21)
|
| 509 |
+
=
|
| 510 |
+
ň
|
| 511 |
+
∂Ut
|
| 512 |
+
g dHn−1(x)
|
| 513 |
+
ã 1
|
| 514 |
+
p Lj
|
| 515 |
+
∂Uint
|
| 516 |
+
t
|
| 517 |
+
1
|
| 518 |
+
|∇u| dHn−1(x) +
|
| 519 |
+
1
|
| 520 |
+
β
|
| 521 |
+
1
|
| 522 |
+
p−1
|
| 523 |
+
ˆ
|
| 524 |
+
∂Uext
|
| 525 |
+
t
|
| 526 |
+
1
|
| 527 |
+
u dHn−1(x)
|
| 528 |
+
å1− 1
|
| 529 |
+
p
|
| 530 |
+
(22)
|
| 531 |
+
≤
|
| 532 |
+
Lj µ(t)
|
| 533 |
+
0
|
| 534 |
+
f ∗(s) ds
|
| 535 |
+
å 1
|
| 536 |
+
p Ç
|
| 537 |
+
−µ′(t) +
|
| 538 |
+
1
|
| 539 |
+
β
|
| 540 |
+
1
|
| 541 |
+
p−1
|
| 542 |
+
ˆ
|
| 543 |
+
∂Uext
|
| 544 |
+
t
|
| 545 |
+
1
|
| 546 |
+
u dHn−1(x)
|
| 547 |
+
å1− 1
|
| 548 |
+
p
|
| 549 |
+
,
|
| 550 |
+
(23)
|
| 551 |
+
and, so, (15) follows. Finally, we notice that, if v is the solution to (6), then all the inequalities
|
| 552 |
+
above are equalities, and, consequently, we have (16).
|
| 553 |
+
Lemma 2.4. For all τ ≥ vm, we have
|
| 554 |
+
ˆ τ
|
| 555 |
+
0
|
| 556 |
+
tp−1
|
| 557 |
+
Lj
|
| 558 |
+
∂Uext
|
| 559 |
+
t
|
| 560 |
+
1
|
| 561 |
+
u(x) dHn−1(x)
|
| 562 |
+
å
|
| 563 |
+
dt ≤ 1
|
| 564 |
+
pβ
|
| 565 |
+
ˆ |Ω|
|
| 566 |
+
0
|
| 567 |
+
f ∗(s) ds.
|
| 568 |
+
(24)
|
| 569 |
+
Moreover,
|
| 570 |
+
ˆ τ
|
| 571 |
+
0
|
| 572 |
+
tp−1
|
| 573 |
+
ň
|
| 574 |
+
∂Vt∩∂Ω♯
|
| 575 |
+
1
|
| 576 |
+
v(x) dHn−1(x)
|
| 577 |
+
ã
|
| 578 |
+
dt = 1
|
| 579 |
+
pβ
|
| 580 |
+
ˆ |Ω|
|
| 581 |
+
0
|
| 582 |
+
f ∗(s) ds,
|
| 583 |
+
(25)
|
| 584 |
+
Lemma 2.5 (Gronwall). Let ξ(τ) be a continuously differentiable function, let q > 1 and let C be
|
| 585 |
+
a non negative constant C such that the following differential inequality holds
|
| 586 |
+
τξ′(τ) ≤ (q − 1)ξ(τ) + C
|
| 587 |
+
∀τ ≥ τ0 > 0.
|
| 588 |
+
Then, we have
|
| 589 |
+
ξ(τ) ≤
|
| 590 |
+
Å
|
| 591 |
+
ξ(τ0) +
|
| 592 |
+
C
|
| 593 |
+
q − 1
|
| 594 |
+
ã Å τ
|
| 595 |
+
τ0
|
| 596 |
+
ãq−1
|
| 597 |
+
−
|
| 598 |
+
C
|
| 599 |
+
q − 1
|
| 600 |
+
∀τ ≥ τ0,
|
| 601 |
+
(26)
|
| 602 |
+
and
|
| 603 |
+
ξ′(τ) ≤
|
| 604 |
+
Å(q − 1)ξ(τ0) + C
|
| 605 |
+
τ0
|
| 606 |
+
ã Å τ
|
| 607 |
+
τ0
|
| 608 |
+
ãq−2
|
| 609 |
+
∀τ ≥ τ0.
|
| 610 |
+
(27)
|
| 611 |
+
The following Lemma is contained in [4].
|
| 612 |
+
Lemma 2.6. Let f, g ∈ L2(Ω) be two positive functions. If
|
| 613 |
+
ˆ
|
| 614 |
+
Ω
|
| 615 |
+
fg dx =
|
| 616 |
+
ˆ
|
| 617 |
+
Ω♯ f ♯g♯ dx,
|
| 618 |
+
(28)
|
| 619 |
+
then, for every τ ≥ 0 there exists t ≥ 0 such that we have, up to zero measure set,
|
| 620 |
+
{g > τ} = {f > t}.
|
| 621 |
+
(29)
|
| 622 |
+
|
| 623 |
+
3
|
| 624 |
+
PROOF OF THEOREM ??
|
| 625 |
+
8
|
| 626 |
+
We conclude this preliminary session, recalling the classical results contained in [10] (see The-
|
| 627 |
+
orem 1.1 and Lemma 2.3). In particular, the result contained in (iii) of Lemma (2.7) gives the
|
| 628 |
+
rigidity of the Pólya-Szegő inequality (see [23]):
|
| 629 |
+
ˆ
|
| 630 |
+
Rn |∇u♯|p dx ≤
|
| 631 |
+
ˆ
|
| 632 |
+
Rn |∇u|p dx,
|
| 633 |
+
∀u ∈ W 1,p(Rn).
|
| 634 |
+
(30)
|
| 635 |
+
Theorem 2.7. Let w ∈ W 1,p(Rn), let σ(t) be its distribution function and let
|
| 636 |
+
wM :=
|
| 637 |
+
®
|
| 638 |
+
∥w∥∞
|
| 639 |
+
if w ∈ L∞(Ω)
|
| 640 |
+
+∞
|
| 641 |
+
otherwise.
|
| 642 |
+
Then, the following are true:
|
| 643 |
+
i. For almost all t ∈ (0, wM),
|
| 644 |
+
∞ > −σ′(t) ≥
|
| 645 |
+
ˆ
|
| 646 |
+
w−1(t)
|
| 647 |
+
1
|
| 648 |
+
|∇w|dHn−1
|
| 649 |
+
(31)
|
| 650 |
+
ii. σ is absolutely continuous if and only if
|
| 651 |
+
���
|
| 652 |
+
¶
|
| 653 |
+
|∇w♯| = 0
|
| 654 |
+
©
|
| 655 |
+
∩
|
| 656 |
+
¶
|
| 657 |
+
0 < w♯ < wM
|
| 658 |
+
©��� = 0.
|
| 659 |
+
(32)
|
| 660 |
+
iii. If
|
| 661 |
+
ˆ
|
| 662 |
+
Rn |∇w|p =
|
| 663 |
+
ˆ
|
| 664 |
+
Rn |∇w♯|p,
|
| 665 |
+
(33)
|
| 666 |
+
and (32) holds, then there exist a translate of w♯ which is almost everywhere equal to w.
|
| 667 |
+
Remark 2.2. We observe that in [14], it is proved that the condition
|
| 668 |
+
|{ |∇w| = 0 } ∩ { 0 < w < wM }| = 0
|
| 669 |
+
(34)
|
| 670 |
+
implies (32). So, by (iii) in Lemma 2.7, if we have (33) and (34), there exists a translated of w♯
|
| 671 |
+
which is almost everywhere equal to w.
|
| 672 |
+
Remark 2.3. We observe that the Pólya -Szegő inequality (30) and the relative rigidity result
|
| 673 |
+
(iii) contained in Lemma 2.7 hold also if we assume w ∈ W 1,p
|
| 674 |
+
0 (Ω). Indeed, it is easily proved that
|
| 675 |
+
for every w ∈ W 1,p
|
| 676 |
+
0 (Ω) one has w♯ ∈ W 1,p
|
| 677 |
+
0 (Ω♯).
|
| 678 |
+
3
|
| 679 |
+
Proof of Theorem 1.1
|
| 680 |
+
In order to prove the main Theorem 1.1, we divide the proof into the following steps. First of all,
|
| 681 |
+
we prove that, under the assumptions of Theorem 1.1, equality holds in (15) and this is the content
|
| 682 |
+
of Proposition 3.1. Then, in Proposition 3.4, we prove that equality in (15) implies the fact that Ω
|
| 683 |
+
is a ball and u and f are radial functions. In order to prove this last step, we need the key Lemma
|
| 684 |
+
3.2.
|
| 685 |
+
|
| 686 |
+
3
|
| 687 |
+
PROOF OF THEOREM ??
|
| 688 |
+
9
|
| 689 |
+
Proposition 3.1. Let u be the solution to (4) and let v be the solution to (6). If there exists k
|
| 690 |
+
k ∈
|
| 691 |
+
ò
|
| 692 |
+
0,
|
| 693 |
+
n(p − 1)
|
| 694 |
+
(n − 2)p + n
|
| 695 |
+
ò
|
| 696 |
+
such that
|
| 697 |
+
∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
|
| 698 |
+
then equality holds in (15) for almost every t.
|
| 699 |
+
Proof. Since we are assuming that ∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯), we have that
|
| 700 |
+
ˆ +∞
|
| 701 |
+
0
|
| 702 |
+
tp−1µ(t)
|
| 703 |
+
1
|
| 704 |
+
k dt =
|
| 705 |
+
ˆ +∞
|
| 706 |
+
0
|
| 707 |
+
tp−1φ(t)
|
| 708 |
+
1
|
| 709 |
+
k dt.
|
| 710 |
+
(35)
|
| 711 |
+
Let us multiply (15) by tp−1µ(t)α, where α = 1
|
| 712 |
+
k −
|
| 713 |
+
Å
|
| 714 |
+
1 − 1
|
| 715 |
+
n
|
| 716 |
+
ã
|
| 717 |
+
p
|
| 718 |
+
p − 1, and let us integrate from 0 to
|
| 719 |
+
+∞:
|
| 720 |
+
γn
|
| 721 |
+
ˆ +∞
|
| 722 |
+
0
|
| 723 |
+
tp−1µ
|
| 724 |
+
1
|
| 725 |
+
k (t) dt
|
| 726 |
+
≤
|
| 727 |
+
ˆ +∞
|
| 728 |
+
0
|
| 729 |
+
Lj µ(t)
|
| 730 |
+
0
|
| 731 |
+
f ∗(s) ds
|
| 732 |
+
å
|
| 733 |
+
1
|
| 734 |
+
p−1 Ç
|
| 735 |
+
−µ′(t) +
|
| 736 |
+
1
|
| 737 |
+
β
|
| 738 |
+
1
|
| 739 |
+
p−1
|
| 740 |
+
ˆ
|
| 741 |
+
∂Uext
|
| 742 |
+
t
|
| 743 |
+
1
|
| 744 |
+
u dHn−1
|
| 745 |
+
å
|
| 746 |
+
tp−1µ(t)α dt
|
| 747 |
+
≤
|
| 748 |
+
ˆ +∞
|
| 749 |
+
0
|
| 750 |
+
tp−1µ(t)α
|
| 751 |
+
Lj µ(t)
|
| 752 |
+
0
|
| 753 |
+
f ∗(s) ds
|
| 754 |
+
å
|
| 755 |
+
1
|
| 756 |
+
p−1
|
| 757 |
+
(−µ′(t)) dt + |Ω|α
|
| 758 |
+
pβ
|
| 759 |
+
p
|
| 760 |
+
p−1
|
| 761 |
+
Lj |Ω|
|
| 762 |
+
0
|
| 763 |
+
f ∗(s) ds
|
| 764 |
+
å
|
| 765 |
+
p
|
| 766 |
+
p−1
|
| 767 |
+
,
|
| 768 |
+
(36)
|
| 769 |
+
where in the last inequality we have used µ(t) ≤ |Ω| and (24) in Lemma 2.4. As far as v is
|
| 770 |
+
concerned, it holds
|
| 771 |
+
γn
|
| 772 |
+
ˆ +∞
|
| 773 |
+
0
|
| 774 |
+
tp−1φ
|
| 775 |
+
1
|
| 776 |
+
k (t) dt
|
| 777 |
+
=
|
| 778 |
+
ˆ +∞
|
| 779 |
+
0
|
| 780 |
+
Lj φ(t)
|
| 781 |
+
0
|
| 782 |
+
f ∗(s) ds
|
| 783 |
+
å
|
| 784 |
+
1
|
| 785 |
+
p−1 Ç
|
| 786 |
+
−φ′(t) +
|
| 787 |
+
1
|
| 788 |
+
β
|
| 789 |
+
1
|
| 790 |
+
p−1
|
| 791 |
+
ˆ
|
| 792 |
+
∂V ext
|
| 793 |
+
t
|
| 794 |
+
1
|
| 795 |
+
u dHn−1
|
| 796 |
+
å
|
| 797 |
+
tp−1φ(t)α dt
|
| 798 |
+
=
|
| 799 |
+
ˆ +∞
|
| 800 |
+
0
|
| 801 |
+
tp−1φ(t)α
|
| 802 |
+
Lj φ(t)
|
| 803 |
+
0
|
| 804 |
+
f ∗(s) ds
|
| 805 |
+
å
|
| 806 |
+
1
|
| 807 |
+
p−1
|
| 808 |
+
(−φ′(t)) dt + |Ω|α
|
| 809 |
+
pβ
|
| 810 |
+
p
|
| 811 |
+
p−1
|
| 812 |
+
Lj |Ω|
|
| 813 |
+
0
|
| 814 |
+
f ∗(s) ds
|
| 815 |
+
å
|
| 816 |
+
p
|
| 817 |
+
p−1
|
| 818 |
+
.
|
| 819 |
+
(37)
|
| 820 |
+
We observe that the left-hand-side of (36) and the left-hand-side of (37) are equal from (35). So,
|
| 821 |
+
it follows
|
| 822 |
+
ˆ +∞
|
| 823 |
+
0
|
| 824 |
+
tp−1φ(t)α
|
| 825 |
+
Lj φ(t)
|
| 826 |
+
0
|
| 827 |
+
f ∗(s) ds
|
| 828 |
+
å
|
| 829 |
+
1
|
| 830 |
+
p−1
|
| 831 |
+
(−φ′(t)) dt ≤
|
| 832 |
+
ˆ +∞
|
| 833 |
+
0
|
| 834 |
+
tp−1µ(t)α
|
| 835 |
+
Lj µ(t)
|
| 836 |
+
0
|
| 837 |
+
f ∗(s) ds
|
| 838 |
+
å
|
| 839 |
+
1
|
| 840 |
+
p−1
|
| 841 |
+
(−µ′(t)) dt.
|
| 842 |
+
(38)
|
| 843 |
+
Setting F(l) =
|
| 844 |
+
ˆ l
|
| 845 |
+
0
|
| 846 |
+
ωδ
|
| 847 |
+
�ˆ ω
|
| 848 |
+
0
|
| 849 |
+
f ∗(s) ds
|
| 850 |
+
�
|
| 851 |
+
1
|
| 852 |
+
p−1
|
| 853 |
+
dω, and integrating (38) by parts, we get
|
| 854 |
+
ˆ ∞
|
| 855 |
+
0
|
| 856 |
+
tp−2F(φ(t)) dt ≤
|
| 857 |
+
ˆ ∞
|
| 858 |
+
0
|
| 859 |
+
tp−2F(µ(t)) dt,
|
| 860 |
+
being µ(t) = φ(t) = 0 for t > vM. In [6] (see the proof of Theorem 1.1), it is proved that
|
| 861 |
+
ˆ ∞
|
| 862 |
+
0
|
| 863 |
+
tp−2F(µ(t)) dt ≤
|
| 864 |
+
ˆ ∞
|
| 865 |
+
0
|
| 866 |
+
tp−2F(φ(t)) dt.
|
| 867 |
+
(39)
|
| 868 |
+
|
| 869 |
+
3
|
| 870 |
+
PROOF OF THEOREM ??
|
| 871 |
+
10
|
| 872 |
+
and we recall here the proof for the reader’s convenience. In order to do that, we multiply (15)
|
| 873 |
+
by tp−1F(µ(t))µ(t)− (n−1)p
|
| 874 |
+
n(p−1) and we integrate between 0 and τ > vm. First, we observe that, by
|
| 875 |
+
the hypothesis k ≤
|
| 876 |
+
n(p − 1)
|
| 877 |
+
(n − 2)p + n, it follows that the function h(l) = F(l)l− (n−1)p
|
| 878 |
+
n(p−1) is non decreasing.
|
| 879 |
+
Hence, we obtain
|
| 880 |
+
ˆ τ
|
| 881 |
+
0
|
| 882 |
+
γntp−1F(µ(t)) dt ≤
|
| 883 |
+
ˆ τ
|
| 884 |
+
0
|
| 885 |
+
�
|
| 886 |
+
−µ′(t)
|
| 887 |
+
�
|
| 888 |
+
tp−1µ(t)− (n−1)p
|
| 889 |
+
n(p−1) F(µ(t))
|
| 890 |
+
Lj µ(t)
|
| 891 |
+
0
|
| 892 |
+
f ∗(s) ds
|
| 893 |
+
å
|
| 894 |
+
1
|
| 895 |
+
p−1
|
| 896 |
+
dt
|
| 897 |
+
+ F(|Ω|)|Ω|− p(n−1)
|
| 898 |
+
n(p−1)
|
| 899 |
+
pβ
|
| 900 |
+
p
|
| 901 |
+
p−1
|
| 902 |
+
Lj |Ω|
|
| 903 |
+
0
|
| 904 |
+
f ∗(s) ds
|
| 905 |
+
å
|
| 906 |
+
p
|
| 907 |
+
p−1
|
| 908 |
+
.
|
| 909 |
+
If we integrate by parts both sides of the last expression and we set
|
| 910 |
+
C = F(|Ω|)|Ω|− p(n−1)
|
| 911 |
+
n(p−1)
|
| 912 |
+
pβ
|
| 913 |
+
p
|
| 914 |
+
p−1
|
| 915 |
+
Lj |Ω|
|
| 916 |
+
0
|
| 917 |
+
f ∗(s) ds
|
| 918 |
+
å
|
| 919 |
+
p
|
| 920 |
+
p−1
|
| 921 |
+
,
|
| 922 |
+
we obtain
|
| 923 |
+
τ
|
| 924 |
+
ˆ τ
|
| 925 |
+
0
|
| 926 |
+
γntp−2F(µ(t)) dt + τHµ(τ) ≤
|
| 927 |
+
ˆ τ
|
| 928 |
+
0
|
| 929 |
+
ˆ t
|
| 930 |
+
0
|
| 931 |
+
rp−2F(µ(r)) drdt +
|
| 932 |
+
ˆ τ
|
| 933 |
+
0
|
| 934 |
+
Hµ(t) dt + C,
|
| 935 |
+
(40)
|
| 936 |
+
where
|
| 937 |
+
Hµ(τ) = −
|
| 938 |
+
ˆ +∞
|
| 939 |
+
τ
|
| 940 |
+
tp−2µ(t)− p(n−1)
|
| 941 |
+
n(p−1) F(µ(t))
|
| 942 |
+
ň µ(t)
|
| 943 |
+
0
|
| 944 |
+
f ∗(s) ds
|
| 945 |
+
ã
|
| 946 |
+
1
|
| 947 |
+
p−1
|
| 948 |
+
dµ(t).
|
| 949 |
+
Setting now
|
| 950 |
+
ξ(τ) =
|
| 951 |
+
ˆ τ
|
| 952 |
+
0
|
| 953 |
+
ˆ t
|
| 954 |
+
0
|
| 955 |
+
γnrp−2F(µ(r)) dr +
|
| 956 |
+
ˆ t
|
| 957 |
+
0
|
| 958 |
+
Hµ(t) dt,
|
| 959 |
+
inequality (40) becomes
|
| 960 |
+
τξ′(τ) ≤ ξ(τ) + C.
|
| 961 |
+
So, Lemma 2.5, with τ0 = vm and q=2, gives
|
| 962 |
+
ˆ τ
|
| 963 |
+
0
|
| 964 |
+
γntp−2F(µ(t)) dt + Hµ(τ) ≤
|
| 965 |
+
܈ vm
|
| 966 |
+
0
|
| 967 |
+
tp−2F(µ(t) dt + Hµ(vm) + C
|
| 968 |
+
vm
|
| 969 |
+
ê
|
| 970 |
+
.
|
| 971 |
+
Of course, the inequality holds as equality if we replace µ(t) with φ(t), so we get:
|
| 972 |
+
ˆ τ
|
| 973 |
+
0
|
| 974 |
+
γntp−2F(µ(t)) dt + Hµ(τ) ≤
|
| 975 |
+
ˆ τ
|
| 976 |
+
0
|
| 977 |
+
γnF(φ(t)) dt + Hφ(τ),
|
| 978 |
+
keeping in mind that µ(t) ≤ φ(t) = |Ω| for t ≤ vm. Now, letting τ → ∞, one has
|
| 979 |
+
ˆ ∞
|
| 980 |
+
0
|
| 981 |
+
tp−2F(µ(t))dt ≤
|
| 982 |
+
ˆ ∞
|
| 983 |
+
0
|
| 984 |
+
tp−2F(φ(t))dt,
|
| 985 |
+
since Hµ(τ), Hφ(τ) → 0.
|
| 986 |
+
|
| 987 |
+
3
|
| 988 |
+
PROOF OF THEOREM ??
|
| 989 |
+
11
|
| 990 |
+
So, we get equality in (36) and, consequently, in (15) for almost every t, indeed
|
| 991 |
+
γn
|
| 992 |
+
ˆ +∞
|
| 993 |
+
0
|
| 994 |
+
tp−1µ
|
| 995 |
+
1
|
| 996 |
+
k (t) dt
|
| 997 |
+
≤
|
| 998 |
+
ˆ +∞
|
| 999 |
+
0
|
| 1000 |
+
Lj µ(t)
|
| 1001 |
+
0
|
| 1002 |
+
f ∗(s) ds
|
| 1003 |
+
å
|
| 1004 |
+
1
|
| 1005 |
+
p−1 Ç
|
| 1006 |
+
−µ′(t) +
|
| 1007 |
+
1
|
| 1008 |
+
β
|
| 1009 |
+
1
|
| 1010 |
+
p−1
|
| 1011 |
+
ˆ
|
| 1012 |
+
∂Uext
|
| 1013 |
+
t
|
| 1014 |
+
1
|
| 1015 |
+
u dHn−1
|
| 1016 |
+
å
|
| 1017 |
+
tp−1µ(t)α dt
|
| 1018 |
+
≤
|
| 1019 |
+
ˆ +∞
|
| 1020 |
+
0
|
| 1021 |
+
tp−2F(µ(t)) dt + |Ω|α
|
| 1022 |
+
pβ
|
| 1023 |
+
p
|
| 1024 |
+
p−1
|
| 1025 |
+
Lj |Ω|
|
| 1026 |
+
0
|
| 1027 |
+
f ∗(s) ds
|
| 1028 |
+
å
|
| 1029 |
+
p
|
| 1030 |
+
p−1
|
| 1031 |
+
=
|
| 1032 |
+
ˆ +∞
|
| 1033 |
+
0
|
| 1034 |
+
tp−2F(φ(t)) dt + |Ω|α
|
| 1035 |
+
pβ
|
| 1036 |
+
p
|
| 1037 |
+
p−1
|
| 1038 |
+
Lj |Ω|
|
| 1039 |
+
0
|
| 1040 |
+
f ∗(s) ds
|
| 1041 |
+
å
|
| 1042 |
+
p
|
| 1043 |
+
p−1
|
| 1044 |
+
=
|
| 1045 |
+
ˆ +∞
|
| 1046 |
+
0
|
| 1047 |
+
Lj φ(t)
|
| 1048 |
+
0
|
| 1049 |
+
f ∗(s) ds
|
| 1050 |
+
å
|
| 1051 |
+
1
|
| 1052 |
+
p−1 Ç
|
| 1053 |
+
−φ′(t) +
|
| 1054 |
+
1
|
| 1055 |
+
β
|
| 1056 |
+
1
|
| 1057 |
+
p−1
|
| 1058 |
+
ˆ
|
| 1059 |
+
∂V ext
|
| 1060 |
+
t
|
| 1061 |
+
1
|
| 1062 |
+
v dHn−1
|
| 1063 |
+
å
|
| 1064 |
+
tp−1φ(t)α dt
|
| 1065 |
+
= γn
|
| 1066 |
+
ˆ +∞
|
| 1067 |
+
0
|
| 1068 |
+
tp−1φ
|
| 1069 |
+
1
|
| 1070 |
+
k (t) dt = γn
|
| 1071 |
+
ˆ +∞
|
| 1072 |
+
0
|
| 1073 |
+
tp−1µ
|
| 1074 |
+
1
|
| 1075 |
+
k (t) dt.
|
| 1076 |
+
In the following Lemma we prove that a solution to a Dirichlet problem, such that its distribu-
|
| 1077 |
+
tion function satisfies the differential equation (42), is necessarily defined on a ball and it has to
|
| 1078 |
+
be radial and decreasing.
|
| 1079 |
+
Lemma 3.2. Let Ω ⊂ Rn be an open, bounded and Lipschitz set. Let f ∈ Lp′(Ω) be a positive
|
| 1080 |
+
function, let w be a weak solution to
|
| 1081 |
+
®
|
| 1082 |
+
−∆pw = f
|
| 1083 |
+
in Ω
|
| 1084 |
+
w = 0
|
| 1085 |
+
on ∂Ω,
|
| 1086 |
+
(41)
|
| 1087 |
+
and let σ be the distribution function of w. If σ satisfies the following condition
|
| 1088 |
+
γnσ(t)(1− 1
|
| 1089 |
+
n)
|
| 1090 |
+
p
|
| 1091 |
+
p−1 =
|
| 1092 |
+
Lj σ(t)
|
| 1093 |
+
0
|
| 1094 |
+
f ∗(s) ds
|
| 1095 |
+
å
|
| 1096 |
+
1
|
| 1097 |
+
p−1 �
|
| 1098 |
+
−σ′(t)
|
| 1099 |
+
�
|
| 1100 |
+
,
|
| 1101 |
+
for a.e. t ∈ [0, wM]
|
| 1102 |
+
(42)
|
| 1103 |
+
then, there exists x0 such that
|
| 1104 |
+
Ω = Ω♯ + x0,
|
| 1105 |
+
w(· + x0) = w♯(·),
|
| 1106 |
+
f(· + x0) = f ♯(·).
|
| 1107 |
+
Proof. First of all, we recall that w is a weak solution to (41) if and only if
|
| 1108 |
+
ˆ
|
| 1109 |
+
Ω
|
| 1110 |
+
|∇w|p−2∇w∇ϕ dx =
|
| 1111 |
+
ˆ
|
| 1112 |
+
Ω
|
| 1113 |
+
fϕ dx,
|
| 1114 |
+
∀ϕ ∈ W 1,p
|
| 1115 |
+
0 (Ω).
|
| 1116 |
+
(43)
|
| 1117 |
+
Arguing as in the proof of (15) in Lemma 2.3, choosing the same test function ϕ, defined in (17),
|
| 1118 |
+
ϕ(x) =
|
| 1119 |
+
|
| 1120 |
+
|
| 1121 |
+
|
| 1122 |
+
|
| 1123 |
+
|
| 1124 |
+
0
|
| 1125 |
+
if w < t
|
| 1126 |
+
w − t
|
| 1127 |
+
if t < w < t + h
|
| 1128 |
+
h
|
| 1129 |
+
if w > t + h,
|
| 1130 |
+
|
| 1131 |
+
3
|
| 1132 |
+
PROOF OF THEOREM ??
|
| 1133 |
+
12
|
| 1134 |
+
one obtains
|
| 1135 |
+
ˆ
|
| 1136 |
+
∂Wt
|
| 1137 |
+
|∇w|p−1 dHn−1 =
|
| 1138 |
+
ˆ
|
| 1139 |
+
Wt
|
| 1140 |
+
f(x) dx ≤
|
| 1141 |
+
ˆ σ(t)
|
| 1142 |
+
0
|
| 1143 |
+
f ⋆(s) ds,
|
| 1144 |
+
(44)
|
| 1145 |
+
where Wt = {x ∈ Ω : w(x) > t}.
|
| 1146 |
+
If we apply the isoperimetric inequality to the superlevel set Wt, the Hölder inequality and the
|
| 1147 |
+
Hardy-Littlewood inequality, we get, for almost every t,
|
| 1148 |
+
nω
|
| 1149 |
+
1
|
| 1150 |
+
nn σ(t)
|
| 1151 |
+
n−1
|
| 1152 |
+
n
|
| 1153 |
+
≤ P(Wt) =
|
| 1154 |
+
ˆ
|
| 1155 |
+
∂Wt
|
| 1156 |
+
dHn−1
|
| 1157 |
+
(45)
|
| 1158 |
+
≤
|
| 1159 |
+
ň
|
| 1160 |
+
∂Wt
|
| 1161 |
+
|∇w|p−1 dHn−1(x)
|
| 1162 |
+
ã 1
|
| 1163 |
+
p ň
|
| 1164 |
+
∂Wt
|
| 1165 |
+
1
|
| 1166 |
+
|∇w| dHn−1(x)
|
| 1167 |
+
ã1− 1
|
| 1168 |
+
p
|
| 1169 |
+
(46)
|
| 1170 |
+
≤
|
| 1171 |
+
Lj σ(t)
|
| 1172 |
+
0
|
| 1173 |
+
f ∗(s) ds
|
| 1174 |
+
å 1
|
| 1175 |
+
p �
|
| 1176 |
+
−σ′(t)
|
| 1177 |
+
�1− 1
|
| 1178 |
+
p .
|
| 1179 |
+
(47)
|
| 1180 |
+
So, hypothesis (42) ensures us that equality holds in the isoperimetric inequality (45), in the Hölder
|
| 1181 |
+
inequality (46) and in the Hardy-Littlewood inequality (47).
|
| 1182 |
+
We now divide the proof into three steps.
|
| 1183 |
+
Step 1. Let us prove that the superlevel set { w > t } is a ball for all t ∈ [0, wM). Equality in (45)
|
| 1184 |
+
implies that, for almost every t, Wt is a ball. On the other hand, for all t ∈ [0, wM), there exists a
|
| 1185 |
+
sequence { tk } such that
|
| 1186 |
+
1. tk → t;
|
| 1187 |
+
2. tk > tk+1;
|
| 1188 |
+
3. {w > tk} is a ball for all k.
|
| 1189 |
+
Since { w > t } = ∪k { w > tk } can be written as an increasing union of balls, {w > t} is a ball for
|
| 1190 |
+
all t and, in particular, Ω = {w > 0} is a ball too and we obtain that Ω = x0 + Ω♯.
|
| 1191 |
+
From now on, we can assume without loss of generality that x0 = 0.
|
| 1192 |
+
Step 2. Let us prove that the superlevel sets are concentric balls.
|
| 1193 |
+
Equality in (46) implies also equality in Hölder inequality, i.e.
|
| 1194 |
+
ˆ
|
| 1195 |
+
∂Wt
|
| 1196 |
+
dHn−1 =
|
| 1197 |
+
ň
|
| 1198 |
+
∂Wt
|
| 1199 |
+
|∇w|p−1 dHn−1(x)
|
| 1200 |
+
ã 1
|
| 1201 |
+
p ň
|
| 1202 |
+
∂Wt
|
| 1203 |
+
1
|
| 1204 |
+
|∇w| dHn−1(x)
|
| 1205 |
+
ã1− 1
|
| 1206 |
+
p
|
| 1207 |
+
.
|
| 1208 |
+
This means that, for almost every t, |∇w| is constant Hn−1−almost everywhere on ∂Wt , and we
|
| 1209 |
+
denote by Ct the (Hn−1−a.e.) constant value of |∇w| on ∂Wt. We claim that Ct ̸= 0 for almost
|
| 1210 |
+
every t. Indeed, (44) and the positivity of f ensure us that
|
| 1211 |
+
P(Wt)Cp−1
|
| 1212 |
+
t
|
| 1213 |
+
=
|
| 1214 |
+
ˆ
|
| 1215 |
+
∂Wt
|
| 1216 |
+
|∇w|p−1 dHn−1 =
|
| 1217 |
+
ˆ
|
| 1218 |
+
Wt
|
| 1219 |
+
f(x) dx > 0.
|
| 1220 |
+
Integrating (42), we obtain w♯(x) = z(x), for all x ∈ Ω♯, where z is the solution to
|
| 1221 |
+
®
|
| 1222 |
+
−∆pz = f ♯
|
| 1223 |
+
in Ω♯
|
| 1224 |
+
z = 0
|
| 1225 |
+
on ∂Ω♯,
|
| 1226 |
+
(48)
|
| 1227 |
+
|
| 1228 |
+
3
|
| 1229 |
+
PROOF OF THEOREM ??
|
| 1230 |
+
13
|
| 1231 |
+
and it has the following explicit form:
|
| 1232 |
+
z(x) =
|
| 1233 |
+
ˆ |Ω|
|
| 1234 |
+
ωn|x|n
|
| 1235 |
+
1
|
| 1236 |
+
γn
|
| 1237 |
+
ň s
|
| 1238 |
+
0
|
| 1239 |
+
f ⋆(r) dr
|
| 1240 |
+
ã1/(p−1)
|
| 1241 |
+
1
|
| 1242 |
+
s(1−1/n)(p/(p−1)) ds,
|
| 1243 |
+
so it easily follows that
|
| 1244 |
+
���
|
| 1245 |
+
¶
|
| 1246 |
+
|∇w♯| = 0
|
| 1247 |
+
©
|
| 1248 |
+
∩
|
| 1249 |
+
¶
|
| 1250 |
+
0 < w♯ < wM
|
| 1251 |
+
©��� = 0.
|
| 1252 |
+
(49)
|
| 1253 |
+
Using (ii) in Lemma 2.7, we have that (49) implies the absolutely continuity of σ.
|
| 1254 |
+
Now, we denote by C♯
|
| 1255 |
+
t the (Hn−1−a.e.) constant value of
|
| 1256 |
+
��∇w♯�� on ∂W ♯
|
| 1257 |
+
t . We recall that it
|
| 1258 |
+
holds
|
| 1259 |
+
−σ′(t) =
|
| 1260 |
+
ˆ
|
| 1261 |
+
∂W ♯
|
| 1262 |
+
t
|
| 1263 |
+
1
|
| 1264 |
+
|∇w♯| = P(∂W ♯
|
| 1265 |
+
t )
|
| 1266 |
+
C♯
|
| 1267 |
+
t
|
| 1268 |
+
.
|
| 1269 |
+
and, by the absolutely continuity of σ, we have
|
| 1270 |
+
−σ′(t) =
|
| 1271 |
+
ˆ
|
| 1272 |
+
∂Wt
|
| 1273 |
+
1
|
| 1274 |
+
|∇w| = P(∂Wt)
|
| 1275 |
+
Ct
|
| 1276 |
+
.
|
| 1277 |
+
Since w and w♯ are equi-distributed, we have,
|
| 1278 |
+
P(∂Wt)
|
| 1279 |
+
Ct
|
| 1280 |
+
= P(∂W ♯
|
| 1281 |
+
t )
|
| 1282 |
+
C♯
|
| 1283 |
+
t
|
| 1284 |
+
Moreover, since P(∂Wt) = P(∂W ♯
|
| 1285 |
+
t ), we have that Ct = C♯
|
| 1286 |
+
t. So, by the coarea formula, we get
|
| 1287 |
+
ˆ
|
| 1288 |
+
Ω
|
| 1289 |
+
|∇w|p dx =
|
| 1290 |
+
ˆ +∞
|
| 1291 |
+
0
|
| 1292 |
+
ˆ
|
| 1293 |
+
∂Wt
|
| 1294 |
+
|∇w|p−1 dHn−1 =
|
| 1295 |
+
ˆ +∞
|
| 1296 |
+
0
|
| 1297 |
+
Cp−1
|
| 1298 |
+
t
|
| 1299 |
+
P(Wt) dt dHn−1
|
| 1300 |
+
=
|
| 1301 |
+
ˆ +∞
|
| 1302 |
+
0
|
| 1303 |
+
Ä
|
| 1304 |
+
C♯
|
| 1305 |
+
t
|
| 1306 |
+
äp−1 P(Wt) dt dHn−1 =
|
| 1307 |
+
ˆ +∞
|
| 1308 |
+
0
|
| 1309 |
+
ˆ
|
| 1310 |
+
∂W ♯
|
| 1311 |
+
t
|
| 1312 |
+
|∇w♯|p−1 dHn−1 =
|
| 1313 |
+
ˆ
|
| 1314 |
+
Ω♯|∇w♯|p dx.
|
| 1315 |
+
By (iii) in Lemma 2.7, we conclude that u = u♯.
|
| 1316 |
+
Step 3. Let us prove that f is radial and decreasing.
|
| 1317 |
+
Equality in (47) reads, for almost every t,
|
| 1318 |
+
ˆ
|
| 1319 |
+
Wt
|
| 1320 |
+
f(x) dx =
|
| 1321 |
+
ˆ σ(t)
|
| 1322 |
+
0
|
| 1323 |
+
f ∗(s) ds.
|
| 1324 |
+
Moreover, for all τ ∈ [0, wM), there exists a sequence { τk } such that
|
| 1325 |
+
1. τk → τ;
|
| 1326 |
+
2. τk > τk+1;
|
| 1327 |
+
3.
|
| 1328 |
+
ˆ
|
| 1329 |
+
Wτk
|
| 1330 |
+
f(x) dx =
|
| 1331 |
+
ˆ σ(τk)
|
| 1332 |
+
0
|
| 1333 |
+
f ∗(s) ds,
|
| 1334 |
+
|
| 1335 |
+
3
|
| 1336 |
+
PROOF OF THEOREM ??
|
| 1337 |
+
14
|
| 1338 |
+
and, by the continuity of σ(·), we have
|
| 1339 |
+
ˆ σ(τ)
|
| 1340 |
+
0
|
| 1341 |
+
f ∗(s) ds = lim
|
| 1342 |
+
k
|
| 1343 |
+
ˆ σ(τk)
|
| 1344 |
+
0
|
| 1345 |
+
f ∗(s) = lim
|
| 1346 |
+
k
|
| 1347 |
+
ˆ
|
| 1348 |
+
Wτk
|
| 1349 |
+
f(x) dx =
|
| 1350 |
+
ˆ
|
| 1351 |
+
Wτ
|
| 1352 |
+
f(x) dx.
|
| 1353 |
+
By Lemma 2.6, we have that for all τ, there exists ατ such that
|
| 1354 |
+
{w > τ} = {f > ατ}.
|
| 1355 |
+
Consequently, we have that also f is radial and decreasing, so f = f ♯.
|
| 1356 |
+
As a direct consequence of Lemma 3.2, we obtain the rigidity for the p−Laplace operator with
|
| 1357 |
+
Dirichlet boundary conditions.
|
| 1358 |
+
Corollary 3.3. Let Ω ⊂ Rn be an open, bounded and Lipschitz set. Let f ∈ Lp′(Ω) be a positive
|
| 1359 |
+
function and let w and z be weak solutions respectively to
|
| 1360 |
+
®
|
| 1361 |
+
−∆pw = f
|
| 1362 |
+
in Ω
|
| 1363 |
+
w = 0
|
| 1364 |
+
on ∂Ω,
|
| 1365 |
+
®
|
| 1366 |
+
−∆pz = f ♯
|
| 1367 |
+
in Ω♯
|
| 1368 |
+
z = 0
|
| 1369 |
+
on ∂Ω♯.
|
| 1370 |
+
(50)
|
| 1371 |
+
If w♯(x) = z(x), for all x ∈ Ω♯, then there exists x0 ∈ Rn such that
|
| 1372 |
+
Ω = Ω♯ + x0,
|
| 1373 |
+
w(· + x0) = z(·),
|
| 1374 |
+
f(· + x0) = f ♯(·).
|
| 1375 |
+
Proof. From the proof of Lemma 3.2, it follows that the distribution function of w, denoted by σ,
|
| 1376 |
+
satisfies
|
| 1377 |
+
nω
|
| 1378 |
+
1
|
| 1379 |
+
nn σ(t)
|
| 1380 |
+
n−1
|
| 1381 |
+
n
|
| 1382 |
+
≤
|
| 1383 |
+
Lj σ(t)
|
| 1384 |
+
0
|
| 1385 |
+
f ∗(s) ds
|
| 1386 |
+
å 1
|
| 1387 |
+
p �−σ′(t)�1− 1
|
| 1388 |
+
p .
|
| 1389 |
+
(51)
|
| 1390 |
+
Now, we integrate (51) from 0 to t, obtaining
|
| 1391 |
+
u∗(t) =
|
| 1392 |
+
ˆ |Ω|
|
| 1393 |
+
σ(t)
|
| 1394 |
+
1
|
| 1395 |
+
γn
|
| 1396 |
+
ň s
|
| 1397 |
+
0
|
| 1398 |
+
f ⋆(r) dr
|
| 1399 |
+
ã1/(p−1)
|
| 1400 |
+
1
|
| 1401 |
+
s(1−1/n)(p/(p−1)) ds = z∗(t).
|
| 1402 |
+
So, if w♯ = z, we have w∗ = z∗, and consequently we obtain equality in (51) for almost every
|
| 1403 |
+
t ∈ [0, wM]. We can conclude by applying Lemma 3.2.
|
| 1404 |
+
Now, using Lemma 3.2, we are in position to conclude the proof of the main Theorem.
|
| 1405 |
+
Proposition 3.4. Let Ω ⊂ Rn be an open, bounded and Lipschitz set and let Ω♯ be the ball with the
|
| 1406 |
+
same measure as Ω. Let u be the solution to (4) and let µ be its distribution function. If equality
|
| 1407 |
+
holds in (15), then there exists x0 ∈ Rn such that
|
| 1408 |
+
Ω = Ω♯ + x0,
|
| 1409 |
+
u(· + x0) = v(·),
|
| 1410 |
+
f(· + x0) = f ♯(·).
|
| 1411 |
+
|
| 1412 |
+
3
|
| 1413 |
+
PROOF OF THEOREM ??
|
| 1414 |
+
15
|
| 1415 |
+
Proof. Firstly, we claim that the superlevel sets { u > t } are balls for every t ∈ [0, uM). Equality
|
| 1416 |
+
in (15) implies the equality in (20), i.e.
|
| 1417 |
+
nω
|
| 1418 |
+
1
|
| 1419 |
+
nn µ(t)
|
| 1420 |
+
n−1
|
| 1421 |
+
n
|
| 1422 |
+
= P(Ut),
|
| 1423 |
+
for a. e. t ∈ [0, uM]
|
| 1424 |
+
that means that almost every superlevel set is a ball. Arguing as in Step 1 of Lemma 3.2, we
|
| 1425 |
+
can conclude that every superlevel set is a ball, so, Ω = {u > um} is a ball and we obtain that
|
| 1426 |
+
Ω = x0 + Ω♯.
|
| 1427 |
+
Let us observe that for every t, s ∈ [um, uM] with t < s, as both Ut and Us are balls, we have
|
| 1428 |
+
that ∂Ut ∩ ∂Us contains at most one point. In particular, the function w = u − um is a weak
|
| 1429 |
+
solution to the Dirichlet problem (41) in Ω.
|
| 1430 |
+
We claim that σ(t) = |{ w > t }| satisfies (42).
|
| 1431 |
+
Since { w > t } = { u > t + um }, we have
|
| 1432 |
+
σ(t) = µ(t + um) for all t ∈ [0, uM − um]. Moreover, we have
|
| 1433 |
+
ˆ
|
| 1434 |
+
∂Ut
|
| 1435 |
+
1
|
| 1436 |
+
u dHn−1 = 0,
|
| 1437 |
+
∀t > um
|
| 1438 |
+
So, using the fact that we have equality in (15) by hypothesis, we get
|
| 1439 |
+
γnσ(t)(1− 1
|
| 1440 |
+
n)
|
| 1441 |
+
p
|
| 1442 |
+
p−1 = γnµ(t + um)(1− 1
|
| 1443 |
+
n)
|
| 1444 |
+
p
|
| 1445 |
+
p−1
|
| 1446 |
+
=
|
| 1447 |
+
Lj µ(t+um)
|
| 1448 |
+
0
|
| 1449 |
+
f ∗(s) ds
|
| 1450 |
+
å
|
| 1451 |
+
1
|
| 1452 |
+
p−1 Ç
|
| 1453 |
+
−µ′(t + um) +
|
| 1454 |
+
1
|
| 1455 |
+
β
|
| 1456 |
+
1
|
| 1457 |
+
p−1
|
| 1458 |
+
ˆ
|
| 1459 |
+
∂Uext
|
| 1460 |
+
t+um
|
| 1461 |
+
1
|
| 1462 |
+
u dHn−1(x)
|
| 1463 |
+
å
|
| 1464 |
+
=
|
| 1465 |
+
Lj σ(t)
|
| 1466 |
+
0
|
| 1467 |
+
f ∗(s) ds
|
| 1468 |
+
å
|
| 1469 |
+
1
|
| 1470 |
+
p−1 �−σ′(t)� ,
|
| 1471 |
+
for all t ∈ (0, uM − um). So, we can conclude by Lemma 3.2.
|
| 1472 |
+
We conclude now with the proof of the main Theorem.
|
| 1473 |
+
Proof of Theorem 1.1. From Proposition 3.1, we have that the hypothesis of Theorem 1.1
|
| 1474 |
+
∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
|
| 1475 |
+
for some k ∈
|
| 1476 |
+
ò
|
| 1477 |
+
0,
|
| 1478 |
+
n(p − 1)
|
| 1479 |
+
(n − 2)p + n
|
| 1480 |
+
ò
|
| 1481 |
+
implies the following equality for almost every t ∈ (0, uM)
|
| 1482 |
+
γnµ(t)(1− 1
|
| 1483 |
+
n)
|
| 1484 |
+
p
|
| 1485 |
+
p−1 =
|
| 1486 |
+
Lj µ(t)
|
| 1487 |
+
0
|
| 1488 |
+
f ∗(s) ds
|
| 1489 |
+
å
|
| 1490 |
+
1
|
| 1491 |
+
p−1 Ç
|
| 1492 |
+
−µ′(t) +
|
| 1493 |
+
1
|
| 1494 |
+
β
|
| 1495 |
+
1
|
| 1496 |
+
p−1
|
| 1497 |
+
ˆ
|
| 1498 |
+
∂Uext
|
| 1499 |
+
t
|
| 1500 |
+
1
|
| 1501 |
+
u dHn−1(x)
|
| 1502 |
+
å
|
| 1503 |
+
,
|
| 1504 |
+
where µ(t) is the distribution function of u.
|
| 1505 |
+
Now, we are in position to apply Proposition 3.4, and, so, there exists x0 ∈ Rn such that
|
| 1506 |
+
Ω = Ω♯ + x0,
|
| 1507 |
+
u(· + x0) = v(·),
|
| 1508 |
+
f(· + x0) = f ♯(·).
|
| 1509 |
+
|
| 1510 |
+
4
|
| 1511 |
+
REMARKS AND OPEN PROBLEMS
|
| 1512 |
+
16
|
| 1513 |
+
4
|
| 1514 |
+
Remarks and open problems
|
| 1515 |
+
Remark 4.1. In [6] the authors also prove that in the case f ≡ 1, it holds
|
| 1516 |
+
∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
|
| 1517 |
+
if 0 < k ≤
|
| 1518 |
+
n(p − 1)
|
| 1519 |
+
n(p − 1) − p.
|
| 1520 |
+
(52)
|
| 1521 |
+
We stress that the proof of Theorem 1.1 can be adapted to case f ≡ 1, regardless of the fact that
|
| 1522 |
+
now the admissible k varies in a wider range.
|
| 1523 |
+
Open problem 4.2. Below we present a list of open problems and work in progress.
|
| 1524 |
+
• Generalize the rigidity results in the anisotropic setting, starting from the comparison proved
|
| 1525 |
+
in [24].
|
| 1526 |
+
• Generalize the rigidity results to other problems, such as the ones investigated in [1], [13].
|
| 1527 |
+
Acknowledgements
|
| 1528 |
+
The authors Alba Lia Masiello and Gloria Paoli are supported by GNAMPA of INdAM. The
|
| 1529 |
+
author Gloria Paoli is supported by the Alexander von Humboldt Foundation with an Alexander
|
| 1530 |
+
von Humboldt research fellowship.
|
| 1531 |
+
References
|
| 1532 |
+
[1] A. Alvino, F. Chiacchio, C. Nitsch, and C. Trombetti. Sharp estimates for solutions to elliptic
|
| 1533 |
+
problems with mixed boundary conditions. J. Math. Pures Appl., 152:251—261, 2021.
|
| 1534 |
+
[2] A. Alvino, V. Ferone, G. Trombetti, and P.-L. Lions. Convex symmetrization and applications.
|
| 1535 |
+
Ann. Inst. H. Poincaré C Anal. Non Linéaire, 14(2):275–293, 1997.
|
| 1536 |
+
[3] A. Alvino, P.-L. Lions, and G. Trombetti. A remark on comparison results via symmetrization.
|
| 1537 |
+
Proc. Roy. Soc. Edinburgh Sect. A, 102(1-2):37–48, 1986.
|
| 1538 |
+
[4] A. Alvino, P.-L. Lions, and G. Trombetti.
|
| 1539 |
+
Comparison results for elliptic and parabolic
|
| 1540 |
+
equations via Schwarz symmetrization. Ann. Inst. H. Poincaré Anal. Non Linéaire, 7(2):37–
|
| 1541 |
+
65, 1990.
|
| 1542 |
+
[5] A. Alvino, C. Nitsch, and C. Trombetti. A Talenti comparison result for solutions to elliptic
|
| 1543 |
+
problems with Robin boundary conditions. to appear on Comm. Pure Appl. Math.
|
| 1544 |
+
[6] V. Amato, A. Gentile, and A. L. Masiello.
|
| 1545 |
+
Comparison results for solutions to p-Laplace
|
| 1546 |
+
equations with Robin boundary conditions.
|
| 1547 |
+
Ann. Mat. Pura Appl. (4), 201(3):1189–1212,
|
| 1548 |
+
2022.
|
| 1549 |
+
[7] L. Ambrosio, N. Fusco, and D. Pallara. Functions of bounded variation and free discontinuity
|
| 1550 |
+
problems. Oxford Mathematical Monographs. The Clarendon Press, Oxford University Press,
|
| 1551 |
+
New York, 2000.
|
| 1552 |
+
|
| 1553 |
+
REFERENCES
|
| 1554 |
+
17
|
| 1555 |
+
[8] G. Aronsson and G. Talenti. Estimating the integral of a function in terms of a distribution
|
| 1556 |
+
function of its gradient. Boll. Un. Mat. Ital. B (5), 18(3):885–894, 1981.
|
| 1557 |
+
[9] M. S. Ashbaugh and R. D. Benguria. On Rayleigh’s conjecture for the clamped plate and
|
| 1558 |
+
its generalization to three dimensions.
|
| 1559 |
+
In Differential equations and mathematical physics
|
| 1560 |
+
(Birmingham, AL, 1994), pages 17–27. Int. Press, Boston, MA, 1995.
|
| 1561 |
+
[10] J. E. Brothers and W. P. Ziemer. Minimal rearrangements of Sobolev functions. J. Reine
|
| 1562 |
+
Angew. Math., 384:153–179, 1988.
|
| 1563 |
+
[11] Y. D. Burago and V. A. Zalgaller.
|
| 1564 |
+
Geometric inequalities, volume 285 of Grundlehren
|
| 1565 |
+
der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
|
| 1566 |
+
Springer-Verlag, Berlin, 1988. Translated from the Russian by A. B. Sosinski˘ı, Springer Series
|
| 1567 |
+
in Soviet Mathematics.
|
| 1568 |
+
[12] I. Chavel. Isoperimetric inequalities, volume 145 of Cambridge Tracts in Mathematics. Cam-
|
| 1569 |
+
bridge University Press, Cambridge, 2001. Differential geometric and analytic perspectives.
|
| 1570 |
+
[13] F. Chiacchio, N. Gavitone, C. Nitsch, and C. Trombetti. Sharp estimates for the gaussian
|
| 1571 |
+
torsional rigidity with Robin boundary conditions. Potential Analysis, pages 1–10, 2022.
|
| 1572 |
+
[14] A. Cianchi and N. Fusco. Steiner symmetric extremals in Pólya-Szegö type inequalities. Adv.
|
| 1573 |
+
Math., 203(2):673–728, 2006.
|
| 1574 |
+
[15] E. De Giorgi. Sulla proprietà isoperimetrica dell’ipersfera, nella classe degli insiemi aventi
|
| 1575 |
+
frontiera orientata di misura finita. Atti Accad. Naz. Lincei Mem. Cl. Sci. Fis. Mat. Natur.
|
| 1576 |
+
Sez. Ia (8), 5:33–44, 1958.
|
| 1577 |
+
[16] A. Ferone and R. Volpicelli. Minimal rearrangements of Sobolev functions: a new proof. Ann.
|
| 1578 |
+
Inst. H. Poincaré C Anal. Non Linéaire, 20(2):333–339, 2003.
|
| 1579 |
+
[17] V. Ferone and M. R. Posteraro. A remark on a comparison theorem. Comm. Partial Differ-
|
| 1580 |
+
ential Equations, 16(8-9):1255–1262, 1991.
|
| 1581 |
+
[18] S. Kesavan. On a comparison theorem via symmetrisation. Proc. Roy. Soc. Edinburgh Sect.
|
| 1582 |
+
A, 119(1-2):159–167, 1991.
|
| 1583 |
+
[19] S. Kesavan. Symmetrization & applications, volume 3 of Series in Analysis. World Scientific
|
| 1584 |
+
Publishing Co. Pte. Ltd., Hackensack, NJ, 2006.
|
| 1585 |
+
[20] P. Lindqvist. On the definition and properties of p-superharmonic functions. J. Reine Angew.
|
| 1586 |
+
Math., 365:67–79, 1986.
|
| 1587 |
+
[21] A. L. Masiello and G. Paoli. A rigidity result for the robin torsion problem. arXiv preprint
|
| 1588 |
+
arXiv:2209.06706, 2022.
|
| 1589 |
+
[22] R. Osserman. The isoperimetric inequality. Bull. Amer. Math. Soc., 84(6):1182–1238, 1978.
|
| 1590 |
+
[23] G. Pólya and G. Szegö. Isoperimetric Inequalities in Mathematical Physics. Annals of Math-
|
| 1591 |
+
ematics Studies, No. 27. Princeton University Press, Princeton, N. J., 1951.
|
| 1592 |
+
|
| 1593 |
+
REFERENCES
|
| 1594 |
+
18
|
| 1595 |
+
[24] R. Sannipoli. Comparison results for solutions to the anisotropic Laplacian with Robin bound-
|
| 1596 |
+
ary conditions. Nonlinear Anal., 214:Paper No. 112615, 21, 2022.
|
| 1597 |
+
[25] G. Talenti. Elliptic equations and rearrangements. Ann. Scuola Norm. Sup. Pisa Cl. Sci. (4),
|
| 1598 |
+
3(4):697–718, 1976.
|
| 1599 |
+
[26] G. Talenti. Nonlinear elliptic equations, rearrangements of functions and Orlicz spaces. Ann.
|
| 1600 |
+
Mat. Pura Appl. (4), 120:160–184, 1979.
|
| 1601 |
+
[27] G. Talenti. The standard isoperimetric theorem. In Handbook of convex geometry, Vol. A, B,
|
| 1602 |
+
pages 73–123. North-Holland, Amsterdam, 1993.
|
| 1603 |
+
[28] G. Talenti. Inequalities in rearrangement invariant function spaces. In Nonlinear analysis,
|
| 1604 |
+
function spaces and applications, Vol. 5 (Prague, 1994), pages 177–230. Prometheus, Prague,
|
| 1605 |
+
1994.
|
| 1606 |
+
[29] J. L. Vázquez. A strong maximum principle for some quasilinear elliptic equations. Appl.
|
| 1607 |
+
Math. Optim., 12(3):191–202, 1984.
|
| 1608 |
+
|
09E2T4oBgHgl3EQfigc1/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:244cc71f04ca1c952747a7388549b4b429c8d9de5d2a39dd2870029a23f5e992
|
| 3 |
+
size 8650797
|
09FIT4oBgHgl3EQf3Sv5/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ae12c41f4f3627708a618031df39bfc5c07407425a79b837978951c8ac279f3c
|
| 3 |
+
size 256319
|
0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b956ea4daebf1a727bffa03e30eab44b4dfb9249b49130cbf58f078ba94376cf
|
| 3 |
+
size 2031661
|
1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d2e471768c1f8a08e7895936a3423a268e8b5355984a4780d80ddea4acfa6c24
|
| 3 |
+
size 370918
|
1dFRT4oBgHgl3EQfmDfL/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b6f555d25857915caadce401427693b8f8e39c7673f9421569e5a6574fbfb034
|
| 3 |
+
size 170353
|
1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:07f7203babc2680fee2197573d614332e5f558524e42e3bedc94d91349bb7efa
|
| 3 |
+
size 222528
|
1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:91cc6679b464376e81034a94be28ad8938ae7936389ab6a723a9d3070a912049
|
| 3 |
+
size 2228269
|
1tE2T4oBgHgl3EQfNQaE/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fbbbf15963a5048ef6c37a2079dd3bea98eed79461d939c584f5ca3160cd9506
|
| 3 |
+
size 90216
|
2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fd17659403de83436f1d1acfa8d1782322a7d6b631b8b888d076c30d813c0b40
|
| 3 |
+
size 6553645
|
2dAyT4oBgHgl3EQf1fnx/content/tmp_files/2301.00738v1.pdf.txt
ADDED
|
@@ -0,0 +1,942 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Training Differentially Private Graph Neural
|
| 2 |
+
Networks with Random Walk Sampling
|
| 3 |
+
Morgane Ayle
|
| 4 |
+
Technical University of Munich
|
| 5 |
+
morgane.ayle@tum.de
|
| 6 |
+
Jan Schurchardt
|
| 7 |
+
Technical University of Munich
|
| 8 |
+
j.schuchardt@tum.de
|
| 9 |
+
Lukas Gosch
|
| 10 |
+
Technical University of Munich
|
| 11 |
+
l.gosch@tum.de
|
| 12 |
+
Daniel Zügner
|
| 13 |
+
Technical University of Munich
|
| 14 |
+
zuegnerd@in.tum.de
|
| 15 |
+
Stephan Günnemann
|
| 16 |
+
Technical University of Munich
|
| 17 |
+
s.guennemann@tum.de
|
| 18 |
+
Abstract
|
| 19 |
+
Deep learning models are known to put the privacy of their training data at risk,
|
| 20 |
+
which poses challenges for their safe and ethical release to the public. Differentially
|
| 21 |
+
private stochastic gradient descent is the de facto standard for training neural
|
| 22 |
+
networks without leaking sensitive information about the training data. However,
|
| 23 |
+
applying it to models for graph-structured data poses a novel challenge: unlike
|
| 24 |
+
with i.i.d. data, sensitive information about a node in a graph cannot only leak
|
| 25 |
+
through its gradients, but also through the gradients of all nodes within a larger
|
| 26 |
+
neighborhood. In practice, this limits privacy-preserving deep learning on graphs
|
| 27 |
+
to very shallow graph neural networks. We propose to solve this issue by training
|
| 28 |
+
graph neural networks on disjoint subgraphs of a given training graph. We develop
|
| 29 |
+
three random-walk-based methods for generating such disjoint subgraphs and
|
| 30 |
+
perform a careful analysis of the data-generating distributions to provide strong
|
| 31 |
+
privacy guarantees. Through extensive experiments, we show that our method
|
| 32 |
+
greatly outperforms the state-of-the-art baseline on three large graphs, and matches
|
| 33 |
+
or outperforms it on four smaller ones.
|
| 34 |
+
1
|
| 35 |
+
Introduction
|
| 36 |
+
The introduction of Graph Neural Networks (GNNs) has enabled the training of Deep Learning (DL)
|
| 37 |
+
models on graph-structured data and for various tasks such as node classification, link prediction or
|
| 38 |
+
graph classification. However, similar to DL models trained on image [1] or text data [2, 3], GNNs
|
| 39 |
+
leak information about their training data [4–6], such as the features of a node, or which nodes are
|
| 40 |
+
connected by an edge.
|
| 41 |
+
In this paper, we analyze the privacy of GNNs under the lens of Differential Privacy (DP)
|
| 42 |
+
[7]. In particular, we ensure the privacy of all nodes’ features in a graph. While DP-SGD [8] is the de
|
| 43 |
+
facto standard for training DL models with DP, its transfer to GNNs is not straightforward given the
|
| 44 |
+
non-i.i.d. nature of the data. Indeed, since an L-layer GNN typically uses the L-hop neighborhood
|
| 45 |
+
of a node during the forward pass, the gradient of a node does not depend on that node alone, but
|
| 46 |
+
on all nodes in its neighborhood. While some works [9, 10] have attempted to apply DP to GNNs,
|
| 47 |
+
most of them focus on edge-level DP. Methods that can be applied to feature-level DP suffer from
|
| 48 |
+
2022 Trustworthy and Socially Responsible Machine Learning (TSRML 2022) co-located with NeurIPS 2022.
|
| 49 |
+
arXiv:2301.00738v1 [cs.LG] 2 Jan 2023
|
| 50 |
+
|
| 51 |
+
loose privacy guarantees [9], or rely on custom GNN architectures [10]. We propose an adaptation
|
| 52 |
+
of DP-SGD to train GNNs with feature-level DP while attenuating the aforementioned problem
|
| 53 |
+
and preserving a high model utility. We experimentally demonstrate that our method can offer
|
| 54 |
+
significantly stronger privacy guarantees than prior work, particularly on large graphs.
|
| 55 |
+
2
|
| 56 |
+
Background
|
| 57 |
+
2.1
|
| 58 |
+
Differential privacy
|
| 59 |
+
(ϵ, δ)-DP
|
| 60 |
+
Differential Privacy (DP) [7] is a notion of privacy that allows data analysts to extract
|
| 61 |
+
useful statistics from a dataset, without leaking too much information about the samples in it. More
|
| 62 |
+
formally, given two neighboring datasets D and D′ – denoted D ∼ D′ – that differ by one sample
|
| 63 |
+
(either by deleting, adding or modifying a sample), a randomized algorithm M with co-domain Y
|
| 64 |
+
is (ϵ, δ)-DP if for all O ⊆ Y , and for all D ∼ D′, Pr[M(D) ∈ O] ≤ exp(ϵ)Pr[M(D′) ∈ O] + δ.
|
| 65 |
+
The parameters ϵ and δ are the privacy budget parameters: the smaller their values, the better the
|
| 66 |
+
privacy guarantees.
|
| 67 |
+
(α, γ)-RDP
|
| 68 |
+
An alternative definition of DP is Rényi Differential Privacy (RDP) [11]. A randomized
|
| 69 |
+
algorithm M is said to be γ-RDP of order α – or (α, γ)-RDP – if for any D ∼ D′ it holds that
|
| 70 |
+
Dα(M(D), M(D′)) ≤ γ, where Dα =
|
| 71 |
+
1
|
| 72 |
+
α−1 log Ex∼Q
|
| 73 |
+
�
|
| 74 |
+
P (x)
|
| 75 |
+
Q(x)
|
| 76 |
+
�α
|
| 77 |
+
is the Rényi divergence of order α
|
| 78 |
+
which measures the similarity of the distributions P and Q. Note that if M is (α, γ)-RDP, then it
|
| 79 |
+
is also (ϵ, δ)-DP for any 0 < δ < 1 where ϵ = fRDP→DP(α, γ, δ) = γ + log( α−1
|
| 80 |
+
α ) − log δ+log α
|
| 81 |
+
α−1
|
| 82 |
+
[12].
|
| 83 |
+
We rely on (α, γ)-RDP during our analysis, but report our results in terms of (ϵ, δ)-DP following
|
| 84 |
+
prior work.
|
| 85 |
+
The Gaussian mechanism
|
| 86 |
+
Given an algorithm A with real-valued output space A : ND → Rd,
|
| 87 |
+
the Gaussian mechanism privatizes the algorithm by adding Gaussian noise to the outputs of A,
|
| 88 |
+
i.e. M = Gσ (A (D)) = A(D) + N(0, σ2). Given that the ℓ2 sensitivity of A is ∆2A(D) =
|
| 89 |
+
maxD∼D′ ∥A(D) − A(D′)∥2, the mechanism satisfies (α, γ(α))-RDP, with γ(α) = α(∆2A)2
|
| 90 |
+
2σ2
|
| 91 |
+
.
|
| 92 |
+
Intuitively, this indicates that the larger the sensitivity of the function, the more noise needs to be
|
| 93 |
+
added to obtain a small privacy budget, and therefore the worse the final performance will be. A
|
| 94 |
+
small sensitivity is therefore desirable.
|
| 95 |
+
Amplification by sub-sampling
|
| 96 |
+
A useful property of DP (and RDP) is that, given a mechanism S
|
| 97 |
+
that samples a sub-set of the dataset D, applying a private mechanism to S(D) leads to better privacy
|
| 98 |
+
guarantees than applying it to the entire dataset D. Intuitively, this is due to the fact that subsampling
|
| 99 |
+
introduces a non-zero chance of an added or modified sample to not be processed by the randomized
|
| 100 |
+
algorithm. Typically, S is assumed to be a Poisson or uniform sampling over the dataset. Poisson
|
| 101 |
+
sampling is typically used when the neighboring datasets differ in size, while uniform sampling is
|
| 102 |
+
used otherwise. In this paper, we rely on uniform sampling.
|
| 103 |
+
2.2
|
| 104 |
+
Differential privacy in deep learning
|
| 105 |
+
Differentially Private Stochastic Gradient Descent (DP-SGD) [13, 14, 8] is the foundation of many
|
| 106 |
+
works [9, 2, 15] that apply DP to deep learning. It privatizes the weights of a model with respect to
|
| 107 |
+
the input dataset at every iteration of training, and then accumulates the privacy budget being spent
|
| 108 |
+
over all iterations. One private training iteration consists of batching a set of samples, computing the
|
| 109 |
+
gradient on each sample independently, clipping the norm of each gradient vector to a maximum norm
|
| 110 |
+
C, calculating the entire gradient by adding calibrated Gaussian noise, and finally performing an
|
| 111 |
+
update step. The clipping step is used to bound the sensitivity of the gradients to changes in the input.
|
| 112 |
+
Then, assuming that two neighboring datasets D and D′ differ in the features of one sample, the
|
| 113 |
+
sensitivity of the total gradient on a batch of i.i.d. samples is bounded by 2C. Through batching (i.e.
|
| 114 |
+
sub-sampling the dataset using a sampling mechanism S), amplification by sub-sampling theorems
|
| 115 |
+
[16, 17] can be exploited to get better privacy guarantees at every iteration. Finally, assuming each
|
| 116 |
+
iteration t is (α, γt)-RDP, the overall training is then (α, �T
|
| 117 |
+
t=0 γt)-RDP [11] where T is the total
|
| 118 |
+
number of iterations.
|
| 119 |
+
2
|
| 120 |
+
|
| 121 |
+
2.3
|
| 122 |
+
Graph neural networks
|
| 123 |
+
Definition
|
| 124 |
+
In the following, we define a graph as G = {X, A}, where X ∈ RN×d is the feature
|
| 125 |
+
matrix in which each row corresponds to one node’s feature vector, and A ∈ {0, 1}N×N is the
|
| 126 |
+
adjacency matrix in which Aij is 1 if there exists an edge between nodes i and j and 0 otherwise.
|
| 127 |
+
Note that we only consider undirected graphs, therefore A = AT . Graph Neural Networks (GNNs)
|
| 128 |
+
are a class of models that learn a mapping f : G → Z ∈ RN×d′, where Z is an updated feature
|
| 129 |
+
matrix of G that can be used for various downstream tasks. Each layer of a GNN typically consists of
|
| 130 |
+
two steps: 1) in the aggregation step, information about the neighborhood of every node is gathered;
|
| 131 |
+
2) in the update step, the feature vector of every node is updated based on its current feature vector
|
| 132 |
+
and the aggregated neighborhood information.
|
| 133 |
+
The receptive field
|
| 134 |
+
The receptive field of a node in a GNN is defined as the region in the input
|
| 135 |
+
graph that influences the GNN’s predictions for that specific node. For a GNN with L layers, the
|
| 136 |
+
receptive field of a node v is the L-hop neighborhood of v. Thus, for a graph with maximum node
|
| 137 |
+
degree K, the largest possible receptive field size of any node v is RF(v) = �L
|
| 138 |
+
l=0 Kl = KL+1−1
|
| 139 |
+
K−1
|
| 140 |
+
,
|
| 141 |
+
i.e. the receptive field grows exponentially with the number of layers of the GNN.
|
| 142 |
+
2.4
|
| 143 |
+
Differential privacy in graph neural networks
|
| 144 |
+
Given that graphs contain two types of attributes – node features and edges – multiple levels of DP
|
| 145 |
+
[18, 9, 10] can be considered: edge-level DP, where the edges between nodes are private; feature-level
|
| 146 |
+
DP, where the features of nodes are private; and node-level DP, where both the features and edges of
|
| 147 |
+
nodes are private. In this work, we focus on feature-level DP using DP-SGD. Contrary to traditional
|
| 148 |
+
i.i.d. datasets, samples in a graph (i.e. nodes) are not independent: changing the features of one
|
| 149 |
+
node affects the gradients of all nodes within the receptive field of the modified node. In fact, the
|
| 150 |
+
sensitivity of the total gradient on a graph is bounded by 2 KL+1−1
|
| 151 |
+
K−1
|
| 152 |
+
C (see Appendix A), which
|
| 153 |
+
grows exponentially with the number of layers L. Given that the Gaussian mechanism adds noise
|
| 154 |
+
proportional to the sensitivity of the total gradient, this can lead to large amounts of noise being
|
| 155 |
+
added during training, which in turn leads to poor final model utility.
|
| 156 |
+
3
|
| 157 |
+
Related work
|
| 158 |
+
In [19], a node-level differentially private GNN is trained by perturbing features and edges locally
|
| 159 |
+
before sending them to a global server. This setup is called local DP, and differs from our notion of
|
| 160 |
+
DP where a central learner is trusted with the real data. The authors in [15] propose to split the graph
|
| 161 |
+
into disjoint sub-graphs using uniform node sampling, then treat each sub-graph as an independent
|
| 162 |
+
sample. Note that, contrary to our method which considers privacy at the individual node feature
|
| 163 |
+
level, their approach treats the entire graph as a datapoint to privatize, rather than providing privacy
|
| 164 |
+
for the individual nodes in the graph. The method in [10] privatizes GNNs at both the node-level
|
| 165 |
+
and edge-level. However, their approach only applies to the GNN architecture they propose and
|
| 166 |
+
not to arbitrary GNNs, unlike our proposed method. Furthermore, it does not resolve the issue of
|
| 167 |
+
exponentially growing sensitivity in transductive learning scenarios. For a survey on DP on graph
|
| 168 |
+
data, refer to [20]. Finally, the authors of [9] propose to reduce the sensitivity of a GNN’s gradients
|
| 169 |
+
by bounding the maximum degree K of the graph. However, this does not resolve the exponential
|
| 170 |
+
growth with the number of layers. Therefore, they still obtain loose privacy guarantees (ϵ = 20).
|
| 171 |
+
Since this method is the closest to our setup, we compare our approach to theirs in our experiments.
|
| 172 |
+
4
|
| 173 |
+
Methodology
|
| 174 |
+
4.1
|
| 175 |
+
Approach
|
| 176 |
+
We propose to adapt DP-SGD to the graph domain to ensure that the weights of a GNN are private
|
| 177 |
+
with respect to the nodes’ features, while overcoming the problem of requiring exponentially more
|
| 178 |
+
noise with a growing network depth. In the following, we define two graphs G and G′ as neighbors if
|
| 179 |
+
they share the same structure A and number of nodes N but differ in one row of the feature matrix
|
| 180 |
+
X corresponding to the modified node ˜v. We want to train the GNN such that for all G ∼ G′,
|
| 181 |
+
3
|
| 182 |
+
|
| 183 |
+
Figure 1: Our general sampling method. Starting with a graph, we generate subgraphs by first
|
| 184 |
+
sampling a root node (depicted in red), and then sampling one or more random walks starting from
|
| 185 |
+
the root node. Every node appears in exactly one subgraph. Before every iteration, we batch m many
|
| 186 |
+
subgraphs, where m = 2 in this case. Root nodes are used as training nodes, while remaining nodes
|
| 187 |
+
are used for aggregation in the GNN only.
|
| 188 |
+
Dα(M(G), M(G′)) ≤ γ, where M is a randomized algorithm that returns the weights of the GNN.
|
| 189 |
+
To adapt DP-SGD to the graph domain, we propose to pre-process the graph into sets of
|
| 190 |
+
independent subgraphs that do not affect each others’ gradients, so that the sensitivity of the total
|
| 191 |
+
gradient on any batch depends on the gradient of one subgraph only. We summarize our training
|
| 192 |
+
procedure in Algorithm 1. More precisely, we pre-process the graph into a set of M disjoint
|
| 193 |
+
subgraphs GS = {s1, s2, . . . , sM}, i.e. subgraphs that do not have any nodes in common, using
|
| 194 |
+
sampling method S. Each subgraph si consists of two components: 1) one training node vi, and
|
| 195 |
+
2) a set of neighbors N (vi) that is used for the aggregation step of the GNN. At training time, for
|
| 196 |
+
every iteration t, we create a batch by sampling m subgraphs uniformly at random from the set of
|
| 197 |
+
subgraphs GS. We then compute the gradients ∇wtL(vj, N (vj)) on all training nodes and clip
|
| 198 |
+
the norm of each to a value C. We compute the total gradient by summing individual gradients and
|
| 199 |
+
adding Gaussian noise. Finally, we update the weights.
|
| 200 |
+
Due to the disjointness of subgraphs, changing one node’s features – whether it is a train-
|
| 201 |
+
ing node or a neighbor – will affect at most one subgraph (i.e. sample) in the batch, which reduces
|
| 202 |
+
the upper bound on the sensitivity of the total gradient to 2C. Since we sample subgraphs uniformly
|
| 203 |
+
at random, we can leverage the strong amplification by sub-sampling theorem [17], i.e. account for
|
| 204 |
+
the possibility of the gradient not being affected if the modified node ˜v is not part of the batch.
|
| 205 |
+
We generate these disjoint subgraphs via random walk sampling, which is an effective way
|
| 206 |
+
of training GNNs [21]. We choose random walk sampling, since it ensures that nodes form a
|
| 207 |
+
connected subgraph of a training node’s neighborhood, while limiting the number of nodes being
|
| 208 |
+
sampled from that neighborhood (i.e. from the receptive field). In the following, we propose three
|
| 209 |
+
different random-walk-based sampling methods, which we later compare in our experimental results.
|
| 210 |
+
Furthermore, we derive for each sampling method a tight upper bound on the probability of sampling
|
| 211 |
+
the modified node ˜v in a batch, which is required for applying the amplification by subsampling
|
| 212 |
+
theorem in [17].
|
| 213 |
+
4.2
|
| 214 |
+
Sampling methods
|
| 215 |
+
Our three sampling methods consist of pre-processing the graph into a set of M disjoint subgraphs
|
| 216 |
+
GS = {s1, s2, . . . , sM}, and then generating a batch B ⊆ GS by sampling m subgraphs uniformly
|
| 217 |
+
at random. An overview of our general approach is depicted in Figure 1. Given a graph with M
|
| 218 |
+
generated disjoint subgraphs, the true probability of sampling node ˜v is P[˜v] =
|
| 219 |
+
1
|
| 220 |
+
M , since we know
|
| 221 |
+
that a node is in exactly one of the M subgraphs. However, to ensure differential privacy, we require
|
| 222 |
+
a bound that holds for all possible graphs and any run of the sampling procedure. Thus, we use the
|
| 223 |
+
upper bound P[˜v] =
|
| 224 |
+
1
|
| 225 |
+
M ≤
|
| 226 |
+
1
|
| 227 |
+
Mmin where Mmin is the minimum number of subgraphs that can be
|
| 228 |
+
generated in any graph of N nodes. Then, the probability of sampling ˜v in a batch of m subgraphs
|
| 229 |
+
using sampling mechanism S is at most PS[˜v] ≤
|
| 230 |
+
m
|
| 231 |
+
Mmin .
|
| 232 |
+
4
|
| 233 |
+
|
| 234 |
+
pre-process
|
| 235 |
+
batchAlgorithm 1 DP-SGD with random walk sampling
|
| 236 |
+
Input: Graph G = {V, E}, sampling method S, loss function L, initial model weights w0, noise
|
| 237 |
+
standard deviation σ, gradient clipping norm C, number of iterations T, frequency at which to
|
| 238 |
+
re-sample subgraphs in DRW-D i
|
| 239 |
+
GS = S(G)
|
| 240 |
+
▷ Generate subgraphs from graph G using sampling method S
|
| 241 |
+
for t in [0, T) do
|
| 242 |
+
if t % i == 0 and S == DRW-D then
|
| 243 |
+
GS = S(G)
|
| 244 |
+
end if
|
| 245 |
+
Sample m subgraphs uniformly at random from GS to form batch B
|
| 246 |
+
for sj in B do
|
| 247 |
+
▷ sj is a subgraph
|
| 248 |
+
Compute ∇wtL(vj, N (vj))
|
| 249 |
+
gt(vj) = clip (∇wtL (vj, N (vj)) , C)
|
| 250 |
+
▷ Compute and clip individual gradients in B
|
| 251 |
+
end for
|
| 252 |
+
gt(B) =
|
| 253 |
+
1
|
| 254 |
+
|B|
|
| 255 |
+
���
|
| 256 |
+
sj∈B gt(vj)
|
| 257 |
+
�
|
| 258 |
+
+ N(0, σ2)
|
| 259 |
+
�
|
| 260 |
+
▷ Add noise to the gradients
|
| 261 |
+
wt+1 = update(wt, gt(B))
|
| 262 |
+
▷ Update weights based on optimizer being used
|
| 263 |
+
end for
|
| 264 |
+
Disjoint random walks
|
| 265 |
+
The first sampling method we propose is called Disjoint Random Walks
|
| 266 |
+
(DRW). We pre-process the graph once before training and then generate batches at every iteration
|
| 267 |
+
using the same set of subgraphs. Each subgraph consists of one random walk of length L (refer to
|
| 268 |
+
Appendix B for a pseudo-code). A random walk of length L contains at most L + 1 nodes, and
|
| 269 |
+
generating random walks that all have maximal length would result in the minimum number of
|
| 270 |
+
random walks, since a node can only appear in one random walk. Therefore, we get Mmin = ⌈ N
|
| 271 |
+
L+1⌉
|
| 272 |
+
and P[˜v] ≤
|
| 273 |
+
1
|
| 274 |
+
⌈
|
| 275 |
+
N
|
| 276 |
+
L+1 ⌉. Finally, the upper bound probability of sampling a node ˜v is PDRW[˜v] ≤
|
| 277 |
+
m
|
| 278 |
+
⌈
|
| 279 |
+
N
|
| 280 |
+
L+1 ⌉.
|
| 281 |
+
Disjoint random walks with restarts
|
| 282 |
+
To create better subgraphs that contain more nodes for
|
| 283 |
+
aggregation, we also propose Disjoint Random Walks with Restarts (DRW-R). Similary to DRW,
|
| 284 |
+
this sampling method generates subgraphs once before training by using random walks, but instead
|
| 285 |
+
of sampling one random walk per training node we sample R of them (refer to Appendix B for a
|
| 286 |
+
pseudo-code). Given a random walk length of L and R restarts, the minimum number of subgraphs
|
| 287 |
+
is Mmin = ⌈
|
| 288 |
+
N
|
| 289 |
+
1+R×L⌉ where 1 + R × L is the maximum size of one subgraph when all random
|
| 290 |
+
walks have length L, and the probability of sampling node u in a batch of size m is therefore
|
| 291 |
+
PDRW-R[u] ≤
|
| 292 |
+
m
|
| 293 |
+
⌈
|
| 294 |
+
N
|
| 295 |
+
1+R×L ⌉.
|
| 296 |
+
Disjoint random walks with dynamic re-sampling
|
| 297 |
+
Finally, we propose a third sampling method
|
| 298 |
+
in which we pre-process the graph into disjoint subgraphs every ith iteration instead of once before
|
| 299 |
+
training, where i is a hyper-parameter that is chosen based on the cost of the sampling procedure
|
| 300 |
+
on each dataset. This allows us to increase the diversity of subgraphs used for training, and prevent
|
| 301 |
+
overfitting on the subgraphs generated in one run of the sampling procedure. We call this procedure
|
| 302 |
+
DRW-D, where D stands for Dynamically re-sampling random walks. The probability of sampling
|
| 303 |
+
node ˜v is the same as in DRW, namely PDRW-D[˜v] = PDRW[˜v] ≤
|
| 304 |
+
m
|
| 305 |
+
⌈
|
| 306 |
+
N
|
| 307 |
+
L+1 ⌉. Note that this method
|
| 308 |
+
consists simply of re-running the subgraph generation process DRW at every ith iteration instead of
|
| 309 |
+
once before training, which is reflected in Algorithm 1.
|
| 310 |
+
5
|
| 311 |
+
Experimental results
|
| 312 |
+
Experimental setup
|
| 313 |
+
We report our results on seven datasets, both in the transductive and the
|
| 314 |
+
inductive settings. The dataset sizes in terms of total nodes range from small (Cora [22], Citeseer
|
| 315 |
+
[22]) to medium (PPI [21], Pubmed [22]) to large (Flickr [21], Arxiv [21], Reddit [21]), or in number
|
| 316 |
+
of training nodes from small (Pubmed, Citeseer, Cora) to medium (PPI) to large (Flickr, Arxiv,
|
| 317 |
+
Reddit). We report the exact number of nodes as well as some additional dataset characteristics
|
| 318 |
+
in Appendix C. We focus on the node classification task, and report our results in terms of F1
|
| 319 |
+
Micro score, a metric equivalent to accuracy except on PPI which is a multi-label classification task.
|
| 320 |
+
Following prior work, we report our privacy budget using ϵ and a fixed δ per dataset (see Appendix
|
| 321 |
+
5
|
| 322 |
+
|
| 323 |
+
Table 1: Comparison between the F1 Micro score (%) achieved by a basic GCN and MLP, the FDP
|
| 324 |
+
baseline, and our proposed method with multiple sampling methods. All DP methods are trained with
|
| 325 |
+
a target budget of ϵ ≤ 8.
|
| 326 |
+
Layers
|
| 327 |
+
Width
|
| 328 |
+
Dataset
|
| 329 |
+
Cora
|
| 330 |
+
CiteSeer
|
| 331 |
+
PPI
|
| 332 |
+
PubMed
|
| 333 |
+
Flickr
|
| 334 |
+
Arxiv
|
| 335 |
+
Reddit
|
| 336 |
+
GCN (non-DP)
|
| 337 |
+
1
|
| 338 |
+
-
|
| 339 |
+
69.8
|
| 340 |
+
59.5
|
| 341 |
+
46.2
|
| 342 |
+
68.7
|
| 343 |
+
45.6
|
| 344 |
+
59.7
|
| 345 |
+
92.5
|
| 346 |
+
2
|
| 347 |
+
256
|
| 348 |
+
77.3
|
| 349 |
+
63.7
|
| 350 |
+
58.9
|
| 351 |
+
72.9
|
| 352 |
+
51.3
|
| 353 |
+
69.1
|
| 354 |
+
94.7
|
| 355 |
+
512
|
| 356 |
+
76.6
|
| 357 |
+
62.2
|
| 358 |
+
60.7
|
| 359 |
+
72.9
|
| 360 |
+
51.3
|
| 361 |
+
69.5
|
| 362 |
+
94.7
|
| 363 |
+
MLP (non-DP)
|
| 364 |
+
1
|
| 365 |
+
-
|
| 366 |
+
43.0
|
| 367 |
+
37.6
|
| 368 |
+
45.2
|
| 369 |
+
61.3
|
| 370 |
+
45.7
|
| 371 |
+
52.3
|
| 372 |
+
67.7
|
| 373 |
+
2
|
| 374 |
+
256
|
| 375 |
+
47.3
|
| 376 |
+
36.1
|
| 377 |
+
52.1
|
| 378 |
+
61.5
|
| 379 |
+
36.2
|
| 380 |
+
52.6
|
| 381 |
+
69.8
|
| 382 |
+
512
|
| 383 |
+
44.8
|
| 384 |
+
39.3
|
| 385 |
+
53.6
|
| 386 |
+
63.3
|
| 387 |
+
38.4
|
| 388 |
+
52.0
|
| 389 |
+
69.7
|
| 390 |
+
FDP (DP)
|
| 391 |
+
1
|
| 392 |
+
-
|
| 393 |
+
17.1
|
| 394 |
+
17.5
|
| 395 |
+
38.4
|
| 396 |
+
39.6
|
| 397 |
+
33.6
|
| 398 |
+
43.8
|
| 399 |
+
56.7
|
| 400 |
+
2
|
| 401 |
+
256
|
| 402 |
+
17.6
|
| 403 |
+
21.5
|
| 404 |
+
40.7
|
| 405 |
+
41.4
|
| 406 |
+
42.5
|
| 407 |
+
31.9
|
| 408 |
+
43.7
|
| 409 |
+
512
|
| 410 |
+
23.2
|
| 411 |
+
22.1
|
| 412 |
+
40.0
|
| 413 |
+
41.2
|
| 414 |
+
42.4
|
| 415 |
+
30.2
|
| 416 |
+
42.3
|
| 417 |
+
Ours
|
| 418 |
+
DRW (DP)
|
| 419 |
+
1
|
| 420 |
+
-
|
| 421 |
+
19.9
|
| 422 |
+
20.6
|
| 423 |
+
40.2
|
| 424 |
+
41.7
|
| 425 |
+
42.1
|
| 426 |
+
59.2
|
| 427 |
+
81.4
|
| 428 |
+
2
|
| 429 |
+
256
|
| 430 |
+
17.2
|
| 431 |
+
20.9
|
| 432 |
+
38.7
|
| 433 |
+
40.3
|
| 434 |
+
48.7
|
| 435 |
+
59.6
|
| 436 |
+
80.2
|
| 437 |
+
512
|
| 438 |
+
24.9
|
| 439 |
+
21.3
|
| 440 |
+
37.9
|
| 441 |
+
41.1
|
| 442 |
+
47.9
|
| 443 |
+
59.2
|
| 444 |
+
81.8
|
| 445 |
+
DRW-D (DP)
|
| 446 |
+
1
|
| 447 |
+
-
|
| 448 |
+
19.8
|
| 449 |
+
20.6
|
| 450 |
+
40.1
|
| 451 |
+
41.7
|
| 452 |
+
42.2
|
| 453 |
+
59.2
|
| 454 |
+
81.4
|
| 455 |
+
2
|
| 456 |
+
256
|
| 457 |
+
17.2
|
| 458 |
+
21.3
|
| 459 |
+
38.6
|
| 460 |
+
40.2
|
| 461 |
+
48.5
|
| 462 |
+
59.7
|
| 463 |
+
80.2
|
| 464 |
+
512
|
| 465 |
+
25.0
|
| 466 |
+
21.7
|
| 467 |
+
37.9
|
| 468 |
+
41.2
|
| 469 |
+
47.8
|
| 470 |
+
59.3
|
| 471 |
+
81.5
|
| 472 |
+
DRW-R (DP)
|
| 473 |
+
1
|
| 474 |
+
-
|
| 475 |
+
18.3
|
| 476 |
+
19.2
|
| 477 |
+
40.0
|
| 478 |
+
40.3
|
| 479 |
+
42.3
|
| 480 |
+
59.1
|
| 481 |
+
82.0
|
| 482 |
+
2
|
| 483 |
+
256
|
| 484 |
+
17.3
|
| 485 |
+
20.7
|
| 486 |
+
38.2
|
| 487 |
+
40.4
|
| 488 |
+
48.3
|
| 489 |
+
59.7
|
| 490 |
+
81.0
|
| 491 |
+
512
|
| 492 |
+
24.5
|
| 493 |
+
21.3
|
| 494 |
+
36.9
|
| 495 |
+
40.4
|
| 496 |
+
48.5
|
| 497 |
+
59.4
|
| 498 |
+
82.2
|
| 499 |
+
C). Given a target ϵ, we keep training while tracking the (α, γt) privacy budget being spent until we
|
| 500 |
+
reach ϵ = fRDP→DP(α, �T ′
|
| 501 |
+
t=0 γt, δ) at iteration T ′.
|
| 502 |
+
We compare our proposed methodology with each sampling method to three baselines: 1) A basic
|
| 503 |
+
GCN trained with random walk sampling; 2) A basic MLP trained with uniform node sampling; and
|
| 504 |
+
3) The method proposed in [9] which we call FDP for Feature-level DP. Note that while they train
|
| 505 |
+
their models up to an ϵ of 20, we only train them until ϵ = 8, since a very large ϵ does not have much
|
| 506 |
+
value in terms of privacy.
|
| 507 |
+
Discussion
|
| 508 |
+
Table 5 summarizes our results. A GCN trained without DP always outperforms the
|
| 509 |
+
ones trained with DP, which is expected since clipping gradients and especially adding Gaussian noise
|
| 510 |
+
decreases the utility of the final model. However, in some cases our method can almost match the
|
| 511 |
+
utility of the basic GCN, whereas the FDP baseline struggles. For example, DRW sampling on Flickr
|
| 512 |
+
can reach up to 48.7% accuracy – which corresponds to 95% of the baseline GCN’s performance
|
| 513 |
+
– whereas FDP reaches only 42.5% accuracy – which corresponds to 83% of the baseline GCN’s
|
| 514 |
+
performance. Similarly, our method achieves 87% of the GCN’s performance on the challenging
|
| 515 |
+
dataset Reddit, while FDP can only reach 60% of the GCN’s performance. This shows that our
|
| 516 |
+
sub-sampling approach is effective at solving the exponential growth of the receptive field while
|
| 517 |
+
approaching the utility of the non-DP GCN baseline, which makes our method attractive for real
|
| 518 |
+
world applications. That being said, our method uses a smaller amount of training nodes than what
|
| 519 |
+
is available at every iteration, even when computational complexity is not an issue (i.e. on small
|
| 520 |
+
graphs). The effect of this reduction in training training samples is exacerbated on small graphs that
|
| 521 |
+
do not require batching in non-DP training, which leads to our method performing on-par with the
|
| 522 |
+
FDP baseline on small datasets.
|
| 523 |
+
Comparison with variable privacy budget
|
| 524 |
+
Finally, in Figure 2 we expand on our previous results
|
| 525 |
+
by reporting the accuracy at various ϵ checkpoints during training. We report the best results that
|
| 526 |
+
our method achieved across all sampling methods and compare to the FDP baseline. On all datasets,
|
| 527 |
+
our method largely outperforms FDP across multiple epsilon values. Moreover, FDP cannot achieve
|
| 528 |
+
an epsilon lower than 2, whereas our method does while sometimes outperforming FDP at higher
|
| 529 |
+
privacy budgets.
|
| 530 |
+
6
|
| 531 |
+
|
| 532 |
+
(a)
|
| 533 |
+
(b)
|
| 534 |
+
(c)
|
| 535 |
+
Figure 2: F1 Micro Score vs. epsilon achieved by FDP and our best sampling method for a) Flickr, b)
|
| 536 |
+
Arxiv and c) Reddit datasets.
|
| 537 |
+
6
|
| 538 |
+
Conclusion
|
| 539 |
+
We proposed a novel way of training differentially private graph neural networks. Since graphs
|
| 540 |
+
consist of inter-connected nodes that influence each other’s gradients during training, naively adapting
|
| 541 |
+
traditional DP methods to graph neural networks can result in unnecessarily large amounts of noise
|
| 542 |
+
being added to the model during training, which in turn leads to poor utility of the model. We
|
| 543 |
+
proposed an adapted version of DP-SGD that uses random-walk based sub-sampling to overcome
|
| 544 |
+
this problem and introduced three sampling methods that generate disjoint subgraphs. For each
|
| 545 |
+
sampling method, we derived an upper bound on the probability of sampling a modified node in
|
| 546 |
+
a batch to apply the amplification by sub-sampling theorem and obtain tighter privacy guarantees.
|
| 547 |
+
Our method achieves a better privacy-utility trade-off compared to the state-of-the-art baseline FDP
|
| 548 |
+
across multiple datasets, especially for large datasets. A necessary future work direction in this field
|
| 549 |
+
is to attempt to solve the performance issue on small datasets, which is especially exacerbated on
|
| 550 |
+
GNNs. For example, pre-training the models on public datasets [2] or using variable signal-to-noise
|
| 551 |
+
ratios during training are ways of improving the utility in DP. Moreover, different sampling methods
|
| 552 |
+
that do not necessarily focus on random walks can be explored.
|
| 553 |
+
References
|
| 554 |
+
[1] Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. Model inversion attacks that exploit
|
| 555 |
+
confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC
|
| 556 |
+
conference on computer and communications security, pages 1322–1333, 2015.
|
| 557 |
+
[2] Xuechen Li, Florian Tramer, Percy Liang, and Tatsunori Hashimoto. Large language mod-
|
| 558 |
+
els can be strong differentially private learners. In International Conference on Learning
|
| 559 |
+
Representations, 2021.
|
| 560 |
+
[3] Rohan Anil, Badih Ghazi, Vineet Gupta, Ravi Kumar, and Pasin Manurangsi. Large-scale
|
| 561 |
+
differentially private bert. arXiv preprint arXiv:2108.01624, 2021.
|
| 562 |
+
[4] Fan Wu, Yunhui Long, Ce Zhang, and Bo Li. Linkteller: Recovering private edges from graph
|
| 563 |
+
neural networks via influence analysis. arXiv preprint arXiv:2108.06504, 2021.
|
| 564 |
+
[5] Iyiola E Olatunji, Wolfgang Nejdl, and Megha Khosla. Membership inference attack on graph
|
| 565 |
+
neural networks. In 2021 Third IEEE International Conference on Trust, Privacy and Security
|
| 566 |
+
in Intelligent Systems and Applications (TPS-ISA), pages 11–20. IEEE, 2021.
|
| 567 |
+
[6] Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chengqiang Lu, Chuanren Liu, and Enhong
|
| 568 |
+
Chen. Graphmi: Extracting private graph data from graph neural networks. arXiv preprint
|
| 569 |
+
arXiv:2106.02820, 2021.
|
| 570 |
+
[7] Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Founda-
|
| 571 |
+
tions and Trends® in Theoretical Computer Science, 9(3–4):211–407, 2014.
|
| 572 |
+
[8] Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar,
|
| 573 |
+
and Li Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC
|
| 574 |
+
conference on computer and communications security, pages 308–318, 2016.
|
| 575 |
+
7
|
| 576 |
+
|
| 577 |
+
0.48
|
| 578 |
+
FDP
|
| 579 |
+
Ours
|
| 580 |
+
0.46
|
| 581 |
+
F1 Micro Score
|
| 582 |
+
0.44
|
| 583 |
+
0.42
|
| 584 |
+
0.40
|
| 585 |
+
0.38
|
| 586 |
+
0.36
|
| 587 |
+
0.34
|
| 588 |
+
1
|
| 589 |
+
2
|
| 590 |
+
3
|
| 591 |
+
4
|
| 592 |
+
5
|
| 593 |
+
6
|
| 594 |
+
7
|
| 595 |
+
8
|
| 596 |
+
Epsilon0.60
|
| 597 |
+
0.55
|
| 598 |
+
0.50
|
| 599 |
+
Micro Score
|
| 600 |
+
0.45
|
| 601 |
+
0.40
|
| 602 |
+
0.35
|
| 603 |
+
F1
|
| 604 |
+
0.30
|
| 605 |
+
FDP
|
| 606 |
+
0.25
|
| 607 |
+
Ours
|
| 608 |
+
0.20
|
| 609 |
+
1
|
| 610 |
+
2
|
| 611 |
+
3
|
| 612 |
+
4
|
| 613 |
+
5
|
| 614 |
+
6
|
| 615 |
+
7
|
| 616 |
+
8
|
| 617 |
+
Epsilon0.8
|
| 618 |
+
FDP
|
| 619 |
+
Ours
|
| 620 |
+
0.7
|
| 621 |
+
Fl Micro Score
|
| 622 |
+
0.6
|
| 623 |
+
0.5
|
| 624 |
+
0.4
|
| 625 |
+
0.3
|
| 626 |
+
1
|
| 627 |
+
2
|
| 628 |
+
3
|
| 629 |
+
4
|
| 630 |
+
5
|
| 631 |
+
6
|
| 632 |
+
7
|
| 633 |
+
8
|
| 634 |
+
Epsilon[9] Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal,
|
| 635 |
+
and Prateek Jain. Node-level differentially private graph neural networks. In ICLR 2022
|
| 636 |
+
Workshop on PAIR, 2022.
|
| 637 |
+
[10] Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, and Daniel Gatica-Perez. Gap:
|
| 638 |
+
Differentially private graph neural networks with aggregation perturbation. arXiv preprint
|
| 639 |
+
arXiv:2203.00949, 2022.
|
| 640 |
+
[11] Ilya Mironov. Rényi differential privacy. In 2017 IEEE 30th computer security foundations
|
| 641 |
+
symposium (CSF), pages 263–275. IEEE, 2017.
|
| 642 |
+
[12] Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, and Tetsuya Sato. Hypothesis test-
|
| 643 |
+
ing interpretations and renyi differential privacy. In International Conference on Artificial
|
| 644 |
+
Intelligence and Statistics, pages 2496–2506. PMLR, 2020.
|
| 645 |
+
[13] Shuang Song, Kamalika Chaudhuri, and Anand D Sarwate. Stochastic gradient descent with
|
| 646 |
+
differentially private updates. In 2013 IEEE global conference on signal and information
|
| 647 |
+
processing, pages 245–248. IEEE, 2013.
|
| 648 |
+
[14] Raef Bassily, Adam Smith, and Abhradeep Thakurta. Private empirical risk minimization:
|
| 649 |
+
Efficient algorithms and tight error bounds. In 2014 IEEE 55th annual symposium on foundations
|
| 650 |
+
of computer science, pages 464–473. IEEE, 2014.
|
| 651 |
+
[15] Timour Igamberdiev and Ivan Habernal. Privacy-Preserving Graph Convolutional Networks for
|
| 652 |
+
Text Classification. In Proceedings of the 13th Language Resources and Evaluation Conference,
|
| 653 |
+
page (to appear), Marseille, France, 2022. European Language Resources Association.
|
| 654 |
+
[16] Borja Balle, Gilles Barthe, and Marco Gaboardi. Privacy amplification by subsampling: Tight
|
| 655 |
+
analyses via couplings and divergences. Advances in Neural Information Processing Systems,
|
| 656 |
+
31, 2018.
|
| 657 |
+
[17] Yu-Xiang Wang, Borja Balle, and Shiva Prasad Kasiviswanathan. Subsampled rényi differential
|
| 658 |
+
privacy and analytical moments accountant. In The 22nd International Conference on Artificial
|
| 659 |
+
Intelligence and Statistics, pages 1226–1235. PMLR, 2019.
|
| 660 |
+
[18] Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal,
|
| 661 |
+
and Prateek Jain. Node-level differentially private graph neural networks. arXiv preprint
|
| 662 |
+
arXiv:2111.15521, 2021.
|
| 663 |
+
[19] Sina Sajadmanesh and Daniel Gatica-Perez. Locally private graph neural networks. In Proceed-
|
| 664 |
+
ings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages
|
| 665 |
+
2130–2145, 2021.
|
| 666 |
+
[20] Tamara T Mueller, Dmitrii Usynin, Johannes C Paetzold, Daniel Rueckert, and Georgios Kaissis.
|
| 667 |
+
Sok: Differential privacy on graph-structured data. arXiv preprint arXiv:2203.09205, 2022.
|
| 668 |
+
[21] Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna.
|
| 669 |
+
Graphsaint: Graph sampling based inductive learning method. arXiv preprint arXiv:1907.04931,
|
| 670 |
+
2019.
|
| 671 |
+
[22] Prithviraj Sen, Galileo Mark Namata, Mustafa Bilgic, Lise Getoor, Brian Gallagher, and Tina
|
| 672 |
+
Eliassi-Rad. Collective classification in network data. AI Magazine, 29(3):93–106, 2008.
|
| 673 |
+
A
|
| 674 |
+
Upper Bound on Gradient Sensitivity
|
| 675 |
+
We show how to derive the upper bound on the sensitivity of the total gradient on a batch, where gt
|
| 676 |
+
is the function that takes a batch B as input and returns the gradients at iteration t, B and B′ are
|
| 677 |
+
neighboring batches that differ by one sample ˜v, Lv is the loss function on a node v, ∇wLv is the
|
| 678 |
+
8
|
| 679 |
+
|
| 680 |
+
gradient of the loss on v with respect to the weights of the model, and I[˜v ∈ B] is the indicator
|
| 681 |
+
function which is 1 if ˜v is in the batch and 0 otherwise.
|
| 682 |
+
∆2gt = ∥gt(B) − gt(B′)∥2
|
| 683 |
+
= ∥
|
| 684 |
+
�
|
| 685 |
+
v∈B
|
| 686 |
+
∇wLv −
|
| 687 |
+
�
|
| 688 |
+
v∈B′
|
| 689 |
+
∇wLv∥2
|
| 690 |
+
= ∥(∇wL˜v +
|
| 691 |
+
�
|
| 692 |
+
u∈RF (˜v)\{˜v}
|
| 693 |
+
∇wLu)I[˜v ∈ B] − (∇wL˜v′ +
|
| 694 |
+
�
|
| 695 |
+
u∈RF (˜v′)\{˜v′}
|
| 696 |
+
∇wLu)I[˜v′ ∈ B′]∥2
|
| 697 |
+
≤ ∥(∇wL˜v +
|
| 698 |
+
�
|
| 699 |
+
u∈RF (˜v)\{˜v}
|
| 700 |
+
∇wLu)I[˜v ∈ B]∥2 + ∥(∇wL˜v′ +
|
| 701 |
+
�
|
| 702 |
+
u∈RF (˜v′)\{˜v′}
|
| 703 |
+
∇wL˜v′)I[˜v′ ∈ B′]∥2
|
| 704 |
+
≤ ∥∇wL˜v +
|
| 705 |
+
�
|
| 706 |
+
u∈RF (˜v)\{˜v}
|
| 707 |
+
∇wLu∥2 + ∥∇wL˜v′ +
|
| 708 |
+
�
|
| 709 |
+
u∈RF (˜v′)\{˜v′}
|
| 710 |
+
∇wLu∥2
|
| 711 |
+
≤ ∥∇wL˜v∥2 +
|
| 712 |
+
�
|
| 713 |
+
u∈RF (˜v)\{˜v}
|
| 714 |
+
∥∇wLu∥2 + ∥∇wL˜v′∥2 +
|
| 715 |
+
�
|
| 716 |
+
u∈RF (˜v′)\{˜v′}
|
| 717 |
+
∥∇wLu∥2
|
| 718 |
+
≤ 2|RF(˜v)|C
|
| 719 |
+
≤ 2KL+1 − 1
|
| 720 |
+
K − 1
|
| 721 |
+
C
|
| 722 |
+
(1)
|
| 723 |
+
9
|
| 724 |
+
|
| 725 |
+
B
|
| 726 |
+
Algorithms
|
| 727 |
+
B.1
|
| 728 |
+
DRW Sampler
|
| 729 |
+
The following algorithm shows how to generate disjoint subgraphs using the Disjoint Random Walks
|
| 730 |
+
(DRW) sampling method (see Section 4.2). To generate a subgraph, we first sample a node v from
|
| 731 |
+
the set of remaining nodes, then remove it from this set. We then construct the set of valid neighbors
|
| 732 |
+
of v, which consists of all nodes that have not been already sampled. We sample the next node v in
|
| 733 |
+
the subgraph from the set of valid neighbors, and repeat the process until we get a random walk of
|
| 734 |
+
length L. We iterate this process until all nodes are included in one subgraph.
|
| 735 |
+
Algorithm 2 DRW Sampler
|
| 736 |
+
Input: Graph G = {V, E}, random walk length L.
|
| 737 |
+
Output: Set of all disjoint subgraphs = ()
|
| 738 |
+
remaining_nodes = {v1, v2, . . . , vN}
|
| 739 |
+
while len(remaining_nodes) != 0 do
|
| 740 |
+
subgraph = []
|
| 741 |
+
v = sample(remaining_nodes, 1)
|
| 742 |
+
▷ uniformly sample over non-sampled nodes
|
| 743 |
+
subgraph.append(v)
|
| 744 |
+
remaining_nodes.remove(v)
|
| 745 |
+
l = 0
|
| 746 |
+
while l < L do
|
| 747 |
+
valid_neighbors = Neighbors(v)
|
| 748 |
+
▷ Neighbors returns all neighbors of a node
|
| 749 |
+
for u in valid_neighbors do
|
| 750 |
+
if u not in remaining_nodes then
|
| 751 |
+
valid_neighbors.remove(u)
|
| 752 |
+
end if
|
| 753 |
+
end for
|
| 754 |
+
if len(valid_neighbors) != 0 then
|
| 755 |
+
v = sample(valid_neighbors, 1)
|
| 756 |
+
▷ uniformly sample a neighbor of v
|
| 757 |
+
else
|
| 758 |
+
break
|
| 759 |
+
end if
|
| 760 |
+
random_walk.append(v)
|
| 761 |
+
remaining_nodes.remove(v)
|
| 762 |
+
l = l + 1
|
| 763 |
+
end while
|
| 764 |
+
subgraphs.add(subgraph)
|
| 765 |
+
end while
|
| 766 |
+
B.2
|
| 767 |
+
DRW-R Sampler
|
| 768 |
+
The following algorithm shows how to generate disjoint subgraphs using the Disjoint Random Walks
|
| 769 |
+
with restarts (DRW-R) sampling method (see 4.2). The main difference to the DRW sampler is that,
|
| 770 |
+
instead of stopping the subgraph generation after one random walk, we sample multiple random
|
| 771 |
+
walks rooted at the same node by re-initializing the starting node of the random walk to the same root
|
| 772 |
+
node of the subgraph R times.
|
| 773 |
+
10
|
| 774 |
+
|
| 775 |
+
Algorithm 3 DRW-R Sampler
|
| 776 |
+
Input: Graph G = {V, E}, random walk length L.
|
| 777 |
+
Output: Set of all disjoint subgraphs = ()
|
| 778 |
+
remaining_nodes = {v1, v2, . . . , vN}
|
| 779 |
+
while len(remaining_nodes) != 0 do
|
| 780 |
+
subgraph = []
|
| 781 |
+
root = sample(remaining_nodes, 1)
|
| 782 |
+
▷ uniformly sample over non-sampled nodes
|
| 783 |
+
subgraph.append(root)
|
| 784 |
+
remaining_nodes.remove(root)
|
| 785 |
+
for r in range(R) do
|
| 786 |
+
v = root
|
| 787 |
+
l = 0
|
| 788 |
+
while l < L do
|
| 789 |
+
valid_neighbors = Neighbors(v)
|
| 790 |
+
▷ Neighbors returns all neighbors of a node
|
| 791 |
+
for u in valid_neighbors do
|
| 792 |
+
if u not in remaining_nodes then
|
| 793 |
+
valid_neighbors.remove(u)
|
| 794 |
+
end if
|
| 795 |
+
end for
|
| 796 |
+
if len(valid_neighbors) != 0 then
|
| 797 |
+
v = sample(valid_neighbors, 1)
|
| 798 |
+
▷ uniformly sample a neighbor of v
|
| 799 |
+
else
|
| 800 |
+
break
|
| 801 |
+
end if
|
| 802 |
+
subgraph.append(v)
|
| 803 |
+
remaining_nodes.remove(v)
|
| 804 |
+
l = l + 1
|
| 805 |
+
end while
|
| 806 |
+
subgraphs.add(subgraph)
|
| 807 |
+
end for
|
| 808 |
+
end while
|
| 809 |
+
11
|
| 810 |
+
|
| 811 |
+
C
|
| 812 |
+
Training Hyperparameters
|
| 813 |
+
We run all experiments with three different seeds, Adam optimizer and ReLU activation. We
|
| 814 |
+
summarize the number of roots used for different sampling scenarios in Table 4. For the non-DP
|
| 815 |
+
trainings, we fix the learning rate to 0.01. We perform a grid hyper-parameter search for the trainings
|
| 816 |
+
on all datasets. We experiment with the following hyper-parameters for both DP and non-DP trainings:
|
| 817 |
+
• Number of layers in {1, 2}
|
| 818 |
+
• Width of hidden layers in {256, 512}
|
| 819 |
+
• Maximum graph degree in {2 , 4} for the FDP baseline
|
| 820 |
+
We use the follow hyper-parameters for the DP specific trainings:
|
| 821 |
+
• Learning rate in {0.01, 0.1, 0.2}
|
| 822 |
+
• Clip norm percentage C% in {0.001, 0.01, 0.1}.
|
| 823 |
+
• Noise multiplier λ in {1, 2, 4, 8}. The noise multiplier is the ratio of the standard deviation
|
| 824 |
+
σ of the Gaussian noise added to the gradients to the sensitivity ∆2f of the function f.
|
| 825 |
+
Instead of tuning σ, we tune λ, then fix σ = λ × ∆2f.
|
| 826 |
+
• Delta value δ: we summarize the values used in Table 3
|
| 827 |
+
Table 2: Characteristics of the datasets that we use in our experiments. (s) indicates a single-label
|
| 828 |
+
classification problem, and (m) a multi-label one.
|
| 829 |
+
Nodes
|
| 830 |
+
Feature Size
|
| 831 |
+
Classes
|
| 832 |
+
Training Nodes
|
| 833 |
+
Type
|
| 834 |
+
Cora
|
| 835 |
+
2,708
|
| 836 |
+
1,433
|
| 837 |
+
7 (s)
|
| 838 |
+
140
|
| 839 |
+
Transductive
|
| 840 |
+
Citeseer
|
| 841 |
+
3,327
|
| 842 |
+
3,703
|
| 843 |
+
6 (s)
|
| 844 |
+
120
|
| 845 |
+
Transductive
|
| 846 |
+
PPI
|
| 847 |
+
14,755
|
| 848 |
+
50
|
| 849 |
+
121 (m)
|
| 850 |
+
9,716
|
| 851 |
+
Inductive
|
| 852 |
+
Pubmed
|
| 853 |
+
19,717
|
| 854 |
+
500
|
| 855 |
+
3 (s)
|
| 856 |
+
60
|
| 857 |
+
Transductive
|
| 858 |
+
Flickr
|
| 859 |
+
89,250
|
| 860 |
+
500
|
| 861 |
+
7 (s)
|
| 862 |
+
44,625
|
| 863 |
+
Inductive
|
| 864 |
+
Arxiv
|
| 865 |
+
169,343
|
| 866 |
+
128
|
| 867 |
+
40 (s)
|
| 868 |
+
90,941
|
| 869 |
+
Inductive
|
| 870 |
+
Reddit
|
| 871 |
+
232,965
|
| 872 |
+
602
|
| 873 |
+
41 (s)
|
| 874 |
+
153,932
|
| 875 |
+
Inductive
|
| 876 |
+
Table 3: δ value used for each dataset.
|
| 877 |
+
Dataset
|
| 878 |
+
Cora
|
| 879 |
+
Citeseer
|
| 880 |
+
PPI
|
| 881 |
+
Pubmed
|
| 882 |
+
Flickr
|
| 883 |
+
Arxiv
|
| 884 |
+
Reddit
|
| 885 |
+
δ
|
| 886 |
+
1e-5
|
| 887 |
+
1e-5
|
| 888 |
+
1e-5
|
| 889 |
+
1e-6
|
| 890 |
+
1e-6
|
| 891 |
+
1e-7
|
| 892 |
+
1e-7
|
| 893 |
+
Table 4: Batch sizes used for training based on the sampler, depth of the model, and dataset. Note
|
| 894 |
+
that as a general rule, we used around 20% of total number of training nodes for the large datasets,
|
| 895 |
+
and 50% for the small datasets.
|
| 896 |
+
Sampler
|
| 897 |
+
Depth
|
| 898 |
+
Dataset
|
| 899 |
+
Cora
|
| 900 |
+
CiteSeer
|
| 901 |
+
PPI
|
| 902 |
+
PubMed
|
| 903 |
+
Flickr
|
| 904 |
+
Arxiv
|
| 905 |
+
Reddit
|
| 906 |
+
RW, uniform, PreDRW,
|
| 907 |
+
1
|
| 908 |
+
70
|
| 909 |
+
60
|
| 910 |
+
2,000
|
| 911 |
+
30
|
| 912 |
+
10,000
|
| 913 |
+
20,000
|
| 914 |
+
30,000
|
| 915 |
+
PreDRW-D, DynDRW
|
| 916 |
+
2
|
| 917 |
+
46
|
| 918 |
+
40
|
| 919 |
+
2,000
|
| 920 |
+
20
|
| 921 |
+
10,000
|
| 922 |
+
20,000
|
| 923 |
+
30,000
|
| 924 |
+
PreDRW-R
|
| 925 |
+
1
|
| 926 |
+
46
|
| 927 |
+
40
|
| 928 |
+
2,000
|
| 929 |
+
20
|
| 930 |
+
10,000
|
| 931 |
+
20,000
|
| 932 |
+
30,000
|
| 933 |
+
2
|
| 934 |
+
28
|
| 935 |
+
24
|
| 936 |
+
1,800
|
| 937 |
+
12
|
| 938 |
+
8,000
|
| 939 |
+
18,000
|
| 940 |
+
30,000
|
| 941 |
+
12
|
| 942 |
+
|
2dAyT4oBgHgl3EQf1fnx/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:bea7e67c20ba3bc55372bc3eebd829cb15d32ffb4b83f54494acb00f8e29fa0c
|
| 3 |
+
size 3342381
|
5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/2301.00041v1.pdf.txt
ADDED
|
@@ -0,0 +1,1329 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
HIP-2022-35/TH
|
| 2 |
+
Vector dark matter in supercooled Higgs portal models
|
| 3 |
+
Mads T. Frandsen∗ and Mattias E. Thing†
|
| 4 |
+
CP3-Origins, University of Southern Denmark, Denmark
|
| 5 |
+
Matti Heikinheimo‡ and Kimmo Tuominen§
|
| 6 |
+
Department of Physics, University of Helsinki,
|
| 7 |
+
P.O.Box 64, FI-00014 University of Helsinki, Finland and
|
| 8 |
+
Helsinki Institute of Physics, P.O.Box 64,
|
| 9 |
+
FI-00014 University of Helsinki, Finland
|
| 10 |
+
Martin Rosenlyst¶
|
| 11 |
+
Rudolf Peierls Centre for Theoretical Physics, University of Oxford,
|
| 12 |
+
1 Keble Road, Oxford OX1 3NP, United Kingdom
|
| 13 |
+
We consider extensions of the Standard Model by a hidden sector consisting of a
|
| 14 |
+
gauge field coupled with a scalar field. Assuming the absence of dimensionful param-
|
| 15 |
+
eters in the tree level potential, radiative symmetry breaking will make the hidden
|
| 16 |
+
sector gauge field massive and induce the electroweak scale of the Standard Model.
|
| 17 |
+
We consider separately dark sector gauge groups U(1)D and SU(2)D, and focus on
|
| 18 |
+
probing the models with a combination of direct detection experiments and gravita-
|
| 19 |
+
tional wave observatories. We find that recent dark matter direct detection results
|
| 20 |
+
significantly constrain the parameter space of the models where they can account for
|
| 21 |
+
the observed dark matter relic density via freeze-out. The gravitational wave signals
|
| 22 |
+
originating from strongly first order electroweak phase transition in these models can
|
| 23 |
+
be probed in future gravitational wave observatories such as LISA. We show how
|
| 24 |
+
the projected results compliment direct detection experiments and can help probe
|
| 25 |
+
parameter space near the neutrino floor of direct detection.
|
| 26 |
+
I.
|
| 27 |
+
INTRODUCTION
|
| 28 |
+
Despite the success of the Standard Model (SM) of particle physics, there are many phenomena
|
| 29 |
+
that it does not explain and that appear to require new particles and interactions. One enigmatic
|
| 30 |
+
phenomenon is the problem of missing mass, which emerged in a wide range of astrophysical
|
| 31 |
+
systems including galaxy clusters [1] and galaxies [2]. One possible solution to the missing mass
|
| 32 |
+
problem is cold dark matter (DM), constituted by a new stable and neutral massive particle. This
|
| 33 |
+
hypothesis provides an excellent parametrisation for 26% of the energy density of the universe in
|
| 34 |
+
addition to the components parametrised as baryonic matter and dark energy [3]. On the other
|
| 35 |
+
hand, the non-gravitational nature of dark matter (DM) remains unknown [4–6].
|
| 36 |
+
The cosmological observations on the light element abundance and cosmic microwave back-
|
| 37 |
+
ground radiation spectrum imply that the Standard Model (SM) degrees of freedom must have
|
| 38 |
+
been in thermal equilibrium in the early universe [7–11]. Whether DM was ever part of the same
|
| 39 |
+
heat bath is not known.
|
| 40 |
+
However, assuming that this was the case, allows for the abundance of dark matter to arise as a
|
| 41 |
+
relic from thermal decoupling in the early universe via interactions between the DM and the SM.
|
| 42 |
+
∗ frandsen@cp3.sdu.dk
|
| 43 |
+
† thing@cp3.sdu.dk
|
| 44 |
+
‡ matti.heikinheimo@helsinki.fi
|
| 45 |
+
§ kimmo.i.tuominen@helsinki.fi
|
| 46 |
+
¶ martin.jorgensen@physics.ox.ac.uk
|
| 47 |
+
arXiv:2301.00041v1 [hep-ph] 30 Dec 2022
|
| 48 |
+
|
| 49 |
+
2
|
| 50 |
+
Moreover, these interactions offer the prospect of detecting DM in direct detection experiments.
|
| 51 |
+
The most studied example of this paradigm is Weakly Interacting Massive Particle (WIMP). How-
|
| 52 |
+
ever, simplest WIMP models are now very strongly constrained by direct detection experiments.
|
| 53 |
+
It is therefore worthwhile to explore the phenomenology of different types of simple benchmark
|
| 54 |
+
hidden sectors instead coupled with the SM via portal interactions.
|
| 55 |
+
In this paper we analyze two simple models of vector DM, that feature scale invariance of the
|
| 56 |
+
tree-level Lagrangian and are coupled to the SM via the Higgs portal, where one scalar mass
|
| 57 |
+
eigenstate is SM-like, with mass 125.46 ± 0.16 GeV [12]. The other eigenstate is massless at tree
|
| 58 |
+
level but obtains its mass via loop corrections as an effect of radiative symmetry breaking [13].
|
| 59 |
+
This framework of classically scale invariant DM models that feature radiative symmetry breaking,
|
| 60 |
+
mediated to the SM via the Higgs portal, has been explored in literature, see e.g. [14–24].
|
| 61 |
+
In this paper we aim to clarify how simple U(1)D and SU(2)D models of this type can be tested
|
| 62 |
+
with a combination of direct detection and gravitational wave observations.
|
| 63 |
+
Direct detection
|
| 64 |
+
experiments have provided very stringent constraints on interactions of weak scale dark matter
|
| 65 |
+
with nuclei. Currently, the most stringent constraints come from the recent PandaX-4T and LZ
|
| 66 |
+
(2022) experiments [25, 26]. It is well known that radiative symmetry breaking in classically scale
|
| 67 |
+
invariant models typically results in a strongly first order electroweak phase transition (EWPT).
|
| 68 |
+
Such a first order EWPT could be relevant for baryogenesis and produces gravitational wave signals
|
| 69 |
+
which could be observable in upcoming gravitational wave experiments such as LISA [27].
|
| 70 |
+
We present a careful examination of the first order phase transition using different numerical
|
| 71 |
+
packages in order to characterise the theoretical uncertainty in the predictions.
|
| 72 |
+
II.
|
| 73 |
+
DEFINITIONS OF THE MODELS
|
| 74 |
+
We consider two models where the SM is extended with a hidden sector gauge group and a
|
| 75 |
+
new scalar field charged under the gauge group. Spontaneous symmetry breaking of the hidden
|
| 76 |
+
sector gauge group via this scalar leads to new massive vector DM candidates. The first model we
|
| 77 |
+
consider is an U(1)D extension defined by the Langrangian [22],
|
| 78 |
+
LU(1)D = L0
|
| 79 |
+
SM − 1
|
| 80 |
+
4VµνV µν + (DµS)∗(DµS) − V (H, S),
|
| 81 |
+
(1)
|
| 82 |
+
where L0
|
| 83 |
+
SM is the SM Lagrangian without the Higgs potential.
|
| 84 |
+
The covariant derivative is
|
| 85 |
+
Dµ = ∂µ + igVµ and the field strength tensor of the U(1)D vector field is Vµν = ∂µVν − ∂νVµ.
|
| 86 |
+
The scalar potential is given by
|
| 87 |
+
V (H, S) = 1
|
| 88 |
+
6λH(H†H)2 + 1
|
| 89 |
+
6λS(S∗S)2 + 2λHS(H†H)(S∗S).
|
| 90 |
+
(2)
|
| 91 |
+
In principle a kinetic mixing term BµνVµν could be present, but we assume this does not arise. For
|
| 92 |
+
example, the mixing term can be explicitly prohibited by a Z2 symmetry under which Vµ → −Vµ
|
| 93 |
+
and all other fields are singlets. In the unitary gauge the scalar fields are written as
|
| 94 |
+
H = 1
|
| 95 |
+
√
|
| 96 |
+
2
|
| 97 |
+
�
|
| 98 |
+
0
|
| 99 |
+
v1 + h1
|
| 100 |
+
�
|
| 101 |
+
,
|
| 102 |
+
S = 1
|
| 103 |
+
√
|
| 104 |
+
2(v2 + h2),
|
| 105 |
+
(3)
|
| 106 |
+
and upon symmetry breaking vi, (i = 1, 2), becomes nonzero. The SM gauge boson masses are
|
| 107 |
+
determined by the vacuum expectation value (VEV) v1 = 246 GeV while the DM mass is related
|
| 108 |
+
to the VEV v2 via M 2
|
| 109 |
+
V = g2v2
|
| 110 |
+
2.
|
| 111 |
+
The second model we consider is the similar SU(2)D extension defined by the Langrangian [24]
|
| 112 |
+
LSU(2)D = L0
|
| 113 |
+
SM − 1
|
| 114 |
+
4V i
|
| 115 |
+
µνV µν
|
| 116 |
+
i
|
| 117 |
+
+ (DµS)†(DµS) − V (H, S),
|
| 118 |
+
(4)
|
| 119 |
+
|
| 120 |
+
3
|
| 121 |
+
where the DM candidate is now the SU(2)D vector triplet V i
|
| 122 |
+
µ. The covariant derivative and the
|
| 123 |
+
field strength tensor take the forms
|
| 124 |
+
Dµ = ∂µ + igV i
|
| 125 |
+
µti,
|
| 126 |
+
V i
|
| 127 |
+
µν = ∂µV i
|
| 128 |
+
ν − ∂νV i
|
| 129 |
+
µ + gϵi
|
| 130 |
+
jkV j
|
| 131 |
+
µ V k
|
| 132 |
+
ν ,
|
| 133 |
+
(5)
|
| 134 |
+
where ti = σi/2 is the SU(2) generator. In this non-Abelian model, the kinetic mixing is forbidden
|
| 135 |
+
by gauge symmetry. The normalization of the scalar potential is here chosen as
|
| 136 |
+
V (H, S) = λH(H†H)2 + λS(S†S)2 + λHS(H†H)(S†S),
|
| 137 |
+
(6)
|
| 138 |
+
where the scalars are now both complex SU(2) doublets, and in the unitary gauge given by
|
| 139 |
+
H = 1
|
| 140 |
+
√
|
| 141 |
+
2
|
| 142 |
+
�
|
| 143 |
+
0
|
| 144 |
+
v1 + h1
|
| 145 |
+
�
|
| 146 |
+
,
|
| 147 |
+
S = 1
|
| 148 |
+
√
|
| 149 |
+
2
|
| 150 |
+
�
|
| 151 |
+
0
|
| 152 |
+
v2 + h2
|
| 153 |
+
�
|
| 154 |
+
.
|
| 155 |
+
(7)
|
| 156 |
+
In both of the above models the two neutral scalar states mix and the resulting mass eigenstates
|
| 157 |
+
are connected to the gauge eigenstates via a mixing matrix of the form
|
| 158 |
+
�
|
| 159 |
+
h
|
| 160 |
+
hS
|
| 161 |
+
�
|
| 162 |
+
=
|
| 163 |
+
�
|
| 164 |
+
cos α − sin α
|
| 165 |
+
sin α
|
| 166 |
+
cos α
|
| 167 |
+
� �
|
| 168 |
+
h1
|
| 169 |
+
h2
|
| 170 |
+
�
|
| 171 |
+
,
|
| 172 |
+
(8)
|
| 173 |
+
where the mixing angle α describes the mixing between the SM and DM sectors. Generally, this
|
| 174 |
+
angle is restricted to small values, sin α ≲ 0.1.
|
| 175 |
+
The parameters of these models can be written in uniform notation as,
|
| 176 |
+
v2 = cV MV
|
| 177 |
+
g
|
| 178 |
+
,
|
| 179 |
+
sin α = v1
|
| 180 |
+
v
|
| 181 |
+
(9)
|
| 182 |
+
λH = 3M 2
|
| 183 |
+
h
|
| 184 |
+
v2
|
| 185 |
+
1
|
| 186 |
+
cos2 α,
|
| 187 |
+
λS = 3M 2
|
| 188 |
+
h
|
| 189 |
+
v2
|
| 190 |
+
2
|
| 191 |
+
sin2 α,
|
| 192 |
+
λHS = − M 2
|
| 193 |
+
h
|
| 194 |
+
2v1v2
|
| 195 |
+
sin α cos α,
|
| 196 |
+
(10)
|
| 197 |
+
where MV is the mass of the DM candidate, Mh is the SM-Higgs mass and cV = 2 for the SU(2)D
|
| 198 |
+
model and cV = 1 for the U(1)D. We have also defined v2 = v2
|
| 199 |
+
1 + v2
|
| 200 |
+
2.
|
| 201 |
+
The tree-level potential has a flat direction along the scalon hS field direction, while the SM-like
|
| 202 |
+
Higgs h is perpendicular to the flat direction. We can thus consider the loop corrections in the flat
|
| 203 |
+
direction as per the Gildener-Weinberg formalism [13]. The first order loop corrections lead to an
|
| 204 |
+
effective potential of the general form,
|
| 205 |
+
V 1
|
| 206 |
+
eff(hS) =
|
| 207 |
+
1
|
| 208 |
+
64π2
|
| 209 |
+
n
|
| 210 |
+
�
|
| 211 |
+
s=1
|
| 212 |
+
gsM 4
|
| 213 |
+
s
|
| 214 |
+
�
|
| 215 |
+
ln
|
| 216 |
+
�M 2
|
| 217 |
+
s
|
| 218 |
+
Λ2
|
| 219 |
+
�
|
| 220 |
+
− Ci
|
| 221 |
+
�
|
| 222 |
+
,
|
| 223 |
+
(11)
|
| 224 |
+
where Ms refers to tree level masses, gs is the degrees of freedom (with positive values for bosons
|
| 225 |
+
and negative for fermions), n is the number of states, and Λ is a renormalization scale. The scalon
|
| 226 |
+
field is massless at tree level, but obtains a mass from the loop corrections, given by
|
| 227 |
+
M 2
|
| 228 |
+
S =
|
| 229 |
+
1
|
| 230 |
+
8π2v2
|
| 231 |
+
�
|
| 232 |
+
gV M 4
|
| 233 |
+
V + 3M 4
|
| 234 |
+
Z + 6M 4
|
| 235 |
+
W + M 4
|
| 236 |
+
h − 12m4
|
| 237 |
+
t
|
| 238 |
+
�
|
| 239 |
+
,
|
| 240 |
+
(12)
|
| 241 |
+
where gV is the degrees of freedom for the vector boson: gV = 9 for the SU(2)D model and gV = 3
|
| 242 |
+
for the U(1)D. Here MS is the scalon mass for each respective model and MV is the DM candidate.
|
| 243 |
+
Notice that Equation (12) relates the scalon and DM masses. In order for the scalon mass to be
|
| 244 |
+
non-negative, this sets a lower bound for the DM masses. The bound is MV > 240 GeV for the
|
| 245 |
+
SU(2)D model and MV > 185 GeV for the U(1)D model.
|
| 246 |
+
|
| 247 |
+
4
|
| 248 |
+
III.
|
| 249 |
+
FREEZE-OUT RELIC DENSITY
|
| 250 |
+
The dark matter abundance in the model is determined via the freeze-out mechanism. While
|
| 251 |
+
other possibilities, namely super-cool DM and filtered DM have been considered in the context of
|
| 252 |
+
radiative symmetry breaking models such as those under the present study [28–31], we will see
|
| 253 |
+
that the freeze-out mechanism is operational throughout the parameter space considered in this
|
| 254 |
+
work.
|
| 255 |
+
To see how the observed DM abundance Ωh2 = 0.120 ± 0.001 [3] is generated via the freeze-out
|
| 256 |
+
mechanism, we recall the basic formalism below. The present-day dark matter density is obtained
|
| 257 |
+
from the Boltzmann equation
|
| 258 |
+
dnV
|
| 259 |
+
dt + 3HnV = − ⟨σav⟩
|
| 260 |
+
�
|
| 261 |
+
n2
|
| 262 |
+
V − n2
|
| 263 |
+
V,eq
|
| 264 |
+
�
|
| 265 |
+
,
|
| 266 |
+
(13)
|
| 267 |
+
where nV is the number density of the dark matter, which in equilibrium in the broken phase is
|
| 268 |
+
given as
|
| 269 |
+
neq
|
| 270 |
+
V (T) = gV
|
| 271 |
+
�MV T
|
| 272 |
+
2π
|
| 273 |
+
�3/2
|
| 274 |
+
e�� MV
|
| 275 |
+
T .
|
| 276 |
+
(14)
|
| 277 |
+
Here H is the Hubble parameter and ⟨σav⟩ is the thermally averaged annihilation cross section.
|
| 278 |
+
Equation (13) can be rewritten using entropy conservation, the yield YV = nV
|
| 279 |
+
s , and x = MV
|
| 280 |
+
T
|
| 281 |
+
into
|
| 282 |
+
the form
|
| 283 |
+
dYV
|
| 284 |
+
dx =
|
| 285 |
+
1
|
| 286 |
+
3H
|
| 287 |
+
ds
|
| 288 |
+
dx ⟨σav⟩
|
| 289 |
+
�
|
| 290 |
+
Y 2
|
| 291 |
+
V − Y 2
|
| 292 |
+
V,eq
|
| 293 |
+
�
|
| 294 |
+
,
|
| 295 |
+
(15)
|
| 296 |
+
and solving this equation we obtain the present day yield Y 0
|
| 297 |
+
V that links to the abundance as
|
| 298 |
+
Ωh2 = MV s0Y 0
|
| 299 |
+
V h2
|
| 300 |
+
ρc
|
| 301 |
+
0
|
| 302 |
+
≃ 2.755 · 108MV s0Y 0
|
| 303 |
+
V GeV−1,
|
| 304 |
+
(16)
|
| 305 |
+
where
|
| 306 |
+
s0 = 2.8912 · 109 m−3,
|
| 307 |
+
ρc
|
| 308 |
+
0 = 10.537h2 GeVm−3 for H = h100 km/s/Mpc,
|
| 309 |
+
(17)
|
| 310 |
+
and h = 0.678.
|
| 311 |
+
To solve the Boltzmann equation numerically we use the micrOMEGA package [32]. This software
|
| 312 |
+
uses CalcHEP input files with the models Feynman rules to compute the thermally averaged cross
|
| 313 |
+
section, which we generate with the LanHEP package [33, 34]. The numerical results for the relic
|
| 314 |
+
density for both models can be seen in Figure 1. To asses the validity of the numerical results
|
| 315 |
+
we have compared these to the analytical result, obtained in the non-relativistic limit and under
|
| 316 |
+
the approximation of instantaneous freeze-out. Both of these approximations tend to overestimate
|
| 317 |
+
the relic density. Nevertheless, the analytical result only deviates up to around 10% for the U(1)D
|
| 318 |
+
model and slightly more for the SU(2)D model, considering only the leading annihilation processes
|
| 319 |
+
σ (V V → hShS) for the U(1)D model and σ (V iV j → hShS) plus the semi-annihilation process
|
| 320 |
+
σ
|
| 321 |
+
�
|
| 322 |
+
V iV j → V khS
|
| 323 |
+
�
|
| 324 |
+
for the SU(2)D model.
|
| 325 |
+
From Figure 1 it is evident that both models can reproduce the observed relic density. A larger
|
| 326 |
+
coupling g leads to more efficient annihilation of the vector DM candidate V into scalons hS and
|
| 327 |
+
thus the correct abundance is obtained for a correspondingly higher vector mass MV . In the non-
|
| 328 |
+
Abelian model the semi-annihilation process is taken into account in the analytic approximation
|
| 329 |
+
by defining the effective thermally averaged total annihilation cross section as
|
| 330 |
+
⟨σav⟩ = ⟨σannv⟩ + 1
|
| 331 |
+
2 ⟨σsemi−annv⟩ ,
|
| 332 |
+
(18)
|
| 333 |
+
|
| 334 |
+
5
|
| 335 |
+
(a) The DM relic density as a function of the mass of
|
| 336 |
+
the U(1)D vector DM candidate for different coupling
|
| 337 |
+
constants, including the Planck collaboration result.
|
| 338 |
+
(b) The DM relic density as a function of the mass of
|
| 339 |
+
the SU(2)D vector DM candidate for different coupling
|
| 340 |
+
constants, including the Planck collaboration result.
|
| 341 |
+
FIG. 1. The red line representing the Planck collaboration result of Ωh2 = 0.120 ± 0.001 is shown in red,
|
| 342 |
+
and both models can match it via a freeze-out relic density [3].
|
| 343 |
+
where the first term is the annihilation and the second term is the semi-annihilation cross section.
|
| 344 |
+
The addition of the semi-annihilation generally leads to more efficient annihilation, and thus
|
| 345 |
+
one would expect the relic density to be lower. However, the SU(2)D result in Figure 1(b) is very
|
| 346 |
+
close to the U(1)D result in Figure 1(a), which indicates that there is not much difference in the
|
| 347 |
+
abundance for the two models considered. The origin of this is that that while the additional
|
| 348 |
+
degrees of freedom in the non-Abelian model increase the relic density, this is balanced by the
|
| 349 |
+
reducing effect of the semi-annihilations. Concretely, the semi-annihilations increases the overall
|
| 350 |
+
thermally averaged total annihilation cross section only by roughly 15%.
|
| 351 |
+
Finally, we comment on the possibility of a freeze-in origin for the DM abundance in these
|
| 352 |
+
models. In the freeze-in regime the DM particle V needs to be feebly coupled to the visible sector,
|
| 353 |
+
so that it does not reach equilibrium with the SM thermal bath in the early universe. To achieve
|
| 354 |
+
this, either the gauge coupling g needs to be very small so that the vector remains decoupled while
|
| 355 |
+
the scalar S is in equilibrium, or the portal coupling λHS can be very small, so that both the vector
|
| 356 |
+
and the scalar remain decoupled from the SM.
|
| 357 |
+
In the first scenario, the typical scale for the gauge coupling would be g ∼ O(10−7), as seen
|
| 358 |
+
from the approximate relation [35]
|
| 359 |
+
YV (T) ∼ g2Mpl
|
| 360 |
+
T ,
|
| 361 |
+
(19)
|
| 362 |
+
where Mpl is the reduced Planck mass. Since this process is IR dominated, the dominant production
|
| 363 |
+
would be at the lowest kinematically allowed temperature T ∼ MV . Thus we can approximate the
|
| 364 |
+
abundance by the replacement T = MV in the above to obtain
|
| 365 |
+
Y 0
|
| 366 |
+
V ∼ g2Mpl
|
| 367 |
+
MV
|
| 368 |
+
.
|
| 369 |
+
(20)
|
| 370 |
+
Consider now the relationship between the coupling and DM mass in Equations (10) and (12).
|
| 371 |
+
If the coupling is g ∼ O(10−7) as necessary for the freeze-in mechanism to work, the VEV, v2,
|
| 372 |
+
|
| 373 |
+
RelicDensity of U(1)pModel
|
| 374 |
+
g= 0.5
|
| 375 |
+
g = 0.7
|
| 376 |
+
g= 0.9
|
| 377 |
+
100
|
| 378 |
+
Planck
|
| 379 |
+
10~1
|
| 380 |
+
10~2
|
| 381 |
+
250500
|
| 382 |
+
1000
|
| 383 |
+
1500
|
| 384 |
+
2000
|
| 385 |
+
2500
|
| 386 |
+
3000
|
| 387 |
+
3500
|
| 388 |
+
4000
|
| 389 |
+
Mv[GeV]RelicDensity of SU(2)p Model
|
| 390 |
+
101
|
| 391 |
+
g=0.5
|
| 392 |
+
g= 0.7
|
| 393 |
+
g= 0.9
|
| 394 |
+
Planck
|
| 395 |
+
100
|
| 396 |
+
10-1
|
| 397 |
+
10~2
|
| 398 |
+
250500
|
| 399 |
+
1000
|
| 400 |
+
1500
|
| 401 |
+
2000
|
| 402 |
+
2500
|
| 403 |
+
3000
|
| 404 |
+
3500
|
| 405 |
+
4000
|
| 406 |
+
My[GeV]6
|
| 407 |
+
becomes very large and the scalon mass, MS, is approximately zero.
|
| 408 |
+
The presence of a very
|
| 409 |
+
light scalar in the spectrum is potentially problematic, e.g. due to Higgs invisible decays, unless
|
| 410 |
+
suppressed by a small portal coupling. On the other hand, the scenario where the portal coupling
|
| 411 |
+
would be very small, would also require a large hidden sector VEV v2 ≫ v1. If the gauge coupling
|
| 412 |
+
is not very small, then this implies that the DM mass MV becomes very large. In this case the
|
| 413 |
+
hidden sector can only be effectively populated in the broken phase, as there is no scalar mixing in
|
| 414 |
+
the unbroken phase. However, in this scenario there will be large supercooling, as discussed below,
|
| 415 |
+
and the DM production should take place after reheating from thermal inflation. Now the scalar
|
| 416 |
+
VEV is mostly in the S-direction v2 ≫ v1, so that the energy stored in the inflaton field mostly
|
| 417 |
+
goes into S-quanta, but since these are feebly coupled to the SM, the reheating will be very slow
|
| 418 |
+
and the reheating temperature suppressed. Thus, the heavy DM can not be efficiently produced
|
| 419 |
+
after reheating, since Tr ≪ MV . While there might be some way to overcome these apparent
|
| 420 |
+
problems with freeze-in, we do not consider this scenario further in this work.
|
| 421 |
+
IV.
|
| 422 |
+
INFLATION, REHEATING AND SUPERCOOLING
|
| 423 |
+
In the previous section, we discussed the DM abundance in the standard freeze-out scenario.
|
| 424 |
+
The situation may however be more complicated [28, 30, 36, 37], due to a possible phase of thermal
|
| 425 |
+
inflation characteristic of classically scale invariant models with radiative symmetry breaking. The
|
| 426 |
+
thermal history in the models can be summarised in terms of the following temperature thresholds:
|
| 427 |
+
• TFO: The freeze-out temperature of the DM candidate defined roughly by neq
|
| 428 |
+
V ⟨σv⟩ = H.
|
| 429 |
+
• Tn: The nucleation temperature when the probability to nucleate an expanding bubble of
|
| 430 |
+
the broken phase vacuum inside a Hubble horizon becomes of O(1), approximately the
|
| 431 |
+
temperature at which the phase transition completes.
|
| 432 |
+
• Tinf: The temperature at the beginning of thermal inflation defined by ρV = ρrad, where
|
| 433 |
+
ρV is the energy density of the false unbroken vacuum (i.e. the difference in the potential
|
| 434 |
+
between the local minimum at V (S) = 0 and the true minimum at V (S = v)), and ρrad is
|
| 435 |
+
the energy density of the radiation dominated universe. When ρV begins to dominate the
|
| 436 |
+
energy density, inflation begins.
|
| 437 |
+
In the case of the two vector DM models discussed in this paper, the finite temperature potential
|
| 438 |
+
includes the thermal integral summing over the bosons and fermions [38],
|
| 439 |
+
V 1
|
| 440 |
+
eff(hS, T) =
|
| 441 |
+
n
|
| 442 |
+
�
|
| 443 |
+
s=1
|
| 444 |
+
gs
|
| 445 |
+
�
|
| 446 |
+
1
|
| 447 |
+
64π2M 4
|
| 448 |
+
s
|
| 449 |
+
�
|
| 450 |
+
ln
|
| 451 |
+
�M 2
|
| 452 |
+
s
|
| 453 |
+
Λ2
|
| 454 |
+
�
|
| 455 |
+
− Ci
|
| 456 |
+
�
|
| 457 |
+
+ T 4
|
| 458 |
+
2π2
|
| 459 |
+
� ∞
|
| 460 |
+
0
|
| 461 |
+
x2 ln
|
| 462 |
+
�
|
| 463 |
+
1 ∓ e−√
|
| 464 |
+
x2±M2s /T 2�
|
| 465 |
+
dx
|
| 466 |
+
�
|
| 467 |
+
.
|
| 468 |
+
(21)
|
| 469 |
+
For some models, it might be necessary to consider the additional ring diagrams for the bosons, but
|
| 470 |
+
for this investigation they can be ignored as they are insignificant [39]. This thermal potential is
|
| 471 |
+
not amenable to an analytic solution, but can be approximated using modified Bessel functions of
|
| 472 |
+
the second kind [23]. We compute the freeze-out temperature, TFO, numerically with micrOMEGA,
|
| 473 |
+
and the nucleation temperature, Tn, numerically using CosmoTransitions and Bubbleprofiler
|
| 474 |
+
(for cross-checking) [32, 40, 41].
|
| 475 |
+
Let us now consider the thermal history of the model depending on the order of the above three
|
| 476 |
+
temperature thresholds. If Tn > TFO, the phase transition completes before DM freeze-out, and
|
| 477 |
+
the freeze-out then takes place as usual in the broken phase. This means that we can calculate
|
| 478 |
+
the relic abundance as presented in the previous section.
|
| 479 |
+
In the opposite case, Tn < TFO there are three scenarios to consider. The filtered DM scenario
|
| 480 |
+
takes place for the ordering TFO > Tn > Tinf. In this situation, there is no thermal inflation, as the
|
| 481 |
+
|
| 482 |
+
7
|
| 483 |
+
phase transition completes before inflation would begin, but the DM annihilations are immediately
|
| 484 |
+
out of equilibrium after the phase transition, and therefore the abundance is set by the amount of
|
| 485 |
+
DM particles that are able to enter the boundary to the broken phase, as described in [30].
|
| 486 |
+
The supercool DM scenario [28], takes place for TFO > Tinf > Tn. In this situation, there is a
|
| 487 |
+
period of thermal inflation, which ends at Tn. After inflation, the latent heat stored in the false
|
| 488 |
+
vacuum is released to reheat the universe back to temperature Tinf, under the assumption of instant
|
| 489 |
+
reheating, or to a lower reheating temperature for delayed reheating. However, since TFO > Tinf,
|
| 490 |
+
no DM is produced in reheating and the abundance is set by the amount that was present before
|
| 491 |
+
inflation, diluted by the expansion of the scale factor and by the filtering effect as in the above
|
| 492 |
+
scenario.
|
| 493 |
+
Finally, there is the case where Tinf > TFO. In this situation, assuming instant reheating, the
|
| 494 |
+
reheating will bring DM back to equilibrium, and the relic abundance is again obtained via the
|
| 495 |
+
usual freeze-out mechanism as presented in the previous section.
|
| 496 |
+
The inflation temperature is obtained by solving for Tinf from
|
| 497 |
+
∆V (Tinf) = V high
|
| 498 |
+
eff
|
| 499 |
+
(hS, Tinf) − V low
|
| 500 |
+
eff (0, Tinf) = g∗π2
|
| 501 |
+
30 T 4
|
| 502 |
+
inf,
|
| 503 |
+
(22)
|
| 504 |
+
where V high
|
| 505 |
+
eff
|
| 506 |
+
(hS, T) is the true vacuum and V low
|
| 507 |
+
eff (0, T) is the false vacuum. We find that throughout
|
| 508 |
+
the parameter space of interest in this work, we are either in the first or the last situation described
|
| 509 |
+
above, and the DM abundance is thus obtained via the usual freeze-out mechanism in both cases.
|
| 510 |
+
See Appendix A for more on the reheating.
|
| 511 |
+
V.
|
| 512 |
+
DIRECT DETECTION
|
| 513 |
+
In this section, we present the direct detection constraints on the two models. We will see
|
| 514 |
+
that the recent results from the LZ experiment significantly affect the SU(2)D model and that the
|
| 515 |
+
U(1)D model is already very constrained.
|
| 516 |
+
To compute the direct detection cross section, we again use the micrOMEGA package [32]. The
|
| 517 |
+
DM coupling to nucleons arises from the scalar mixing and is mediated via exchange of the SM-like
|
| 518 |
+
Higgs and the scalon in the t-channel leading to a spin-independent cross section with negligible
|
| 519 |
+
difference between protons and neutrons. The results of this computation for both models are
|
| 520 |
+
shown in Figure 2. The correct relic abundance is obtained along the red solid line.
|
| 521 |
+
The purple region is excluded by LHC constraints on to Higgs decays into two scalons [44, 45].
|
| 522 |
+
This process becomes kinetically forbidden for larger DM mass, as larger DM mass leads to larger
|
| 523 |
+
scalon mass as shown in Equation (12). In the orange region, the DM-nucleon cross section is below
|
| 524 |
+
the neutrino floor, and the yellow regions indicate the exclusion limit due to the LZ experiment
|
| 525 |
+
[26], providing a significant improvement over the XENON1T experiment shown in green [42].
|
| 526 |
+
Finally, the grey region shows the projected exclusion limit from XENONnT [43].
|
| 527 |
+
Starting with the U(1)D model we see a small gap in the direct detection limits at the resonance
|
| 528 |
+
region, Mh ≃ 2MV , where the DM mass is around 0.9-1 TeV and the coupling 0.65 ≤ g ≤ 0.7. In
|
| 529 |
+
the middle of this range the direct detection cross section falls below the neutrino floor. Outside of
|
| 530 |
+
the resonance region, the model can not produce an O(1)-fraction of DM without being excluded
|
| 531 |
+
by direct detection, unless the DM mass is well above 10 TeV.
|
| 532 |
+
For the SU(2)D model the new constraints from LZ alter the picture compared to the situation
|
| 533 |
+
with the previous XENON1T limits: the relic abundance line above the resonance region is now
|
| 534 |
+
excluded for DM masses below 7.5 TeV, while prior to the LZ result there were no constraints
|
| 535 |
+
beyond 1 TeV. In the resonance region, we find the nucleation temperature for the phase transition
|
| 536 |
+
below the QCD-scale. This alters the computation for the gravitational wave signal, as the phase
|
| 537 |
+
transition will be completed in conjunction with the QCD phase transition, as discussed in [46, 47].
|
| 538 |
+
This picture slightly changes when including additional scalar self-energy corrections for the SU(2)
|
| 539 |
+
|
| 540 |
+
8
|
| 541 |
+
(a) Constraints for the the U(1)D model.
|
| 542 |
+
(b) Constraints for the the SU(2)D model.
|
| 543 |
+
FIG. 2. The red line shows the correct relic abundance, Ωh2 = 0.12 [3]. The yellow region is excluded by
|
| 544 |
+
the LZ (2022) experiment [26], the green region is the XENON1T experiment [42], the purple region is
|
| 545 |
+
the LHC constraint for exotic Higgs decay, the orange region is the neutrino floor and the gray region is
|
| 546 |
+
the projected 90% CL constraint from the XENONnT experiment [43].
|
| 547 |
+
model [48]. First, the scalon mass is slightly larger than in our leading order analysis, pushing
|
| 548 |
+
the resonance region in figure 2(b) to the right. Additionally, the correction appears to slightly
|
| 549 |
+
increase the nucleation temperature compared to our results. However, we find that overall the
|
| 550 |
+
resulting gravitational wave (GW) signal is not significantly affected, and the GW signal prediction
|
| 551 |
+
remains comparable to our results presented in the next section.
|
| 552 |
+
For DM mass above 7.5 TeV the model is again allowed by direct detection. In Figure 2 we
|
| 553 |
+
have marked three benchmark points allowed by direct detection with the blue, indigo, and purple
|
| 554 |
+
markers. These points will be used as examples for analyzing the GW signals in the next section.
|
| 555 |
+
VI.
|
| 556 |
+
GRAVITATIONAL WAVES
|
| 557 |
+
The strongly first order phase transition possible in classically scale invariant models is inter-
|
| 558 |
+
esting due to the implications for baryogenesis [49], and due to potentially observable gravitational
|
| 559 |
+
wave (GW) signal.
|
| 560 |
+
To explore the gravitational wave signals, we consider the finite temperature potential in Equa-
|
| 561 |
+
tion (21). This potential contains a barrier between the unbroken false vacuum and the broken
|
| 562 |
+
phase minimum, leading to a first order phase transition. At the nucleation temperature Tn, the
|
| 563 |
+
phase transition will complete via the formation of bubbles of the true vacuum. The expanding
|
| 564 |
+
and colliding bubbles deposit energy in the surrounding plasma, generating gravitational waves as
|
| 565 |
+
described in [50–52].
|
| 566 |
+
For the purpose of solving Equation
|
| 567 |
+
(21) and obtaining the parameters that describe the
|
| 568 |
+
gravitational wave signal, we use the Python package CosmoTransitions[40], with custom modifi-
|
| 569 |
+
cations including a method of computing the β value. The relevant parameters are the latent heat
|
| 570 |
+
normalized with respect to the radiation energy, α, the inverse duration of the phase transition,
|
| 571 |
+
|
| 572 |
+
Constraints ofU(1)p Model
|
| 573 |
+
1.0
|
| 574 |
+
Qh2 = 0.12
|
| 575 |
+
0.9
|
| 576 |
+
0.8
|
| 577 |
+
9 0.7
|
| 578 |
+
LZ(2022)
|
| 579 |
+
0.6
|
| 580 |
+
LHC
|
| 581 |
+
KENONIT
|
| 582 |
+
0.5
|
| 583 |
+
XENONnT
|
| 584 |
+
0.4
|
| 585 |
+
300
|
| 586 |
+
1000
|
| 587 |
+
2000
|
| 588 |
+
3000
|
| 589 |
+
4000
|
| 590 |
+
Mv[GeV]ConstraintsofSU(2)pModel
|
| 591 |
+
2.0
|
| 592 |
+
Qh2 = 0.12
|
| 593 |
+
1.8
|
| 594 |
+
1.6
|
| 595 |
+
1.4
|
| 596 |
+
1.0
|
| 597 |
+
XENONIT
|
| 598 |
+
0.8
|
| 599 |
+
0.6
|
| 600 |
+
0.4
|
| 601 |
+
300
|
| 602 |
+
1000
|
| 603 |
+
2000
|
| 604 |
+
4000
|
| 605 |
+
8000
|
| 606 |
+
My[GeV]9
|
| 607 |
+
Model
|
| 608 |
+
Benchmark point Parameter CosmoTransitions BubbleProfiler
|
| 609 |
+
U(1)D
|
| 610 |
+
g = 0.66
|
| 611 |
+
MV = 911 GeV
|
| 612 |
+
Tc = 303 GeV
|
| 613 |
+
α
|
| 614 |
+
20740
|
| 615 |
+
92180
|
| 616 |
+
β
|
| 617 |
+
23.8
|
| 618 |
+
39.2
|
| 619 |
+
Tn
|
| 620 |
+
7.04 GeV
|
| 621 |
+
4.78 GeV
|
| 622 |
+
U(1)D
|
| 623 |
+
g = 0.7
|
| 624 |
+
MV = 1028 GeV
|
| 625 |
+
Tc = 336 GeV
|
| 626 |
+
α
|
| 627 |
+
1497
|
| 628 |
+
4597
|
| 629 |
+
β
|
| 630 |
+
36.8
|
| 631 |
+
49.5
|
| 632 |
+
Tn
|
| 633 |
+
15.3 GeV
|
| 634 |
+
11.4 GeV
|
| 635 |
+
SU(2)D
|
| 636 |
+
g = 2.0
|
| 637 |
+
MV = 7530 GeV
|
| 638 |
+
Tc = 2345 GeV
|
| 639 |
+
α
|
| 640 |
+
0.16
|
| 641 |
+
0.22
|
| 642 |
+
β
|
| 643 |
+
289
|
| 644 |
+
301
|
| 645 |
+
Tn
|
| 646 |
+
1430 GeV
|
| 647 |
+
1446 GeV
|
| 648 |
+
.
|
| 649 |
+
FIG. 3. Table with benchmark points used for the discussion of gravitaitonal wave signals. The two first
|
| 650 |
+
benchmark points are from the U(1)D model and the last is from the SU(2)D model.
|
| 651 |
+
β, and the nucleation temperature, Tn, defined as [24, 53],
|
| 652 |
+
α ≡ 1
|
| 653 |
+
ρ
|
| 654 |
+
�
|
| 655 |
+
∆V − T
|
| 656 |
+
4
|
| 657 |
+
d∆V
|
| 658 |
+
dT
|
| 659 |
+
� ����
|
| 660 |
+
Tn
|
| 661 |
+
,
|
| 662 |
+
β
|
| 663 |
+
H ≡ T d(S/T)
|
| 664 |
+
dT
|
| 665 |
+
����
|
| 666 |
+
Tn
|
| 667 |
+
,
|
| 668 |
+
(23)
|
| 669 |
+
where,
|
| 670 |
+
∆V = V high
|
| 671 |
+
eff
|
| 672 |
+
(hS, T) − V low
|
| 673 |
+
eff (hS, T),
|
| 674 |
+
ρ = geπ2
|
| 675 |
+
30 T 4
|
| 676 |
+
n,
|
| 677 |
+
(24)
|
| 678 |
+
where the ge ≈ 103 is the number of effective degrees of freedom during the nucleation at the
|
| 679 |
+
temperature Tn. Finally the Euclidean action is defined as,
|
| 680 |
+
S = 4π
|
| 681 |
+
� ∞
|
| 682 |
+
0
|
| 683 |
+
r2
|
| 684 |
+
�
|
| 685 |
+
1
|
| 686 |
+
2
|
| 687 |
+
�dhφ/S
|
| 688 |
+
dr
|
| 689 |
+
�2
|
| 690 |
+
+ Veff(hφ/S)
|
| 691 |
+
�
|
| 692 |
+
dr,
|
| 693 |
+
(25)
|
| 694 |
+
where r is the radial distance from the center of the true vacuum bubble.
|
| 695 |
+
In order to assess the reliability of the results, we make use of two different numerical tools
|
| 696 |
+
for computing the nucleation temperature and the β and α parameters. The parameters α and β
|
| 697 |
+
depend heavily on the nucleation temperature, Tn, so that possible errors on Tn will propagate to
|
| 698 |
+
α and β. For the computation we use CosmoTransitions and BubbleProfiler[40, 41]. As shown
|
| 699 |
+
in the appendix, we obtain a smaller numerical error with CosmoTransitions, but the results of
|
| 700 |
+
both numerical computations agree within uncertainty. In general, we find that for sub-TeV DM
|
| 701 |
+
masses the nucleation temperature in the BubbleProfiler implementation tends to be smaller
|
| 702 |
+
than in CosmoTransitions.
|
| 703 |
+
In Figure 2, we identify three benchmark points allowed by all constraints. These benchmark
|
| 704 |
+
points are shown in 3 corresponding to the indigo diamond, blue square and purple hexagon shown
|
| 705 |
+
in Figure 2.
|
| 706 |
+
Notice that the first point is below one TeV, the trend we observed regarding the performance of
|
| 707 |
+
the two simulation tools is noticeable, and the BubbleProfiler nucleation temperature is signifi-
|
| 708 |
+
cantly below the value obtained from CosmoTransitions, affecting also the α and β parameters.
|
| 709 |
+
At this point, the critical temperature is Tc = 303.
|
| 710 |
+
In summary, both CosmoTransitions and BubbleProfiler show similar behavior for both
|
| 711 |
+
models and are in reasonable agreement. For high masses the latter tool yields slightly higher
|
| 712 |
+
nucleation temperatures and therefore α is also a bit lower and β as indicated by Equation 23.
|
| 713 |
+
|
| 714 |
+
10
|
| 715 |
+
Having computed the relevant parameters for calculating gravitational waves (GW) spectra, we
|
| 716 |
+
can consider the following equation for computing the total signal,
|
| 717 |
+
Ωtoth2 = Ωcolh2 + Ωswh2 + Ωturbh2,
|
| 718 |
+
(26)
|
| 719 |
+
where the first term is the collision term, the second term is the sound wave term, and the last
|
| 720 |
+
term is the turbulence term. The collisions from the bubbles themselves contribute to the GW
|
| 721 |
+
spectra, but they do not give the most significant contribution. The collisions also produce bulk
|
| 722 |
+
motion in the fluid. This causes sound waves that result in the primary contribution to the GW
|
| 723 |
+
spectra. Finally, there is also some turbulence caused by the collisions which contribute to the
|
| 724 |
+
GW spectra [23, 52, 54]. The relevant equations for computing the collision term are,
|
| 725 |
+
Ωcolh2(f) = 1.67 · 10−5
|
| 726 |
+
�
|
| 727 |
+
α
|
| 728 |
+
1 + α
|
| 729 |
+
�2 H2
|
| 730 |
+
β2
|
| 731 |
+
� ge
|
| 732 |
+
100
|
| 733 |
+
�− 1
|
| 734 |
+
3 0.11κ2
|
| 735 |
+
vv3
|
| 736 |
+
b
|
| 737 |
+
0.42 + v2
|
| 738 |
+
b
|
| 739 |
+
Scol
|
| 740 |
+
Scol(f) =
|
| 741 |
+
3.8
|
| 742 |
+
�
|
| 743 |
+
f
|
| 744 |
+
fcol
|
| 745 |
+
�2.8
|
| 746 |
+
2.8
|
| 747 |
+
�
|
| 748 |
+
f
|
| 749 |
+
fcol
|
| 750 |
+
�3.8
|
| 751 |
+
+ 1
|
| 752 |
+
fcol = 16.5 µHz
|
| 753 |
+
0.62
|
| 754 |
+
v2
|
| 755 |
+
b − 0.1vb + 1.8
|
| 756 |
+
β
|
| 757 |
+
H
|
| 758 |
+
Tn
|
| 759 |
+
100 GeV
|
| 760 |
+
� ge
|
| 761 |
+
100
|
| 762 |
+
� 1
|
| 763 |
+
6 ,
|
| 764 |
+
(27)
|
| 765 |
+
similarly, the equations for the sound wave term are
|
| 766 |
+
Ωswh2(f) = 2.65 · 10−6
|
| 767 |
+
�
|
| 768 |
+
α
|
| 769 |
+
1 + α
|
| 770 |
+
�2 H
|
| 771 |
+
β
|
| 772 |
+
� ge
|
| 773 |
+
100
|
| 774 |
+
�− 1
|
| 775 |
+
3 κ2
|
| 776 |
+
vvbSsw
|
| 777 |
+
Ssw(f) =
|
| 778 |
+
� f
|
| 779 |
+
fsw
|
| 780 |
+
�3
|
| 781 |
+
�
|
| 782 |
+
�
|
| 783 |
+
�
|
| 784 |
+
7
|
| 785 |
+
3
|
| 786 |
+
�
|
| 787 |
+
f
|
| 788 |
+
fsw
|
| 789 |
+
�2
|
| 790 |
+
+ 4
|
| 791 |
+
�
|
| 792 |
+
�
|
| 793 |
+
�
|
| 794 |
+
3.5
|
| 795 |
+
fsw = 19 µHz 1
|
| 796 |
+
vb
|
| 797 |
+
β
|
| 798 |
+
H
|
| 799 |
+
Tn
|
| 800 |
+
100 GeV
|
| 801 |
+
� ge
|
| 802 |
+
100
|
| 803 |
+
� 1
|
| 804 |
+
6 ,
|
| 805 |
+
(28)
|
| 806 |
+
and lastly, the equations for the turbulence term are
|
| 807 |
+
Ωturbh2(f) = 3.35 · 10−4
|
| 808 |
+
�κturbα
|
| 809 |
+
1 + α
|
| 810 |
+
� 3
|
| 811 |
+
2 H
|
| 812 |
+
β
|
| 813 |
+
� ge
|
| 814 |
+
100
|
| 815 |
+
�− 1
|
| 816 |
+
3 vbSturb
|
| 817 |
+
Sturb(f) =
|
| 818 |
+
�
|
| 819 |
+
f
|
| 820 |
+
fturb
|
| 821 |
+
�3
|
| 822 |
+
�
|
| 823 |
+
1 + 8πf
|
| 824 |
+
h∗
|
| 825 |
+
� �
|
| 826 |
+
1 +
|
| 827 |
+
f
|
| 828 |
+
fturb
|
| 829 |
+
� 11
|
| 830 |
+
3
|
| 831 |
+
fturb = 22.7 µHz 1
|
| 832 |
+
vb
|
| 833 |
+
β
|
| 834 |
+
H
|
| 835 |
+
Tn
|
| 836 |
+
100 GeV
|
| 837 |
+
� ge
|
| 838 |
+
100
|
| 839 |
+
� 1
|
| 840 |
+
6 ,
|
| 841 |
+
(29)
|
| 842 |
+
where the inverse Hubble time, h∗, red-shifted to today, at the GW production is given as
|
| 843 |
+
h∗ = 1.65 · 10−5
|
| 844 |
+
Tn
|
| 845 |
+
100 GeV
|
| 846 |
+
� ge
|
| 847 |
+
100
|
| 848 |
+
� 1
|
| 849 |
+
6 ,
|
| 850 |
+
(30)
|
| 851 |
+
|
| 852 |
+
11
|
| 853 |
+
FIG. 4. The GW spectra for two different sets of transition parameters for the U(1)D model and one
|
| 854 |
+
for the SU(2)D model (g = 2.0, MV = 7530) computed with CosmoTransitions, dashed lines, and
|
| 855 |
+
BubbleProfiler, dotted lines. The sensitivity curves (C1-C4) of the LISA detector are also shown [27].
|
| 856 |
+
According to this result, the signals from this model are strong enough for LISA to detect the GW signal
|
| 857 |
+
from the phase transition.
|
| 858 |
+
and the two modified efficiency factors can be written as,
|
| 859 |
+
κv =
|
| 860 |
+
α
|
| 861 |
+
0.73 + 0.083√α + α,
|
| 862 |
+
κturb = 0.05κv.
|
| 863 |
+
(31)
|
| 864 |
+
The result of this computation can be seen in Figure 4 for the three benchmark points, two
|
| 865 |
+
from the U(1)D model and one from the SU(2)D.
|
| 866 |
+
The marker shape indicates the parameter as shown in Figure 2. The diamond and square
|
| 867 |
+
shapes are from the U(1)D model. For SU(2)D model we have the high mass case marked by
|
| 868 |
+
the hexagon shape. The projected sensitivity curves (for the configurations C1-C4) for the LISA
|
| 869 |
+
detector are also shown [27], and one can see that for the U(1)D model the signal should be
|
| 870 |
+
detectable by three out of four configurations, but for the SU(2)D model the mass becomes too
|
| 871 |
+
high and we need other future experiments to detect such high DM mass models such as the
|
| 872 |
+
proposed TianQin detector [55].
|
| 873 |
+
VII.
|
| 874 |
+
DISCUSSION AND CONCLUSIONS
|
| 875 |
+
We have investigated two vector DM models in light of existing DM direct detection experiments
|
| 876 |
+
and future GW experiments. Both of the models investigated in this work are already strongly
|
| 877 |
+
constrained by direct detection. For the SU(2)D model this is in particular due to recent results
|
| 878 |
+
|
| 879 |
+
Gravitational wavespectra of selectedpoints
|
| 880 |
+
10-5
|
| 881 |
+
10
|
| 882 |
+
10~9
|
| 883 |
+
yo
|
| 884 |
+
10-11
|
| 885 |
+
10-13
|
| 886 |
+
C1
|
| 887 |
+
g = 0.66 My= 911 [GeV]
|
| 888 |
+
10-15
|
| 889 |
+
C2
|
| 890 |
+
g= 0.70 My = 1028 [GeV]
|
| 891 |
+
C3
|
| 892 |
+
g = 2.0 My = 7530 [GeV]
|
| 893 |
+
C4
|
| 894 |
+
10~17
|
| 895 |
+
10-4
|
| 896 |
+
10-3
|
| 897 |
+
10-2
|
| 898 |
+
10-1
|
| 899 |
+
f[Hz]12
|
| 900 |
+
from the LZ experiment which has ruled out most of parameter space consistent with a full relic
|
| 901 |
+
abundance from freeze-out in the range MV ∈ (1 − 10) TeV and with XENONnT the DM will
|
| 902 |
+
either be detected or the entire parameter space above the neutrino floor will be ruled out as shown
|
| 903 |
+
in Figure 2.
|
| 904 |
+
GW signals in both models have been discussed in earlier literature. In our analysis we find
|
| 905 |
+
that results differ significantly between different numerical implementations. Recently, the SU(2)D
|
| 906 |
+
model was discussed in [48], and we find that their results for the α and Tn parameters agree with
|
| 907 |
+
our findings.
|
| 908 |
+
Regarding the U(1)D model, it was previously suggested that GW signals could be used to probe
|
| 909 |
+
the model in case the direct detection cross section remains below the neutrino floor [23]. We agree
|
| 910 |
+
with this conclusion, but numerically we find differences to [23] in the GW parameters. While we
|
| 911 |
+
can reproduce the critical temperature reported, the nucleation temperature and the α and β
|
| 912 |
+
parameters differ from those reported in [23]. Their results were obtained with the AnyBubble
|
| 913 |
+
package [56], for which we failed to obtain results in agreement with the other two numerical
|
| 914 |
+
implementations used in this work.
|
| 915 |
+
This raises the question of comparability between the phase transition parameters obtained via
|
| 916 |
+
the various numerical implementations available. This issue has been investigated in [41], where
|
| 917 |
+
a fairly good agreement between BubbleProfiler and CosmoTransitions is observed. This is
|
| 918 |
+
compatible with our findings.
|
| 919 |
+
The finite temperature potential in both cases leads to a strong first order electroweak phase
|
| 920 |
+
transition. The U(1)D model can produce significant GW signals, which can be detected by LISA
|
| 921 |
+
[27] and future experiments would be able to test the SU(2)D model also in the high DM mass
|
| 922 |
+
regime.
|
| 923 |
+
ACKNOWLEDGMENTS
|
| 924 |
+
The financial support from Academy of Finland, project #342777, is gratefully acknowledged.
|
| 925 |
+
MTF and MR acknowledge partial funding from The Independent Research Fund Denmark, grant
|
| 926 |
+
numbers DFF 6108-00623 and DFF 1056-00027B, respectively. MET acknowledges funding from
|
| 927 |
+
Augustinus Fonden, application #22−19584, to cover part of the expenses associated with visiting
|
| 928 |
+
the University of Helsinki for half a year.
|
| 929 |
+
Appendix A: Supercooling, inflation and reheating
|
| 930 |
+
The investigation of the GW spectra leads to the discussion of supercooling in the models
|
| 931 |
+
presented. As shown in the GW section there are orders of magnitude in the difference between
|
| 932 |
+
the critical and nucleation temperature at the low mass scale. As discussed in the other papers, this
|
| 933 |
+
can lead to different kinds of phenomena including inflation, filtering and, reheating [28, 30, 37].
|
| 934 |
+
These effects are expected to affect the GW signal for low masses, and it might effects some of
|
| 935 |
+
the results even presented in Figure 4, but it is beyond this paper to look at the details of this.
|
| 936 |
+
As discussed in a recent paper, the universe could escape inflation via bubble nucleation or via
|
| 937 |
+
quantum tunneling, two different scenarios leading to different GW signals [36].
|
| 938 |
+
We would however like to highlight the fact that strong supercooling from hundreds of GeV to
|
| 939 |
+
the QCD scale might not be a big issue for the models. The bigger the supercooling the greater
|
| 940 |
+
the inflation as the scalon Higgs field will be stuck in a false vacuum acting like a cosmological
|
| 941 |
+
constant. The main constraint for any possible is lover than the max number of e-folds,
|
| 942 |
+
Nmax = 23.8 + ln TR
|
| 943 |
+
TeV,
|
| 944 |
+
(A1)
|
| 945 |
+
|
| 946 |
+
13
|
| 947 |
+
where TR is the reheating temperature after the inflationary epoch and one finds that this limits the
|
| 948 |
+
temperature to TR < 6.6· 1015 GeV [36]. To compute the reheating temperature, we are interested
|
| 949 |
+
in computing the decay of the inflaton-like field which in this case is the scalon Higgs field S for the
|
| 950 |
+
U(1)D model. Due to the mass constraints, only the scalon Higgs is kinetically allowed to decay
|
| 951 |
+
as Γ(hS → h, h), but this requires a DM mas of MV > 1 TeV. From the Lagrangian, we find that
|
| 952 |
+
the Feynman rule for this vertex and this yields the decay,
|
| 953 |
+
Γ(hS → 2h) =
|
| 954 |
+
�
|
| 955 |
+
M 2
|
| 956 |
+
S − 4M 2
|
| 957 |
+
h
|
| 958 |
+
32πM 2
|
| 959 |
+
S
|
| 960 |
+
|M|2,
|
| 961 |
+
(A2)
|
| 962 |
+
where,
|
| 963 |
+
|M|2 =
|
| 964 |
+
�M 2
|
| 965 |
+
h
|
| 966 |
+
4v1
|
| 967 |
+
(5 + 3 cos(4α)) sin(α)
|
| 968 |
+
�2
|
| 969 |
+
.
|
| 970 |
+
(A3)
|
| 971 |
+
We can furthermore include decays into quarks and leptons,
|
| 972 |
+
Γ(hS → f ¯f/ℓ¯ℓ) = NC
|
| 973 |
+
8π
|
| 974 |
+
m2
|
| 975 |
+
b
|
| 976 |
+
v2
|
| 977 |
+
1
|
| 978 |
+
MS
|
| 979 |
+
�
|
| 980 |
+
1 − 4m2
|
| 981 |
+
b
|
| 982 |
+
M 2
|
| 983 |
+
φ
|
| 984 |
+
sin(α)2.
|
| 985 |
+
(A4)
|
| 986 |
+
where NC = 3 for fermions and NC = 1 for leptons. Using the decays one can calculate the
|
| 987 |
+
reheating temperature, TR, using the following equation [57],
|
| 988 |
+
TR ≈ 0.2
|
| 989 |
+
�200
|
| 990 |
+
g∗
|
| 991 |
+
�1/4 �
|
| 992 |
+
ΓMpl,
|
| 993 |
+
(A5)
|
| 994 |
+
where Mpl is the reduced Planck mass and g∗ = 103.
|
| 995 |
+
Considering a rather low mixing value
|
| 996 |
+
0 ≤ α ≤
|
| 997 |
+
π
|
| 998 |
+
64 and a mass range of 250 GeV ≤ MV ≤ 2500 GeV the reheating temperature is
|
| 999 |
+
somewhere around 0.1-1.6 PeV yielding mass of the scalon field around 1 GeV < MS < 200 GeV.
|
| 1000 |
+
This is so hot that the universe will reheat back to a temperature much hotter than the scales
|
| 1001 |
+
of freeze-out. It also satisfies the constraint from Equation (A1), thus it is not too hot and not
|
| 1002 |
+
causing too much inflation. One can repeat this exercise for the SU(2)D, but the result is roughly
|
| 1003 |
+
the same with the main differences being a slightly heavier scalon mass, 1 GeV < MS < 350 GeV,
|
| 1004 |
+
and higher reheating temperature 0.1-2 PeV. Conclusively, dark matter production can take place
|
| 1005 |
+
via freeze-out as the universe subsequently cools down again.
|
| 1006 |
+
Appendix B: Model implementation in CosmoTransitions
|
| 1007 |
+
For the implementation of the model in CosmoTransitions we feed in the tree level potentials
|
| 1008 |
+
as shown in Equation (2) and (6). Then we manually implement the mass matrix with the massive
|
| 1009 |
+
SM bosons, plus the new bosons, and the top quark,
|
| 1010 |
+
M 2
|
| 1011 |
+
W = g2
|
| 1012 |
+
W
|
| 1013 |
+
4 h2
|
| 1014 |
+
1,
|
| 1015 |
+
M 2
|
| 1016 |
+
Z = g2
|
| 1017 |
+
W + g2
|
| 1018 |
+
Z
|
| 1019 |
+
4
|
| 1020 |
+
h2
|
| 1021 |
+
1,
|
| 1022 |
+
m2
|
| 1023 |
+
t = λ2
|
| 1024 |
+
t
|
| 1025 |
+
2 h2
|
| 1026 |
+
1,
|
| 1027 |
+
(B1)
|
| 1028 |
+
where the Yukawa coupling of the top quark is λt = 1. The DM candidate have their respective
|
| 1029 |
+
implementations for each model where,
|
| 1030 |
+
M 2
|
| 1031 |
+
V = cV g2h2
|
| 1032 |
+
2,
|
| 1033 |
+
(B2)
|
| 1034 |
+
|
| 1035 |
+
14
|
| 1036 |
+
with cV = 1 (1/4) for the U(1)D (SU(2)D) model, and then the scalar mass matrices yield,
|
| 1037 |
+
M 2
|
| 1038 |
+
h,S(U(1)D) = 1
|
| 1039 |
+
4
|
| 1040 |
+
�
|
| 1041 |
+
h2
|
| 1042 |
+
1 (λh + 2λφh) + h2
|
| 1043 |
+
2(λφ + 2λφh)
|
| 1044 |
+
±
|
| 1045 |
+
�
|
| 1046 |
+
h4
|
| 1047 |
+
1 (λh − 2λφh)2 + h4
|
| 1048 |
+
2 (λφ − 2λφh)2 + 2h2
|
| 1049 |
+
1h2
|
| 1050 |
+
2
|
| 1051 |
+
�
|
| 1052 |
+
2λhλφh + 28λ2
|
| 1053 |
+
φh − λhλφ + 2λφλφh
|
| 1054 |
+
�
|
| 1055 |
+
�
|
| 1056 |
+
(B3)
|
| 1057 |
+
M 2
|
| 1058 |
+
h,S(SU(2)D) = 1
|
| 1059 |
+
4
|
| 1060 |
+
�
|
| 1061 |
+
h2
|
| 1062 |
+
1 (6λH + λHS) + h2
|
| 1063 |
+
2(6λS + λHS)
|
| 1064 |
+
±
|
| 1065 |
+
�
|
| 1066 |
+
h4
|
| 1067 |
+
1 (λHS − 6λH)2 + h4
|
| 1068 |
+
2 (λHS − 6λS)2 + 2h2
|
| 1069 |
+
1h2
|
| 1070 |
+
2 (6λH(λHS − 6λHS) + λHS(7λHS + 6λS))
|
| 1071 |
+
�
|
| 1072 |
+
, (B4)
|
| 1073 |
+
A custom solution is made for computing the beta value. This is done by simply calculating the
|
| 1074 |
+
action divided by the temperature around the point of the nucleation temperature, making a fit
|
| 1075 |
+
to those plots, and taken the derivative etc. Some tweaks have been done to the source code to
|
| 1076 |
+
make this work, and also to improve the precision at low nucleation temperatures.
|
| 1077 |
+
Appendix C: Model implementation in BubbleProfiler
|
| 1078 |
+
For this package, we give it the full thermal potential in Equation (21), but instead of evaluating
|
| 1079 |
+
the thermal integral an approximation is made using Bessel function[23]. Specifically we use the
|
| 1080 |
+
modified Bessel functions, K2(kx), as follows
|
| 1081 |
+
� ∞
|
| 1082 |
+
0
|
| 1083 |
+
x2 ln
|
| 1084 |
+
�
|
| 1085 |
+
1 ∓ e−√
|
| 1086 |
+
x2±M2s /T 2�
|
| 1087 |
+
dx = −
|
| 1088 |
+
3
|
| 1089 |
+
�
|
| 1090 |
+
k=1
|
| 1091 |
+
x2
|
| 1092 |
+
k2K2(kx) −
|
| 1093 |
+
2
|
| 1094 |
+
�
|
| 1095 |
+
k=1
|
| 1096 |
+
(−1)kx2
|
| 1097 |
+
k2
|
| 1098 |
+
K2(kx).
|
| 1099 |
+
(C1)
|
| 1100 |
+
The BubbleProfiler is written in C++, but comes with a command line interface (CLI). Using
|
| 1101 |
+
this one can implement simple potentials like polynomials. In order to avoid implementing all
|
| 1102 |
+
these functions, we created a python interface where we implement the model in python. Then
|
| 1103 |
+
we create a higher order polynomial fit to the full potential.
|
| 1104 |
+
This polynomial is then fed to
|
| 1105 |
+
BubbleProfiler via the CLI together with other relevant parameters. We compute several points
|
| 1106 |
+
around the nucleation temperature and make a fit to that and from there we determine the β and
|
| 1107 |
+
Tn value, and the latter is then used to find α.
|
| 1108 |
+
Appendix D: Computing parameters of the EWPT
|
| 1109 |
+
The essential computation for the phase transition is finding the relationship between the action
|
| 1110 |
+
and temperature. The nucleation temperature condition is defined as
|
| 1111 |
+
S(T)
|
| 1112 |
+
T
|
| 1113 |
+
����
|
| 1114 |
+
Tn
|
| 1115 |
+
≈ 140,
|
| 1116 |
+
(D1)
|
| 1117 |
+
thus when the action divided by the temperature is equal to 140. We can compute the action and
|
| 1118 |
+
by dividing by the temperature a plot of this relationship can be obtained as seen in Figure 5.
|
| 1119 |
+
Given some data points, it is possible to make a fit, and from that read off the Tn value.
|
| 1120 |
+
Furthermore, the fit is also a function of S(T)/T, which can thus be used to compute β. Now
|
| 1121 |
+
|
| 1122 |
+
15
|
| 1123 |
+
(a) Using BubbleProfiler for computing parameters.
|
| 1124 |
+
(b) Using CosmoTransitions for computing
|
| 1125 |
+
parameters.
|
| 1126 |
+
FIG. 5. A comparison of the apparent error when computing the β and Tn parameter when computing
|
| 1127 |
+
the EWPT parameters in U(1)D model for g = 0.75 and MV = 1184. Note the temperature range is
|
| 1128 |
+
different for the implementation, thus the range is different in the plots.
|
| 1129 |
+
recall that α is evaluated at the nucleation temperature and α ∝ 1/T 4
|
| 1130 |
+
n, thus, the value of α
|
| 1131 |
+
is also highly dependent on the nucleation temperature.
|
| 1132 |
+
Since our BubbleProfiler result in
|
| 1133 |
+
general yields a slightly higher nucleation temperature we get a lower value of α as discussed in
|
| 1134 |
+
the GW section. For lower masses the BubbleProfiler result yield significantly lower nucleation
|
| 1135 |
+
temperatures suggesting that our implementation might not be as good in this regime.
|
| 1136 |
+
Looking at Figure 5, we see that the apparent error of the BubbleProfiler is significantly
|
| 1137 |
+
higher than the error from the CosmoTransitions result. This may be attributed to the fact that
|
| 1138 |
+
we used an approximated potential via our custom Python interface instead of implementing the
|
| 1139 |
+
model using C++. This leads us to consider the CosmoTransitions as the better result in this
|
| 1140 |
+
paper even though BubbleProfiler is claimed to be more accurate [41].
|
| 1141 |
+
[1] Fritz Zwicky. The redshift of extragalactic nebulae. Helvetica Physica Acta, 1933.
|
| 1142 |
+
[2] Vera
|
| 1143 |
+
C.
|
| 1144 |
+
Rubin.
|
| 1145 |
+
The
|
| 1146 |
+
rotation
|
| 1147 |
+
of
|
| 1148 |
+
spiral
|
| 1149 |
+
galaxies.
|
| 1150 |
+
Science,
|
| 1151 |
+
1983,
|
| 1152 |
+
https://www.science.org/doi/pdf/10.1126/science.220.4604.1339.
|
| 1153 |
+
URL
|
| 1154 |
+
https://www.science.
|
| 1155 |
+
org/doi/abs/10.1126/science.220.4604.1339.
|
| 1156 |
+
[3] The Planck Collaboration. Planck 2018 results. Astronomy & Astrophysics, Sep 2020, 1807.06209.
|
| 1157 |
+
ISSN 1432-0746.
|
| 1158 |
+
[4] Lars Bergstr¨om. Nonbaryonic dark matter: Observational evidence and detection methods. Rept.
|
| 1159 |
+
Prog. Phys., 2000, hep-ph/0002126.
|
| 1160 |
+
[5] Gianfranco Bertone and Dan Hooper. History of dark matter. Rev. Mod. Phys., 2018, 1605.04909.
|
| 1161 |
+
[6] Jaco de Swart, Gianfranco Bertone, and Jeroen van Dongen. How Dark Matter Came to Matter.
|
| 1162 |
+
Nature Astron., 2017, 1703.00013.
|
| 1163 |
+
[7] M. Kawasaki, Kazunori Kohri, and Naoshi Sugiyama. MeV scale reheating temperature and ther-
|
| 1164 |
+
malization of neutrino background. Phys. Rev. D, 2000, astro-ph/0002127.
|
| 1165 |
+
[8] Steen Hannestad. What is the lowest possible reheating temperature? Phys. Rev. D, 2004, astro-
|
| 1166 |
+
|
| 1167 |
+
S(T)/T plot
|
| 1168 |
+
data points
|
| 1169 |
+
160
|
| 1170 |
+
fit
|
| 1171 |
+
155
|
| 1172 |
+
150
|
| 1173 |
+
145
|
| 1174 |
+
/(L)S
|
| 1175 |
+
140
|
| 1176 |
+
135
|
| 1177 |
+
130
|
| 1178 |
+
125
|
| 1179 |
+
22.5
|
| 1180 |
+
25.0
|
| 1181 |
+
27.5
|
| 1182 |
+
30.0
|
| 1183 |
+
32.5
|
| 1184 |
+
35.0
|
| 1185 |
+
37.5
|
| 1186 |
+
40.0
|
| 1187 |
+
Temperature[GeV]S(T)/T plot
|
| 1188 |
+
data points
|
| 1189 |
+
200
|
| 1190 |
+
fit
|
| 1191 |
+
180
|
| 1192 |
+
160
|
| 1193 |
+
/()S
|
| 1194 |
+
140
|
| 1195 |
+
120
|
| 1196 |
+
100
|
| 1197 |
+
10
|
| 1198 |
+
20
|
| 1199 |
+
30
|
| 1200 |
+
40
|
| 1201 |
+
50
|
| 1202 |
+
60
|
| 1203 |
+
70
|
| 1204 |
+
80
|
| 1205 |
+
Temperature[GeV]16
|
| 1206 |
+
ph/0403291.
|
| 1207 |
+
[9] Kazuhide Ichikawa, Masahiro Kawasaki, and Fuminobu Takahashi. The Oscillation effects on ther-
|
| 1208 |
+
malization of the neutrinos in the Universe with low reheating temperature. Phys. Rev. D, 2005,
|
| 1209 |
+
astro-ph/0505395.
|
| 1210 |
+
[10] Francesco De Bernardis, Luca Pagano, and Alessandro Melchiorri. New constraints on the reheating
|
| 1211 |
+
temperature of the universe after WMAP-5. Astropart. Phys., 2008.
|
| 1212 |
+
[11] N. Aghanim et al. Planck 2018 results. VI. Cosmological parameters. Astron. Astrophys., 2020,
|
| 1213 |
+
1807.06209. [Erratum: Astron.Astrophys. 652, C4 (2021)].
|
| 1214 |
+
[12] The CMS Collaboration. A measurement of the higgs boson mass in the diphoton decay channel.
|
| 1215 |
+
Phys. Lett. B, 2020. https://arxiv.org/pdf/2002.06398.pdf.
|
| 1216 |
+
[13] Eldad Gildener and Steven Weinberg. Symmetry breaking and scalar bosons. Phys. Rev. D, Jun
|
| 1217 |
+
1976. https://link.aps.org/doi/10.1103/PhysRevD.13.3333.
|
| 1218 |
+
[14] We-Fu Chang, John N. Ng, and Jackson M. S. Wu. Shadow Higgs from a scale-invariant hidden
|
| 1219 |
+
U(1)(s) model. Phys. Rev. D, 2007, hep-ph/0701254.
|
| 1220 |
+
[15] Robert Foot, Archil Kobakhidze, and Raymond R. Volkas. Electroweak Higgs as a pseudo-Goldstone
|
| 1221 |
+
boson of broken scale invariance. Phys. Lett. B, 2007, 0704.1165.
|
| 1222 |
+
[16] Krzysztof A. Meissner and Hermann Nicolai. Conformal Symmetry and the Standard Model. Phys.
|
| 1223 |
+
Lett. B, 2007, hep-th/0612165.
|
| 1224 |
+
[17] Jose Ramon Espinosa and Mariano Quiros. Novel Effects in Electroweak Breaking from a Hidden
|
| 1225 |
+
Sector. Phys. Rev. D, 2007, hep-ph/0701145.
|
| 1226 |
+
[18] Thomas Hambye. Hidden vector dark matter. Journal of High Energy Physics, jan 2009, 0811.0172.
|
| 1227 |
+
[19] Christopher D. Carone and Raymundo Ramos. Classical scale-invariance, the electroweak scale and
|
| 1228 |
+
vector dark matter. Phys. Rev. D, 2013, 1307.8428.
|
| 1229 |
+
[20] Christoph Englert, Joerg Jaeckel, V. V. Khoze, and Michael Spannowsky. Emergence of the elec-
|
| 1230 |
+
troweak scale through the higgs portal. JHEP, 2013, 1301.4224.
|
| 1231 |
+
[21] Emidio Gabrielli, Matti Heikinheimo, Kristjan Kannike, Antonio Racioppi, Martti Raidal, and Chris-
|
| 1232 |
+
tian Spethmann. Towards Completing the Standard Model: Vacuum Stability, EWSB and Dark
|
| 1233 |
+
Matter. Phys. Rev. D, 2014, 1309.6632.
|
| 1234 |
+
[22] Seyed Yaser Ayazi and Ahmad Mohamadnejad. Conformal vector dark matter and strongly first-
|
| 1235 |
+
order electroweak phase transition. Journal of High Energy Physics, Mar 2019, 1901.04168. ISSN
|
| 1236 |
+
1029-8479.
|
| 1237 |
+
[23] Ahmad Mohamadnejad. Gravitational waves from scale-invariant vector dark matter model: probing
|
| 1238 |
+
below the neutrino-floor. The European Physical Journal C, Mar 2020, 1907.08899. ISSN 1434-6052.
|
| 1239 |
+
[24] Thomas Hambye and Alessandro Strumia. Dynamical generation of the weak and dark matter scale.
|
| 1240 |
+
Physical Review D, Sep 2013, 1306.2329. ISSN 1550-2368.
|
| 1241 |
+
[25] Yue Meng et al. Dark matter search results from the PandaX-4t commissioning run. Physical Review
|
| 1242 |
+
Letters, dec 2021, 2107.13438.
|
| 1243 |
+
[26] The LUX-ZEPLIN (LZ) Collaboration). First dark matter search results from the lux-zeplin (lz)
|
| 1244 |
+
experiment, 2022. https://arxiv.org/pdf/1907.08899.pdf.
|
| 1245 |
+
[27] Chiara Caprini, Mark Hindmarsh, Stephan Huber, Thomas Konstandin, Jonathan Kozaczuk, Ger-
|
| 1246 |
+
mano Nardini, Jose Miguel No, Antoine Petiteau, Pedro Schwaller, G´eraldine Servant, and et al.
|
| 1247 |
+
Science with the space-based interferometer elisa. ii: gravitational waves from cosmological phase
|
| 1248 |
+
transitions. Journal of Cosmology and Astroparticle Physics, Apr 2016, 1512.06239. ISSN 1475-7516.
|
| 1249 |
+
[28] Thomas Hambye, Alessandro Strumia, and Daniele Teresi. Super-cool dark matter. Journal of High
|
| 1250 |
+
Energy Physics, Aug 2018, 1805.01473. ISSN 1029-8479.
|
| 1251 |
+
[29] Dongjin Chway, Tae Hyun Jung, and Chang Sub Shin. Dark matter filtering-out effect during a
|
| 1252 |
+
first-order phase transition. Phys. Rev. D, 2020, 1912.04238.
|
| 1253 |
+
[30] Michael J. Baker, Joachim Kopp, and Andrew J. Long. Filtered dark matter at a first order phase
|
| 1254 |
+
transition. Physical Review Letters, Oct 2020, 1912.02830. ISSN 1079-7114.
|
| 1255 |
+
[31] Iason Baldes, Yann Gouttenoire, Filippo Sala, and G´eraldine Servant. Supercool composite Dark
|
| 1256 |
+
|
| 1257 |
+
17
|
| 1258 |
+
Matter beyond 100 TeV. JHEP, 2022, 2110.13926.
|
| 1259 |
+
[32] D. Barducci et al.
|
| 1260 |
+
The user’s manual, version 5.2, March 2020.
|
| 1261 |
+
https://lapth.cnrs.fr/
|
| 1262 |
+
micromegas/v5.2/manual_5.2.pdf.
|
| 1263 |
+
[33] A. Semenov. Lanhep - a package for automatic generation of feynman rules from the lagrangian.
|
| 1264 |
+
updated version 3.2, 2014, 1412.5016.
|
| 1265 |
+
[34] Alexander Belyaev, Neil D. Christensen, and Alexander Pukhov. Calchep 3.4 for collider physics
|
| 1266 |
+
within and beyond the standard model. Computer Physics Communications, Jul 2013, 1207.6082.
|
| 1267 |
+
ISSN 0010-4655.
|
| 1268 |
+
[35] Lawrence J. Hall, Karsten Jedamzik, John March-Russell, and Stephen M. West. Freeze-in production
|
| 1269 |
+
of fimp dark matter. Journal of High Energy Physics, Mar 2010, 0911.1120. ISSN 1029-8479.
|
| 1270 |
+
[36] Marek Lewicki, Oriol Pujol`as, and Ville Vaskonen. Escape from supercooling with or without bubbles:
|
| 1271 |
+
gravitational wave signatures. The European Physical Journal C, Sep 2021, 2106.09706. ISSN 1434-
|
| 1272 |
+
6052.
|
| 1273 |
+
[37] Iason Baldes, Yann Gouttenoire, Filippo Sala, and G´eraldine Servant. Supercool composite dark
|
| 1274 |
+
matter beyond 100 tev, 2021, 2110.13926.
|
| 1275 |
+
[38] L. Dolan and R. Jackiw. Symmetry behavior at finite temperature. Phys. Rev. D, Jun 1974. https:
|
| 1276 |
+
//link.aps.org/doi/10.1103/PhysRevD.9.3320.
|
| 1277 |
+
[39] M. E. Carrington. Effective potential at finite temperature in the standard model. Phys. Rev. D,
|
| 1278 |
+
Apr 1992. https://link.aps.org/doi/10.1103/PhysRevD.45.2933.
|
| 1279 |
+
[40] Carroll L. Wainwright. Cosmotransitions: Computing cosmological phase transition temperatures
|
| 1280 |
+
and bubble profiles with multiple fields. Computer Physics Communications, Sep 2012, 1109.4189.
|
| 1281 |
+
ISSN 0010-4655.
|
| 1282 |
+
[41] Peter Athron, Csaba Bal´azs, Michael Bardsley, Andrew Fowlie, Dylan Harries, and Graham White.
|
| 1283 |
+
Bubbleprofiler: Finding the field profile and action for cosmological phase transitions. Computer
|
| 1284 |
+
Physics Communications, Nov 2019, 1901.03714. ISSN 0010-4655.
|
| 1285 |
+
[42] E. et al. Aprile. First dark matter search results from the xenon1t experiment. Physical Review
|
| 1286 |
+
Letters, Oct 2017, 1705.06655. ISSN 1079-7114.
|
| 1287 |
+
[43] E. et al. Aprile. Projected wimp sensitivity of the xenonnt dark matter experiment. Journal of
|
| 1288 |
+
Cosmology and Astroparticle Physics, Nov 2020, 2007.08796. ISSN 1475-7516.
|
| 1289 |
+
[44] Georges Aad et al. Search for invisible Higgs-boson decays in events with vector-boson fusion sig-
|
| 1290 |
+
natures using 139 fb−1 of proton-proton data recorded by the ATLAS experiment. JHEP, 2022,
|
| 1291 |
+
2202.07953.
|
| 1292 |
+
[45] Armen Tumasyan et al. Search for invisible decays of the Higgs boson produced via vector boson
|
| 1293 |
+
fusion in proton-proton collisions at s=13 TeV. Phys. Rev. D, 2022, 2201.11585.
|
| 1294 |
+
[46] Satoshi Iso, Pasquale D. Serpico, and Kengo Shimada. QCD-Electroweak First-Order Phase Transi-
|
| 1295 |
+
tion in a Supercooled Universe. Phys. Rev. Lett., 2017, 1704.04955.
|
| 1296 |
+
[47] Benedict von Harling and Geraldine Servant. QCD-induced Electroweak Phase Transition. JHEP,
|
| 1297 |
+
2018, 1711.11554.
|
| 1298 |
+
[48] Maciej Kierkla, Alexandros Karam, and Bogumila Swiezewska. Conformal model for gravitational
|
| 1299 |
+
waves and dark matter: A status update, 2022. https://arxiv.org/pdf/2210.07075.pdf.
|
| 1300 |
+
[49] A. D. Sakharov. Violation of cp invariance, c asymmetry, and baryon asymmetry of the universe.
|
| 1301 |
+
Pisma Zh. Eksp. Teor. Fiz., 1967.
|
| 1302 |
+
[50] Stephan J Huber and Thomas Konstandin. Gravitational wave production by collisions: more bub-
|
| 1303 |
+
bles. Journal of Cosmology and Astroparticle Physics, Sep 2008, 0806.1828. ISSN 1475-7516.
|
| 1304 |
+
[51] Riccardo Apreda, Michele Maggiore, Alberto Nicolis, and Antonio Riotto. Gravitational waves from
|
| 1305 |
+
electroweak phase transitions. Nuclear Physics B, Jun 2002, gr-qc/0107033. ISSN 0550-3213.
|
| 1306 |
+
[52] Marc Kamionkowski, Arthur Kosowsky, and Michael S. Turner. Gravitational radiation from first-
|
| 1307 |
+
order phase transitions. Physical Review D, Mar 1994, astro-ph/9310044. ISSN 0556-2821.
|
| 1308 |
+
[53] John Ellis, Marek Lewicki, Jos´e Miguel No, and Ville Vaskonen. Gravitational wave energy budget in
|
| 1309 |
+
strongly supercooled phase transitions. Journal of Cosmology and Astroparticle Physics, Jun 2019,
|
| 1310 |
+
|
| 1311 |
+
18
|
| 1312 |
+
1903.09642. ISSN 1475-7516.
|
| 1313 |
+
[54] Tommi Alanne, Thomas Hugle, Moritz Platscher, and Kai Schmitz. A fresh look at the gravitational-
|
| 1314 |
+
wave signal from cosmological phase transitions.
|
| 1315 |
+
Journal of High Energy Physics, Mar 2020,
|
| 1316 |
+
1909.11356. ISSN 1029-8479.
|
| 1317 |
+
[55] Jun Luo, Li-Sheng Chen, Hui-Zong Duan, Yun-Gui Gong, Shoucun Hu, Jianghui Ji, Qi Liu, Jianwei
|
| 1318 |
+
Mei, Vadim Milyukov, Mikhail Sazhin, Cheng-Gang Shao, Viktor T Toth, Hai-Bo Tu, Yamin Wang,
|
| 1319 |
+
Yan Wang, Hsien-Chi Yeh, Ming-Sheng Zhan, Yonghe Zhang, Vladimir Zharov, and Ze-Bing Zhou.
|
| 1320 |
+
TianQin: a space-borne gravitational wave detector.
|
| 1321 |
+
Classical and Quantum Gravity, jan 2016,
|
| 1322 |
+
1512.02076.
|
| 1323 |
+
[56] Ali Masoumi, Ken D. Olum, and Jeremy M. Wachter.
|
| 1324 |
+
Approximating tunneling rates in multi-
|
| 1325 |
+
dimensional field spaces. Journal of Cosmology and Astroparticle Physics, Oct 2017, 1702.00356.
|
| 1326 |
+
ISSN 1475-7516.
|
| 1327 |
+
[57] Kai Schmitz and Gilles Vertongen. Reheating and preheating after inflation : an introduction, 2010.
|
| 1328 |
+
https://www.desy.de/~westphal/workshop_seminar_fall_2010/reheating.pdf.
|
| 1329 |
+
|
5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/2301.01700v1.pdf.txt
ADDED
|
@@ -0,0 +1,1572 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.01700v1 [cs.GT] 4 Jan 2023
|
| 2 |
+
Non-Adaptive Matroid Prophet Inequalities
|
| 3 |
+
Kanstantsin Pashkovich, Alice Sayutina
|
| 4 |
+
University of Waterloo
|
| 5 |
+
Department of Combinatorics & Optimization
|
| 6 |
+
200 University Avenue West
|
| 7 |
+
Waterloo, ON, Canada
|
| 8 |
+
N2L 3G1
|
| 9 |
+
Abstract
|
| 10 |
+
We consider the matroid prophet inequality problem. This problem
|
| 11 |
+
has been extensively studied in the case of adaptive mechanisms. In par-
|
| 12 |
+
ticular, there is a tight 2-competitive mechanism for all matroids [KW12].
|
| 13 |
+
However, it is not known what classes of matroids admit non-adaptive
|
| 14 |
+
mechanisms with constant guarantee.
|
| 15 |
+
Recently, in [CGKM20] it was
|
| 16 |
+
shown that there are constant-competitive non-adaptive mechanisms for
|
| 17 |
+
graphic matroids. In this work, we show that various known classes of
|
| 18 |
+
matroids admit constant-competitive non-adaptive mechanisms.
|
| 19 |
+
1
|
| 20 |
+
Introduction
|
| 21 |
+
Let us consider the classical prophet inequality problem [KS77].
|
| 22 |
+
A gambler
|
| 23 |
+
observes a sequence of non-negative independent random variables X1, X2, . . . ,
|
| 24 |
+
Xn, which correspond to a sequence of values for n items. The gambler knows
|
| 25 |
+
the distributions of X1, X2, . . . , Xn. The gambler is allowed to accept at most
|
| 26 |
+
one item; and the gambler is interested in maximizing the value of the accepted
|
| 27 |
+
item. However, the gambler cannot simply select an item of the maximum value,
|
| 28 |
+
because the values of the n items are revealed to the gambler one by one; and
|
| 29 |
+
each time a value of the current item is revealed the gambler has to make an
|
| 30 |
+
irrevocable choice whether to accept the current item or not.
|
| 31 |
+
What stopping rule the gambler should use to maximize the expected value of
|
| 32 |
+
the item they accept? The gambler knows only the distributions of X1, X2, . . . ,
|
| 33 |
+
Xn while a prophet knows the realization of X1, X2, . . . , Xn. Thus, in contrast
|
| 34 |
+
to the gambler the prophet can always obtain the maximum item’s value. The
|
| 35 |
+
seminal result of Krengel and Sucheston [KS77] showed that the gambler can
|
| 36 |
+
obtain at least a half of the expected value obtained by the prophet.
|
| 37 |
+
The classical prophet inequality problem led to a series of works on different
|
| 38 |
+
variants of the problem. A natural variant of the problem is the generalization
|
| 39 |
+
1
|
| 40 |
+
|
| 41 |
+
of the problem where a gambler can buy more than one item, but the set of
|
| 42 |
+
bought items should satisfy a known feasibility constraint. Formally, let us be
|
| 43 |
+
given a collection S ⊆ 2[n] of item sets. Then both gambler and prophet can
|
| 44 |
+
select any item set S from S. So S defines a feasibility constraint for selecting
|
| 45 |
+
items. In most standard examples of feasibility constraints, S can be defined as
|
| 46 |
+
a collection of all item sets with cardinality at most k for some natural number k.
|
| 47 |
+
More generally S can be defined as a collection of all independent sets in some
|
| 48 |
+
matroid, in this case we speak about the matroid prophet inequality problem.
|
| 49 |
+
The result in [SC84] showed that in the single-item setting a gambler can
|
| 50 |
+
obtain at least half of the prophet value by using the following threshold-rule:
|
| 51 |
+
determine a constant T as a function of known distributions and accept the first
|
| 52 |
+
item exceeding T . This rule results in a 2-competitive mechanism, similar to
|
| 53 |
+
the adaptive approach of [KS77]. Note, that this approximation guarantee is
|
| 54 |
+
known to be tight. There is also another method to set a threshold presented in
|
| 55 |
+
[KW12], which also results in a 2-competitive mechanism. This was extended
|
| 56 |
+
by Chawla et al. in [CHMS10] and [CGKM20] to the setting of several items.
|
| 57 |
+
The results presented in [KW12] further extend to the matroid prophet in-
|
| 58 |
+
equalities, where accepted items need to form an independent set in a known
|
| 59 |
+
matroid. It leads to a 2-competitive mechanism for every matroid, matching
|
| 60 |
+
the single-item setting result. However, unlike the mechanism in the single-item
|
| 61 |
+
setting, the mechanism for matroids is adaptive: the thresholds for items are
|
| 62 |
+
computed based on the previously accepted items. By [KW12], there also exists
|
| 63 |
+
a constant-competitive adaptive mechanism for feasibility constraints defined as
|
| 64 |
+
an intersection of constant number of matroids. The mechanism by Kleinberg
|
| 65 |
+
and Weinberg was further extended to a 2-competitive mechanism for polyma-
|
| 66 |
+
troids by Dütting and Kleinberg in [DK15].
|
| 67 |
+
Gravin and Wang [GW19] studied the bipartite matching version of this
|
| 68 |
+
problem: in their version, the arriving items are the edges of the (known) bi-
|
| 69 |
+
partite graph. Gravin and Wang obtained a 3-competitive non-adaptive mech-
|
| 70 |
+
anism, which assigns thresholds to each vertex in the graph and an edge is
|
| 71 |
+
accepted only if its weight is at least the sum of the thresholds associated with
|
| 72 |
+
its endpoints.
|
| 73 |
+
Feldman, Svensson and Zenklusen [FSZ16] studied online item selection
|
| 74 |
+
mechanisms called “online contention resolution schemes" (OCRS). They showed
|
| 75 |
+
that given special properties, OCRS translate directly into a constant-competitive
|
| 76 |
+
prophet inequality for the same problem against almighty adversary, i.e. an ad-
|
| 77 |
+
versary which knows in advance realizations of all the items and the random
|
| 78 |
+
bits generated by an algorithm. As a result, they develop a constant-competitive
|
| 79 |
+
mechanism for prophet inequalities of the intersection of a constant number of
|
| 80 |
+
matroids, knapsack and matching constraints. Those mechanisms are “almost”
|
| 81 |
+
non-adaptive in a sense that they fix thresholds for all items, however their mech-
|
| 82 |
+
anisms also impose a subconstraint: an item cannot be accepted if together with
|
| 83 |
+
previously accepted items it forms one of the fixed forbidden sets.
|
| 84 |
+
Finally, in a later version of their paper [FSZ21], they prove that pure non-
|
| 85 |
+
adaptive mechanisms cannot achieve a constant-competitive approximation even
|
| 86 |
+
against a “normal” adversary. They construct a family of gammoid matroids
|
| 87 |
+
2
|
| 88 |
+
|
| 89 |
+
showing a lower bound of Ω(log n/ log log n) for a guarantee of non-adaptive
|
| 90 |
+
mechanisms on gammoids with n elements.
|
| 91 |
+
There have been works studying similar setups with other goals. Chawla
|
| 92 |
+
et al. [CHMS10] studied a Bayesian item selection process in a fixed item ar-
|
| 93 |
+
rival order or against an adversary in control of the order. They studied it
|
| 94 |
+
from a perspective of the revenue maximization for the auctioneer. The per-
|
| 95 |
+
formance is constant-competitive compared to the well-known Myerson mech-
|
| 96 |
+
anism
|
| 97 |
+
[Mye81], which achieves the largest possible expected revenue among
|
| 98 |
+
truthful mechanisms. The mechanism by Chawla et al. [CHMS10] has an ad-
|
| 99 |
+
vantage that it determines static thresholds together with a subconstraint so
|
| 100 |
+
that each agent can be offered take-it-or-leave-it prices in an online fashion.
|
| 101 |
+
Recently, Chawla et al. [CGKM20] developed a 32-competitive non-adaptive
|
| 102 |
+
mechanism for graphic matroids against adversary item ordering.
|
| 103 |
+
1.1
|
| 104 |
+
Our results
|
| 105 |
+
First, we list the known results for non-adaptive mechanism that were mentioned
|
| 106 |
+
in the previous section.
|
| 107 |
+
Theorem 1 (Uniform Rank 1 Matroid [SC84]). There exists a 2-competitive
|
| 108 |
+
non-adaptive mechanism for single-item setting.
|
| 109 |
+
Theorem 2 (Graphic Matroid [CGKM20]). There exists a 32-competitive
|
| 110 |
+
non-adaptive mechanism for graphic matroids.
|
| 111 |
+
Now let us list our results. In case of a simple graph, i.e. a graph with no
|
| 112 |
+
parallel edges or loops, we can slightly improve the above theorem by considering
|
| 113 |
+
essentially the same mechanism as [CGKM20] but considering a different scaling
|
| 114 |
+
of a point from the matroid polytope. We provide this result for the sake of
|
| 115 |
+
completeness.
|
| 116 |
+
Theorem 3. There exists a 16-competitive non-adaptive mechanism for graphic
|
| 117 |
+
matroids in the case of simple graphs.
|
| 118 |
+
Furthermore, the mechanism [CGKM20] can be generalized to the setting of
|
| 119 |
+
k-column sparse matroids. This result we need later to obtain Theorem 8.
|
| 120 |
+
Theorem 4 (k-Column Sparse Matroids). There exists a (2k+2k)-competitive
|
| 121 |
+
non-adaptive mechanism for k-column sparse matroids.
|
| 122 |
+
Note, that Theorem 2 of [CGKM20] follows from Theorem 4, since a graphic
|
| 123 |
+
matroid is also a 2-column sparse matroid over F2.
|
| 124 |
+
Using analogous approach to the one in [Sot13], we also develop a mechanism
|
| 125 |
+
for cographic matroids.
|
| 126 |
+
Theorem 5 (Cographic Matroids). There exists a 6-competitive non-adaptive
|
| 127 |
+
mechanism for cographic matroids.
|
| 128 |
+
The approach in [Sot13] immediately leads to the following result for γ-sparse
|
| 129 |
+
matroids.
|
| 130 |
+
3
|
| 131 |
+
|
| 132 |
+
Theorem 6 (γ-Sparse Matroids). There exists a γ-competitive non-adaptive
|
| 133 |
+
mechanism for γ-sparse matroids.
|
| 134 |
+
Combining the above results and using classic Seymour’s decomposition re-
|
| 135 |
+
sults we obtain the following theorem.
|
| 136 |
+
Theorem 7 (Regular Matroids). There exists a 256-competitive non-adaptive
|
| 137 |
+
mechanism for regular matroids.
|
| 138 |
+
Subject to the Structural Hypothesis 1 due to Geelen, Gerards and Whittle,
|
| 139 |
+
which is stated later, we can also derive the following result.
|
| 140 |
+
Theorem 8. Subject to the Structural Hypothesis 1, for every prime number p
|
| 141 |
+
there exists a constant-competitive mechanism for every proper minor-closed
|
| 142 |
+
class of matroids representable over Fp.
|
| 143 |
+
We also would like to observe that some of the recent results on “single
|
| 144 |
+
sample prophet inequalities” (SSPI) lead to non-adaptive constant-competitive
|
| 145 |
+
mechanisms. For this, the single sample required by the gambler in SSPI can
|
| 146 |
+
be directly sampled by our gambler from the available distributions. In partic-
|
| 147 |
+
ular, the results in [AKW19] and [CFPP21] on laminar matroids and truncated
|
| 148 |
+
partition matroids inspired by the mechanism in [MTW16] lead to non-adaptive
|
| 149 |
+
mechanisms for prophet inequalities. To obtain these results, it is crucial that
|
| 150 |
+
the mechanism in [MTW16] does not involve subconstraints, i.e. each item is
|
| 151 |
+
accepted as long as the item is not in the “observation phase”, the item passes
|
| 152 |
+
its threshold based only on the “observation phase” and the item forms an in-
|
| 153 |
+
dependent set with previously accepted items. In comparison, it is not clear
|
| 154 |
+
how from the results on regular matroids in [AKW19] based on the mechanism
|
| 155 |
+
in [DK14] one can obtain non-adaptive mechanisms.
|
| 156 |
+
So the following results can be directly obtained from [AKW19] and [CFPP21],
|
| 157 |
+
respectively.
|
| 158 |
+
Theorem 9 (Laminar Matroid). There exists a 9.6-competitive non-adaptive
|
| 159 |
+
mechanism for laminar matroids.
|
| 160 |
+
Theorem 10 (Truncated Partition Matroid). There exists an 8-competitive
|
| 161 |
+
non-adaptive mechanism for truncated partition matroids.
|
| 162 |
+
2
|
| 163 |
+
Comparison to known results
|
| 164 |
+
Our results for cographic matroids and k-column sparse matroids are obtained
|
| 165 |
+
through modifications of the arguments in [Sot13] and [CGKM20], respectively.
|
| 166 |
+
The results on regular matroids and minor-closed families of matroids follow the
|
| 167 |
+
approach outlined in [HN20] for the secretary problem. As necessary building
|
| 168 |
+
blocks we use our results for cographic and 2-column sparse matroids. Note that
|
| 169 |
+
a biggest challenge for us is the compatibility of non-adaptive thresholds with
|
| 170 |
+
contractions. Indeed, standard tools for deriving mechanisms for contraction
|
| 171 |
+
4
|
| 172 |
+
|
| 173 |
+
minors need subconstraints, while subconstraints are not permitted in non-
|
| 174 |
+
adaptive mechanisms. To obtain our results, we resolve this issue only in the
|
| 175 |
+
context of matroids representable over finite fields, see arguments in Lemma 8.
|
| 176 |
+
It would be interesting to see whether analogous results for contraction minors
|
| 177 |
+
hold with no assumption about representability over finite fields.
|
| 178 |
+
3
|
| 179 |
+
Preliminaries
|
| 180 |
+
In this paper, we consider the matroid prophet inequality problem, where items
|
| 181 |
+
arrive online in adversarial order. Here, the adversary knows the distributions
|
| 182 |
+
of all X1, X2, . . . , Xn and knows the gambler’s mechanism, but the realization
|
| 183 |
+
of X1, X2, . . . , Xn is not known to the adversary.
|
| 184 |
+
Based on the available
|
| 185 |
+
information, the adversary can decide on the order in which items and their
|
| 186 |
+
values are observed by the gambler.
|
| 187 |
+
3.1
|
| 188 |
+
Prophet inequality
|
| 189 |
+
Definition 1. Let M be a matroid on the ground set [n] := {1, . . . , n}, where
|
| 190 |
+
[n] corresponds to n items. Let ⃗X := (X1, . . . , Xn) be non-negative independent
|
| 191 |
+
random variables representing the values of these n items.
|
| 192 |
+
• For every subset of items S ⊆ [n] we define its weight as follows
|
| 193 |
+
w(S) :=
|
| 194 |
+
�
|
| 195 |
+
i∈S
|
| 196 |
+
Xi.
|
| 197 |
+
• Let PROPHM be the random variable corresponding to the value obtained
|
| 198 |
+
by the prophet
|
| 199 |
+
PROPHM :=
|
| 200 |
+
max
|
| 201 |
+
S∈I(M) w(S) ,
|
| 202 |
+
where I(M) is a collection of independent sets for M.
|
| 203 |
+
• Let EPROPHM be the expectation of the value obtained by prophet
|
| 204 |
+
EPROPHM := E[PROPHM] .
|
| 205 |
+
Definition 2. Let us be given a number α > 0.
|
| 206 |
+
• We call a mechanism α-competitive (alternatively, we say that the mech-
|
| 207 |
+
anism guarantees an α-approximation) on the matroid M if the expected
|
| 208 |
+
value obtained by the gambler via this mechanism is at least 1
|
| 209 |
+
αEPROPHM.
|
| 210 |
+
• We call a mechanism α-competitive (alternatively, we say that the mech-
|
| 211 |
+
anism guarantees an α-approximation) on the matroid class M if this
|
| 212 |
+
mechanism is α-competitive for every matroid M ∈ M.
|
| 213 |
+
5
|
| 214 |
+
|
| 215 |
+
3.2
|
| 216 |
+
Non-adaptive mechanism
|
| 217 |
+
We say that a mechanism is non-adaptive if it has the following structure:
|
| 218 |
+
• Given the distributions of ⃗X = (X1, . . . , Xn), the mechanism determines
|
| 219 |
+
the values of thresholds ⃗T = (T1, . . . , Tn), where each Ti, i ∈ [n] is a real
|
| 220 |
+
number or +∞.
|
| 221 |
+
• If the value of item i ∈ [n] is observed, the gambler accepts the item i if
|
| 222 |
+
and only both conditions hold:
|
| 223 |
+
1. the observed value of Xi is at least Ti
|
| 224 |
+
2. the item i together with all previously selected items forms an inde-
|
| 225 |
+
pendent set with respect to the matroid M.
|
| 226 |
+
Note, that a non-adaptive mechanism does not change thresholds during
|
| 227 |
+
its course.
|
| 228 |
+
So, none of the thresholds depends on the realization of ⃗X =
|
| 229 |
+
(X1, . . . , Xn).
|
| 230 |
+
Another crucial feature of a non-adaptive mechanism is that the mechanism
|
| 231 |
+
works only with the original matroid M. A non-adaptive mechanism does not
|
| 232 |
+
allow us to define a new matroid M ′, such that a set of items is independent in
|
| 233 |
+
M ′ only if it is independent in M, and modify the condition (2) based on M ′.
|
| 234 |
+
In this work, we focus on non-adaptive mechanisms. From here and later we
|
| 235 |
+
use the term mechanism to refer to non-adaptive mechanisms exclusively.
|
| 236 |
+
Remark 1. In this work, non-adaptive mechanisms are allowed to make non-
|
| 237 |
+
deterministic decisions. Hence, we allow a non-adaptive mechanism to construct
|
| 238 |
+
the thresholds ⃗T = (T1, . . . , Tn) non-deterministically.
|
| 239 |
+
To measure the performance of such a mechanism we use the expected total
|
| 240 |
+
value, where the expectation is taken not only with respect to ⃗X = (X1, . . . , Xn)
|
| 241 |
+
but also with respect to ⃗T = (T1, . . . , Tn).
|
| 242 |
+
3.3
|
| 243 |
+
Matroids
|
| 244 |
+
We provide a review of matroids here.
|
| 245 |
+
Experienced readers should consider
|
| 246 |
+
skipping or skimming this section. For further results about matroids, consider
|
| 247 |
+
consulting [Oxl06].
|
| 248 |
+
A matroid M = (E, S) is a pair of a finite ground set E and a collection S ⊆
|
| 249 |
+
2E of independent sets. The collection S ⊆ 2E of subsets of E satisfies the
|
| 250 |
+
following conditions:
|
| 251 |
+
(i) Empty set is an independent set, so ∅ ∈ S.
|
| 252 |
+
(ii) The collection S is closed with respect to taking subsets, so for all A ⊆
|
| 253 |
+
B ⊆ E if B is in S then A is in S.
|
| 254 |
+
(iii) The collection S satisfies so called augmenation property. In other words,
|
| 255 |
+
for all A, B ⊆ E such that A, B ∈ S and |A| > |B|, there exists c ∈ A \ B
|
| 256 |
+
such that B ∪ {c} ∈ S.
|
| 257 |
+
6
|
| 258 |
+
|
| 259 |
+
A subset of E is called dependent if it is not in S. The inclusion-maximal
|
| 260 |
+
independent sets are called bases and the inclusion-minimal dependent sets are
|
| 261 |
+
called circuits.
|
| 262 |
+
For every two bases, their cardinalities are equal: for every
|
| 263 |
+
bases A and B of M we have |A| = |B|. A rank function for the matroid M is
|
| 264 |
+
a function rM : 2E → N such that for every A ⊆ E the value rM(A) equals the
|
| 265 |
+
cardinality of an inclusion-maximal independent subset of A. In the cases when
|
| 266 |
+
the choice of the matroid is clear from the context, we write r instead of rM.
|
| 267 |
+
Given a matroid M, we can define the dual matroid M ∗ over the same ground
|
| 268 |
+
set E. A set A is independent for matroid M ∗ if and only if E \ A contains a
|
| 269 |
+
basis of M. An element c ∈ E is called a loop in M if rM(c) = 0. An element
|
| 270 |
+
c ∈ E is called a free element in M if rM∗(c) = 0. To put it another way, an
|
| 271 |
+
element c is free, if and only if for every set A, which is independent in M,
|
| 272 |
+
A∪{c} is also independent in M. We say that elements c and d ∈ E are parallel
|
| 273 |
+
in matroid M, denoted by c ∥ d, if rM(c) = rM(d) = rM({c, d}) = 1. One
|
| 274 |
+
can show that “being parallel” defines an equivalence relation on the non-loop
|
| 275 |
+
elements of M. A matroid is called simple if it has no loops and no parallel
|
| 276 |
+
edges.
|
| 277 |
+
Let M = (E, S) be a matroid and A ⊆ E. The contraction of M by A, de-
|
| 278 |
+
noted as M/A, is a matroid over ground set E\A with the following independent
|
| 279 |
+
sets
|
| 280 |
+
{S ⊆ E \ A : S ∪ A′ ∈ S} ,
|
| 281 |
+
where A′ is an inclusion-maximal independent subset of A.
|
| 282 |
+
The restriction of M to A, denoted as M |A or M \ A, is a matroid over
|
| 283 |
+
the ground set A where a set S ⊆ A is independent in M |A if and only if it is
|
| 284 |
+
independent in M.
|
| 285 |
+
A matroid M ′ is called a simple version of M if M ′ is obtained from M by
|
| 286 |
+
deleting all loops and contracting every parallel class of elements into a single
|
| 287 |
+
element.
|
| 288 |
+
For matroids M, N, we say that N is a minor of M = (E, S) if N is
|
| 289 |
+
isomorphic to M/A\B for some disjoint sets A, B ⊆ E. A matroid class M is
|
| 290 |
+
called minor-closed if for any M ∈ M every minor of M is also in M.
|
| 291 |
+
Let us now list some of the classical examples of matroids, which were ex-
|
| 292 |
+
tensively studied in the context of various mathematical fields.
|
| 293 |
+
• A uniform matroid M = (E, S) of rank k is matroid where
|
| 294 |
+
S := {A ⊆ E : |A| ≤ k} .
|
| 295 |
+
When |E| = n, we denote the uniform matroid of rank k as Uk,n.
|
| 296 |
+
• A graphic matroid over graph G = (V, E) is a matroid M = (E, S), where
|
| 297 |
+
S := {A ⊆ E : A is acyclic} .
|
| 298 |
+
The graphic matroid over graph G is denoted as M(G).
|
| 299 |
+
7
|
| 300 |
+
|
| 301 |
+
• A cographic matroid over graph G = (V, E) is a dual matroid M = (E, S)
|
| 302 |
+
to the graphic matroid over the same graph G. In this case we have
|
| 303 |
+
S := {A ⊆ E : (V, E\A) has the same number of components as (V, E)} .
|
| 304 |
+
• A vector matroid M = (E, S) is a matroid such that there is a vector
|
| 305 |
+
space V and a map φ : E → V satisfying
|
| 306 |
+
S := {A ⊆ E : multiset φ(A) is linearly independent} .
|
| 307 |
+
Given a field F, we say that M is representable over field F if M is iso-
|
| 308 |
+
morphic to the vector matroid where V is a vector space over field F.
|
| 309 |
+
A matroid is called regular if it is representable over every field. A matroid
|
| 310 |
+
is called binary if it is representable over F2.
|
| 311 |
+
• A k-column sparse matroid M = (E, S) is a matroid such that there is a
|
| 312 |
+
field F and dimension m and a map φ : E → Fm such that
|
| 313 |
+
S := {A ⊆ E : multiset φ(A) is linearly independent over F} ;
|
| 314 |
+
and moreover φ(c) ∈ Fm has at most k nonzero coordinates for every
|
| 315 |
+
c ∈ E.
|
| 316 |
+
• A γ-sparse matroid M = (E, S) is a matroid such that the inequality
|
| 317 |
+
|S| ⩽ γrM(S) holds for every S ⊆ E.
|
| 318 |
+
• A laminar matroid M = (E, S) is a matroid such that there exists a
|
| 319 |
+
laminar family F over the ground set E and there are numbers cF ∈ N,
|
| 320 |
+
F ∈ F such that
|
| 321 |
+
S := {A ⊆ E : |A ∩ F| ≤ cF for every F ∈ F} .
|
| 322 |
+
Moreover, if F = {E, E1, . . . , Ek}, where E1, . . . , Ek form a partition of
|
| 323 |
+
the ground set E, then M is called a truncated partition matroid. Recall,
|
| 324 |
+
that a family F is called laminar if for every A, B ∈ F we have A ⊆ B or
|
| 325 |
+
B ⊆ A or A ∩ B = ∅.
|
| 326 |
+
Given a matroid M = (E, S) we can define the corresponding polytope
|
| 327 |
+
PM ⊆ RE as the convex hull of points corresponding to the characteristic vectors
|
| 328 |
+
of independent sets. The polytope PM is known to admit the following outer
|
| 329 |
+
description [Sch03].
|
| 330 |
+
PM = {x ∈ RE : x ≥ 0 and
|
| 331 |
+
x(S) ≤ rM(S) for every S ⊆ E} ,
|
| 332 |
+
where x(S) stands for �
|
| 333 |
+
c∈S xc.
|
| 334 |
+
For a matroid M = (E, S) and a set A ⊆ E we can define the closure of A
|
| 335 |
+
as the following set
|
| 336 |
+
clM(A) := {c ∈ E | rM(A ∪ {c}) = rM(A)} .
|
| 337 |
+
8
|
| 338 |
+
|
| 339 |
+
For a matroid M = (E, S), we call the following function ⊓M : E × E → Z
|
| 340 |
+
a local connectivity function
|
| 341 |
+
⊓M(X, Y ) = r(X) + r(Y ) − r(X ∪ Y ) .
|
| 342 |
+
The following function λM : E → Z⩾0 is called a connectivity function
|
| 343 |
+
λM(X) := ⊓M(X, E \ X) = r(X) + r(E \ X) − r(E) .
|
| 344 |
+
Informally, connectivity functions measure dependence with respect to the
|
| 345 |
+
matroid between parts of the ground set. To illustrate it, let us consider the
|
| 346 |
+
connectivity function for vector matroids.
|
| 347 |
+
Suppose M = (E, S) is a vector
|
| 348 |
+
matroid defined by a vector space V and a map φ : E → V . Then we have
|
| 349 |
+
λM(S) =r(S) + r(E \ S) − r(E) =
|
| 350 |
+
dim(span φ(S)) + dim(span φ(E \ S)) − dim(φ(E)) =
|
| 351 |
+
dim ((span φ(S)) ∩ (span φ(E \ S))) .
|
| 352 |
+
3.4
|
| 353 |
+
Ex-ante relaxation to the matroid polytope
|
| 354 |
+
The goal of ex-ante relaxation [FSZ16] or [CGKM20] is to reduce the origi-
|
| 355 |
+
nal problem to the problem where item values are distributed as independent
|
| 356 |
+
Bernoulli random variables. Note, that both problems are using the same ma-
|
| 357 |
+
troid.
|
| 358 |
+
In the original problem item values ⃗X = (X1, . . . , Xn) are independent ran-
|
| 359 |
+
dom variables with known distributions. For i ∈ [n] let Fi be the cumulative
|
| 360 |
+
distribution function of Xi. The reduction of the original problem to a new
|
| 361 |
+
problem is done using a point p in the matroid polytope PM. Let us first show
|
| 362 |
+
that there is a point p ∈ PM with properties that prove to be desirable later
|
| 363 |
+
following the argumentation in [CGKM20].
|
| 364 |
+
Lemma 1. Given a matroid M over the ground set [n] and random variables
|
| 365 |
+
⃗X = (X1, . . . , Xn), there exists p ∈ PM such that
|
| 366 |
+
EPROPHM ⩽
|
| 367 |
+
n
|
| 368 |
+
�
|
| 369 |
+
i=1
|
| 370 |
+
piti ,
|
| 371 |
+
where ti := E[Xi | Xi ⩾ F −1
|
| 372 |
+
i
|
| 373 |
+
(1 − pi)] for every i ∈ [n]1.
|
| 374 |
+
Proof. Let Iopt be a random variable indicating an optimal independent set
|
| 375 |
+
in M with respect to ⃗X = (X1, . . . , Xn). In case when for some realization
|
| 376 |
+
of ⃗X = (X1, . . . , Xn) there are several optimal independent sets, Iopt can be
|
| 377 |
+
selected as any of these sets. For i ∈ [n], let pi be the probability that element
|
| 378 |
+
1Here, we assume that for every i ∈ [n] the event Xi = F −1
|
| 379 |
+
i
|
| 380 |
+
(1 − pi) happens with the zero
|
| 381 |
+
probability, which is true for all continuous distributions. In case of discrete distributions one
|
| 382 |
+
needs to introduce appropriate tie-breaking.
|
| 383 |
+
9
|
| 384 |
+
|
| 385 |
+
i is in Iopt. Note that p = (p1, . . . , pm) is a convex combination of independent
|
| 386 |
+
sets of M, and so lies in PM.
|
| 387 |
+
Due to EPROPHM = E[�
|
| 388 |
+
i∈Iopt Xi], it remains to show that
|
| 389 |
+
E[
|
| 390 |
+
�
|
| 391 |
+
i∈Iopt
|
| 392 |
+
Xi] ⩽
|
| 393 |
+
n
|
| 394 |
+
�
|
| 395 |
+
i=1
|
| 396 |
+
piti .
|
| 397 |
+
We have
|
| 398 |
+
E[
|
| 399 |
+
�
|
| 400 |
+
i∈Iopt
|
| 401 |
+
Xi] =
|
| 402 |
+
n
|
| 403 |
+
�
|
| 404 |
+
i=1
|
| 405 |
+
P[i ∈ Iopt]E[Xi | i ∈ Iopt] =
|
| 406 |
+
n
|
| 407 |
+
�
|
| 408 |
+
i=1
|
| 409 |
+
piE[Xi | i ∈ Iopt] .
|
| 410 |
+
For every i ∈ [n] we have that ti and E[Xi | i ∈ Iopt] are expectations of the
|
| 411 |
+
same random variable Xi but conditioned on the event Xi ⩾ F −1
|
| 412 |
+
i
|
| 413 |
+
(1−pi) and on
|
| 414 |
+
the event i ∈ Iopt, respectively. Note, that the probability of both these events
|
| 415 |
+
equals pi. However, the expectation of Xi conditioned on Xi ⩾ F −1
|
| 416 |
+
i
|
| 417 |
+
(1 − pi) is
|
| 418 |
+
the “largest” conditional expectation of Xi on an event of probability pi. Thus,
|
| 419 |
+
we have piE[Xi | i ∈ Iopt] ⩽ piti for every i ∈ [n] and so we get the desired
|
| 420 |
+
inequality
|
| 421 |
+
n
|
| 422 |
+
�
|
| 423 |
+
i=1
|
| 424 |
+
piE[Xi | i ∈ Iopt] ⩽
|
| 425 |
+
n
|
| 426 |
+
�
|
| 427 |
+
i=1
|
| 428 |
+
piti .
|
| 429 |
+
Let us show how one can use the point p = (p1, . . . , pn) guaranteed by
|
| 430 |
+
Lemma 1 to reduce the original problem. Let us define independent Bernoulli
|
| 431 |
+
random variables ⃗X′ = (X′
|
| 432 |
+
1, . . . , X′
|
| 433 |
+
n) as follows, for each i ∈ [n]
|
| 434 |
+
X′
|
| 435 |
+
i =
|
| 436 |
+
�
|
| 437 |
+
ti
|
| 438 |
+
with probability pi
|
| 439 |
+
0
|
| 440 |
+
with probability 1 − pi ,
|
| 441 |
+
where ti := E[Xi | Xi ⩾ F −1
|
| 442 |
+
i
|
| 443 |
+
(1 − pi)].
|
| 444 |
+
Let us assume that we have a non-adaptive mechanism for the original ma-
|
| 445 |
+
troid M and item values ⃗X′ = (X′
|
| 446 |
+
1, . . . , X′
|
| 447 |
+
n), which sets nonnegative thresholds
|
| 448 |
+
⃗T ′ = (T ′
|
| 449 |
+
1, . . . , T ′
|
| 450 |
+
n). By definition of ⃗X′ = (X′
|
| 451 |
+
1, . . . , X′
|
| 452 |
+
n), for every i ∈ [n] the
|
| 453 |
+
exact value of T ′
|
| 454 |
+
i is not relevant per se, but it is crucial whether ti ≥ T ′
|
| 455 |
+
i or
|
| 456 |
+
ti < T ′
|
| 457 |
+
i. If for some i ∈ [n] we have T ′
|
| 458 |
+
i > ti then this item i is “inactive” and so
|
| 459 |
+
is never selected by the gambler working with M and ⃗X′ = (X′
|
| 460 |
+
1, . . . , X′
|
| 461 |
+
n).
|
| 462 |
+
The key is to construct a non-adaptive mechanism for the original matroid M
|
| 463 |
+
and item values ⃗X′ = (X′
|
| 464 |
+
1, . . . , X′
|
| 465 |
+
n) with positive thresholds ⃗T ′ = (T ′
|
| 466 |
+
1, . . . , T ′
|
| 467 |
+
n)
|
| 468 |
+
such that for each item i ∈ [n] the probability that i is selected by the gambler
|
| 469 |
+
is at least αpi. Now we can use such a non-adaptive mechanism for the original
|
| 470 |
+
matroid M and item values ⃗X′ = (X′
|
| 471 |
+
1, . . . , X′
|
| 472 |
+
n) to construct a non-adaptive
|
| 473 |
+
α-competitive mechanism for the same matroid M and random variables ⃗X =
|
| 474 |
+
10
|
| 475 |
+
|
| 476 |
+
(X1, . . . , Xn). Let us define the thresholds ⃗T = (T1, . . . , Tn) as follows, for every
|
| 477 |
+
i ∈ [n]
|
| 478 |
+
Ti :=
|
| 479 |
+
�
|
| 480 |
+
+∞
|
| 481 |
+
if ti < T ′
|
| 482 |
+
i
|
| 483 |
+
F −1
|
| 484 |
+
i
|
| 485 |
+
(1 − pi)
|
| 486 |
+
otherwise .
|
| 487 |
+
To see that the thresholds ⃗T = (T1, . . . , Tn) lead to an α-competitive mech-
|
| 488 |
+
anism for M and ⃗X = (X1, . . . , Xn), let us couple random variables X′
|
| 489 |
+
i with
|
| 490 |
+
random variables Xi as follows
|
| 491 |
+
X′
|
| 492 |
+
i :=
|
| 493 |
+
�
|
| 494 |
+
ti
|
| 495 |
+
if Xi ≥ F −1
|
| 496 |
+
i
|
| 497 |
+
(1 − pi)
|
| 498 |
+
0
|
| 499 |
+
otherwise.
|
| 500 |
+
Note that ⃗X′ = (X′
|
| 501 |
+
1, . . . , X′
|
| 502 |
+
n) are independent Bernoulli random variables,
|
| 503 |
+
where for each i ∈ [n] the variable X′
|
| 504 |
+
i equals ti with probability pi and equals 0
|
| 505 |
+
with probability 1 − pi. When ⃗X′ are coupled with ⃗X this way, Xi and X′
|
| 506 |
+
i have
|
| 507 |
+
the same expected value when conditioned on X′
|
| 508 |
+
i being ti. The mechanism with
|
| 509 |
+
thresholds ⃗T selects an item i ∈ [n] when run for ⃗X only if the mechanism with
|
| 510 |
+
thresholds ⃗T ′ selects the item i when run for ⃗X′. Moreover, for both of these
|
| 511 |
+
algorithms, conditionally on the event that the item i is selected the expected
|
| 512 |
+
value of i equals ti. Now, α-competitiveness guarantee of the thresholds ⃗T for
|
| 513 |
+
M and ⃗X follows from Lemma 1.
|
| 514 |
+
4
|
| 515 |
+
Graphic and k-column sparse matroids
|
| 516 |
+
First, we construct a 16-competitive non-adaptive mechanism for graphic ma-
|
| 517 |
+
troids without parallel edges. Our construction is done through the ex-ante re-
|
| 518 |
+
laxation to the matroid polytope, following the works in [FSZ16] or [CGKM20].
|
| 519 |
+
Later, we present a constant-competitive non-adaptive mechanism for k-column
|
| 520 |
+
sparse matroids whenever k is constant.
|
| 521 |
+
4.1
|
| 522 |
+
Graphic matroids
|
| 523 |
+
Now we are ready to provide a 16-competitive non-adaptive mechanism for
|
| 524 |
+
graphic matroid. The provided mechanism is essentially the one constructed
|
| 525 |
+
in [CGKM20] but with saving a factor of 2 in the guarantee, which is achieved
|
| 526 |
+
by rescaling the point from the matroid polytope by 2 and not by 4.
|
| 527 |
+
Let us be given a simple graph G = (V, E) and let us consider the corre-
|
| 528 |
+
sponding graphic matroid M over the ground set E. Recall that a subset of E
|
| 529 |
+
is independent with respect to M if and only if it is acyclic in G. Let us also
|
| 530 |
+
assume that the graph G has n edges and so E = {e1, e2, . . . , en}.
|
| 531 |
+
Lemma 2. Let p = (p1, . . . , pn) be a point in the polytope PM. Thus we assume
|
| 532 |
+
that for every i ∈ [n] the coordinate pi of p corresponds to the edge ei. Then
|
| 533 |
+
there exists an orientation of edges E = {e1, e2, . . . , en} in the graph G = (V, E)
|
| 534 |
+
such that for every vertex v ∈ V we have �
|
| 535 |
+
i∈[n]:ei∈δ−(v) pi ≤ 2.
|
| 536 |
+
11
|
| 537 |
+
|
| 538 |
+
Proof. Observe that the average degree of a vertex in a forest on |V | vertices is
|
| 539 |
+
at most (2|V | − 2)/|V | = 2 − 1/|V | ⩽ 2.
|
| 540 |
+
Let us use this fact to prove the desired statement by induction on the
|
| 541 |
+
number of vertices in the graph G.
|
| 542 |
+
If the graph G has at most two vertices then the orientation is trivial. Other-
|
| 543 |
+
wise, since p is a convex combination of points corresponding to forests in G, we
|
| 544 |
+
have that the average of the value �
|
| 545 |
+
i∈[n]:ei∈δ(v) pi over all vertices v ∈ V is at
|
| 546 |
+
most 2. Thus there exists a vertex v ∈ V such that we have �
|
| 547 |
+
i∈[n]:ei∈δ(v) pi ≤ 2.
|
| 548 |
+
We orient all edges incident to v as edges in δ−(v), so these edges are incoming
|
| 549 |
+
with respect to v. Then we remove the vertex v and all edges incident to it
|
| 550 |
+
and orient the remaining edges according to the orientation guaranteed by the
|
| 551 |
+
inductive hypothesis.
|
| 552 |
+
Now we present an algorithm for graphic matroids of simple graphs.
|
| 553 |
+
Algorithm 1 A non-adaptive 16-competitive mechanisms for graphic matroids
|
| 554 |
+
of a simple graph
|
| 555 |
+
1: Let p be a point in the polytope PM so that the statement of Lemma 1 is
|
| 556 |
+
satisfied.
|
| 557 |
+
2: Let the edges of the original graph G = (V, E) be oriented so that the
|
| 558 |
+
statement of Lemma 2 is satisfied.
|
| 559 |
+
3: For every edge ei ∈ E, i ∈ [n], mark the edge ei as “discarded" independently
|
| 560 |
+
at random with probability 1/2.
|
| 561 |
+
4: Select a cut S ⊆ V uniformly at random, mark all edges not in [S; S] as
|
| 562 |
+
“discarded". Here, [S; S] stands for the set of edges which are oriented such
|
| 563 |
+
that their tail is in S and their head is in S.
|
| 564 |
+
5: Set thresholds ⃗T = (T1, . . . , Tn) as follows, for each i ∈ [n]
|
| 565 |
+
Ti :=
|
| 566 |
+
�
|
| 567 |
+
+∞
|
| 568 |
+
if ei is “discarded”
|
| 569 |
+
F −1
|
| 570 |
+
i
|
| 571 |
+
(1 − pi)
|
| 572 |
+
otherwise .
|
| 573 |
+
Lemma 3. For every i ∈ [n], we have
|
| 574 |
+
P[ei is selected | Xi ≥ Ti and ei is not “discarded”] ≥ 1/2 .
|
| 575 |
+
Proof. Let us assume that the vertex v is the head of the oriented edge ei. Let
|
| 576 |
+
us also assume that ei is not marked as “discarded” and Xi ≥ Ti.
|
| 577 |
+
Since the edge ei is not “discarded”, the edge ei is in the selected set [S; S].
|
| 578 |
+
Hence, every not “discarded” edge incident to v has the vertex v as its head.
|
| 579 |
+
Thus, as long as no other edge with the head at the vertex v is selected by
|
| 580 |
+
the gambler, the gambler has to select ei. We claim, that with probability at
|
| 581 |
+
least 1/2 no other edge with the head at v was selected by the gambler.
|
| 582 |
+
Let I be the event indicating that "the gambler selected an edge ej, j ̸= i
|
| 583 |
+
such that v is the head of ej", in other words “there is j ∈ [n], j ̸= i such that
|
| 584 |
+
12
|
| 585 |
+
|
| 586 |
+
v is the head of ej and Xj ≥ Tj and ej is not “discarded”". Let J indicate the
|
| 587 |
+
event that "ei is not marked as “discarded” after the selection of the cut", in
|
| 588 |
+
other words, "the head of ei is in S and the tail of ei is in S".
|
| 589 |
+
Let us show
|
| 590 |
+
P[I | J] ≤ 1/2 .
|
| 591 |
+
By the union bound, we have
|
| 592 |
+
P[I | J] ⩽
|
| 593 |
+
�
|
| 594 |
+
j∈[n]\{i}:ej∈δ−(v)
|
| 595 |
+
P[Xj ≥ Tj and ej is not “discarded” | J]
|
| 596 |
+
Note that for each edge ej ∈ δ−(v) we have P[Xj ≥ Tj|J] = pj and we also
|
| 597 |
+
have P[ej is not “discarded”|J] = 1/4. Note that any edge is not “discarded”
|
| 598 |
+
in Step 3 of Algorithm 1 with probability 1/2, and not “discarded” in Step 4
|
| 599 |
+
of Algorithm 1 with probability 1/4. However, since the probabilities are with
|
| 600 |
+
respect to the edge ej ∈ δ−(v) and are counted conditioned on the event J,
|
| 601 |
+
the conditioned probability of not being “discarded” in Step 4 of Algorithm 1
|
| 602 |
+
is 1/2. Moreover, even conditioned on J the events "Xj ≥ Tj" and "ej is not
|
| 603 |
+
“discarded”" are independent events. Thus we have
|
| 604 |
+
�
|
| 605 |
+
j∈[n]\{i}:ej∈δ−(v)
|
| 606 |
+
P[Xj ≥ Tj and ej is not “discarded” | J] ≤
|
| 607 |
+
�
|
| 608 |
+
j∈[n]\{i}:ej∈δ−(v)
|
| 609 |
+
pj/4 ⩽ 1/2 ,
|
| 610 |
+
where the last inequality follows from the orientation.
|
| 611 |
+
We are ready to prove Theorem 3 by showing that Algorithm 1 is a 16-
|
| 612 |
+
competitive for graphic matroids without parallel edges.
|
| 613 |
+
Proof of Theorem 3. By Lemma 3 for every i ∈ [n] the probability of edge ei
|
| 614 |
+
being accepted conditional on Xi ≥ Ti and being not “discarded” is at least 1/2.
|
| 615 |
+
Overall, the probability of edge ei being accepted is at least
|
| 616 |
+
1
|
| 617 |
+
16pi. Thus
|
| 618 |
+
mechanism guarantees at least �n
|
| 619 |
+
i=1
|
| 620 |
+
1
|
| 621 |
+
16piti of the expected total value.
|
| 622 |
+
By
|
| 623 |
+
Lemma 1, we have �
|
| 624 |
+
i∈[n]
|
| 625 |
+
1
|
| 626 |
+
16piti ⩾
|
| 627 |
+
1
|
| 628 |
+
16EPROPHM, finishing the proof.
|
| 629 |
+
4.2
|
| 630 |
+
k-column sparse matroids
|
| 631 |
+
There are known constant-competitive mechanisms for k-column sparse ma-
|
| 632 |
+
troids in the context of the secretary problem [Sot13]. However they do not
|
| 633 |
+
immediately lead to a non-adaptive mechanism of constant competitiveness
|
| 634 |
+
guarantee. The reason for that are not the updated thresholds but implicit
|
| 635 |
+
changes to the considered matroid.
|
| 636 |
+
Here, we present a constant competitive mechanism for k-column sparse
|
| 637 |
+
matroid class for each constant k.
|
| 638 |
+
Note, graphic matroids form a subclass
|
| 639 |
+
of 2-column sparse matroids . Because of their significance, 2-column sparse
|
| 640 |
+
matroids are also known in literature as represented frame matroids. Later, we
|
| 641 |
+
use 2-column sparse matroids to prove results in Section 6.4.
|
| 642 |
+
13
|
| 643 |
+
|
| 644 |
+
Suppose M is a k-column sparse matroid over field F. In this section, we
|
| 645 |
+
prove that there exists a (2k+2k)-competitive mechanism for M.
|
| 646 |
+
Suppose a k-sparse representation of M = (E, S) is defined by a map φ :
|
| 647 |
+
E → Fd. Note, if for some element t ∈ E the vector φ(t) is a zero vector then c
|
| 648 |
+
is a loop and therefore can be removed from consideration.
|
| 649 |
+
Now we consider an undirected hyper-multigraph G with vertex set [d]. Each
|
| 650 |
+
matroid element t ∈ E induces a hyperedge et in this graph between non-zero
|
| 651 |
+
coordinates of φ(t). Formally, the hyperedge et is defined as follows et := {i ∈
|
| 652 |
+
[d] : φ(t)i ̸= 0}. We say that a vertex i ∈ [d] of the hyper-multigraph G is
|
| 653 |
+
incident to every edge e of G such that i ∈ e. For a vertex i ∈ [d] we denote
|
| 654 |
+
the collection of incident hyperedges by δ(i). The degree of a vertex i in the
|
| 655 |
+
hyper-multigraph G equals |δ(i)|.
|
| 656 |
+
Claim 1. Suppose I is an independent set of the matroid M. Then the average
|
| 657 |
+
degree of a vertex is at most k when one considers the hyper-multigraph with
|
| 658 |
+
vertices [d] and hyperedges {et : t ∈ I}.
|
| 659 |
+
Proof. Observe that |I| ⩽ d because having more than d vectors in d-dimensional
|
| 660 |
+
vector space Fd leads to a a linear dependency.
|
| 661 |
+
Since M is k-column sparse, we have that every edge in {et : t ∈ I} is
|
| 662 |
+
incident to at most k vertices in [d]. Hence, the total degree is at most kd and
|
| 663 |
+
thus the average degree of a vertex is at most k.
|
| 664 |
+
Now we consider orientations of the graph G. An orientation of the graph
|
| 665 |
+
G is a function ϕ which maps every edge et into one vertex of G incident to et.
|
| 666 |
+
We call ϕ(et) to be the head of the edge et, and all other vertices, if any, to
|
| 667 |
+
be tails. For every vertex i ∈ [d] we denote the set of incoming edges by δ−(i),
|
| 668 |
+
formally δ−(i) = {et : ϕ(et) = i, t ∈ E}.
|
| 669 |
+
Lemma 4. Let p be a point in the polytope PM. We assume that for every
|
| 670 |
+
t ∈ E, the coordinate pt of p corresponds to the element t. Then there exists
|
| 671 |
+
an orientation ϕ of hyperedges in the hyper-mulrigraph G such that for every
|
| 672 |
+
vertex i ∈ [d] we have �
|
| 673 |
+
t∈E:et∈δ−(i) pt ⩽ k.
|
| 674 |
+
The proof of Lemma 4 is analogous to the proof of Lemma 2. Now let us
|
| 675 |
+
describe an algorithm for k-column sparse matroids.
|
| 676 |
+
Lemma 5. For every t ∈ E we have
|
| 677 |
+
P[t is selected | Xt ≥ Tt and t is not “discarded”] ≥ 1/2 .
|
| 678 |
+
Proof. Note that item t ∈ E is accepted whenever Xt ≥ Tt and no other item
|
| 679 |
+
was selected from non-discarded edges in δ−(ϕ(t)). By the union bound, for
|
| 680 |
+
every event J we can upper bound the probability that
|
| 681 |
+
P[there j ∈ E \ {t} such that j is selected and ej ∈ δ−(ϕ(t)) | J] ⩽
|
| 682 |
+
�
|
| 683 |
+
j∈E\{t}:ej∈δ−(ϕ(t))
|
| 684 |
+
P[ej is not “discarded” and Xj ≥ Tj | J] .
|
| 685 |
+
14
|
| 686 |
+
|
| 687 |
+
Algorithm 2 A non-adaptive 2k+2k-competitive mechanisms for k-column
|
| 688 |
+
sparse matroids
|
| 689 |
+
1: Let p be a point in the polytope PM so that the statement of Lemma 1 is
|
| 690 |
+
satisfied.
|
| 691 |
+
2: Let the edges of the hyper-multigraph G be oriented so that the statement
|
| 692 |
+
of Lemma 4 is satisfied.
|
| 693 |
+
3: For every edge ei ∈ E, i ∈ [n], mark the edge ei as “discarded" independently
|
| 694 |
+
at random with probability 1 −
|
| 695 |
+
1
|
| 696 |
+
2k.
|
| 697 |
+
4: Select a cut S ⊆ [d] uniformly at random, mark all edges not in [S; S] as
|
| 698 |
+
“discarded”. Here, [S; S] stands for the set of edges which are oriented such
|
| 699 |
+
that all their tails are in S and their head is in S. In particular, for t ∈ E we
|
| 700 |
+
say that et lies in a cut [S; S] with respect to the orientation ϕ if ϕ(et) ∈ S
|
| 701 |
+
and for every i ∈ et \ {ϕ(et)} we have i ∈ S.
|
| 702 |
+
5: Set thresholds {Tt : t ∈ E} as follows, for each t ∈ E
|
| 703 |
+
Tt :=
|
| 704 |
+
�
|
| 705 |
+
+∞
|
| 706 |
+
if t is “discarded”
|
| 707 |
+
F −1
|
| 708 |
+
t
|
| 709 |
+
(1 − pt)
|
| 710 |
+
otherwise .
|
| 711 |
+
Let J indicate the event that "et is not marked as “discarded” after the selection
|
| 712 |
+
of the cut". Then for each j ∈ E \{t} we have P[ej is not “discarded” and Xj ≥
|
| 713 |
+
Tj | J] ≤
|
| 714 |
+
1
|
| 715 |
+
2kpj. By Lemma 4, we have �
|
| 716 |
+
j∈E:ej∈δ−(ϕ(t)) pj ⩽ k, leading to the
|
| 717 |
+
desired inequality.
|
| 718 |
+
Note that the proof of Lemma 5 is analogous to the proof of Lemma 3. We are
|
| 719 |
+
ready to prove Theorem by showing that the Algorithm 2 is a 2k+2k-competitive
|
| 720 |
+
for k-column sparse matroids.
|
| 721 |
+
Proof of Theorem 4. For every item t ∈ E we have P[Xt ≥ Tt] = pt and
|
| 722 |
+
P[t is not “discarded”] ≥
|
| 723 |
+
1
|
| 724 |
+
2k+1k. By Lemma 5, we have that with probability
|
| 725 |
+
at least 1/2 the item t is selected when it is not “discarded” and Xt ≥ Tt. Thus
|
| 726 |
+
the expected total value of Algorithm 2 is at least �
|
| 727 |
+
j∈E
|
| 728 |
+
1
|
| 729 |
+
2k+2kpjtj which is at
|
| 730 |
+
least
|
| 731 |
+
1
|
| 732 |
+
2k+2kEPROPHM by Lemma 1.
|
| 733 |
+
5
|
| 734 |
+
Cographic and gamma-sparse matroids
|
| 735 |
+
5.1
|
| 736 |
+
Cographic matroids
|
| 737 |
+
Let us revisit a mechanism of Soto [Sot13] for the cographic matroid secretary
|
| 738 |
+
problem which is based on the following corollary of Edmond’s matroid parti-
|
| 739 |
+
tioning theorem [Edm65]. This mechanism leads to a non-adaptive mechanism
|
| 740 |
+
for cographic matroids.
|
| 741 |
+
15
|
| 742 |
+
|
| 743 |
+
Proposition 1. Let G = (V, E) be a three edge-connected graph. Then there
|
| 744 |
+
exist spanning trees H1, H2, H3 in G such that the union of their complements
|
| 745 |
+
contains all the edges E, i.e. E = (E \ H1) ∪ (E \ H2) ∪ (E \ H3).
|
| 746 |
+
Algorithm 3 A non-adaptive 3-competitive mechanisms for cographic matroids
|
| 747 |
+
in the case of three edge-connectivity
|
| 748 |
+
1: Let H1, H2 and H3 be the spanning trees as in Proposition 6.
|
| 749 |
+
2: Uniformly at random select a spanning tree H∗ from H1, H2 and H3. Set
|
| 750 |
+
thresholds {Te : e ∈ E} as follows, for each e ∈ E
|
| 751 |
+
Te :=
|
| 752 |
+
�
|
| 753 |
+
+∞
|
| 754 |
+
if e is not in H∗
|
| 755 |
+
0
|
| 756 |
+
otherwise .
|
| 757 |
+
Lemma 6. Let G = (V, E) be a three edge-connected graph and let M be the
|
| 758 |
+
cographic matroid over G. Then Algorithm 3 is a 3-competitive non-adaptive
|
| 759 |
+
mechanism for the matroid M.
|
| 760 |
+
Proof. The expected total value of the mechanism provided by Algorithm 3
|
| 761 |
+
equals E[�
|
| 762 |
+
e∈E\H∗ Xe] which can be estimated as follows
|
| 763 |
+
E[
|
| 764 |
+
�
|
| 765 |
+
e∈E\H∗
|
| 766 |
+
Xe] = 1
|
| 767 |
+
3E[
|
| 768 |
+
�
|
| 769 |
+
i∈[3]
|
| 770 |
+
�
|
| 771 |
+
e∈E\Hi
|
| 772 |
+
Xe] ≥ 1
|
| 773 |
+
3E[
|
| 774 |
+
�
|
| 775 |
+
e∈E
|
| 776 |
+
Xe] ≥ 1
|
| 777 |
+
3EPROPHM .
|
| 778 |
+
The next theorem provides a proof for Theorem 5.
|
| 779 |
+
Theorem 11. Let G = (V, E) be a graph and let M be the cographic matroid
|
| 780 |
+
over G. Then Algorithm 4 is a 6-competitive non-adaptive mechanism for the
|
| 781 |
+
matroid M.
|
| 782 |
+
Proof. We can assume that G does not have bridges, because every such bridge
|
| 783 |
+
is a loop in M. Thus these edges can be selected neither by the gambler nor by
|
| 784 |
+
the prophet. So we can assume G = G′ and M = M ′.
|
| 785 |
+
In the case when each connected component of G is three edge-connected,
|
| 786 |
+
then Algorithm 4 runs Algorithm 3 for each component to obtain a 3-competitive
|
| 787 |
+
non-adaptive mechanism.
|
| 788 |
+
Otherwise, there is one or more pairs of edges e,e′ such that {e, e′} corre-
|
| 789 |
+
sponds to a cut in G. In this case, the edges e,e′ correspond to parallel elements
|
| 790 |
+
of the cographic matroid M.
|
| 791 |
+
Algorithm 4 considers the partition of E into classes of parallel elements C1,
|
| 792 |
+
C2, . . . , Ck. Let us construct the matroid M ′′ from M by contracting all but
|
| 793 |
+
one edge in each class C1, C2, . . . , Ck. Note, that the ground set of M ′′ has k
|
| 794 |
+
elements. Abusing the notation we refer to these elements of the ground set as
|
| 795 |
+
16
|
| 796 |
+
|
| 797 |
+
Algorithm 4 A non-adaptive 6-competitive mechanisms for cographic matroids
|
| 798 |
+
1: Delete all loops of M to obtain a matroid M ′. Remove all bridges from
|
| 799 |
+
G = (V, E) and obtain a graph G′ = (V ′, E′).
|
| 800 |
+
2: Let C1,. . . , Ck be equivalence classes of M ′ with respect to the relation of
|
| 801 |
+
being parallel. Construct the matroid M ′′ from M ′ by contracting all but
|
| 802 |
+
one edge in each class C1, C2, . . . , Ck. Note, that the ground set of M ′′
|
| 803 |
+
has k elements and matroid M ′′ is the cographic matroid over a graph G′′,
|
| 804 |
+
where each connected component of G′′ is three edge-connected. Abusing
|
| 805 |
+
the notation we refer to the elements of the ground set of M ′′ as C1, C2,
|
| 806 |
+
. . . , Ck.
|
| 807 |
+
3: Let H1, H2 and H3 be forests in G′′ such that the restriction of H1, H2
|
| 808 |
+
and H3 to each connected component of G′′ satisfies Proposition 6 for the
|
| 809 |
+
respective connected component.
|
| 810 |
+
4: Uniformly at random select a forest H∗ from H1, H2 and H3.
|
| 811 |
+
5: For each i ∈ [k] select thresholds T e, e ∈ Ci according to Theorem 1 when
|
| 812 |
+
the gambler is allowed to accept only one item of Ci and the distributions
|
| 813 |
+
of Xe, e ∈ Ci are the same as original distributions of values for e ∈ Ci.
|
| 814 |
+
6: Set thresholds {Te : e ∈ E} as follows, for each e ∈ E
|
| 815 |
+
Te :=
|
| 816 |
+
�
|
| 817 |
+
T e
|
| 818 |
+
if e ∈ Ci and Ci ∈ H∗ for some i ∈ [k]
|
| 819 |
+
+∞
|
| 820 |
+
otherwise .
|
| 821 |
+
C1, C2, . . . , Ck. The matroid M ′′ is isomorphic to the cographic matroid over
|
| 822 |
+
a graph G′′, where each connected component of G′′ is three edge-connected.
|
| 823 |
+
Following Lemma 6, Algorithm 4 constructs forests H1, H2, H3 for the graph G′′.
|
| 824 |
+
So Algorithm 4 leads us to a 6-competitive mechanism. Indeed, the prophet
|
| 825 |
+
with M and with the original distributions of Xe, e ∈ E performs exactly
|
| 826 |
+
as the prophet with M ′′ and with the corresponding distributions of X′′
|
| 827 |
+
i :=
|
| 828 |
+
maxe∈Ci Xe, i ∈ [k]. By selecting forests in Algorithm 4 the gambler acheives
|
| 829 |
+
in expectation E[�
|
| 830 |
+
i∈[k] X′′
|
| 831 |
+
i ]/3 when all classes C1, C2, . . . , Ck are singletons.
|
| 832 |
+
However, for classes that are not singletons we need to take into account an-
|
| 833 |
+
other 2 approximation factor with respect to the prophet, who can achieve the
|
| 834 |
+
expected value E[X′′
|
| 835 |
+
i ] for each i ∈ [k], while the gambler is guaranteed in ex-
|
| 836 |
+
pectation to achieve only E[X′′
|
| 837 |
+
i ]/2 for each i ∈ [k].
|
| 838 |
+
5.2
|
| 839 |
+
Gamma-sparse matroids
|
| 840 |
+
Let us also revisit a mechanism of Soto [Sot13] for γ-sparse matroids to verify
|
| 841 |
+
that it directly leads to a non-adaptive mechanism.
|
| 842 |
+
Theorem 12. Let M = (E, S) be a γ-sparse matroid.
|
| 843 |
+
There exists a γ-
|
| 844 |
+
competitive non-adaptive mechanism for M.
|
| 845 |
+
Proof. First observe that the point x := 1/γ lies in the matroid polytope PM.
|
| 846 |
+
17
|
| 847 |
+
|
| 848 |
+
Indeed, it is non-negative and for every set S ⊆ E(M) we have x(S) = |S|/γ ⩽
|
| 849 |
+
rM(S).
|
| 850 |
+
Then x can be expressed as a convex combination of indicator variables
|
| 851 |
+
corresponding to the independent sets of M.
|
| 852 |
+
In other words, we have x =
|
| 853 |
+
�
|
| 854 |
+
S∈S αS1S for some α ⩾ 0, �
|
| 855 |
+
S∈S αS = 1, where 1S refers to the characteristic
|
| 856 |
+
vector of S.
|
| 857 |
+
Now sample an independent set S in matroid M randomly with probabil-
|
| 858 |
+
ity αS. Let the gambler select all items in S and let the gambler leave all the
|
| 859 |
+
items not in S unselected.
|
| 860 |
+
If Xe is the random variable corresponding to the weight of element e ∈
|
| 861 |
+
E(M), then this mechanism results in a total expected value as follows
|
| 862 |
+
�
|
| 863 |
+
S∈S
|
| 864 |
+
αS
|
| 865 |
+
�
|
| 866 |
+
e∈S
|
| 867 |
+
E[Xe] =
|
| 868 |
+
�
|
| 869 |
+
e∈E
|
| 870 |
+
(1/γ)E[Xe] = E[
|
| 871 |
+
�
|
| 872 |
+
e∈E
|
| 873 |
+
Xe]/γ ⩾ EPROPH/γ ,
|
| 874 |
+
finishing the proof.
|
| 875 |
+
Observe that Proposition 1 implies that for a three edge-connected graph G,
|
| 876 |
+
the cographic matroid of G is 3-sparse. Thus Lemma 6 is a corollary of Theo-
|
| 877 |
+
rem 12.
|
| 878 |
+
Similarly, for a planar graph G the graphic matroid is 3-sparse, leading us
|
| 879 |
+
to the following corollary.
|
| 880 |
+
Corollary 1. Let G is a planar graph and let M be the corresponding graphic
|
| 881 |
+
matroid. There is a 3-competitive non-adaptive mechanism for M.
|
| 882 |
+
6
|
| 883 |
+
Representable matroids
|
| 884 |
+
Many results in the theory of matroids make use of minors coming from re-
|
| 885 |
+
strictions and contractions. To get access to the toolbox provided by matroid
|
| 886 |
+
theory, we need to understand how prophet inequality guarantees change when
|
| 887 |
+
we consider minors.
|
| 888 |
+
6.1
|
| 889 |
+
Preliminaries
|
| 890 |
+
Lemma 7. Let M be a matroid and let matroid N be a restriction of the ma-
|
| 891 |
+
troid M. If there exists an α-competitive non-adaptive mechanism on M, then
|
| 892 |
+
there is an α-competitive non-adaptive mechanism for N.
|
| 893 |
+
Proof. To obtain a mechanism for the matroid N, we can impose thresholds +∞
|
| 894 |
+
for the items that were removed from the ground set to obtain the restriction N
|
| 895 |
+
from the matroid M. The remaining items are assigned the same thresholds in
|
| 896 |
+
both mechanisms.
|
| 897 |
+
A similar result for contractions is harder to obtain in the case of non-
|
| 898 |
+
adaptive mechanisms.
|
| 899 |
+
Indeed, a straightforward approach would require us
|
| 900 |
+
to impose the thresholds +∞ for the contracted items, while using the given
|
| 901 |
+
18
|
| 902 |
+
|
| 903 |
+
mechanism on the remaining items. Unfortunately, this would also require us
|
| 904 |
+
to “change" the underlying matroid, in other words a gambler might be forced
|
| 905 |
+
to reject an item even though its value is over the assigned threshold and its
|
| 906 |
+
addition to the currently selected items keeps the selected set independent with
|
| 907 |
+
respect to M.
|
| 908 |
+
Because of this difficulty, in this work we provide a matching result for
|
| 909 |
+
contractions only for matroids representable over a finite field. This result is
|
| 910 |
+
sufficient for the purpose of this work.
|
| 911 |
+
Lemma 8. Let M = (E, S) be a matroid representable over the field Fp for
|
| 912 |
+
some p. Let T ⊆ E be a subset of the ground set such that λM(T ) ⩽ k for
|
| 913 |
+
some k.
|
| 914 |
+
Then there exists S ⊆ T so that every set that is independent in M |S is also
|
| 915 |
+
independent in M/T and
|
| 916 |
+
EPROPHM|S ⩾
|
| 917 |
+
1
|
| 918 |
+
pk+1 EPROPHM/T .
|
| 919 |
+
Recall that T stands for the complement of T with respect to the ground set E.
|
| 920 |
+
Proof. Consider the representation of the matroid M over Fp. Let φ : E → Fm
|
| 921 |
+
p
|
| 922 |
+
be the map describing the representation of M. Thus, for every S ⊆ E we have
|
| 923 |
+
that the set φ(S) = {φ(e) ∈ Fm
|
| 924 |
+
p : e ∈ S} is independent over the field Fp if and
|
| 925 |
+
only if S is an independent set for the matroid M.
|
| 926 |
+
Since λM(T ) ⩽ k holds, by definition of λM we have
|
| 927 |
+
rM(T ) + rM(T ) − rM(E) ⩽ k .
|
| 928 |
+
We have rM(R) = dim span(φ(R)) for every R ⊆ E. Thus, we have
|
| 929 |
+
dim span φ(E) = dim span φ(T )+dim span φ(T )−dim
|
| 930 |
+
�
|
| 931 |
+
(span φ(T )) ∩ (span φ(T))
|
| 932 |
+
�
|
| 933 |
+
.
|
| 934 |
+
and so
|
| 935 |
+
dim
|
| 936 |
+
�
|
| 937 |
+
(span φ(T )) ∩ (span φ(T ))
|
| 938 |
+
�
|
| 939 |
+
⩽ k .
|
| 940 |
+
Since we are working over the field Fp, the linear space L := (span φ(T )) ∩
|
| 941 |
+
(span φ(T )) has at most pk vectors. Let C be the orthogonal complement of
|
| 942 |
+
the linear space L in the space span φ(T ). Thus, we can represent span φ(T ) as
|
| 943 |
+
L ⊕ C. For every vector v ∈ span φ(T ) we denote v orthogonal projection to L
|
| 944 |
+
and C by v |L and v |C, respectively.
|
| 945 |
+
For each vector a ∈ L, define the set Ta := {t ∈ T : φ(t) |L= a, φ(t) ̸= a}.
|
| 946 |
+
Note that by definition for every a ∈ L we have Ta ∩ L = ∅. Now let us select
|
| 947 |
+
a uniformly at random from L.
|
| 948 |
+
Claim 2. Ea[EPROPHM|Ta ] ��
|
| 949 |
+
1
|
| 950 |
+
pk EPROPHM/T .
|
| 951 |
+
Proof. To prove the desired inequality, we prove the corresponding inequality
|
| 952 |
+
for any realization of item values. From now on we consider the realization of
|
| 953 |
+
item values fixed and thus we prove the following inequality
|
| 954 |
+
Ea[PROPHM|Ta] ≥ 1
|
| 955 |
+
pk PROPHM/T
|
| 956 |
+
19
|
| 957 |
+
|
| 958 |
+
Let us consider the set Iopt on which the prophet achieves PROPHM/T .
|
| 959 |
+
Note that the set Iopt does not contain any item e such that φ(e) is in L, because
|
| 960 |
+
every such an item e is a loop in M/T . Thus, the set Iopt can be partitioned
|
| 961 |
+
into sets Iopt,a, a ∈ L where Iopt,a is a subset of Ta.
|
| 962 |
+
The set Iopt is independent in M/T and so Iopt is also independent in M.
|
| 963 |
+
Hence the sets Iopt,a, a ∈ L are also independent in M. Thus for every a ∈ L,
|
| 964 |
+
PROPHM|Ta ⩾ w(Iopt,a). Then we have
|
| 965 |
+
Ea[PROPHM|Ta] ⩾
|
| 966 |
+
�
|
| 967 |
+
a∈L w(Iopt,a)
|
| 968 |
+
|L|
|
| 969 |
+
= 1
|
| 970 |
+
|L|w(Iopt) ⩾ 1
|
| 971 |
+
pk PROPHM/T ,
|
| 972 |
+
finishing the proof of the claim.
|
| 973 |
+
Let us now select a∗ ∈ L such that EPROPHM|Ta is maximized. By the
|
| 974 |
+
previous claim, we have
|
| 975 |
+
PROPHM|Ta∗ ⩾ 1
|
| 976 |
+
pk PROPHM/T .
|
| 977 |
+
Now for every c ∈ C define set Hc := {t ∈ Ta∗ : (φ(t) |C) · c = 1}. Now let us
|
| 978 |
+
select c uniformly at random from C.
|
| 979 |
+
Claim 3. Ec[EPROPHM|Hc ] ≥ 1
|
| 980 |
+
pEPROPHM|T a∗ .
|
| 981 |
+
Proof. To prove the desired inequality, we prove the corresponding inequality
|
| 982 |
+
for any realization of item values. From now on we consider the realization of
|
| 983 |
+
item values fixed and thus we prove the following inequality
|
| 984 |
+
Ec[PROPHM|Hc ] ≥ 1
|
| 985 |
+
pPROPHM|T a∗ .
|
| 986 |
+
Let Iopt be the set corresponding to PROPHM|Ta∗ . Thus, we have that for
|
| 987 |
+
every e ∈ Iopt, φ(e) is not in L and hence φ(e) |C is not the zero vector. Due to
|
| 988 |
+
Pc[c · t = 1] = 1/p, for every t ∈ Ta∗, we have
|
| 989 |
+
Ec[w(Iopt∩Hc)] =
|
| 990 |
+
�
|
| 991 |
+
t∈Iopt
|
| 992 |
+
Pc[c·t = 1]w(t) = 1
|
| 993 |
+
p
|
| 994 |
+
�
|
| 995 |
+
t∈Iopt
|
| 996 |
+
w(t) = 1
|
| 997 |
+
pw(Iopt) = PROPHM|Ta∗ .
|
| 998 |
+
Finally, since Iopt is independent in M so is Iopt ∩ Hc. Thus, we have
|
| 999 |
+
Ec[PROPHM|Hc ] ≥ 1
|
| 1000 |
+
pPROPHM|T a∗ ,
|
| 1001 |
+
finishing the proof of the claim.
|
| 1002 |
+
Now let us select c∗ so that EPROPHM|Hc is maximized and let S∗ := Hc∗.
|
| 1003 |
+
Then we have EPROPH(M |S∗) ⩾
|
| 1004 |
+
1
|
| 1005 |
+
pk+1 EPROPH(M/T ).
|
| 1006 |
+
Finally, we need to show that every set independent in M |S∗ is an indepen-
|
| 1007 |
+
dent set in M/T . Suppose the contrary, i.e. there exists a set that is independent
|
| 1008 |
+
20
|
| 1009 |
+
|
| 1010 |
+
in M |S∗ but is not an independent set in M/T . Then span S∗ has a non-trivial
|
| 1011 |
+
intersection with span T, suppose x ∈ (span φ(S∗)) ∪ (span φ(T )). Let us show
|
| 1012 |
+
that x is a zero vector. Since x ∈ span S∗, we have x = �
|
| 1013 |
+
s∈S∗ αsφ(s) for some
|
| 1014 |
+
αs ∈ Fp, s ∈ S∗.
|
| 1015 |
+
Let us consider the projections of x on C and L. Since x ∈ span φ(T ) we have
|
| 1016 |
+
that x lies in L and so x |C is the zero vector. Thus x |C= �
|
| 1017 |
+
s∈S∗ αs(φ(s) |C)
|
| 1018 |
+
is the zero vector.
|
| 1019 |
+
Note that by definition, φ(s) |L= a∗ and c∗ · (φ(s) |C) = 1 hold for every s ∈
|
| 1020 |
+
S∗ . Thus over the field Fp we have
|
| 1021 |
+
�
|
| 1022 |
+
s∈S∗
|
| 1023 |
+
αs =
|
| 1024 |
+
�
|
| 1025 |
+
s∈S∗
|
| 1026 |
+
αs(c∗ · (φ(s) |C)) = c∗ ·
|
| 1027 |
+
� �
|
| 1028 |
+
s∈S∗
|
| 1029 |
+
αs(φ(s) |C)
|
| 1030 |
+
�
|
| 1031 |
+
=
|
| 1032 |
+
c∗ · (x |C) = 0 .
|
| 1033 |
+
Now let us consider x |L. We have
|
| 1034 |
+
x |L=
|
| 1035 |
+
�
|
| 1036 |
+
s∈S∗
|
| 1037 |
+
αs(φ(s) |L) =
|
| 1038 |
+
� �
|
| 1039 |
+
s∈S∗
|
| 1040 |
+
αs
|
| 1041 |
+
�
|
| 1042 |
+
a∗ ,
|
| 1043 |
+
where the last expression equals the zero vector since �
|
| 1044 |
+
s∈S∗ αs = 0. Thus we
|
| 1045 |
+
have a vector x ∈ L ⊕ C such that both projections x |L and x |C are the zero
|
| 1046 |
+
vector. Hence, the vector x is the zero vector, finishing the proof.
|
| 1047 |
+
6.2
|
| 1048 |
+
Tree Decompositions
|
| 1049 |
+
Similarly to the approach [HN20] for the matroid secretary problem, we exten-
|
| 1050 |
+
sively use the tree decomposition of matroids. A tree decomposition of bounded
|
| 1051 |
+
thickness allows us to construct non-adaptive mechanisms with good approxi-
|
| 1052 |
+
mation ratios. Before proceeding with these constructions, let us introduce tree
|
| 1053 |
+
decompositions.
|
| 1054 |
+
A tree decomposition of a matroid M = (E, S) is a pair (T, X) where T is
|
| 1055 |
+
a tree and X = {Xv ⊆ E : v ∈ V (T )}, where sets in X form a partition of
|
| 1056 |
+
E. Here, we refer to the vertex and edge sets of the tree T as V (T ) and E(T ),
|
| 1057 |
+
respectively.
|
| 1058 |
+
Given an edge e = {v1, v2} ∈ E(T ) of the tree T , let T1 and T2 be two
|
| 1059 |
+
connected components of T − e, in other word the removal of the edge e from
|
| 1060 |
+
T leads to two connected components T1 and T2. The thickness of the edge
|
| 1061 |
+
e = (v1, v2) is denoted as λ(e) and is defined as follows
|
| 1062 |
+
λ(e) := λM(∪v∈V (T1)Xv) .
|
| 1063 |
+
The thickness of the tree decomposition is the maximum thickness of the edge e
|
| 1064 |
+
in E(T ).
|
| 1065 |
+
Let M be a family of matroids, M be a matroid and (T, X) be a tree decom-
|
| 1066 |
+
position of M. We say that tree decomposition (T, X) is M-tree decomposition
|
| 1067 |
+
21
|
| 1068 |
+
|
| 1069 |
+
if M |clM(Xv)∈ M holds for every v ∈ V (T ). Let tk(M) be a set of matroids
|
| 1070 |
+
which have M-tree decomposition of thickness at most k.
|
| 1071 |
+
Theorem 13. Let Mα,p be the family of matroids which admit α-competitive
|
| 1072 |
+
non-adaptive mechanisms and are representable over the finite field Fp. Then
|
| 1073 |
+
for every natural number k and every matroid M in tk(Mα,p), the matroid M
|
| 1074 |
+
has an (αpk+1)-competitive non-adaptive mechanism.
|
| 1075 |
+
Proof. For a natural number m, let tk,m(Mα,p) be the set of matroids which
|
| 1076 |
+
have an Mα,p-tree decomposition (T, X) of thickness at most k satisfying |V (T )| =
|
| 1077 |
+
m.
|
| 1078 |
+
Let us prove the statement of the lemma by induction on m.
|
| 1079 |
+
The base
|
| 1080 |
+
case follows from the definition of the family Mα,p and the fact that Mα,p =
|
| 1081 |
+
tk,1(Mα,p).
|
| 1082 |
+
Let us now show how to do the inductive step. Let us assume m ≥ 2 and
|
| 1083 |
+
consider a matroid M = (E, S) in tk,m(Mα,p) with its Mα,p-tree decomposition
|
| 1084 |
+
(T, X) of thickness at most k and with |V (T )| = m. Let ℓ be a leaf of the tree T
|
| 1085 |
+
and let u be the neighbour of the vertex ℓ in the tree T .
|
| 1086 |
+
Observe that the tree (V (T ) \ {ℓ}, E(T )\ {ℓu}) together with the subfamily
|
| 1087 |
+
{Xw : w ∈ V (T ) \ {ℓ}} defines an Mα,p-tree decomposition of the matroid
|
| 1088 |
+
M \ Xℓ. Thus the matroid M \ Xℓ is in M ∈ tk,m−1(Mα,p). Hence, by the
|
| 1089 |
+
inductive hypothesis there are thresholds T ′
|
| 1090 |
+
e, e ∈ E \ Xℓ guaranteeing αpk+1-
|
| 1091 |
+
competitiveness of the gambler in comparison to the prophet on the matroid M \
|
| 1092 |
+
Xℓ.
|
| 1093 |
+
Claim 4. There are thresholds T ′′
|
| 1094 |
+
e , e ∈ Xℓ leading to an (α · pk+1)-competitive
|
| 1095 |
+
non-adaptive mechanism for matroid M |Xℓ, such that the gambler always selects
|
| 1096 |
+
a set that is independent in M/Xℓ.
|
| 1097 |
+
Proof. By Lemma 8 there exists a set S ⊆ Xl such that every set independent
|
| 1098 |
+
in M |S is also independent in the matroid M/Xℓ and
|
| 1099 |
+
EPROPHM|S ⩾
|
| 1100 |
+
1
|
| 1101 |
+
pk+1 EPROPHM/Xℓ .
|
| 1102 |
+
By definition of Mα,p and the appearance of Xℓ in the tree decomposition, we
|
| 1103 |
+
have that M |Xℓ is in the family Mα,p. By Lemma 7, since S is a subset of Xℓ
|
| 1104 |
+
the matroid M |S is also in the family Mα,p. Thus, there are thresholds T ′′
|
| 1105 |
+
e ,
|
| 1106 |
+
e ∈ S that lead to an α-competitive non-adaptive mechanism on M |S. The
|
| 1107 |
+
thresholds T ′′
|
| 1108 |
+
e , e ∈ Xℓ \ S can be defined as +∞, finishing the proof of the
|
| 1109 |
+
claim.
|
| 1110 |
+
Now we can define thresholds Te, e ∈ E for all elements of the matroid M
|
| 1111 |
+
as follows
|
| 1112 |
+
Te :=
|
| 1113 |
+
�
|
| 1114 |
+
T ′
|
| 1115 |
+
e
|
| 1116 |
+
if e ̸∈ Xℓ
|
| 1117 |
+
T ′′
|
| 1118 |
+
e
|
| 1119 |
+
otherwise.
|
| 1120 |
+
Let us now demonstrate that such thresholds Te, e ∈ E lead to an (αpk+1)-
|
| 1121 |
+
competitive non-adaptive mechanism for M.
|
| 1122 |
+
22
|
| 1123 |
+
|
| 1124 |
+
First, by the above claim the selected items from Xℓ always form an inde-
|
| 1125 |
+
pendent set in M/Xℓ when used with the thresholds Te, e ∈ Xℓ on the matroid
|
| 1126 |
+
M |Xℓ. Thus the definition of the thresholds guarantees that in expectation the
|
| 1127 |
+
value of selected items from Xℓ is at least EPROPHM|Xℓ/(αpk+1); and in ex-
|
| 1128 |
+
pectation the value of selected items from E\Xℓ is at least EPROPHM\Xℓ/(αpk+1).
|
| 1129 |
+
To finish the proof, note that we have
|
| 1130 |
+
PROPHM|Xℓ + PROPHM\Xℓ ≥ PROPHM
|
| 1131 |
+
and so
|
| 1132 |
+
EPROPHM|Xℓ + EPROPHM\Xℓ ≥ EPROPHM .
|
| 1133 |
+
6.3
|
| 1134 |
+
Regular matroids
|
| 1135 |
+
In this section, we prove Theorem 7. Before we proceed to the proof, let us
|
| 1136 |
+
define key notions related to regular matroids.
|
| 1137 |
+
A subset of the matroid’s ground set is called a circuit, if it is an inclusion-
|
| 1138 |
+
minimal dependent set. A cycle is a subset of the ground set which can be
|
| 1139 |
+
partitioned into a disjoint union of circuits.
|
| 1140 |
+
Let M1 = (E1, S1), M2 = (E2, S2) be two binary matroids. Then the matroid
|
| 1141 |
+
sum M1△M2 has the ground set E1△E2 and the cycles of M1△M2 are all sets
|
| 1142 |
+
of the form C1△C2, where C1 is a cycle for M1 and C2 is a cycle for M2.
|
| 1143 |
+
Definition 3. Consider two binary matroids M1 = (E1, S1), M2 = (E2, S2)
|
| 1144 |
+
and M = M1△M2.
|
| 1145 |
+
1. If |E1 ∩ E2| = 0, and E1 ̸= ∅, E2 ̸= ∅, M is called a 1-sum of M1 and
|
| 1146 |
+
M2.
|
| 1147 |
+
2. If |E1 ∩ E2| = 1, |E1| ≥ 3, |E2| ≥ 3 and E1 ∩ E2 is not a loop of M1 or
|
| 1148 |
+
M2 or their dual matroids, M is called a 2-sum of M1 and M2.
|
| 1149 |
+
3. If |E1 ∩ E2| = 3, |E1| ≥ 7, |E2| ≥ 7 and E1 ∩ E2 is a circuit in both M1
|
| 1150 |
+
and M2, and E1 ∩ E2 does not contain a circuit in their dual matroids,
|
| 1151 |
+
then M is called a 3-sum of M1 and M2.
|
| 1152 |
+
Proof of Theorem 7. By Seymour’s regular matroid decomposition theorem [Sey80],
|
| 1153 |
+
every regular matroid M can be obtained from graphic, cographic or a special
|
| 1154 |
+
matroid R10 through a sequence of 1-sums, 2-sums or 3-sums.
|
| 1155 |
+
This gives a tree decomposition (T, X) of thickness at most 2 so that each M |Xv,
|
| 1156 |
+
v ∈ V (T ) is either a graphic, cographic or a special matroid R10.
|
| 1157 |
+
By performing parallel extensions of the elements to be deleted before each
|
| 1158 |
+
2-sum and 3-sum, we construct a matroid M ′, so that M is a restriction of M ′
|
| 1159 |
+
and M ′ has a tree decomposition (T, X ′) so that each M ′ |clM′ (X′v), v ∈ V (T )
|
| 1160 |
+
is either graphic, cographic or a parallel extension of R10.
|
| 1161 |
+
23
|
| 1162 |
+
|
| 1163 |
+
By Theorem 2, every graphic matroid has a 32-competitive non-adaptive
|
| 1164 |
+
mechanism. By Theorem 5, every cographic matroid has a 6-competitive non-
|
| 1165 |
+
adaptive mechanism. Since matroid R10 has ground set of size 10, by Theorem 1
|
| 1166 |
+
every parallel extension of R10 has a 20-competitive non-adaptive mechanism.
|
| 1167 |
+
Note that by definition every regular matroid is representable over finite
|
| 1168 |
+
field F2. Thus, by Theorem 13 with p = 2, k = 2 and α = 32 there is a 256-
|
| 1169 |
+
competitive non-adaptive mechanism for matroid M ′. Since M is a restriction
|
| 1170 |
+
of M ′, by Lemma 7, there is a 256-competitive non-adaptive mechanism for M,
|
| 1171 |
+
finishing the proof.
|
| 1172 |
+
6.4
|
| 1173 |
+
Minor-closed representable matroid families
|
| 1174 |
+
In this section we show that every minor-clossed subclass of matroids repre-
|
| 1175 |
+
sentable over Fp has a constant-competitive non-adaptive mechanism, where
|
| 1176 |
+
the constant is a function only of p. The proof of this fact is analogous to the
|
| 1177 |
+
proof in [HN20].
|
| 1178 |
+
Theorem 14 (Theorem 4.3 in [Gee11]). Given natural numbers q ⩾ 2 and
|
| 1179 |
+
n ⩾ 1, let M = (E, S) be a matroid with no U2,q+2 or M(Kn) minors. Then
|
| 1180 |
+
we have |E| ≤ qq3nrM(E).
|
| 1181 |
+
Corollary 2. Given natural numbers q ⩾ 2 and n ⩾ 1, let M = (E, S) be a
|
| 1182 |
+
matroid with no U2,q+2 or M(Kn) minors. Then there exists a qq3n-competitive
|
| 1183 |
+
non-adaptive mechanism for M.
|
| 1184 |
+
Proof. If M has no U2,q+2 or M(Kn) minors, then every restriction of M also
|
| 1185 |
+
has no U2,q+2 or M(Kn) minors.
|
| 1186 |
+
Thus for every X ⊆ E we have |X| ⩽
|
| 1187 |
+
qq3nrM(X). So, M is a qq3n-sparse matroid and by Theorem 12 there exists
|
| 1188 |
+
a qq3n-competitive non-adaptive mechanism for M.
|
| 1189 |
+
6.4.1
|
| 1190 |
+
Projections and lifts
|
| 1191 |
+
Let M be a matroid and x be an element of the ground set, which is a not a
|
| 1192 |
+
loop and not a free element of the matroid M. Then M/x is called a projection
|
| 1193 |
+
of M \ x; M \ x is called a lift of M/x. Note that here and later we write M/x
|
| 1194 |
+
and M \ x instead of M/{x} and M \ {x}, repsectively.
|
| 1195 |
+
Let M and N be two matroids with the same ground set. We say that the
|
| 1196 |
+
distance between M and N is t, denoted by dist(M, N) = t if t is the smallest
|
| 1197 |
+
integer such that there exists a sequence of matroids P0, P1, . . . , Pt where
|
| 1198 |
+
P0 = M and Pt = N and for every i ∈ [t] the matroid Pi is either a lift or a
|
| 1199 |
+
projection of Pi−1.
|
| 1200 |
+
Lemma 9. Let N be a lift of the matroid M. If there is an α-competitive non-
|
| 1201 |
+
adaptive mechanism for M then there exists a (2α+2)-competitive non-adaptive
|
| 1202 |
+
mechanism for N.
|
| 1203 |
+
24
|
| 1204 |
+
|
| 1205 |
+
Proof. Since N is a lift of M, there exists a matroid L = (E, S) and an element
|
| 1206 |
+
x of its ground set, such that M = L/x, N = L\x. Here, x is not a loop and
|
| 1207 |
+
not a free element of L.
|
| 1208 |
+
Let P be the set of elements in L that are parallel to x, in other words P :=
|
| 1209 |
+
{x′ ∈ E : x′ ∥ x}. Note that N |P \{x} is a uniform matroid of rank 1. Note also
|
| 1210 |
+
that elements in P \{x} are loops in M and so EPROPHM = EPROPHM\P .
|
| 1211 |
+
Let T ′
|
| 1212 |
+
e, e ∈ E \ {x} be the thresholds imposed by an α-competitive non-
|
| 1213 |
+
adaptive mechanism for the matroid M.
|
| 1214 |
+
Let T ′′
|
| 1215 |
+
e , e ∈ P be the thresholds
|
| 1216 |
+
guaranteeing 2-competitive non-adaptive mechanism as in Theorem 1 for the
|
| 1217 |
+
uniform matroid of rank 1 on the ground set P \{x}; and let T ′′
|
| 1218 |
+
e , e ∈ E\(P ∪{x})
|
| 1219 |
+
be +∞. We select one of these two sets of thresholds for the matroid N as
|
| 1220 |
+
described below. The constructed mechanism for the matroid N selects one
|
| 1221 |
+
of those two sets at random, where first set of thresholds T ′
|
| 1222 |
+
e, e ∈ E \ {x} is
|
| 1223 |
+
selected with probability γ := α/(α + 1) and the second set T ′′
|
| 1224 |
+
e , e ∈ E \ {x}
|
| 1225 |
+
with probability 1 − γ = 1/(α + 1).
|
| 1226 |
+
Next part is dedicated to the analysis of how thresholds T ′
|
| 1227 |
+
e, e ∈ E \ {x}
|
| 1228 |
+
perform on the matroid N.
|
| 1229 |
+
Note, that these thresholds are coming from a
|
| 1230 |
+
mechanism for the matroid M, while they are used for the matroid N with
|
| 1231 |
+
probability γ. We show that the total expected value achieved by thresholds
|
| 1232 |
+
T ′
|
| 1233 |
+
e, e ∈ E \ {x} on N is at least the total expected value achieved by these
|
| 1234 |
+
thresholds on M. For this we can assume that for every realization of item
|
| 1235 |
+
values, the orders of items in matroid N and M are the same. To see that
|
| 1236 |
+
this assumption is valid, we can assume that the order for N is chosen in an
|
| 1237 |
+
adversarial way and is used also as the items order for M.
|
| 1238 |
+
Claim 5. Let us assume that the items order for M and N is the same for
|
| 1239 |
+
a given realization of item values. Let us also assume that for every item e ∈
|
| 1240 |
+
E \ {x} the threshold T ′
|
| 1241 |
+
e is used. Then the gambler with matroid N selects all
|
| 1242 |
+
items that the gambler with matroid M selects.
|
| 1243 |
+
Proof. We fix the item values realization and items order. Let e1, e2,. . . , ek be
|
| 1244 |
+
the items with their values being at least their threshold and with the corre-
|
| 1245 |
+
sponding order.
|
| 1246 |
+
Now we need to show that if the gambler with matroid N selects items
|
| 1247 |
+
greedily from e1, e2,. . . , ek starting from e1, then the set of selected items is a
|
| 1248 |
+
superset of the items greedily selected by the gambler with matroid M. If both
|
| 1249 |
+
gamblers end up selecting exactly the same set of items, then proof of the claim
|
| 1250 |
+
is complete. Otherwise consider the first index i ∈ [k] such that the item ei is
|
| 1251 |
+
selected by exactly one of the two gamblers. Since N = L\x and M = L/x we
|
| 1252 |
+
have that it is only possible if ei is selected by the gambler with the matroid N
|
| 1253 |
+
and rejected by the gambler with the matroid M.
|
| 1254 |
+
Now we claim that every subsequent item, in other words an item in ei+1, . . . ,
|
| 1255 |
+
ek, is either selected by both gamblers or rejected by both gamblers. Suppose
|
| 1256 |
+
the contrary and consider the first item ej, i + 1 ≤ j ≤ k that is selected by
|
| 1257 |
+
one gambler and rejected by another gambler. Let S := {e1, e2, . . . , ej−1} and
|
| 1258 |
+
let T be the set of items selected by the gambler with M from the set S. Thus
|
| 1259 |
+
25
|
| 1260 |
+
|
| 1261 |
+
the gambler with N selected T ∪ {ei} from the set S. So T ∪ {ei} is a basis of
|
| 1262 |
+
(L\x) |S and T is a basis of (L/x) |S. Thus, both T ∪{ei} and T ∪{x} are bases
|
| 1263 |
+
of L |S. If only one of the two gamblers accepts the item sj then the matroid
|
| 1264 |
+
L |S∪{sj} has two bases of different cardinality, attaining a contradiction and
|
| 1265 |
+
finishing the proof.
|
| 1266 |
+
Thus we have that the thresholds T ′
|
| 1267 |
+
e, e ∈ E\{x} guarantee at least EPROPHM
|
| 1268 |
+
as the expected total value of the gambler with N. To prove that the constructed
|
| 1269 |
+
mechanism is 1/(2α + 2)-competitive it is enough to show the following claim.
|
| 1270 |
+
Note that in our construction we used α-competitive non-adaptive mechanism
|
| 1271 |
+
for the matroid M and 2-competitive non-adaptive mechanism for the uniform
|
| 1272 |
+
matroid of rank 1 on P \ {x}.
|
| 1273 |
+
Claim 6. γ 1
|
| 1274 |
+
αEPROPHM + (1 − γ) 1
|
| 1275 |
+
2EPROPHP \{x} ⩾
|
| 1276 |
+
1
|
| 1277 |
+
2α+2EPROPHN
|
| 1278 |
+
Proof. Let us consider the inclusion-maximal set Iopt on which the prophet
|
| 1279 |
+
achieves PROPHN. Let Copt be a random variable corresponding to the unique
|
| 1280 |
+
circuit of Iopt ∪ {x} in L. Recall that x is not a free element of L so such a
|
| 1281 |
+
circuit exists and is unique and contains x.
|
| 1282 |
+
First consider the events when |Copt| ⩾ 3.
|
| 1283 |
+
Note that by definition of a
|
| 1284 |
+
circuit, for every y ∈ Copt \ {x} the set (Iopt ∪ {x}) \ {y} is independent in
|
| 1285 |
+
L. Hence, for every y ∈ Copt \ {x} the set Iopt \ {y} is independent in M. So
|
| 1286 |
+
we have that conditioned on |Copt| ⩾ 3 we have PROPHM ≥ w(Iopt \ {y})
|
| 1287 |
+
for every y ∈ Copt \ {x}.
|
| 1288 |
+
Let yopt be the random variable representing the
|
| 1289 |
+
element in Copt \{x} of smallest value. Then conditioned on |Copt| ⩾ 3, we have
|
| 1290 |
+
w(Copt \ {yopt, x}) ≥ w(C \ {x})/2. Thus, conditioned on |Copt| ⩾ 3 we have
|
| 1291 |
+
PROPHM ⩾ w(Iopt \ {yopt}) = w(Iopt \ Copt) + w(Copt \ {yopt})
|
| 1292 |
+
≥ w(Iopt \ Copt) + 1
|
| 1293 |
+
2w(Copt \ {x}) ≥ 1
|
| 1294 |
+
2w(Iopt) = 1
|
| 1295 |
+
2PROPHN .
|
| 1296 |
+
Second consider the event that |Copt| < 3. Since x is not a loop of L by
|
| 1297 |
+
definition, we have |Copt| = 2 and so Copt = {x, xopt} for some random variable
|
| 1298 |
+
element xopt ∈ P \{x}. For the event |Copt| ≥ 3 let us define the random variable
|
| 1299 |
+
element xopt to be an arbitrary element in Copt \ {x}. Thus, if |Copt| < 3 we
|
| 1300 |
+
have PROPHP \{x} ≥ w(xopt). Now let us define Jopt := Iopt \ {xopt} and note
|
| 1301 |
+
that Jopt is independent in the matroid M. Moreover, since Iopt is the set on
|
| 1302 |
+
which the prophet achieves PROPHN, we have that conditioned on |Copt| < 3
|
| 1303 |
+
the prophet achieves PROPHM on the set Jopt.
|
| 1304 |
+
Combining everything together we have
|
| 1305 |
+
γ 1
|
| 1306 |
+
αEPROPHM + (1 − γ)1
|
| 1307 |
+
2EPROPHP \{x} =
|
| 1308 |
+
1
|
| 1309 |
+
α + 1EPROPHM +
|
| 1310 |
+
1
|
| 1311 |
+
2α + 2EPROPHP \{x} ≥
|
| 1312 |
+
E
|
| 1313 |
+
�w(xopt)
|
| 1314 |
+
2α + 2 + PROPHM
|
| 1315 |
+
α + 1
|
| 1316 |
+
���� |Copt| < 3
|
| 1317 |
+
�
|
| 1318 |
+
P [|Copt| < 3]
|
| 1319 |
+
26
|
| 1320 |
+
|
| 1321 |
+
+ E
|
| 1322 |
+
�PROPHM
|
| 1323 |
+
α + 1
|
| 1324 |
+
���� |Copt| ⩾ 3
|
| 1325 |
+
�
|
| 1326 |
+
P [|Copt| ⩾ 3] =
|
| 1327 |
+
E
|
| 1328 |
+
�w(xopt)
|
| 1329 |
+
2α + 2 + w(Iopt \ {xopt})
|
| 1330 |
+
α + 1
|
| 1331 |
+
���� |Copt| < 3
|
| 1332 |
+
�
|
| 1333 |
+
P [|Copt| < 3]
|
| 1334 |
+
+ E
|
| 1335 |
+
�PROPHM
|
| 1336 |
+
α + 1
|
| 1337 |
+
���� |Copt| ⩾ 3
|
| 1338 |
+
�
|
| 1339 |
+
P [|Copt| ⩾ 3] ≥
|
| 1340 |
+
E
|
| 1341 |
+
�PROPHN
|
| 1342 |
+
2α + 2
|
| 1343 |
+
���� |Copt| < 3
|
| 1344 |
+
�
|
| 1345 |
+
P [|Copt| < 3]
|
| 1346 |
+
+ E
|
| 1347 |
+
�PROPHM
|
| 1348 |
+
α + 1
|
| 1349 |
+
���� |Copt| ⩾ 3
|
| 1350 |
+
�
|
| 1351 |
+
P [|Copt| ⩾ 3] ≥
|
| 1352 |
+
1
|
| 1353 |
+
2α + 2EPROPHN .
|
| 1354 |
+
Lemma 10. Let N be a matroid obtained from a matroid M by a sequence of
|
| 1355 |
+
t projections. Let L be the set of loops in the matroid N. Let there exist an
|
| 1356 |
+
α-competitive non-adaptive mechanism for the matroid M. Then there exists
|
| 1357 |
+
a non-adaptive mechanism for N\L such that the expected total value of this
|
| 1358 |
+
mechanism is at least
|
| 1359 |
+
1
|
| 1360 |
+
α·3t EPROPHM\L.
|
| 1361 |
+
In the context of Lemma 10, every set that is independent for the matroid N\
|
| 1362 |
+
L is also independent for the matroid M \ L. Hence, we have EPROPHM\L ≥
|
| 1363 |
+
EPROPHN\L. Thus in case t = 1, Lemma 10 leads us to the following corol-
|
| 1364 |
+
lary.
|
| 1365 |
+
Corollary 3. Let N be a projection of the matroid M.
|
| 1366 |
+
If there is an α-
|
| 1367 |
+
competitive non-adaptive mechanism for M then there exists a 3α-competitive
|
| 1368 |
+
non-adaptive mechanism for N.
|
| 1369 |
+
Proof of Lemma 10. Let us prove the statement by induction.
|
| 1370 |
+
Of course, in
|
| 1371 |
+
case t = 0 we have M = N and the statement is trivially true.
|
| 1372 |
+
Let us now assume that t is at least 1. Let N ′ be a matroid such that N ′
|
| 1373 |
+
is obtained from the matroid M by a sequence of t − 1 projections and N is a
|
| 1374 |
+
projection of N ′. Since N is a projection of N ′ there is a matroid P = (E, S)
|
| 1375 |
+
and x ∈ E such that P \ x = N ′ and P/x = N. Let L′ be the set of loops in
|
| 1376 |
+
the matroid N ′.
|
| 1377 |
+
By induction hypothesis, there exist thresholds T ′
|
| 1378 |
+
e, e ∈ E \ (L′ ∪ {x}) such
|
| 1379 |
+
that the gambler with the matroid N ′\L′ achieves at least
|
| 1380 |
+
1
|
| 1381 |
+
α·3t−1 EPROPHM\L′
|
| 1382 |
+
as the expected total value.
|
| 1383 |
+
Let us assume that to compute thresholds T ′
|
| 1384 |
+
e,
|
| 1385 |
+
e ∈ E \(L′ ∪{x}) the values of items in L were set to be 0 while the distribution
|
| 1386 |
+
of values for other items remain the same. Since L′ ⊆ L, analogously to Lemma 7
|
| 1387 |
+
we can define thresholds
|
| 1388 |
+
T ′′
|
| 1389 |
+
e :=
|
| 1390 |
+
�
|
| 1391 |
+
+∞
|
| 1392 |
+
if e ∈ L
|
| 1393 |
+
T ′
|
| 1394 |
+
e
|
| 1395 |
+
otherwise
|
| 1396 |
+
27
|
| 1397 |
+
|
| 1398 |
+
such that the gambler with the matroid N ′\L achieves at least
|
| 1399 |
+
1
|
| 1400 |
+
α·3t−1 EPROPHM\L
|
| 1401 |
+
as the expected total value. Let T ′′′
|
| 1402 |
+
e , e ∈ E \(L∪{x}) be the thresholds guaran-
|
| 1403 |
+
teeing 2-competitive non-adaptive mechanism as in Theorem 1 for the uniform
|
| 1404 |
+
matroid of rank 1 on the ground set E \ (L ∪ {x}).
|
| 1405 |
+
The constructed mechanism for the matroid N\L selects one of two threshohold
|
| 1406 |
+
sets at random, where first set of thresholds T ′′
|
| 1407 |
+
e , e ∈ E \ (L ∪ {x}) is selected
|
| 1408 |
+
with probability 1/3 and the thresholds T ′′′
|
| 1409 |
+
e , e ∈ E \ (L ∪ {x}) with probability
|
| 1410 |
+
2/3. Note that the thresholds T ′′
|
| 1411 |
+
e , e ∈ E \ (L ∪ {x}) were designed for the
|
| 1412 |
+
matroid N ′ \ L but are used for the matroid N \ L; hence less items might be
|
| 1413 |
+
selected than when it is used for N ′ \ L. Also note, that the thresholds T ′′′
|
| 1414 |
+
e ,
|
| 1415 |
+
e ∈ E \ (L ∪ {x}) are used for N \ L but were designed for the uniform matroid
|
| 1416 |
+
of rank 1.
|
| 1417 |
+
For the analysis, let Ialg be the random variable indicating the items set
|
| 1418 |
+
selected by the gambler with matroid N ′ \ L when the thresholds T ′′
|
| 1419 |
+
e , e ∈
|
| 1420 |
+
E \ (L ∪ {x}) are used. Analogously to a claim in the proof of Lemma 9, we can
|
| 1421 |
+
assume that when the thresholds T ′′
|
| 1422 |
+
e , e ∈ E\(L∪{x}) are used the gambler with
|
| 1423 |
+
N \L select all items in Ialg with an exception for possibly one item. Let xopt be
|
| 1424 |
+
the random variable indicating the element of maximum value in E \ (L ∪ {x}).
|
| 1425 |
+
To finish the proof it is enough to show the following inequality
|
| 1426 |
+
1
|
| 1427 |
+
3E[w(Ialg) − w(xopt)] + 2
|
| 1428 |
+
3
|
| 1429 |
+
1
|
| 1430 |
+
2E[w(xopt)] ≥
|
| 1431 |
+
1
|
| 1432 |
+
α · 3t EPROPHM\L .
|
| 1433 |
+
To obtain this inequality we can do estimations as follows
|
| 1434 |
+
1
|
| 1435 |
+
3E[w(Ialg)−w(xopt)]+2
|
| 1436 |
+
3
|
| 1437 |
+
1
|
| 1438 |
+
2E[w(xopt)] = 1
|
| 1439 |
+
3E[w(Ialg)] ≥ 1
|
| 1440 |
+
3
|
| 1441 |
+
1
|
| 1442 |
+
α · 3t−1 EPROPHM\L .
|
| 1443 |
+
Now let us combine Corollary 3 and Lemma 9.
|
| 1444 |
+
Lemma 11. Let M and N be matroids such that dist(M, N) ≤ t. If there exists
|
| 1445 |
+
an α-competitive non-adaptive mechanism for the matroid M with α ≥ 2 then
|
| 1446 |
+
there exists a 3tα-competitive non-adaptive mechanism for the matroid N.
|
| 1447 |
+
Proof. Note that for α ≥ 2 we have 3α ≥ 2α + 2. Since N can be obtained
|
| 1448 |
+
from M by a sequence of t projection and lift steps, we can use Corollary 3 or
|
| 1449 |
+
Lemma 9 for each of these steps to obtain the desired competitiveness ratio.
|
| 1450 |
+
6.4.2
|
| 1451 |
+
Minor-closed families theorem
|
| 1452 |
+
Lemma 12 (Lemma 6 in [HN20]). Let p and n be integers such that p ⩽ n − 2
|
| 1453 |
+
and p is prime. The matroid U2,n is not representable over the field Fp.
|
| 1454 |
+
The following Structural Hypothesis is due to Geelen, Gerards and Whittle.
|
| 1455 |
+
The proof of this Structural Hypothesis has not appeared in print.
|
| 1456 |
+
28
|
| 1457 |
+
|
| 1458 |
+
Hypothesis 1. Let p be a prime number and M is a proper minor-closed class
|
| 1459 |
+
of matroids representable over Fp.
|
| 1460 |
+
Then there exist k, n, t such that every M ∈ M is a restriction of an Fp-
|
| 1461 |
+
representable matroid M ′ having a full tree-decomposition (T, X) of thickness at
|
| 1462 |
+
most k so that for every v ∈ V (T ) if M ′ |clM′(Xv) has a M(Kn) minor, then
|
| 1463 |
+
there exists a 2-column sparse matroid N with dist(M ′ |clM′ (Xv), N) ⩽ t.
|
| 1464 |
+
Proof of Theorem 8. Let k, n, t are as stated in the Structural Hypothesis 1 on
|
| 1465 |
+
M.
|
| 1466 |
+
Let M1 be the set of matroids on distance t or less from some 2-column
|
| 1467 |
+
sparse matroid and are representable over Fp.
|
| 1468 |
+
By Theorem 4 all 2-column
|
| 1469 |
+
sparse matroids have a 32-competitive non-adaptive mechanism. By Lemma 11
|
| 1470 |
+
there exists a (3t · 32)-competitive mechanism for matroids in M1.
|
| 1471 |
+
Let M2 be the set of matroids without M(Kn) minor and are representable
|
| 1472 |
+
over Fp. By Lemma 12 all matroids in M2 do not have U2,p+2 as a minor.
|
| 1473 |
+
Then by Corollary 2, we have that there is a pp3n-competitive non-adaptive
|
| 1474 |
+
mechanism for every matroid in M2.
|
| 1475 |
+
By the Structural Hypothesis 1 we have that every M ∈ M is a restriction
|
| 1476 |
+
of some M ′ with a full tree-decomposition (T, X) of thickness at most k so that
|
| 1477 |
+
for every v ∈ V (T ) M ′ |clM′ (Xv)∈ M1 ∪ M2.
|
| 1478 |
+
Thus by Theorem 13, matroid M ′ has a γ := (max(3t · 32, pp3n) · pk+1)-
|
| 1479 |
+
competitive non-adaptive mechanism. By Lemma 7 the matroid M has also a
|
| 1480 |
+
γ-competitive non-adaptive mechanism.
|
| 1481 |
+
29
|
| 1482 |
+
|
| 1483 |
+
References
|
| 1484 |
+
[AKW19]
|
| 1485 |
+
Pablo D. Azar, Robert Kleinberg, and S. Matthew Weinberg. Prior
|
| 1486 |
+
independent mechanisms via prophet inequalities with limited in-
|
| 1487 |
+
formation. Games and Economic Behavior, 118:511–532, 2019.
|
| 1488 |
+
[CFPP21]
|
| 1489 |
+
Constantine Caramanis, Matthew Faw, Orestis Papadigenopoulos,
|
| 1490 |
+
and Emmanouil Pountourakis. Single-sample prophet inequalities
|
| 1491 |
+
revisited. ArXiv, abs/2103.13089, 2021.
|
| 1492 |
+
[CGKM20] Shuchi Chawla, Kira Goldner, Anna R Karlin, and J Benjamin
|
| 1493 |
+
Miller. Non-adaptive matroid prophet inequalities. arXiv preprint
|
| 1494 |
+
arXiv:2011.09406, 2020.
|
| 1495 |
+
[CHMS10] Shuchi Chawla, Jason D Hartline, David L Malec, and Balasubra-
|
| 1496 |
+
manian Sivan. Multi-parameter mechanism design and sequential
|
| 1497 |
+
posted pricing. In Proceedings of the forty-second ACM symposium
|
| 1498 |
+
on Theory of computing, pages 311–320, 2010.
|
| 1499 |
+
[DK14]
|
| 1500 |
+
Michael Dinitz and Guy Kortsarz. Matroid secretary for regular and
|
| 1501 |
+
decomposable matroids. SIAM Journal on Computing, 43(5):1807–
|
| 1502 |
+
1830, 2014.
|
| 1503 |
+
[DK15]
|
| 1504 |
+
Paul Dütting and Robert Kleinberg. Polymatroid prophet inequal-
|
| 1505 |
+
ities. In Algorithms-ESA 2015, pages 437–449. Springer, 2015.
|
| 1506 |
+
[Edm65]
|
| 1507 |
+
Jack Edmonds. Minimum partition of a matroid into independent
|
| 1508 |
+
subsets. J. Res. Nat. Bur. Standards Sect. B, 69:67–72, 1965.
|
| 1509 |
+
[FSZ16]
|
| 1510 |
+
Moran Feldman, Ola Svensson, and Rico Zenklusen. Online con-
|
| 1511 |
+
tention resolution schemes.
|
| 1512 |
+
In Proceedings of the twenty-seventh
|
| 1513 |
+
annual ACM-SIAM symposium on Discrete algorithms, pages 1014–
|
| 1514 |
+
1033. SIAM, 2016.
|
| 1515 |
+
[FSZ21]
|
| 1516 |
+
Moran Feldman, Ola Svensson, and Rico Zenklusen. Online con-
|
| 1517 |
+
tention resolution schemes with applications to bayesian selection
|
| 1518 |
+
problems. SIAM Journal on Computing, 50(2):255–300, 2021.
|
| 1519 |
+
[Gee11]
|
| 1520 |
+
Jim Geelen.
|
| 1521 |
+
Small cocircuits in matroids.
|
| 1522 |
+
European Journal of
|
| 1523 |
+
Combinatorics, 32(6):795–801, 2011.
|
| 1524 |
+
[GW19]
|
| 1525 |
+
Nikolai Gravin and Hongao Wang. Prophet inequality for bipartite
|
| 1526 |
+
matching: Merits of being simple and non adaptive. In Proceedings
|
| 1527 |
+
of the 2019 ACM Conference on Economics and Computation, pages
|
| 1528 |
+
93–109, 2019.
|
| 1529 |
+
[HN20]
|
| 1530 |
+
Tony Huynh and Peter Nelson.
|
| 1531 |
+
The matroid secretary problem
|
| 1532 |
+
for minor-closed classes and random matroids. SIAM Journal on
|
| 1533 |
+
Discrete Mathematics, 34(1):163–176, 2020.
|
| 1534 |
+
30
|
| 1535 |
+
|
| 1536 |
+
[KS77]
|
| 1537 |
+
Ulrich Krengel and Louis Sucheston.
|
| 1538 |
+
Semiamarts and finite val-
|
| 1539 |
+
ues. Bulletin of the American Mathematical Society, 83(4):745–747,
|
| 1540 |
+
1977.
|
| 1541 |
+
[KW12]
|
| 1542 |
+
Robert Kleinberg and Seth Matthew Weinberg. Matroid prophet
|
| 1543 |
+
inequalities. In Proceedings of the forty-fourth annual ACM sympo-
|
| 1544 |
+
sium on Theory of computing, pages 123–136, 2012.
|
| 1545 |
+
[MTW16]
|
| 1546 |
+
Tengyu Ma, Bo Tang, and Yajun Wang. The simulated greedy algo-
|
| 1547 |
+
rithm for several submodular matroid secretary problems. Theory
|
| 1548 |
+
of Computing Systems, 58(4):681–706, 2016.
|
| 1549 |
+
[Mye81]
|
| 1550 |
+
Roger B Myerson. Optimal auction design. Mathematics of opera-
|
| 1551 |
+
tions research, 6(1):58–73, 1981.
|
| 1552 |
+
[Oxl06]
|
| 1553 |
+
James G. Oxley. Matroid Theory. Oxford graduate texts in mathe-
|
| 1554 |
+
matics. Oxford University Press, 2006.
|
| 1555 |
+
[SC84]
|
| 1556 |
+
Ester Samuel-Cahn. Comparison of threshold stop rules and maxi-
|
| 1557 |
+
mum for independent nonnegative random variables. the Annals of
|
| 1558 |
+
Probability, pages 1213–1216, 1984.
|
| 1559 |
+
[Sch03]
|
| 1560 |
+
A. Schrijver.
|
| 1561 |
+
Combinatorial Optimization:
|
| 1562 |
+
Polyhedra and Effi-
|
| 1563 |
+
ciency. Number Bd. 1 in Algorithms and Combinatorics. Springer,
|
| 1564 |
+
2003.
|
| 1565 |
+
[Sey80]
|
| 1566 |
+
Paul D Seymour. Decomposition of regular matroids. Journal of
|
| 1567 |
+
combinatorial theory, Series B, 28(3):305–359, 1980.
|
| 1568 |
+
[Sot13]
|
| 1569 |
+
José A Soto. Matroid secretary problem in the random-assignment
|
| 1570 |
+
model. SIAM Journal on Computing, 42(1):178–211, 2013.
|
| 1571 |
+
31
|
| 1572 |
+
|
5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1b578983b5d04843cefafc656ac55156b252ba7b6e555eedc94dc7f2c7a8061d
|
| 3 |
+
size 4197471
|
6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1cbb132d84aa07ce0e4235d50bd04b5ee7c75fa79e33b06241f3eecceaff7d40
|
| 3 |
+
size 7864365
|
7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8d097e678466f9dea9040b7488dfe778d37eff1a909b32a3fde95a0afc52484d
|
| 3 |
+
size 199998
|
7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:38e9e8b08c5814bc3e9f06311b3dd272507fd8895f01f268e948859686fc7917
|
| 3 |
+
size 2752557
|
7tE1T4oBgHgl3EQf7QXS/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:08ffd57712673db789a6ec07fa30fca884a204ce3071e9539c6a10a384ffcf86
|
| 3 |
+
size 94285
|
7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:34369c63ddb1c9de9bf2c2aeba94a4917e766800b2f4e91883b4e152d94656af
|
| 3 |
+
size 12976173
|
89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:844441ab6d789bf4e735856923103939250577b0123f9109d5234065491ce52f
|
| 3 |
+
size 448607
|
89E5T4oBgHgl3EQfQw7M/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:045592dc5c9c9a92983f712b7f7400e63b8a2a7479787a87b0bbf5291981e472
|
| 3 |
+
size 197763
|
8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/2301.03535v1.pdf.txt
ADDED
|
@@ -0,0 +1,788 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
1
|
| 2 |
+
RISs and Sidelink Communications in Smart Cities:
|
| 3 |
+
The Key to Seamless Localization and Sensing
|
| 4 |
+
Hui Chen, Member, IEEE, Hyowon Kim, Member, IEEE, Mustafa Ammous, Student Member, IEEE,
|
| 5 |
+
Gonzalo Seco-Granados, Senior Member, IEEE, George C. Alexandropoulos, Senior Member, IEEE,
|
| 6 |
+
Shahrokh Valaee, Fellow, IEEE, and Henk Wymeersch, Senior Member, IEEE
|
| 7 |
+
Abstract—A smart city involves, among other elements, intelli-
|
| 8 |
+
gent transportation, crowd monitoring, and digital twins, each of
|
| 9 |
+
which requires information exchange via wireless communication
|
| 10 |
+
links and localization of connected devices and passive objects
|
| 11 |
+
(including people). Although localization and sensing (L&S) are
|
| 12 |
+
envisioned as core functions of future communication systems,
|
| 13 |
+
they have inherently different demands in terms of infrastructure
|
| 14 |
+
compared to communications. Wireless communications gener-
|
| 15 |
+
ally requires a connection to only a single access point (AP),
|
| 16 |
+
while L&S demand simultaneous line-of-sight propagation paths
|
| 17 |
+
to several APs, which serve as location and orientation anchors.
|
| 18 |
+
Hence, a smart city deployment optimized for communication
|
| 19 |
+
will be insufficient to meet stringent L&S requirements. In this
|
| 20 |
+
article, we argue that the emerging technologies of reconfigurable
|
| 21 |
+
intelligent surfaces (RISs) and sidelink communications constitute
|
| 22 |
+
the key to providing ubiquitous coverage for L&S in smart cities
|
| 23 |
+
with low-cost and energy-efficient technical solutions. To this end,
|
| 24 |
+
we propose and evaluate AP-coordinated and self-coordinated
|
| 25 |
+
RIS-enabled L&S architectures and detail three groups of appli-
|
| 26 |
+
cation scenarios, relying on low-complexity beacons, cooperative
|
| 27 |
+
localization, and full-duplex transceivers. A list of practical issues
|
| 28 |
+
and consequent open research challenges of the proposed L&S
|
| 29 |
+
systems is also provided.
|
| 30 |
+
Index Terms—Smart cities, reconfigurable intelligent surfaces,
|
| 31 |
+
localization, sensing, sidelink communication.
|
| 32 |
+
I. INTRODUCTION
|
| 33 |
+
The emerging concept of smart cities aims to improve ac-
|
| 34 |
+
cessibility to public services, advance digitization of the urban
|
| 35 |
+
environment, and monitor various human-oriented processes
|
| 36 |
+
as well as assets, by harmonizing diverse digital technologies
|
| 37 |
+
at a city level [1]. This broad concept integrates various
|
| 38 |
+
independent applications to bring improvements both at the
|
| 39 |
+
societal level (such as smart homes, smart transportation, sup-
|
| 40 |
+
ply chains, and environment monitoring), and at the individual
|
| 41 |
+
level (such as indoor navigation and extended reality (XR)). To
|
| 42 |
+
realize the concept of smart cities, reliable, low-latency, and
|
| 43 |
+
high-speed communication systems (to support information
|
| 44 |
+
exchange and management among interconnected devices), as
|
| 45 |
+
well as accurate localization and sensing (L&S) (to support
|
| 46 |
+
communication and provide situation-awareness services), are
|
| 47 |
+
of great importance. In this article, we use the term localization
|
| 48 |
+
to indicate the position (and possibly orientation) estimation of
|
| 49 |
+
a target user equipment (UE), and the term sensing to specify
|
| 50 |
+
the position estimation of passive objects (i.e., objects without
|
| 51 |
+
networking infrastructure or non-cooperating ones).
|
| 52 |
+
By exploiting the large antenna array sizes and wide
|
| 53 |
+
bandwidth of millimeter-wave/THz systems, recent research
|
| 54 |
+
activities in industry and academia on integrated sensing,
|
| 55 |
+
localization, and communication (ISLAC) are growing. ISLAC
|
| 56 |
+
is able to utilize communication infrastructures and signals
|
| 57 |
+
to enable synergies with L&S for diverse applications. To
|
| 58 |
+
this end, several standardization efforts and 3GPP activities
|
| 59 |
+
have been recently studied, such as the definition of new
|
| 60 |
+
radio positioning requirements, evaluation methodologies, and
|
| 61 |
+
techniques (dependent on radio access technology and not), in
|
| 62 |
+
TR 38.855 [2] as well as the development of Wi-Fi sensing
|
| 63 |
+
technology (in both sub-7 GHz and mmWave spectrum), in
|
| 64 |
+
the IEEE 802.11bf standard [3].
|
| 65 |
+
While high angular and delay resolution (due to large
|
| 66 |
+
arrays and wide signal bandwidths) facilitate L&S tasks,
|
| 67 |
+
signal coverage is one of the major challenges, especially
|
| 68 |
+
for high-frequency systems which suffer from high path loss
|
| 69 |
+
and high blockage probability. In contrast to communications,
|
| 70 |
+
which is possible to work with only one point-to-point link,
|
| 71 |
+
L&S functions necessitate access to multiple access points
|
| 72 |
+
(APs). Reflective reconfigurable intelligent surfaces (RISs)
|
| 73 |
+
constitute a promising emerging technology for extending
|
| 74 |
+
coverage and dynamically programming signal propagation
|
| 75 |
+
with almost zero-energy consumption [4], thus, supporting,
|
| 76 |
+
or even enabling in certain cases, wireless communications,
|
| 77 |
+
as well as L&S tasks in various scenarios [5]. However, since
|
| 78 |
+
they are incapable of generating their own signals and only
|
| 79 |
+
modify the analog waveforms impinging on them, separate
|
| 80 |
+
signal generation sources are needed.
|
| 81 |
+
The sources generating signals for RIS-assisted L&S can
|
| 82 |
+
be: i) APs with full communication capabilities, ii) low-
|
| 83 |
+
complexity beacons that broadcast or receive L&S reference
|
| 84 |
+
signals; or iii) the UEs themselves that are involved in the
|
| 85 |
+
L&S tasks. The latter two cases are particularly relevant when
|
| 86 |
+
power-hungry APs, whose deployment is usually costly, needs
|
| 87 |
+
to be avoided. To fulfill the ubiquitous L&S requirements in
|
| 88 |
+
out-of-coverage areas or partially-covered ones (e.g., indoor
|
| 89 |
+
UEs and vehicles in tunnels), sidelink communications via
|
| 90 |
+
the PC5 interface can be particularly useful [6], as mentioned
|
| 91 |
+
in the 3GPP TR 38.845 report [7]. In addition, cooperative
|
| 92 |
+
localization between several UEs can be employed to enhance
|
| 93 |
+
or enable L&S. Furthermore, when a UE is equipped with
|
| 94 |
+
a full-duplex transceiver [8] —a technology that is widely
|
| 95 |
+
discussed in ISLAC for sensing purposes—, it can both
|
| 96 |
+
simultaneously transmit and receive the signal to localize itself
|
| 97 |
+
with a single RIS anchor.
|
| 98 |
+
In this article, we argue that RIS technology in conjunction
|
| 99 |
+
with sidelink communications can provide seamless L&S so-
|
| 100 |
+
lutions, speeding up the intelligent transformation of cities into
|
| 101 |
+
arXiv:2301.03535v1 [eess.SP] 9 Jan 2023
|
| 102 |
+
|
| 103 |
+
2
|
| 104 |
+
Beacon-Assisted Localization
|
| 105 |
+
Beacon
|
| 106 |
+
Self-L&S with
|
| 107 |
+
a Full-Duplex
|
| 108 |
+
Transceiver
|
| 109 |
+
Beacon-UE Channel
|
| 110 |
+
RIS Anchor Channel
|
| 111 |
+
RIS Localization Channel
|
| 112 |
+
Sidelink Channel
|
| 113 |
+
Sensing Channel
|
| 114 |
+
Scenarios
|
| 115 |
+
Cooperative Localization
|
| 116 |
+
RIS
|
| 117 |
+
A2
|
| 118 |
+
A1
|
| 119 |
+
B1
|
| 120 |
+
B2
|
| 121 |
+
C1
|
| 122 |
+
C2
|
| 123 |
+
C3
|
| 124 |
+
RIS-attached
|
| 125 |
+
Vehicle
|
| 126 |
+
AP
|
| 127 |
+
A3
|
| 128 |
+
B3
|
| 129 |
+
Figure elements by macrovector on Freepik
|
| 130 |
+
Fig. 1. RIS-enabled seamless L&S scenarios in smart cities: a) beacon-assisted localization, b) cooperative localization, and c) self-L&S with a full-duplex
|
| 131 |
+
transceiver.
|
| 132 |
+
smart entities. We particularly elaborate on the representative
|
| 133 |
+
RIS-enabled L&S scenarios illustrated in Figure 1: beacon-
|
| 134 |
+
assisted localization, cooperative localization, and self-L&S
|
| 135 |
+
with a full-duplex transceiver, describing both AP-coordinated
|
| 136 |
+
and AP-free architectures for different coverage scenarios. We
|
| 137 |
+
discuss the open challenges with the proposed green (low-
|
| 138 |
+
cost and energy-efficient) L&S systems in smart cities and list
|
| 139 |
+
potential directions for future research.
|
| 140 |
+
II. L&S ARCHITECTURES AND PROTOCOLS
|
| 141 |
+
In this section, we describe the different entity types of the
|
| 142 |
+
proposed L&S system for smart cities, relying on RISs and
|
| 143 |
+
sidelink communications, as well as its enabling architectures,
|
| 144 |
+
depending on whether an AP is present for L&S coordination.
|
| 145 |
+
A. Entity Types and Overall Architecture
|
| 146 |
+
In the proposed RIS-enabled L&S system, there are several
|
| 147 |
+
types of entities: APs, beacons, RISs, and UEs, as shown in
|
| 148 |
+
Figure 2. The APs (e.g., a gNB macro base station) provide
|
| 149 |
+
cellular services to the devices in coverage. A beacon could be
|
| 150 |
+
a roadside unit (RSU) that is capable of sending and receiving
|
| 151 |
+
L&S reference signals via sidelink communications. In this
|
| 152 |
+
way, the explicit involvement of expensive and power-hungry
|
| 153 |
+
APs with full communication protocols is not needed for L&S
|
| 154 |
+
purposes. RISs serve as reference anchors to assist ISLAC
|
| 155 |
+
tasks, and are controlled by a dedicated entity responsible
|
| 156 |
+
for realizing communication functions. Finally, UEs may have
|
| 157 |
+
different hardware capabilities (e.g., single/multiple antennas,
|
| 158 |
+
half-/full-duplex) that play different roles in L&S (e.g., a target
|
| 159 |
+
UE to be localized, an assistant UE with known or measured
|
| 160 |
+
location to assist L&S, or a server/coordinator in performing
|
| 161 |
+
L&S tasks). Although all the devices involved in the targeted
|
| 162 |
+
tasks will have sidelink communication capabilities, beacons
|
| 163 |
+
usually have fewer power constraints than UEs, while the
|
| 164 |
+
controllers of reflective RISs are expected to work in low-
|
| 165 |
+
power mode without sending or processing L&S reference
|
| 166 |
+
signals [4]. We further consider that RISs coordinate their
|
| 167 |
+
reflective beamforming, either using time division or phase
|
| 168 |
+
profile codes in the time domain.
|
| 169 |
+
For the scenarios considered in this article, we propose two
|
| 170 |
+
different architectures: one based on AP coordination and the
|
| 171 |
+
other on self-coordination. The former architecture works for
|
| 172 |
+
UEs (and other L&S-related devices) inside a coverage area or
|
| 173 |
+
in partial-covered areas (where sidelink is available), requiring
|
| 174 |
+
a specific AP to serve as a L&S coordinator, e.g., interact
|
| 175 |
+
with the location management function (LMF) via the NR
|
| 176 |
+
positioning protocol A (NRPPa) [9]. The self-coordinated ar-
|
| 177 |
+
chitecture relies explicitly on sidelink communications, being
|
| 178 |
+
particularly suitable for UEs in the out-of-coverage of APs, or
|
| 179 |
+
for UEs connected to APs that cannot meet the latency and
|
| 180 |
+
spatial resolution requirements (e.g., legacy 3G/4G APs). In
|
| 181 |
+
both architectures, L&S signals can be generated by a beacon,
|
| 182 |
+
an assistant UE, or a target UE, depending on the network
|
| 183 |
+
topologies and the specific application scenario.
|
| 184 |
+
|
| 185 |
+
3
|
| 186 |
+
Beacon-UE Channel
|
| 187 |
+
Sidelink Channel
|
| 188 |
+
RIS Channel
|
| 189 |
+
AP-Coordinated Control Link
|
| 190 |
+
Self-Coordinated Control Link
|
| 191 |
+
L&S Coordinator
|
| 192 |
+
Controller
|
| 193 |
+
RIS-1
|
| 194 |
+
In-coverage
|
| 195 |
+
Partial coverage
|
| 196 |
+
Out-of-coverage
|
| 197 |
+
AP
|
| 198 |
+
Beacon
|
| 199 |
+
UE-1
|
| 200 |
+
UE-2
|
| 201 |
+
UE-3
|
| 202 |
+
UE-4
|
| 203 |
+
UE-5
|
| 204 |
+
RIS-2
|
| 205 |
+
RIS-3
|
| 206 |
+
Fig. 2. UEs performing L&S in different coverage areas. The AP-coordinated
|
| 207 |
+
architecture can be used for UEs located in in-coverage or partial-coverage
|
| 208 |
+
(sidelink communications required) areas. When the UEs and all the L&S
|
| 209 |
+
devices cannot access any surrounding APs (i.e., lying in out-of-coverage
|
| 210 |
+
areas), the self-coordinated architecture is the only option for L&S services.
|
| 211 |
+
B. AP-Coordinated Architecture
|
| 212 |
+
This architecture relies on one or several APs to allocate
|
| 213 |
+
the available radio resources and ensure timing among the
|
| 214 |
+
connected devices, which are the UEs, the RIS controllers, and
|
| 215 |
+
dedicated beacon nodes. This network management scheme is
|
| 216 |
+
similar to the mode-1 in sidelink communications [6], and the
|
| 217 |
+
L&S protocols can be summarized into the following 6 steps:
|
| 218 |
+
1) The target UE triggers an L&S request to the AP (which
|
| 219 |
+
is selected as the task coordinator).
|
| 220 |
+
2) The coordinator exchanges related location information
|
| 221 |
+
with the core network (e.g., via the NRPPa), determines
|
| 222 |
+
L&S configurations (e.g., broadcasting, sidelink, and
|
| 223 |
+
RIS phase profiles), as well as selects and notifies nearby
|
| 224 |
+
beacons, UEs, and RISs that are involved in the L&S
|
| 225 |
+
task.
|
| 226 |
+
3) The coordinator allocates time-frequency resources for
|
| 227 |
+
L&S to all involved devices and triggers the RIS con-
|
| 228 |
+
troller(s) to configure their phase profiles for the whole
|
| 229 |
+
duration of the estimation process.
|
| 230 |
+
4) The beacons and/or UEs transmit L&S reference signals,
|
| 231 |
+
which are reflected by the involved RIS(s) and received
|
| 232 |
+
by the target UE.
|
| 233 |
+
5) The collected measurements are used by the target UE
|
| 234 |
+
for the localization, and/or sensing tasks. Alternatively,
|
| 235 |
+
this computation can be offloaded at the localization
|
| 236 |
+
server (e.g., the coordinating AP or another UE with
|
| 237 |
+
high computational power).
|
| 238 |
+
6) The target UE updates the task coordinator with the
|
| 239 |
+
estimated L&S results; this optional step can serve as
|
| 240 |
+
prior information for future use.
|
| 241 |
+
For the partial-coverage scenarios, the out-of-coverage UEs
|
| 242 |
+
need to establish sidelink communications with devices that
|
| 243 |
+
are covered by APs. Then, the L&S tasks can be performed
|
| 244 |
+
similarly to the aforementioned steps.
|
| 245 |
+
C. Self-Coordinated Architecture
|
| 246 |
+
An AP-free architecture is required for cases where the
|
| 247 |
+
devices involved in L&S tasks are located in out-of-coverage
|
| 248 |
+
areas. Similar to the mode-2 sidelink communications [6],
|
| 249 |
+
L&S tasks can be autonomously realized by selecting a
|
| 250 |
+
specific device as the localization coordinator, as follows:
|
| 251 |
+
1) The target UE discovers nearby devices (e.g., beacons,
|
| 252 |
+
RISs, and other UEs) and obtains their location infor-
|
| 253 |
+
mation (if available).
|
| 254 |
+
2) Based on the discovered neighbors, the target UE de-
|
| 255 |
+
termines a L&S task coordinator (could be itself) and
|
| 256 |
+
notifies it of the L&S configurations.
|
| 257 |
+
3) The target UE triggers a L&S request to the coordi-
|
| 258 |
+
nator and performs the same actions as with the AP-
|
| 259 |
+
coordinated architecture (i.e., steps 2)–6)).
|
| 260 |
+
III. RIS-ENABLED L&S SCENARIOS
|
| 261 |
+
In this section, we will present three representative RIS-
|
| 262 |
+
enabled L&S scenarios for smart city applications relying on
|
| 263 |
+
the aforementioned architectures and protocols. We mainly
|
| 264 |
+
focus on localization applications and list potential position-
|
| 265 |
+
ing scenarios in systems with minimum infrastructure and
|
| 266 |
+
resources. For example, if positioning can be done with a
|
| 267 |
+
single antenna, it can also be achieved using a multi-antenna
|
| 268 |
+
array. The same applies to narrowband (NB)/wideband (WB)
|
| 269 |
+
signals, single/multiple anchors, and availability/unavailability
|
| 270 |
+
of a line-of-sight (LOS) path between the UE and the active
|
| 271 |
+
signal source.
|
| 272 |
+
A. Beacon-Assisted Localization
|
| 273 |
+
With low-complexity beacons, high flexibility in the in-
|
| 274 |
+
stallation and deployment of L&S systems is feasible. A
|
| 275 |
+
typical use case could be a train station with multiple low-
|
| 276 |
+
cost beacons broadcasting L&S reference signals to UEs to
|
| 277 |
+
navigate indoors, via the support of RISs. In this category, we
|
| 278 |
+
consider UE localization (with the aid of one or more RISs)
|
| 279 |
+
and RIS localization (with the aid of several beacons).
|
| 280 |
+
A1) Single-RIS-Enabled UE Localization: In a WB system
|
| 281 |
+
where the LOS channel is available, the delays of the LOS
|
| 282 |
+
and RIS paths can be estimated based on the L&S reference
|
| 283 |
+
signals sent from a beacon. Assuming the RIS and beacon
|
| 284 |
+
states are known, the angle-of-departure (AOD) at the RIS
|
| 285 |
+
can also be estimated. The target UE can then be localized
|
| 286 |
+
by the intersection of a hyperbola (i.e., time-difference-of-
|
| 287 |
+
arrival (TDOA) of the LOS and RIS paths) and the line in
|
| 288 |
+
the direction of the AOD at the RIS. When the target UE
|
| 289 |
+
is equipped with an antenna array, 3D orientation can also
|
| 290 |
+
be estimated based on the estimated angle-of-arrivals (AOAs).
|
| 291 |
+
This is the basic RIS-enabled localization scenario that only
|
| 292 |
+
requires a single low-complexity beacon [10].
|
| 293 |
+
A2) Multi-RIS-Enabled UE Localization: If multiple RISs
|
| 294 |
+
are simultaneously available, the requirements for LOS and
|
| 295 |
+
WB are unnecessary. The AODs from different RISs can be
|
| 296 |
+
estimated and used to localize the UE by intersecting the AOD
|
| 297 |
+
lines. In this way, localization tasks can be completed using
|
| 298 |
+
NB signals, which saves bandwidth resources for communi-
|
| 299 |
+
cations. Figure 3 shows the position error bound (PEB) of the
|
| 300 |
+
target UE with different positions inside a 5 × 10 m2 area. As
|
| 301 |
+
shown, with multiple RISs, the UE is localizable even under
|
| 302 |
+
blockage of the LOS path between the beacon and the UE.
|
| 303 |
+
|
| 304 |
+
4
|
| 305 |
+
-5
|
| 306 |
+
-4
|
| 307 |
+
-3
|
| 308 |
+
-2
|
| 309 |
+
-1
|
| 310 |
+
0
|
| 311 |
+
1
|
| 312 |
+
2
|
| 313 |
+
3
|
| 314 |
+
4
|
| 315 |
+
5
|
| 316 |
+
x axis [m]
|
| 317 |
+
0
|
| 318 |
+
1
|
| 319 |
+
2
|
| 320 |
+
3
|
| 321 |
+
4
|
| 322 |
+
5
|
| 323 |
+
y axis [m]
|
| 324 |
+
Beacon
|
| 325 |
+
RIS
|
| 326 |
+
Wall
|
| 327 |
+
0.001
|
| 328 |
+
0.01
|
| 329 |
+
0.1
|
| 330 |
+
1 [m]
|
| 331 |
+
Fig. 3. Scenarios A1 and A2: PEB (in meters) with different UE locations
|
| 332 |
+
in a multi-RIS-aided localization scenario. The target UE can be localized
|
| 333 |
+
with one RIS and a beacon-UE LOS path, or with at least 2 RISs under LOS
|
| 334 |
+
blockage conditions.
|
| 335 |
+
However, the localization tasks cannot be performed when
|
| 336 |
+
only one anchor (beacon or RIS) is visible to the UE (see
|
| 337 |
+
the yellow triangular area around the point [3, 3] m).
|
| 338 |
+
A3) RIS Localization via Multi-Static Sensing: In a
|
| 339 |
+
scenario where passive UEs or objects are coated with RISs,
|
| 340 |
+
the localization (or sensing, depending on scenarios) can be
|
| 341 |
+
performed semi-passively with only a small amount of energy
|
| 342 |
+
needed for localization coordination and RIS phase profile
|
| 343 |
+
control. Such localization tasks can estimate the positions (and
|
| 344 |
+
orientations) of RIS-coated objects by using several beacons
|
| 345 |
+
with known positions. Note that the geometrical constraints
|
| 346 |
+
can largely reduce the difficulties in these scenarios. For
|
| 347 |
+
example, the orientation of an RIS can be assumed as 1D
|
| 348 |
+
(e.g., placed on the top of a car facing up). In addition, the
|
| 349 |
+
adoption of antenna arrays at the beacons can further simplify
|
| 350 |
+
the RIS localization problem.
|
| 351 |
+
B. Cooperative Localization
|
| 352 |
+
Sidelink communications (e.g., device-to-device (D2D)
|
| 353 |
+
communications, or the vehicular version known as vehicle-
|
| 354 |
+
to-everything (V2X) communications) has been introduced in
|
| 355 |
+
the millimeter-wave band for information exchange between
|
| 356 |
+
vehicles, opening the road for numerous use cases, such
|
| 357 |
+
as platooning, collision avoidance and autonomous driving
|
| 358 |
+
[6]. The combination of RISs and sidelink is expected to
|
| 359 |
+
provide low-latency and high-reliability communications [11].
|
| 360 |
+
Interestingly, it can also be exploited to assist L&S. Sidelink
|
| 361 |
+
communications enables UEs to participate in a cooperative
|
| 362 |
+
manner in the sharing of position and surrounding information
|
| 363 |
+
within a local network, and in performing relative location
|
| 364 |
+
estimation using sidelink signals [12]. We will focus on the
|
| 365 |
+
latter case, where the absolute location can be estimated
|
| 366 |
+
using RIS anchors (i.e., with known position and orientation
|
| 367 |
+
information), without any APs or beacons. A typical scenario
|
| 368 |
+
could be cooperative vehicular networks in urban areas with
|
| 369 |
+
severe AP and GPS signal blockages.
|
| 370 |
+
We next discuss single- and multi-RIS-involved localization
|
| 371 |
+
scenarios, where single-antenna UEs cooperate to estimate
|
| 372 |
+
their positions via WB sidelink signals. We also consider a
|
| 373 |
+
more general scenario where RIS-coated objects are involved,
|
| 374 |
+
resulting in cooperative RIS localization.
|
| 375 |
+
B1) Single-RIS-Enabled Cooperative Localization: Con-
|
| 376 |
+
sider a scenario with several UEs and one RIS anchor, where
|
| 377 |
+
the UEs wish to estimate their positions. We assume that each
|
| 378 |
+
UE can send sidelink signals (i.e., being the transmitter (TX))
|
| 379 |
+
to other UEs, which arrive at the receiver (RX) UEs via two
|
| 380 |
+
paths (i.e., the UE-UE and UE-RIS-UE paths). By proper
|
| 381 |
+
control of the RIS elements, those two paths can be separated,
|
| 382 |
+
and thus, two delay measurements can be obtained. Due to the
|
| 383 |
+
unknown states of the UEs, both the AOD and AOA at the
|
| 384 |
+
RIS for every TX-RX pair of UEs are unknown and cannot
|
| 385 |
+
be directly estimated. However, we can estimate the spatial
|
| 386 |
+
frequency information at the RIS for every TX-RX pair. This
|
| 387 |
+
scenario requires at least three UEs to cooperate and render
|
| 388 |
+
their locations feasibly without ambiguities. Figure 4 compares
|
| 389 |
+
the PEBs for three UEs in an RIS-enabled versus beacon-aided
|
| 390 |
+
(equipped with an antenna array) 3D cooperative localization
|
| 391 |
+
scenario as a function of the number of RIS elements.
|
| 392 |
+
B2) Multi-RIS-Enabled One-Way Sidelink Localization:
|
| 393 |
+
In the scenario with at least two RISs, one-way sidelink
|
| 394 |
+
communications is sufficient to localize both the TX and RX
|
| 395 |
+
UEs. Assume that one UE takes the role of the TX and the
|
| 396 |
+
other UE is the RX. With two RISs, three delay measurements
|
| 397 |
+
can be obtained between the TX and RX via the LOS and
|
| 398 |
+
the two RIS paths. However, that would require an optimal
|
| 399 |
+
joint design of the reflection elements at both RISs to be able
|
| 400 |
+
to separate the paths at the RX. In addition, once the RIS
|
| 401 |
+
paths are separated, we can also estimate the spatial frequency
|
| 402 |
+
information at each RIS. Thus, those collected measurements
|
| 403 |
+
can be utilized to estimate the locations of the TX and RX.
|
| 404 |
+
B3) Cooperative RIS Localization: Let us consider a more
|
| 405 |
+
general scenario where one RIS (or several) with a known state
|
| 406 |
+
is used to localize multiple UEs (with sidelink capabilities) and
|
| 407 |
+
objects (coated with an RIS). This scenario is challenging due
|
| 408 |
+
to the high complexity of the network and a large number of
|
| 409 |
+
unknowns. However, with a proper design of all the involved
|
| 410 |
+
RIS profiles and the transmission protocol, this problem can
|
| 411 |
+
be decomposed into a cooperative localization (see B1) and
|
| 412 |
+
an RIS localization (see A3) problems. Similar to B1, at least
|
| 413 |
+
several UEs (depending on scenarios) need to take the role
|
| 414 |
+
of the TX, and transmit sidelink signals to the other UEs via
|
| 415 |
+
the direct and indirect paths. Once the UEs are localized, the
|
| 416 |
+
RIS localization task can be solved similarly to A3, and the
|
| 417 |
+
estimation results can be refined by processing all the available
|
| 418 |
+
information.
|
| 419 |
+
C. Self-L&S with a Full-Duplex Transceiver
|
| 420 |
+
When a UE is equipped with a full-duplex transceiver (like
|
| 421 |
+
radar) [8], the multi-RIS setup and cooperation between UEs
|
| 422 |
+
are unnecessary. Instead, this UE can perform self-positioning
|
| 423 |
+
with a single RIS and use the multipath components to map the
|
| 424 |
+
environment over time; this process is known as monostatic
|
| 425 |
+
simultaneous localization and mapping (SLAM). It is noted
|
| 426 |
+
that SLAM is not limited to full-duplex UEs, and bistatic
|
| 427 |
+
SLAM can also be performed in use cases A1-A3 and B1-
|
| 428 |
+
B3.
|
| 429 |
+
We next present three beacon-free L&S scenarios with a
|
| 430 |
+
full-duplex UE.
|
| 431 |
+
|
| 432 |
+
5
|
| 433 |
+
0
|
| 434 |
+
20
|
| 435 |
+
40
|
| 436 |
+
60
|
| 437 |
+
80
|
| 438 |
+
100
|
| 439 |
+
120
|
| 440 |
+
140
|
| 441 |
+
160
|
| 442 |
+
0
|
| 443 |
+
0.5
|
| 444 |
+
1
|
| 445 |
+
1.5
|
| 446 |
+
UE-1 (RIS)
|
| 447 |
+
UE-1 (beacon)
|
| 448 |
+
UE-2 (RIS)
|
| 449 |
+
UE-2 (beacon)
|
| 450 |
+
UE-3 (RIS)
|
| 451 |
+
UE-3 (beacon)
|
| 452 |
+
Number of RIS Elements
|
| 453 |
+
PEB [m]
|
| 454 |
+
Fig. 4.
|
| 455 |
+
PEBs of RIS-enabled vs. beacon-aided cooperative localization for
|
| 456 |
+
different RIS sizes and a fixed random phase profile setup. It is shown that,
|
| 457 |
+
with a sufficient number of RIS elements, an active anchor can be replaced
|
| 458 |
+
with a passive one (RIS) without performance degradation.
|
| 459 |
+
C1) RIS-Enabled Self-Localization: Consider a system
|
| 460 |
+
with a single-antenna UE and an RIS, where the UE transmits
|
| 461 |
+
L&S reference signals and receives their back-scattered ver-
|
| 462 |
+
sions, i.e., the UE-RIS-UE (controlled path) and UE-landmark-
|
| 463 |
+
UE (uncontrolled path) signals. One option for the RIS phase
|
| 464 |
+
profiles is to consider directional reflective beams, which can
|
| 465 |
+
be efficiently designed when the UE position uncertainty (even
|
| 466 |
+
under mobility cases) is available [13]. The delay and angle
|
| 467 |
+
information at the RIS of the UE-RIS-UE channel can be
|
| 468 |
+
estimated for this scenario, and then used to localize the UE. In
|
| 469 |
+
Figure 5, beampatterns at the RIS with two different phase pro-
|
| 470 |
+
files are illustrated, focusing on the UE uncertainty region. As
|
| 471 |
+
demonstrated, the optimized phase profiles of [13] can provide
|
| 472 |
+
sufficient beamforming gain, compared with directional phase
|
| 473 |
+
profiles. This gain can offer improved L&S performance.
|
| 474 |
+
C2) RIS-Enabled SLAM: If a UE is equipped with a
|
| 475 |
+
full-duplex multiple-input multiple-output (MIMO) antenna
|
| 476 |
+
array [8], SLAM can be enabled. Similar to scenario C1, the
|
| 477 |
+
signals from different paths can be resolvable with optimized
|
| 478 |
+
RIS phase profiles and precoders/combiners. The following
|
| 479 |
+
channel parameters can be estimated: i) the signal propagation
|
| 480 |
+
delay, the AOD at the RIS, and the AOA at the UE for the
|
| 481 |
+
UE-RIS-UE channel; as well as ii) the delay and AOA at
|
| 482 |
+
the UE for each UE-landmark-UE channel. In addition to the
|
| 483 |
+
position information obtained from the controlled path (as in
|
| 484 |
+
scenario C1), the angular resolution offered by the UE array
|
| 485 |
+
can be leveraged to map/sense the environment. With multiple
|
| 486 |
+
estimations, the localization and radio mapping performance
|
| 487 |
+
can be improved using state-of-the-art filters (e.g., Poisson
|
| 488 |
+
multi-Bernoulli filter).
|
| 489 |
+
C3) RIS Localization with a Full-Duplex Array: Consider
|
| 490 |
+
the more general scenario from C1 including one anchor
|
| 491 |
+
RIS mounted on a wall, a UE equipped with a full-duplex
|
| 492 |
+
MIMO transceiver, and several objects coated with RISs (e.g.,
|
| 493 |
+
mounted on the front and rear side of a vehicle). In addition to
|
| 494 |
+
the signals reflected from the anchor RIS (as also in scenario
|
| 495 |
+
C1), the UE also receives single-bounce reflected signals from
|
| 496 |
+
the RISs mounted on the objects. The time delay, AOA, and
|
| 497 |
+
the amplitude of the channel gain for each signal path can be
|
| 498 |
+
estimated, which can be used for the localization of both itself
|
| 499 |
+
and the RISs-coated objects. When multiple UEs are present
|
| 500 |
+
and cooperate in the estimation process, the orientation of the
|
| 501 |
+
(a) Directional Phase Profiles
|
| 502 |
+
(b) Optimized Phase Profiles
|
| 503 |
+
Fig. 5. The reflective beamforming gain (in dB) with a 50 × 50 RIS using
|
| 504 |
+
(a) a directional phase profile, and (b) an optimized phase profile via [13].
|
| 505 |
+
The red squares represent the UE angular uncertainty region, which needs to
|
| 506 |
+
be fully covered by an effective beampattern design.
|
| 507 |
+
RISs-coated objects can also be obtained. In a scenario without
|
| 508 |
+
any anchors, this RIS localization can also help in estimating
|
| 509 |
+
the relative locations of the active UE and passive UEs.
|
| 510 |
+
IV. OPEN RESEARCH CHALLENGES
|
| 511 |
+
With the assistance of low-complexity beacons, cooperative
|
| 512 |
+
localization, and full-duplex radios, the L&S coverage for
|
| 513 |
+
smart city applications can be significantly extended. However,
|
| 514 |
+
there exist several practical issues that need to be thoroughly
|
| 515 |
+
investigated. In this section, we discuss the most critical
|
| 516 |
+
challenges with the proposed RIS-enabled L&S system and
|
| 517 |
+
list possible directions for future research.
|
| 518 |
+
A. Anchor Deployment Optimization
|
| 519 |
+
The placement of the anchors (e.g., beacons and RISs) is
|
| 520 |
+
critical to meet the L&S key performance indicator (KPI) re-
|
| 521 |
+
quirements within a service area (e.g., error bounds lower than
|
| 522 |
+
a certain threshold, as shown in Figure 3). The deployment
|
| 523 |
+
involves both the position and orientation optimization of the
|
| 524 |
+
anchors, taking into account the blockage in the surrounding
|
| 525 |
+
environment. RIS-aided SLAM can help in creating such an
|
| 526 |
+
environment map, which can be supported by cooperative
|
| 527 |
+
sidelink UEs. Heuristic optimization solutions can then be
|
| 528 |
+
applied for finding optimal anchor sites, extending approaches
|
| 529 |
+
from the literature [14].
|
| 530 |
+
|
| 531 |
+
e.100100150evation20
|
| 532 |
+
Gro40
|
| 533 |
+
.M06080J60
|
| 534 |
+
azllBeaiot0
|
| 535 |
+
muthele100100150evation20
|
| 536 |
+
G[o]40
|
| 537 |
+
.=060
|
| 538 |
+
B80ncertain60
|
| 539 |
+
azilReaiol
|
| 540 |
+
Vmuth6
|
| 541 |
+
B. Resource Allocation and Coordination
|
| 542 |
+
RIS-aided L&S systems involve APs, beacons, RISs, and
|
| 543 |
+
UEs, making them inherently heterogeneous. Resource al-
|
| 544 |
+
location for L&S tasks, including power allocation, time-
|
| 545 |
+
frequency allocation, beamforming design, and scheduling
|
| 546 |
+
must be carefully designed to ensure a favorable trade-off
|
| 547 |
+
with conventional communication services. Depending on the
|
| 548 |
+
KPI requirements of the applications that send L&S ser-
|
| 549 |
+
vice requests, new objectives that consider integrated L&S
|
| 550 |
+
and communications should be formulated and satisfied. An
|
| 551 |
+
important part of resource allocation is RIS phase profile
|
| 552 |
+
optimization and multiplexing [10]. Broad RIS beams lead to
|
| 553 |
+
coverage reduction, while narrow pencil beams are sensitive to
|
| 554 |
+
misalignment. Hence, highly adaptive RIS profile designs are
|
| 555 |
+
needed, relying, when possible, on prior UE and object state
|
| 556 |
+
information. When RISs are large, the near-field effects need
|
| 557 |
+
to be taken into consideration and the beamforming designs
|
| 558 |
+
should account for the curvature of arrival, resulting in beam-
|
| 559 |
+
focusing designs. RIS multiplexing can be addressed by time
|
| 560 |
+
multiplexing, temporal coding, and making use of high path
|
| 561 |
+
loss for spatial reuse. The afore-described resource allocation
|
| 562 |
+
problems can be tackled by a combination of traditional
|
| 563 |
+
optimization-based methods (e.g., convex optimization) and
|
| 564 |
+
learning-based methods (e.g., reinforcement learning).
|
| 565 |
+
C. Estimation Algorithms
|
| 566 |
+
From an algorithmic perspective, there are challenges re-
|
| 567 |
+
lated to channel parameter estimation, tracking in dynamic
|
| 568 |
+
environments, and calibration. Channel parameter estimation
|
| 569 |
+
in the presence of severe multipath is difficult since almost
|
| 570 |
+
passive reflective RISs have no local signal processing capa-
|
| 571 |
+
bilities. Moreover, in cooperative localization (scenarios B1
|
| 572 |
+
and B2) and RIS localization (e.g., scenarios A3, B3, and
|
| 573 |
+
C3) tasks, the AOAs/AODs at the RISs are coupled, meaning
|
| 574 |
+
that we can no longer estimate them independently. Instead,
|
| 575 |
+
only spatial frequencies (containing coupled AOAs and AODs
|
| 576 |
+
information) can be obtained, requiring novel algorithms for
|
| 577 |
+
further processing. More refined channel parameter estimation
|
| 578 |
+
also requires accurate channel models and the RISs’ impact
|
| 579 |
+
on them, such as the near-field effect, beam squint effect, RIS
|
| 580 |
+
element failures, and anchor calibration errors.
|
| 581 |
+
Due to mobility, difficult conditions such as signal blockage,
|
| 582 |
+
unresolvable signal paths, and severe path loss will affect L&S
|
| 583 |
+
performance. Multiple RISs can be involved to handle such
|
| 584 |
+
blockages, offering coverage extension. As the carrier fre-
|
| 585 |
+
quency increases, the signal resolutions become higher, and the
|
| 586 |
+
effect of the severe path loss can be mitigated by adopting RISs
|
| 587 |
+
with larger sizes or active RISs with reflection amplification
|
| 588 |
+
capabilities [15]. Sensing also suffers from inherent complica-
|
| 589 |
+
tions, such as an unknown number of objects, unknown types
|
| 590 |
+
of objects, unknown detection probabilities for signal paths,
|
| 591 |
+
extended objects, and multi-bounce observations. Dedicated
|
| 592 |
+
filters should be developed to address these complications and
|
| 593 |
+
get integrated into the L&S framework.
|
| 594 |
+
Finally, in terms of calibration, anchor geometry error and
|
| 595 |
+
hardware impairments (HWIs) are two important aspects. We
|
| 596 |
+
note that the geometrical calibration of an RIS is similar to RIS
|
| 597 |
+
localization (as described in scenarios A3, B3, and C3), which
|
| 598 |
+
requires a calibration agent that incorporates other sources of
|
| 599 |
+
localization estimations (i.e., sensor fusion). While for HWIs,
|
| 600 |
+
the channel model could be too complicated when considering
|
| 601 |
+
each specific impairment (e.g., mutual coupling and phase
|
| 602 |
+
noise), learning-based methods can be considered to unveil
|
| 603 |
+
their impact and drive practical algorithmic designs.
|
| 604 |
+
D. Understanding Anchor Hardware Alternatives
|
| 605 |
+
There are also opportunities to improve L&S coverage via
|
| 606 |
+
variations of the hardware deployed at the beacons, RISs, and
|
| 607 |
+
UEs. On the beacon and UE sides, multi-panel arrays (i.e., 3D
|
| 608 |
+
arrays) could be implemented for further coverage extension.
|
| 609 |
+
On the RIS side, new types of RISs are emerging beyond
|
| 610 |
+
almost passive reflective RISs [15]. As previously mentioned,
|
| 611 |
+
an active RIS can be used to boost the signal energy (i.e.,
|
| 612 |
+
change both the amplitude and phase of the incident signal) for
|
| 613 |
+
improved coverage. A receiving RIS (also known as a hybrid
|
| 614 |
+
RIS or a simultaneously reflecting and sensing RIS) can enable
|
| 615 |
+
parameter estimation at the RIS side, offering extra degrees
|
| 616 |
+
of freedom for the design of L&S estimation approaches.
|
| 617 |
+
Omni-directional RISs, intended to realize simultaneous reflec-
|
| 618 |
+
tion and refraction (i.e., 360◦ coverage), enable simultaneous
|
| 619 |
+
indoor and outdoor 3D localization. A non-reciprocal RIS
|
| 620 |
+
that integrates nonreciprocal phase shifters allows full-duplex
|
| 621 |
+
communications, and a delay-adjustable RIS is capable of
|
| 622 |
+
adjusting the delays of signals reflected by different RIS
|
| 623 |
+
elements, which contributes to the alleviation of the beam
|
| 624 |
+
squint effect. All of these alternatives have implications on
|
| 625 |
+
L&S services and merit further study.
|
| 626 |
+
E. Privacy, Security, and Social Acceptance Issues
|
| 627 |
+
Cooperative L&S require extensive information exchange of
|
| 628 |
+
local measurements between devices, which may cause privacy
|
| 629 |
+
issues. For example, the RX in scenario B2 can estimate the
|
| 630 |
+
position of the TX with a one-way pilot signal transmission. In
|
| 631 |
+
addition, different types of cyber attacks can reduce the L&S
|
| 632 |
+
service availability, or even provide an undetected erroneous
|
| 633 |
+
location estimation, which is unacceptable for safety-critical
|
| 634 |
+
applications. Currently, several security management systems
|
| 635 |
+
have been standardized (e.g., IEEE 1609.2), and security
|
| 636 |
+
threats have been identified for sidelink communications.
|
| 637 |
+
However, the discussions on L&S task-related security issues
|
| 638 |
+
are still at the initial stage, and potential threats need to
|
| 639 |
+
be explored and eliminated. A final aspect related to the
|
| 640 |
+
widespread adoption of RISs lies in their social acceptance.
|
| 641 |
+
RISs should be integrated in a way that they blend into
|
| 642 |
+
the environment (ideally, be transparent). To this end, the
|
| 643 |
+
benefits of RISs to improve safety and reduce electromagnetic
|
| 644 |
+
emissions should be demonstrated and disseminated.
|
| 645 |
+
V. CONCLUSION AND OUTLOOK
|
| 646 |
+
The smart city paradigm constitutes the epitome of the
|
| 647 |
+
widespread adoption of digital services for societal needs.
|
| 648 |
+
It is envisioned to profit people and city-level businesses,
|
| 649 |
+
offering efficient, safe, and comfortable living spaces as well
|
| 650 |
+
|
| 651 |
+
7
|
| 652 |
+
as everyday-life smart-living applications. To achieve this
|
| 653 |
+
overarching goal, seamless wireless communications among
|
| 654 |
+
diverse devices and L&S are of paramount importance, en-
|
| 655 |
+
abling information exchange, device localization, and mapping
|
| 656 |
+
of the environment. In this article, we discussed the key
|
| 657 |
+
to achieving low-cost and energy-efficient seamless L&S,
|
| 658 |
+
namely, reflective RISs in conjunction with sidelink commu-
|
| 659 |
+
nications. We presented AP-coordinated and AP-free system
|
| 660 |
+
architectures and detailed three RIS-enabled L&S scenarios,
|
| 661 |
+
each including several use cases and most relying on sidelink
|
| 662 |
+
communications. As became apparent, instead of using APs
|
| 663 |
+
with full communication capabilities, low-complexity beacons
|
| 664 |
+
and RISs can be widely-deployed to enable green L&S smart
|
| 665 |
+
city applications. In addition, when multiple UEs with sidelink
|
| 666 |
+
communication capabilities can be connected in the same
|
| 667 |
+
network, cooperative localization can relieve the requirement
|
| 668 |
+
for multiple anchors. Furthermore, when devices are equipped
|
| 669 |
+
with full-duplex transceivers, they can localize themself and
|
| 670 |
+
map their surrounding environment with only a single RIS
|
| 671 |
+
anchor. Finally, an extended list of open research challenges
|
| 672 |
+
relevant to the proposed RIS-enabled seamless L&S concept
|
| 673 |
+
was presented, including the necessity for anchor deployment
|
| 674 |
+
optimization and optimized resource allocation schemes, al-
|
| 675 |
+
gorithmic and privacy issues, as well as the role of multi-
|
| 676 |
+
functional RISs.
|
| 677 |
+
ACKNOWLEDGMENTS
|
| 678 |
+
This work was supported, in part, by the European Com-
|
| 679 |
+
mission through the EU H2020 RISE-6G project under grant
|
| 680 |
+
101017011, and by the 6G-Cities project from Chalmers
|
| 681 |
+
Transport Area of Advance.
|
| 682 |
+
REFERENCES
|
| 683 |
+
[1] S. Kisseleff et al., “Reconfigurable intelligent surfaces for smart cities:
|
| 684 |
+
Research challenges and opportunities,” IEEE Open J. Commun. Soc.,
|
| 685 |
+
vol. 1, pp. 1781–1797, Nov. 2020.
|
| 686 |
+
[2] “3GPP
|
| 687 |
+
TR
|
| 688 |
+
38.855
|
| 689 |
+
V16.0.0:
|
| 690 |
+
Study
|
| 691 |
+
on
|
| 692 |
+
NR
|
| 693 |
+
positioning
|
| 694 |
+
support
|
| 695 |
+
(Release
|
| 696 |
+
16)
|
| 697 |
+
(accessed
|
| 698 |
+
on
|
| 699 |
+
28-Dec-2022),”
|
| 700 |
+
Mar.
|
| 701 |
+
2019.
|
| 702 |
+
[On-
|
| 703 |
+
line]. Available: https://portal.3gpp.org/desktopmodules/Specifications/
|
| 704 |
+
SpecificationDetails.aspx?specificationId=3501
|
| 705 |
+
[3] C. Chen et al., “Wi-Fi sensing based on IEEE 802.11bf,” IEEE Commun.
|
| 706 |
+
Mag., (Early Access), 2022.
|
| 707 |
+
[4] E. Strinati Calvanese et al., “Reconfigurable, intelligent, and sustainable
|
| 708 |
+
wireless environments for 6G smart connectivity,” IEEE Commun. Mag.,
|
| 709 |
+
vol. 59, no. 10, pp. 99–105, Oct. 2021.
|
| 710 |
+
[5] H. Wymeersch et al., “Radio localization and mapping with recon-
|
| 711 |
+
figurable intelligent surfaces: Challenges, opportunities, and research
|
| 712 |
+
directions,” IEEE Veh. Technol. Mag., vol. 15, no. 4, pp. 52–61, Oct.
|
| 713 |
+
2020.
|
| 714 |
+
[6] M. H. C. Garcia et al., “A tutorial on 5G NR V2X communications,”
|
| 715 |
+
IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 1972–2026, Feb. 2021.
|
| 716 |
+
[7] “3GPP TR 38.845 V17.0.0: Study on scenarios and requirements of
|
| 717 |
+
in-coverage, partial coverage, and out-of-coverage NR positioning
|
| 718 |
+
use
|
| 719 |
+
cases
|
| 720 |
+
(Release
|
| 721 |
+
17)
|
| 722 |
+
(accessed
|
| 723 |
+
on
|
| 724 |
+
28-Dec-2022),”
|
| 725 |
+
Sep.
|
| 726 |
+
2021.
|
| 727 |
+
[Online].
|
| 728 |
+
Available:
|
| 729 |
+
https://portal.3gpp.org/desktopmodules/
|
| 730 |
+
Specifications/SpecificationDetails.aspx?specificationId=3806
|
| 731 |
+
[8] G. C. Alexandropoulos et al., “Full-duplex massive multiple-input,
|
| 732 |
+
multiple-output architectures: Recent advances, applications, and future
|
| 733 |
+
directions,” IEEE Veh. Technol. Mag., vol. 17, no. 4, pp. 83–91, Oct.
|
| 734 |
+
2022.
|
| 735 |
+
[9] “3GPP
|
| 736 |
+
TS
|
| 737 |
+
38.455
|
| 738 |
+
V17.2.0:
|
| 739 |
+
NR
|
| 740 |
+
Positioning
|
| 741 |
+
Protocol
|
| 742 |
+
A
|
| 743 |
+
(NRPPa)
|
| 744 |
+
(Release
|
| 745 |
+
17)
|
| 746 |
+
(accessed
|
| 747 |
+
on
|
| 748 |
+
28-Dec-2022),”
|
| 749 |
+
Sep.
|
| 750 |
+
2022.
|
| 751 |
+
[Online].
|
| 752 |
+
Available:
|
| 753 |
+
https://portal.3gpp.org/desktopmodules/
|
| 754 |
+
Specifications/SpecificationDetails.aspx?specificationId=3256
|
| 755 |
+
[10] K. Keykhosravi et al., “RIS-enabled SISO localization under user mo-
|
| 756 |
+
bility and spatial-wideband effects,” IEEE J. Sel. Topics Signal Process,
|
| 757 |
+
vol. 16, no. 5, pp. 1125–1140, May. 2022.
|
| 758 |
+
[11] X. Gu et al., “Intelligent surface aided D2D-V2X system for low-
|
| 759 |
+
latency and high-reliability communications,” IEEE Trans. Veh. Technol.,
|
| 760 |
+
vol. 71, no. 11, pp. 11 624–11 636, Jul. 2022.
|
| 761 |
+
[12] S.-W. Ko et al., “V2X-based vehicular positioning: Opportunities, chal-
|
| 762 |
+
lenges, and future directions,” IEEE Wireless Commun., vol. 28, no. 2,
|
| 763 |
+
pp. 144–151, Mar. 2021.
|
| 764 |
+
[13] H. Kim et al., “RIS-enabled and access-point-free simultaneous radio
|
| 765 |
+
localization and mapping,” arXiv preprint arXiv:2212.07141, 2022.
|
| 766 |
+
[14] A. Albanese et al., “LOKO: localization-aware roll-out planning for
|
| 767 |
+
future mobile networks,” IEEE Trans. Mobile Comput., (Early Access),
|
| 768 |
+
2022.
|
| 769 |
+
[15] M. Jian et al., “Reconfigurable intelligent surfaces for wireless commu-
|
| 770 |
+
nications: Overview of hardware designs, channel models, and estima-
|
| 771 |
+
tion techniques,” Intell. Converged Netw., vol. 3, no. 1, pp. 1–32, Mar.
|
| 772 |
+
2022.
|
| 773 |
+
Hui Chen (hui.chen@chalmers.se) is a postdoctoral researcher at Chalmers
|
| 774 |
+
University of Technology, Sweden.
|
| 775 |
+
Hyowon Kim (hyowon@chalmers.se) is a postdoctoral researcher at Chalmers
|
| 776 |
+
University of Technology, Sweden.
|
| 777 |
+
Mustafa Ammous (mustafa.ammous@mail.utoronto.ca) is a Ph.D. student at
|
| 778 |
+
University of Toronto, Canada.
|
| 779 |
+
Gonzalo Seco-Granados (gonzalo.seco@uab.cat) is a professor at Universitat
|
| 780 |
+
Autonoma of Barcelona, Spain.
|
| 781 |
+
George C. Alexandropoulos (alexandg@di.uoa.gr) is an assistant professor
|
| 782 |
+
at the Department of Informatics and Telecommunications, National and
|
| 783 |
+
Kapodistrian University of Athens, Greece.
|
| 784 |
+
Shahrokh Valaee (valaee@ece.utoronto.ca) is a professor at University of
|
| 785 |
+
Toronto, Canada.
|
| 786 |
+
Henk Wymeersch (henkw@chalmers.se) is a professor at Chalmers Univer-
|
| 787 |
+
sity of Technology, Sweden.
|
| 788 |
+
|
8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,456 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf,len=455
|
| 2 |
+
page_content='1 RISs and Sidelink Communications in Smart Cities: The Key to Seamless Localization and Sensing Hui Chen, Member, IEEE, Hyowon Kim, Member, IEEE, Mustafa Ammous, Student Member, IEEE, Gonzalo Seco-Granados, Senior Member, IEEE, George C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 3 |
+
page_content=' Alexandropoulos, Senior Member, IEEE, Shahrokh Valaee, Fellow, IEEE, and Henk Wymeersch, Senior Member, IEEE Abstract—A smart city involves, among other elements, intelli- gent transportation, crowd monitoring, and digital twins, each of which requires information exchange via wireless communication links and localization of connected devices and passive objects (including people).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 4 |
+
page_content=' Although localization and sensing (L&S) are envisioned as core functions of future communication systems, they have inherently different demands in terms of infrastructure compared to communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 5 |
+
page_content=' Wireless communications gener- ally requires a connection to only a single access point (AP), while L&S demand simultaneous line-of-sight propagation paths to several APs, which serve as location and orientation anchors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 6 |
+
page_content=' Hence, a smart city deployment optimized for communication will be insufficient to meet stringent L&S requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 7 |
+
page_content=' In this article, we argue that the emerging technologies of reconfigurable intelligent surfaces (RISs) and sidelink communications constitute the key to providing ubiquitous coverage for L&S in smart cities with low-cost and energy-efficient technical solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 8 |
+
page_content=' To this end, we propose and evaluate AP-coordinated and self-coordinated RIS-enabled L&S architectures and detail three groups of appli- cation scenarios, relying on low-complexity beacons, cooperative localization, and full-duplex transceivers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 9 |
+
page_content=' A list of practical issues and consequent open research challenges of the proposed L&S systems is also provided.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 10 |
+
page_content=' Index Terms—Smart cities, reconfigurable intelligent surfaces, localization, sensing, sidelink communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 11 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 12 |
+
page_content=' INTRODUCTION The emerging concept of smart cities aims to improve ac- cessibility to public services, advance digitization of the urban environment, and monitor various human-oriented processes as well as assets, by harmonizing diverse digital technologies at a city level [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 13 |
+
page_content=' This broad concept integrates various independent applications to bring improvements both at the societal level (such as smart homes, smart transportation, sup- ply chains, and environment monitoring), and at the individual level (such as indoor navigation and extended reality (XR)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 14 |
+
page_content=' To realize the concept of smart cities, reliable, low-latency, and high-speed communication systems (to support information exchange and management among interconnected devices), as well as accurate localization and sensing (L&S) (to support communication and provide situation-awareness services), are of great importance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 15 |
+
page_content=' In this article, we use the term localization to indicate the position (and possibly orientation) estimation of a target user equipment (UE), and the term sensing to specify the position estimation of passive objects (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 16 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 17 |
+
page_content=', objects without networking infrastructure or non-cooperating ones).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 18 |
+
page_content=' By exploiting the large antenna array sizes and wide bandwidth of millimeter-wave/THz systems, recent research activities in industry and academia on integrated sensing, localization, and communication (ISLAC) are growing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 19 |
+
page_content=' ISLAC is able to utilize communication infrastructures and signals to enable synergies with L&S for diverse applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 20 |
+
page_content=' To this end, several standardization efforts and 3GPP activities have been recently studied, such as the definition of new radio positioning requirements, evaluation methodologies, and techniques (dependent on radio access technology and not), in TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 21 |
+
page_content='855 [2] as well as the development of Wi-Fi sensing technology (in both sub-7 GHz and mmWave spectrum), in the IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 22 |
+
page_content='11bf standard [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 23 |
+
page_content=' While high angular and delay resolution (due to large arrays and wide signal bandwidths) facilitate L&S tasks, signal coverage is one of the major challenges, especially for high-frequency systems which suffer from high path loss and high blockage probability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 24 |
+
page_content=' In contrast to communications, which is possible to work with only one point-to-point link, L&S functions necessitate access to multiple access points (APs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 25 |
+
page_content=' Reflective reconfigurable intelligent surfaces (RISs) constitute a promising emerging technology for extending coverage and dynamically programming signal propagation with almost zero-energy consumption [4], thus, supporting, or even enabling in certain cases, wireless communications, as well as L&S tasks in various scenarios [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 26 |
+
page_content=' However, since they are incapable of generating their own signals and only modify the analog waveforms impinging on them, separate signal generation sources are needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 27 |
+
page_content=' The sources generating signals for RIS-assisted L&S can be: i) APs with full communication capabilities, ii) low- complexity beacons that broadcast or receive L&S reference signals;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 28 |
+
page_content=' or iii) the UEs themselves that are involved in the L&S tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 29 |
+
page_content=' The latter two cases are particularly relevant when power-hungry APs, whose deployment is usually costly, needs to be avoided.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 30 |
+
page_content=' To fulfill the ubiquitous L&S requirements in out-of-coverage areas or partially-covered ones (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 31 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 32 |
+
page_content=', indoor UEs and vehicles in tunnels), sidelink communications via the PC5 interface can be particularly useful [6], as mentioned in the 3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 33 |
+
page_content='845 report [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 34 |
+
page_content=' In addition, cooperative localization between several UEs can be employed to enhance or enable L&S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 35 |
+
page_content=' Furthermore, when a UE is equipped with a full-duplex transceiver [8] —a technology that is widely discussed in ISLAC for sensing purposes—, it can both simultaneously transmit and receive the signal to localize itself with a single RIS anchor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 36 |
+
page_content=' In this article, we argue that RIS technology in conjunction with sidelink communications can provide seamless L&S so- lutions, speeding up the intelligent transformation of cities into arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 37 |
+
page_content='03535v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 38 |
+
page_content='SP] 9 Jan 2023 2 Beacon-Assisted Localization Beacon Self-L&S with a Full-Duplex Transceiver Beacon-UE Channel RIS Anchor Channel RIS Localization Channel Sidelink Channel Sensing Channel Scenarios Cooperative Localization RIS A2 A1 B1 B2 C1 C2 C3 RIS-attached Vehicle AP A3 B3 Figure elements by macrovector on Freepik Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 39 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 40 |
+
page_content=' RIS-enabled seamless L&S scenarios in smart cities: a) beacon-assisted localization, b) cooperative localization, and c) self-L&S with a full-duplex transceiver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 41 |
+
page_content=' smart entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 42 |
+
page_content=' We particularly elaborate on the representative RIS-enabled L&S scenarios illustrated in Figure 1: beacon- assisted localization, cooperative localization, and self-L&S with a full-duplex transceiver, describing both AP-coordinated and AP-free architectures for different coverage scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 43 |
+
page_content=' We discuss the open challenges with the proposed green (low- cost and energy-efficient) L&S systems in smart cities and list potential directions for future research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 44 |
+
page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 45 |
+
page_content=' L&S ARCHITECTURES AND PROTOCOLS In this section, we describe the different entity types of the proposed L&S system for smart cities, relying on RISs and sidelink communications, as well as its enabling architectures, depending on whether an AP is present for L&S coordination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 46 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 47 |
+
page_content=' Entity Types and Overall Architecture In the proposed RIS-enabled L&S system, there are several types of entities: APs, beacons, RISs, and UEs, as shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 48 |
+
page_content=' The APs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 49 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 50 |
+
page_content=', a gNB macro base station) provide cellular services to the devices in coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 51 |
+
page_content=' A beacon could be a roadside unit (RSU) that is capable of sending and receiving L&S reference signals via sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 52 |
+
page_content=' In this way, the explicit involvement of expensive and power-hungry APs with full communication protocols is not needed for L&S purposes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 53 |
+
page_content=' RISs serve as reference anchors to assist ISLAC tasks, and are controlled by a dedicated entity responsible for realizing communication functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 54 |
+
page_content=' Finally, UEs may have different hardware capabilities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 55 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 56 |
+
page_content=', single/multiple antennas, half-/full-duplex) that play different roles in L&S (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 57 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 58 |
+
page_content=', a target UE to be localized, an assistant UE with known or measured location to assist L&S, or a server/coordinator in performing L&S tasks).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 59 |
+
page_content=' Although all the devices involved in the targeted tasks will have sidelink communication capabilities, beacons usually have fewer power constraints than UEs, while the controllers of reflective RISs are expected to work in low- power mode without sending or processing L&S reference signals [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 60 |
+
page_content=' We further consider that RISs coordinate their reflective beamforming, either using time division or phase profile codes in the time domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 61 |
+
page_content=' For the scenarios considered in this article, we propose two different architectures: one based on AP coordination and the other on self-coordination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 62 |
+
page_content=' The former architecture works for UEs (and other L&S-related devices) inside a coverage area or in partial-covered areas (where sidelink is available), requiring a specific AP to serve as a L&S coordinator, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 63 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 64 |
+
page_content=', interact with the location management function (LMF) via the NR positioning protocol A (NRPPa) [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 65 |
+
page_content=' The self-coordinated ar- chitecture relies explicitly on sidelink communications, being particularly suitable for UEs in the out-of-coverage of APs, or for UEs connected to APs that cannot meet the latency and spatial resolution requirements (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 66 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 67 |
+
page_content=', legacy 3G/4G APs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 68 |
+
page_content=' In both architectures, L&S signals can be generated by a beacon, an assistant UE, or a target UE, depending on the network topologies and the specific application scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 69 |
+
page_content=' 3 Beacon-UE Channel Sidelink Channel RIS Channel AP-Coordinated Control Link Self-Coordinated Control Link L&S Coordinator Controller RIS-1 In-coverage Partial coverage Out-of-coverage AP Beacon UE-1 UE-2 UE-3 UE-4 UE-5 RIS-2 RIS-3 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 70 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 71 |
+
page_content=' UEs performing L&S in different coverage areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 72 |
+
page_content=' The AP-coordinated architecture can be used for UEs located in in-coverage or partial-coverage (sidelink communications required) areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 73 |
+
page_content=' When the UEs and all the L&S devices cannot access any surrounding APs (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 74 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 75 |
+
page_content=', lying in out-of-coverage areas), the self-coordinated architecture is the only option for L&S services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 76 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 77 |
+
page_content=' AP-Coordinated Architecture This architecture relies on one or several APs to allocate the available radio resources and ensure timing among the connected devices, which are the UEs, the RIS controllers, and dedicated beacon nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 78 |
+
page_content=' This network management scheme is similar to the mode-1 in sidelink communications [6], and the L&S protocols can be summarized into the following 6 steps: 1) The target UE triggers an L&S request to the AP (which is selected as the task coordinator).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 79 |
+
page_content=' 2) The coordinator exchanges related location information with the core network (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 80 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 81 |
+
page_content=', via the NRPPa), determines L&S configurations (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 82 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 83 |
+
page_content=', broadcasting, sidelink, and RIS phase profiles), as well as selects and notifies nearby beacons, UEs, and RISs that are involved in the L&S task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 84 |
+
page_content=' 3) The coordinator allocates time-frequency resources for L&S to all involved devices and triggers the RIS con- troller(s) to configure their phase profiles for the whole duration of the estimation process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 85 |
+
page_content=' 4) The beacons and/or UEs transmit L&S reference signals, which are reflected by the involved RIS(s) and received by the target UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 86 |
+
page_content=' 5) The collected measurements are used by the target UE for the localization, and/or sensing tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 87 |
+
page_content=' Alternatively, this computation can be offloaded at the localization server (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 88 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 89 |
+
page_content=', the coordinating AP or another UE with high computational power).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 90 |
+
page_content=' 6) The target UE updates the task coordinator with the estimated L&S results;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 91 |
+
page_content=' this optional step can serve as prior information for future use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 92 |
+
page_content=' For the partial-coverage scenarios, the out-of-coverage UEs need to establish sidelink communications with devices that are covered by APs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 93 |
+
page_content=' Then, the L&S tasks can be performed similarly to the aforementioned steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 94 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 95 |
+
page_content=' Self-Coordinated Architecture An AP-free architecture is required for cases where the devices involved in L&S tasks are located in out-of-coverage areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 96 |
+
page_content=' Similar to the mode-2 sidelink communications [6], L&S tasks can be autonomously realized by selecting a specific device as the localization coordinator, as follows: 1) The target UE discovers nearby devices (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 97 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 98 |
+
page_content=', beacons, RISs, and other UEs) and obtains their location infor- mation (if available).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 99 |
+
page_content=' 2) Based on the discovered neighbors, the target UE de- termines a L&S task coordinator (could be itself) and notifies it of the L&S configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 100 |
+
page_content=' 3) The target UE triggers a L&S request to the coordi- nator and performs the same actions as with the AP- coordinated architecture (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 101 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 102 |
+
page_content=', steps 2)–6)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 103 |
+
page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 104 |
+
page_content=' RIS-ENABLED L&S SCENARIOS In this section, we will present three representative RIS- enabled L&S scenarios for smart city applications relying on the aforementioned architectures and protocols.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 105 |
+
page_content=' We mainly focus on localization applications and list potential position- ing scenarios in systems with minimum infrastructure and resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 106 |
+
page_content=' For example, if positioning can be done with a single antenna, it can also be achieved using a multi-antenna array.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 107 |
+
page_content=' The same applies to narrowband (NB)/wideband (WB) signals, single/multiple anchors, and availability/unavailability of a line-of-sight (LOS) path between the UE and the active signal source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 108 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 109 |
+
page_content=' Beacon-Assisted Localization With low-complexity beacons, high flexibility in the in- stallation and deployment of L&S systems is feasible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 110 |
+
page_content=' A typical use case could be a train station with multiple low- cost beacons broadcasting L&S reference signals to UEs to navigate indoors, via the support of RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 111 |
+
page_content=' In this category, we consider UE localization (with the aid of one or more RISs) and RIS localization (with the aid of several beacons).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 112 |
+
page_content=' A1) Single-RIS-Enabled UE Localization: In a WB system where the LOS channel is available, the delays of the LOS and RIS paths can be estimated based on the L&S reference signals sent from a beacon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 113 |
+
page_content=' Assuming the RIS and beacon states are known, the angle-of-departure (AOD) at the RIS can also be estimated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 114 |
+
page_content=' The target UE can then be localized by the intersection of a hyperbola (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 115 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 116 |
+
page_content=', time-difference-of- arrival (TDOA) of the LOS and RIS paths) and the line in the direction of the AOD at the RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 117 |
+
page_content=' When the target UE is equipped with an antenna array, 3D orientation can also be estimated based on the estimated angle-of-arrivals (AOAs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 118 |
+
page_content=' This is the basic RIS-enabled localization scenario that only requires a single low-complexity beacon [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 119 |
+
page_content=' A2) Multi-RIS-Enabled UE Localization: If multiple RISs are simultaneously available, the requirements for LOS and WB are unnecessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 120 |
+
page_content=' The AODs from different RISs can be estimated and used to localize the UE by intersecting the AOD lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 121 |
+
page_content=' In this way, localization tasks can be completed using NB signals, which saves bandwidth resources for communi- cations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 122 |
+
page_content=' Figure 3 shows the position error bound (PEB) of the target UE with different positions inside a 5 × 10 m2 area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 123 |
+
page_content=' As shown, with multiple RISs, the UE is localizable even under blockage of the LOS path between the beacon and the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 124 |
+
page_content=' 4 5 4 3 2 1 0 1 2 3 4 5 x axis [m] 0 1 2 3 4 5 y axis [m] Beacon RIS Wall 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 125 |
+
page_content='001 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 126 |
+
page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 127 |
+
page_content='1 1 [m] Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 128 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 129 |
+
page_content=' Scenarios A1 and A2: PEB (in meters) with different UE locations in a multi-RIS-aided localization scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 130 |
+
page_content=' The target UE can be localized with one RIS and a beacon-UE LOS path, or with at least 2 RISs under LOS blockage conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 131 |
+
page_content=' However, the localization tasks cannot be performed when only one anchor (beacon or RIS) is visible to the UE (see the yellow triangular area around the point [3, 3] m).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 132 |
+
page_content=' A3) RIS Localization via Multi-Static Sensing: In a scenario where passive UEs or objects are coated with RISs, the localization (or sensing, depending on scenarios) can be performed semi-passively with only a small amount of energy needed for localization coordination and RIS phase profile control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 133 |
+
page_content=' Such localization tasks can estimate the positions (and orientations) of RIS-coated objects by using several beacons with known positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 134 |
+
page_content=' Note that the geometrical constraints can largely reduce the difficulties in these scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 135 |
+
page_content=' For example, the orientation of an RIS can be assumed as 1D (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 136 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 137 |
+
page_content=', placed on the top of a car facing up).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 138 |
+
page_content=' In addition, the adoption of antenna arrays at the beacons can further simplify the RIS localization problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 139 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 140 |
+
page_content=' Cooperative Localization Sidelink communications (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 141 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 142 |
+
page_content=', device-to-device (D2D) communications, or the vehicular version known as vehicle- to-everything (V2X) communications) has been introduced in the millimeter-wave band for information exchange between vehicles, opening the road for numerous use cases, such as platooning, collision avoidance and autonomous driving [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 143 |
+
page_content=' The combination of RISs and sidelink is expected to provide low-latency and high-reliability communications [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 144 |
+
page_content=' Interestingly, it can also be exploited to assist L&S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 145 |
+
page_content=' Sidelink communications enables UEs to participate in a cooperative manner in the sharing of position and surrounding information within a local network, and in performing relative location estimation using sidelink signals [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 146 |
+
page_content=' We will focus on the latter case, where the absolute location can be estimated using RIS anchors (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 147 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 148 |
+
page_content=', with known position and orientation information), without any APs or beacons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 149 |
+
page_content=' A typical scenario could be cooperative vehicular networks in urban areas with severe AP and GPS signal blockages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 150 |
+
page_content=' We next discuss single- and multi-RIS-involved localization scenarios, where single-antenna UEs cooperate to estimate their positions via WB sidelink signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 151 |
+
page_content=' We also consider a more general scenario where RIS-coated objects are involved, resulting in cooperative RIS localization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 152 |
+
page_content=' B1) Single-RIS-Enabled Cooperative Localization: Con- sider a scenario with several UEs and one RIS anchor, where the UEs wish to estimate their positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 153 |
+
page_content=' We assume that each UE can send sidelink signals (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 154 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 155 |
+
page_content=', being the transmitter (TX)) to other UEs, which arrive at the receiver (RX) UEs via two paths (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 156 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 157 |
+
page_content=', the UE-UE and UE-RIS-UE paths).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 158 |
+
page_content=' By proper control of the RIS elements, those two paths can be separated, and thus, two delay measurements can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 159 |
+
page_content=' Due to the unknown states of the UEs, both the AOD and AOA at the RIS for every TX-RX pair of UEs are unknown and cannot be directly estimated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 160 |
+
page_content=' However, we can estimate the spatial frequency information at the RIS for every TX-RX pair.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 161 |
+
page_content=' This scenario requires at least three UEs to cooperate and render their locations feasibly without ambiguities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 162 |
+
page_content=' Figure 4 compares the PEBs for three UEs in an RIS-enabled versus beacon-aided (equipped with an antenna array) 3D cooperative localization scenario as a function of the number of RIS elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 163 |
+
page_content=' B2) Multi-RIS-Enabled One-Way Sidelink Localization: In the scenario with at least two RISs, one-way sidelink communications is sufficient to localize both the TX and RX UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 164 |
+
page_content=' Assume that one UE takes the role of the TX and the other UE is the RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 165 |
+
page_content=' With two RISs, three delay measurements can be obtained between the TX and RX via the LOS and the two RIS paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 166 |
+
page_content=' However, that would require an optimal joint design of the reflection elements at both RISs to be able to separate the paths at the RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 167 |
+
page_content=' In addition, once the RIS paths are separated, we can also estimate the spatial frequency information at each RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 168 |
+
page_content=' Thus, those collected measurements can be utilized to estimate the locations of the TX and RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 169 |
+
page_content=' B3) Cooperative RIS Localization: Let us consider a more general scenario where one RIS (or several) with a known state is used to localize multiple UEs (with sidelink capabilities) and objects (coated with an RIS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 170 |
+
page_content=' This scenario is challenging due to the high complexity of the network and a large number of unknowns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 171 |
+
page_content=' However, with a proper design of all the involved RIS profiles and the transmission protocol, this problem can be decomposed into a cooperative localization (see B1) and an RIS localization (see A3) problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 172 |
+
page_content=' Similar to B1, at least several UEs (depending on scenarios) need to take the role of the TX, and transmit sidelink signals to the other UEs via the direct and indirect paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 173 |
+
page_content=' Once the UEs are localized, the RIS localization task can be solved similarly to A3, and the estimation results can be refined by processing all the available information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 174 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 175 |
+
page_content=' Self-L&S with a Full-Duplex Transceiver When a UE is equipped with a full-duplex transceiver (like radar) [8], the multi-RIS setup and cooperation between UEs are unnecessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 176 |
+
page_content=' Instead, this UE can perform self-positioning with a single RIS and use the multipath components to map the environment over time;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 177 |
+
page_content=' this process is known as monostatic simultaneous localization and mapping (SLAM).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 178 |
+
page_content=' It is noted that SLAM is not limited to full-duplex UEs, and bistatic SLAM can also be performed in use cases A1-A3 and B1- B3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 179 |
+
page_content=' We next present three beacon-free L&S scenarios with a full-duplex UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 180 |
+
page_content=' 5 0 20 40 60 80 100 120 140 160 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 181 |
+
page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 182 |
+
page_content='5 UE-1 (RIS) UE-1 (beacon) UE-2 (RIS) UE-2 (beacon) UE-3 (RIS) UE-3 (beacon) Number of RIS Elements PEB [m] Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 183 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 184 |
+
page_content=' PEBs of RIS-enabled vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 185 |
+
page_content=' beacon-aided cooperative localization for different RIS sizes and a fixed random phase profile setup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 186 |
+
page_content=' It is shown that, with a sufficient number of RIS elements, an active anchor can be replaced with a passive one (RIS) without performance degradation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 187 |
+
page_content=' C1) RIS-Enabled Self-Localization: Consider a system with a single-antenna UE and an RIS, where the UE transmits L&S reference signals and receives their back-scattered ver- sions, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 188 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 189 |
+
page_content=', the UE-RIS-UE (controlled path) and UE-landmark- UE (uncontrolled path) signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 190 |
+
page_content=' One option for the RIS phase profiles is to consider directional reflective beams, which can be efficiently designed when the UE position uncertainty (even under mobility cases) is available [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 191 |
+
page_content=' The delay and angle information at the RIS of the UE-RIS-UE channel can be estimated for this scenario, and then used to localize the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 192 |
+
page_content=' In Figure 5, beampatterns at the RIS with two different phase pro- files are illustrated, focusing on the UE uncertainty region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 193 |
+
page_content=' As demonstrated, the optimized phase profiles of [13] can provide sufficient beamforming gain, compared with directional phase profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 194 |
+
page_content=' This gain can offer improved L&S performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 195 |
+
page_content=' C2) RIS-Enabled SLAM: If a UE is equipped with a full-duplex multiple-input multiple-output (MIMO) antenna array [8], SLAM can be enabled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 196 |
+
page_content=' Similar to scenario C1, the signals from different paths can be resolvable with optimized RIS phase profiles and precoders/combiners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 197 |
+
page_content=' The following channel parameters can be estimated: i) the signal propagation delay, the AOD at the RIS, and the AOA at the UE for the UE-RIS-UE channel;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 198 |
+
page_content=' as well as ii) the delay and AOA at the UE for each UE-landmark-UE channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 199 |
+
page_content=' In addition to the position information obtained from the controlled path (as in scenario C1), the angular resolution offered by the UE array can be leveraged to map/sense the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 200 |
+
page_content=' With multiple estimations, the localization and radio mapping performance can be improved using state-of-the-art filters (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 201 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 202 |
+
page_content=', Poisson multi-Bernoulli filter).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 203 |
+
page_content=' C3) RIS Localization with a Full-Duplex Array: Consider the more general scenario from C1 including one anchor RIS mounted on a wall, a UE equipped with a full-duplex MIMO transceiver, and several objects coated with RISs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 204 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 205 |
+
page_content=', mounted on the front and rear side of a vehicle).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 206 |
+
page_content=' In addition to the signals reflected from the anchor RIS (as also in scenario C1), the UE also receives single-bounce reflected signals from the RISs mounted on the objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 207 |
+
page_content=' The time delay, AOA, and the amplitude of the channel gain for each signal path can be estimated, which can be used for the localization of both itself and the RISs-coated objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 208 |
+
page_content=' When multiple UEs are present and cooperate in the estimation process, the orientation of the (a) Directional Phase Profiles (b) Optimized Phase Profiles Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 209 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 210 |
+
page_content=' The reflective beamforming gain (in dB) with a 50 × 50 RIS using (a) a directional phase profile, and (b) an optimized phase profile via [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 211 |
+
page_content=' The red squares represent the UE angular uncertainty region, which needs to be fully covered by an effective beampattern design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 212 |
+
page_content=' RISs-coated objects can also be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 213 |
+
page_content=' In a scenario without any anchors, this RIS localization can also help in estimating the relative locations of the active UE and passive UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 214 |
+
page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 215 |
+
page_content=' OPEN RESEARCH CHALLENGES With the assistance of low-complexity beacons, cooperative localization, and full-duplex radios, the L&S coverage for smart city applications can be significantly extended.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 216 |
+
page_content=' However, there exist several practical issues that need to be thoroughly investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 217 |
+
page_content=' In this section, we discuss the most critical challenges with the proposed RIS-enabled L&S system and list possible directions for future research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 218 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 219 |
+
page_content=' Anchor Deployment Optimization The placement of the anchors (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 220 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 221 |
+
page_content=', beacons and RISs) is critical to meet the L&S key performance indicator (KPI) re- quirements within a service area (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 222 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 223 |
+
page_content=', error bounds lower than a certain threshold, as shown in Figure 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 224 |
+
page_content=' The deployment involves both the position and orientation optimization of the anchors, taking into account the blockage in the surrounding environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 225 |
+
page_content=' RIS-aided SLAM can help in creating such an environment map, which can be supported by cooperative sidelink UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 226 |
+
page_content=' Heuristic optimization solutions can then be applied for finding optimal anchor sites, extending approaches from the literature [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 227 |
+
page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 228 |
+
page_content='100100150evation20 Gro40 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 229 |
+
page_content='M06080J60 azllBeaiot0 muthele100100150evation20 G[o]40 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 230 |
+
page_content='=060 B80ncertain60 azilReaiol Vmuth6 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 231 |
+
page_content=' Resource Allocation and Coordination RIS-aided L&S systems involve APs, beacons, RISs, and UEs, making them inherently heterogeneous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 232 |
+
page_content=' Resource al- location for L&S tasks, including power allocation, time- frequency allocation, beamforming design, and scheduling must be carefully designed to ensure a favorable trade-off with conventional communication services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 233 |
+
page_content=' Depending on the KPI requirements of the applications that send L&S ser- vice requests, new objectives that consider integrated L&S and communications should be formulated and satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 234 |
+
page_content=' An important part of resource allocation is RIS phase profile optimization and multiplexing [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 235 |
+
page_content=' Broad RIS beams lead to coverage reduction, while narrow pencil beams are sensitive to misalignment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 236 |
+
page_content=' Hence, highly adaptive RIS profile designs are needed, relying, when possible, on prior UE and object state information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 237 |
+
page_content=' When RISs are large, the near-field effects need to be taken into consideration and the beamforming designs should account for the curvature of arrival, resulting in beam- focusing designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 238 |
+
page_content=' RIS multiplexing can be addressed by time multiplexing, temporal coding, and making use of high path loss for spatial reuse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 239 |
+
page_content=' The afore-described resource allocation problems can be tackled by a combination of traditional optimization-based methods (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 240 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 241 |
+
page_content=', convex optimization) and learning-based methods (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 242 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 243 |
+
page_content=', reinforcement learning).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 244 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 245 |
+
page_content=' Estimation Algorithms From an algorithmic perspective, there are challenges re- lated to channel parameter estimation, tracking in dynamic environments, and calibration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 246 |
+
page_content=' Channel parameter estimation in the presence of severe multipath is difficult since almost passive reflective RISs have no local signal processing capa- bilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 247 |
+
page_content=' Moreover, in cooperative localization (scenarios B1 and B2) and RIS localization (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 248 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 249 |
+
page_content=', scenarios A3, B3, and C3) tasks, the AOAs/AODs at the RISs are coupled, meaning that we can no longer estimate them independently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 250 |
+
page_content=' Instead, only spatial frequencies (containing coupled AOAs and AODs information) can be obtained, requiring novel algorithms for further processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 251 |
+
page_content=' More refined channel parameter estimation also requires accurate channel models and the RISs’ impact on them, such as the near-field effect, beam squint effect, RIS element failures, and anchor calibration errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 252 |
+
page_content=' Due to mobility, difficult conditions such as signal blockage, unresolvable signal paths, and severe path loss will affect L&S performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 253 |
+
page_content=' Multiple RISs can be involved to handle such blockages, offering coverage extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 254 |
+
page_content=' As the carrier fre- quency increases, the signal resolutions become higher, and the effect of the severe path loss can be mitigated by adopting RISs with larger sizes or active RISs with reflection amplification capabilities [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 255 |
+
page_content=' Sensing also suffers from inherent complica- tions, such as an unknown number of objects, unknown types of objects, unknown detection probabilities for signal paths, extended objects, and multi-bounce observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 256 |
+
page_content=' Dedicated filters should be developed to address these complications and get integrated into the L&S framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 257 |
+
page_content=' Finally, in terms of calibration, anchor geometry error and hardware impairments (HWIs) are two important aspects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 258 |
+
page_content=' We note that the geometrical calibration of an RIS is similar to RIS localization (as described in scenarios A3, B3, and C3), which requires a calibration agent that incorporates other sources of localization estimations (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 259 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 260 |
+
page_content=', sensor fusion).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 261 |
+
page_content=' While for HWIs, the channel model could be too complicated when considering each specific impairment (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 262 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 263 |
+
page_content=', mutual coupling and phase noise), learning-based methods can be considered to unveil their impact and drive practical algorithmic designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 264 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 265 |
+
page_content=' Understanding Anchor Hardware Alternatives There are also opportunities to improve L&S coverage via variations of the hardware deployed at the beacons, RISs, and UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 266 |
+
page_content=' On the beacon and UE sides, multi-panel arrays (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 267 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 268 |
+
page_content=', 3D arrays) could be implemented for further coverage extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 269 |
+
page_content=' On the RIS side, new types of RISs are emerging beyond almost passive reflective RISs [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 270 |
+
page_content=' As previously mentioned, an active RIS can be used to boost the signal energy (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 271 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 272 |
+
page_content=', change both the amplitude and phase of the incident signal) for improved coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 273 |
+
page_content=' A receiving RIS (also known as a hybrid RIS or a simultaneously reflecting and sensing RIS) can enable parameter estimation at the RIS side, offering extra degrees of freedom for the design of L&S estimation approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 274 |
+
page_content=' Omni-directional RISs, intended to realize simultaneous reflec- tion and refraction (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 275 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 276 |
+
page_content=', 360◦ coverage), enable simultaneous indoor and outdoor 3D localization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 277 |
+
page_content=' A non-reciprocal RIS that integrates nonreciprocal phase shifters allows full-duplex communications, and a delay-adjustable RIS is capable of adjusting the delays of signals reflected by different RIS elements, which contributes to the alleviation of the beam squint effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 278 |
+
page_content=' All of these alternatives have implications on L&S services and merit further study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 279 |
+
page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 280 |
+
page_content=' Privacy, Security, and Social Acceptance Issues Cooperative L&S require extensive information exchange of local measurements between devices, which may cause privacy issues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 281 |
+
page_content=' For example, the RX in scenario B2 can estimate the position of the TX with a one-way pilot signal transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 282 |
+
page_content=' In addition, different types of cyber attacks can reduce the L&S service availability, or even provide an undetected erroneous location estimation, which is unacceptable for safety-critical applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 283 |
+
page_content=' Currently, several security management systems have been standardized (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 284 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 285 |
+
page_content=', IEEE 1609.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 286 |
+
page_content='2), and security threats have been identified for sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 287 |
+
page_content=' However, the discussions on L&S task-related security issues are still at the initial stage, and potential threats need to be explored and eliminated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 288 |
+
page_content=' A final aspect related to the widespread adoption of RISs lies in their social acceptance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 289 |
+
page_content=' RISs should be integrated in a way that they blend into the environment (ideally, be transparent).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 290 |
+
page_content=' To this end, the benefits of RISs to improve safety and reduce electromagnetic emissions should be demonstrated and disseminated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 291 |
+
page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 292 |
+
page_content=' CONCLUSION AND OUTLOOK The smart city paradigm constitutes the epitome of the widespread adoption of digital services for societal needs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 293 |
+
page_content=' It is envisioned to profit people and city-level businesses, offering ef���cient, safe, and comfortable living spaces as well 7 as everyday-life smart-living applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 294 |
+
page_content=' To achieve this overarching goal, seamless wireless communications among diverse devices and L&S are of paramount importance, en- abling information exchange, device localization, and mapping of the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 295 |
+
page_content=' In this article, we discussed the key to achieving low-cost and energy-efficient seamless L&S, namely, reflective RISs in conjunction with sidelink commu- nications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 296 |
+
page_content=' We presented AP-coordinated and AP-free system architectures and detailed three RIS-enabled L&S scenarios, each including several use cases and most relying on sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 297 |
+
page_content=' As became apparent, instead of using APs with full communication capabilities, low-complexity beacons and RISs can be widely-deployed to enable green L&S smart city applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 298 |
+
page_content=' In addition, when multiple UEs with sidelink communication capabilities can be connected in the same network, cooperative localization can relieve the requirement for multiple anchors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 299 |
+
page_content=' Furthermore, when devices are equipped with full-duplex transceivers, they can localize themself and map their surrounding environment with only a single RIS anchor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 300 |
+
page_content=' Finally, an extended list of open research challenges relevant to the proposed RIS-enabled seamless L&S concept was presented, including the necessity for anchor deployment optimization and optimized resource allocation schemes, al- gorithmic and privacy issues, as well as the role of multi- functional RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 301 |
+
page_content=' ACKNOWLEDGMENTS This work was supported, in part, by the European Com- mission through the EU H2020 RISE-6G project under grant 101017011, and by the 6G-Cities project from Chalmers Transport Area of Advance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 302 |
+
page_content=' REFERENCES [1] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 303 |
+
page_content=' Kisseleff et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 304 |
+
page_content=', “Reconfigurable intelligent surfaces for smart cities: Research challenges and opportunities,” IEEE Open J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 305 |
+
page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 306 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 307 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 308 |
+
page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 309 |
+
page_content=' 1781–1797, Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 310 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 311 |
+
page_content=' [2] “3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 312 |
+
page_content='855 V16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 313 |
+
page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 314 |
+
page_content='0: Study on NR positioning support (Release 16) (accessed on 28-Dec-2022),” Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 315 |
+
page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 316 |
+
page_content=' [On- line].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 317 |
+
page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 318 |
+
page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 319 |
+
page_content='org/desktopmodules/Specifications/ SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 320 |
+
page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 321 |
+
page_content='specificationId=3501 [3] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 322 |
+
page_content=' Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 323 |
+
page_content=', “Wi-Fi sensing based on IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 324 |
+
page_content='11bf,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 325 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 326 |
+
page_content=', (Early Access), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 327 |
+
page_content=' [4] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 328 |
+
page_content=' Strinati Calvanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 329 |
+
page_content=', “Reconfigurable, intelligent, and sustainable wireless environments for 6G smart connectivity,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 330 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 331 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 332 |
+
page_content=' 59, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 333 |
+
page_content=' 10, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 334 |
+
page_content=' 99–105, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 335 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 336 |
+
page_content=' [5] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 337 |
+
page_content=' Wymeersch et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 338 |
+
page_content=', “Radio localization and mapping with recon- figurable intelligent surfaces: Challenges, opportunities, and research directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 339 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 340 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 341 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 342 |
+
page_content=' 15, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 343 |
+
page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 344 |
+
page_content=' 52–61, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 345 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 346 |
+
page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 347 |
+
page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 348 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 349 |
+
page_content=' Garcia et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 350 |
+
page_content=', “A tutorial on 5G NR V2X communications,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 351 |
+
page_content=' Surveys Tuts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 352 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 353 |
+
page_content=' 23, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 354 |
+
page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 355 |
+
page_content=' 1972–2026, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 356 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 357 |
+
page_content=' [7] “3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 358 |
+
page_content='845 V17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 359 |
+
page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 360 |
+
page_content='0: Study on scenarios and requirements of in-coverage, partial coverage, and out-of-coverage NR positioning use cases (Release 17) (accessed on 28-Dec-2022),” Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 361 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 362 |
+
page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 363 |
+
page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 364 |
+
page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 365 |
+
page_content='org/desktopmodules/ Specifications/SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 366 |
+
page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 367 |
+
page_content='specificationId=3806 [8] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 368 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 369 |
+
page_content=' Alexandropoulos et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 370 |
+
page_content=', “Full-duplex massive multiple-input, multiple-output architectures: Recent advances, applications, and future directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 371 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 372 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 373 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 374 |
+
page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 375 |
+
page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 376 |
+
page_content=' 83–91, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 377 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 378 |
+
page_content=' [9] “3GPP TS 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 379 |
+
page_content='455 V17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 380 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 381 |
+
page_content='0: NR Positioning Protocol A (NRPPa) (Release 17) (accessed on 28-Dec-2022),” Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 382 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 383 |
+
page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 384 |
+
page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 385 |
+
page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 386 |
+
page_content='org/desktopmodules/ Specifications/SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 387 |
+
page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 388 |
+
page_content='specificationId=3256 [10] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 389 |
+
page_content=' Keykhosravi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 390 |
+
page_content=', “RIS-enabled SISO localization under user mo- bility and spatial-wideband effects,” IEEE J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 391 |
+
page_content=' Sel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 392 |
+
page_content=' Topics Signal Process, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 393 |
+
page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 394 |
+
page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 395 |
+
page_content=' 1125–1140, May.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 396 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 397 |
+
page_content=' [11] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 398 |
+
page_content=' Gu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 399 |
+
page_content=', “Intelligent surface aided D2D-V2X system for low- latency and high-reliability communications,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 400 |
+
page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 401 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 402 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 403 |
+
page_content=' 71, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 404 |
+
page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 405 |
+
page_content=' 11 624–11 636, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 406 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 407 |
+
page_content=' [12] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 408 |
+
page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 409 |
+
page_content=' Ko et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 410 |
+
page_content=', “V2X-based vehicular positioning: Opportunities, chal- lenges, and future directions,” IEEE Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 411 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 412 |
+
page_content=' 28, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 413 |
+
page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 414 |
+
page_content=' 144–151, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 415 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 416 |
+
page_content=' [13] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 417 |
+
page_content=' Kim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 418 |
+
page_content=', “RIS-enabled and access-point-free simultaneous radio localization and mapping,” arXiv preprint arXiv:2212.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 419 |
+
page_content='07141, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 420 |
+
page_content=' [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 421 |
+
page_content=' Albanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 422 |
+
page_content=', “LOKO: localization-aware roll-out planning for future mobile networks,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 423 |
+
page_content=' Mobile Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 424 |
+
page_content=', (Early Access), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 425 |
+
page_content=' [15] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 426 |
+
page_content=' Jian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 427 |
+
page_content=', “Reconfigurable intelligent surfaces for wireless commu- nications: Overview of hardware designs, channel models, and estima- tion techniques,” Intell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 428 |
+
page_content=' Converged Netw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 429 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 430 |
+
page_content=' 3, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 431 |
+
page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 432 |
+
page_content=' 1–32, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 433 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 434 |
+
page_content=' Hui Chen (hui.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 435 |
+
page_content='chen@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 436 |
+
page_content='se) is a postdoctoral researcher at Chalmers University of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 437 |
+
page_content=' Hyowon Kim (hyowon@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 438 |
+
page_content='se) is a postdoctoral researcher at Chalmers University of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 439 |
+
page_content=' Mustafa Ammous (mustafa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 440 |
+
page_content='ammous@mail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 441 |
+
page_content='utoronto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 442 |
+
page_content='ca) is a Ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 443 |
+
page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 444 |
+
page_content=' student at University of Toronto, Canada.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 445 |
+
page_content=' Gonzalo Seco-Granados (gonzalo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 446 |
+
page_content='seco@uab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 447 |
+
page_content='cat) is a professor at Universitat Autonoma of Barcelona, Spain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 448 |
+
page_content=' George C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 449 |
+
page_content=' Alexandropoulos (alexandg@di.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 450 |
+
page_content='uoa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 451 |
+
page_content='gr) is an assistant professor at the Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, Greece.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 452 |
+
page_content=' Shahrokh Valaee (valaee@ece.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 453 |
+
page_content='utoronto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 454 |
+
page_content='ca) is a professor at University of Toronto, Canada.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 455 |
+
page_content=' Henk Wymeersch (henkw@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
| 456 |
+
page_content='se) is a professor at Chalmers Univer- sity of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
|
8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/2301.02859v1.pdf.txt
ADDED
|
@@ -0,0 +1,1175 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
D-Optimal and Nearly D-Optimal Exact Designs for
|
| 2 |
+
Binary Response on the Ball
|
| 3 |
+
Martin Radloff† and Rainer Schwabe‡
|
| 4 |
+
Abstract: In this paper the results of Radloff and Schwabe (2019a) will be
|
| 5 |
+
extended for a special class of symmetrical intensity functions. This includes
|
| 6 |
+
binary response models with logit and probit link. To evaluate the position
|
| 7 |
+
and the weights of the two non-degenerated orbits on the k-dimensional ball
|
| 8 |
+
usually a system of three equations has to be solved. The symmetry allows
|
| 9 |
+
to reduce this system to a single equation. As a further result, the number of
|
| 10 |
+
support points can be reduced to the minimal number. These minimally sup-
|
| 11 |
+
ported designs are highly efficient. The results can be generalized to arbitrary
|
| 12 |
+
ellipsoidal design regions.
|
| 13 |
+
Key words and phrases: Binary response models, D-optimality, k-dimensional
|
| 14 |
+
ball, logit and probit model, multiple regression models, simplex.
|
| 15 |
+
1. Introduction
|
| 16 |
+
Spherical design spaces can occur in engineering or physics problems where the validity of
|
| 17 |
+
a model may be assumed on a spherical region around a target value. So (linear) models
|
| 18 |
+
on spherical design spaces were investigated early in publications like Kiefer (1961) and
|
| 19 |
+
Farrell et al (1967) which discuss polynomial regression on the ball. These ideas were
|
| 20 |
+
followed up by papers in which also only linear problems were focused. So Lau (1988)
|
| 21 |
+
fitted polynomials on the k-dimensional unit ball by using canonical moments. In Dette
|
| 22 |
+
et al (2005, 2007) and Hirao et al (2015) harmonic polynomials and Zernike polynomials
|
| 23 |
+
were used to be fit on the unit disc (2-dimensional unit ball), the 3- and k-dimensional
|
| 24 |
+
unit ball. On the other hand generalized linear models are also well-examined and used
|
| 25 |
+
in practical application. Logit and probit models, for example, in one dimension on an
|
| 26 |
+
interval have already been investigated by Ford et al (1992) and Biedermann et al (2006).
|
| 27 |
+
But there seems to be no available literature which combines both topics.
|
| 28 |
+
In our publication Radloff and Schwabe (2019b) we took the first step to bring non-
|
| 29 |
+
linearity or generalized linear models, respectively, and spherical design regions together.
|
| 30 |
+
These results were extended to a wider class of non-linear models in our follow-up paper
|
| 31 |
+
Radloff and Schwabe (2019a).
|
| 32 |
+
†corresponding author: Martin Radloff, Institute for Mathematical Stochastics, Otto-von-Guericke-
|
| 33 |
+
University, PF 4120, 39016 Magdeburg, Germany, martin.radloff@ovgu.de
|
| 34 |
+
‡Rainer Schwabe, Institute for Mathematical Stochastics, Otto-von-Guericke-University, PF 4120,
|
| 35 |
+
39016 Magdeburg, Germany, rainer.schwabe@ovgu.de
|
| 36 |
+
arXiv:2301.02859v1 [stat.ME] 7 Jan 2023
|
| 37 |
+
|
| 38 |
+
Martin Radloff, Rainer Schwabe
|
| 39 |
+
Exact Designs on the Ball
|
| 40 |
+
For better comprehensibility, we will start with the model description and give a brief
|
| 41 |
+
overview of the findings so far. Then we will consider a special class of intensity func-
|
| 42 |
+
tions which allows to reduce the the complexity of finding (locally) D-optimal designs.
|
| 43 |
+
Afterwards we will tackle the problem, that the optimal designs are not exact designs in
|
| 44 |
+
general, by establishing highly efficient designs on the ball.
|
| 45 |
+
2. General Model Description
|
| 46 |
+
As in Radloff and Schwabe (2019b) and Radloff and Schwabe (2019a), where we described
|
| 47 |
+
(locally) D-optimal designs for two special classes of linear and non-linear models on a
|
| 48 |
+
k-dimensional unit ball Bk = {x ∈ Rk : x2
|
| 49 |
+
1 + . . . + x2
|
| 50 |
+
k ≤ 1} with k ∈ N, we solely focus
|
| 51 |
+
(non-linear) multiple regression models, which means the linear predictor is
|
| 52 |
+
f(x)⊤β = β0 + β1x1 + . . . + βkxk
|
| 53 |
+
with regression function f : Bk → Rk+1, x �→ (1, x1, . . . , xk)⊤, and parameter vector
|
| 54 |
+
β = (β0, β1, . . . , βk)⊤ ∈ Rk+1. The one-support-point (or elemental) information matrix
|
| 55 |
+
should be representable in the form
|
| 56 |
+
M(x, β) = λ
|
| 57 |
+
�
|
| 58 |
+
f(x)⊤β
|
| 59 |
+
�
|
| 60 |
+
f(x)f(x)⊤
|
| 61 |
+
with an intensity (or efficiency) function λ which only depends on the value of the linear
|
| 62 |
+
predictor f(x)⊤β. These one-support-point (or elemental) information matrices are the
|
| 63 |
+
base for the information matrix of a (generalized) design ξ with independent observations
|
| 64 |
+
M(ξ, β) =
|
| 65 |
+
�
|
| 66 |
+
M(x, β) ξ(dx) =
|
| 67 |
+
�
|
| 68 |
+
λ
|
| 69 |
+
�
|
| 70 |
+
f(x)⊤β
|
| 71 |
+
�
|
| 72 |
+
f(x)f(x)⊤ξ(dx) .
|
| 73 |
+
Here generalized design means an arbitrary probability measure on the design region Bk.
|
| 74 |
+
These information matrices allow to define the (local) D-optimality, which is one of the
|
| 75 |
+
most popular criteria in experimental design theory. A design ξ∗
|
| 76 |
+
β0 with regular infor-
|
| 77 |
+
mation matrix M(ξ∗
|
| 78 |
+
β0, β0) is called (locally) D-optimal (at β0) if det(M(ξ∗
|
| 79 |
+
β0, β0)) ≥
|
| 80 |
+
det(M(ξ, β0)) holds for all suitable probability measures ξ on the design space — here
|
| 81 |
+
Bk. This optimality criterion can be interpreted as the minimization of the volume of the
|
| 82 |
+
(asymptotic) confidence ellipsoid.
|
| 83 |
+
3. Prior Results
|
| 84 |
+
In Radloff and Schwabe (2016) we stated results on equivariance and invariance.
|
| 85 |
+
By
|
| 86 |
+
rotating the design space Bk — the k-dimensional unit ball — and the parameter space
|
| 87 |
+
Rk+1 in an analogous way the linear predictor of the multiple regression problem reduces
|
| 88 |
+
to
|
| 89 |
+
f(x)⊤β = β0 + β1x1
|
| 90 |
+
and
|
| 91 |
+
β1 ≥ 0 .
|
| 92 |
+
(3.1)
|
| 93 |
+
Using the rotation invariance with fixed x1, this means the invariance to all orthogonal
|
| 94 |
+
transformations in O(k) which let the x1-component unchanged, the (locally) D-optimal
|
| 95 |
+
(generalized) design ξ∗ can be decomposed (ξ∗ = ξ∗
|
| 96 |
+
1 ⊗ η) in a marginal probability measure
|
| 97 |
+
ξ∗
|
| 98 |
+
1 on [−1, 1] for x1 and a probability kernel η given x1. For fixed x1 the kernel η(x1, ·) is
|
| 99 |
+
2
|
| 100 |
+
|
| 101 |
+
Martin Radloff, Rainer Schwabe
|
| 102 |
+
Exact Designs on the Ball
|
| 103 |
+
the uniform distribution on the surface of a (k − 1)-dimensional ball with radius
|
| 104 |
+
�
|
| 105 |
+
1 − x2
|
| 106 |
+
1
|
| 107 |
+
— the orbit at position x1.
|
| 108 |
+
As a consequence the multidimensional problem collapses to a one-dimensional marginal
|
| 109 |
+
problem. Only the positions of the orbits and their weights have to be determined. To get
|
| 110 |
+
an exact design the uniform orbits have to be discretized, for example, by using regular
|
| 111 |
+
simplices.
|
| 112 |
+
In our first paper — Radloff and Schwabe (2019b) — we started with models where the
|
| 113 |
+
intensity function belongs to the class of monotonous functions. Such models have already
|
| 114 |
+
been investigated in one dimension, for example, by Konstantinou et al (2014) and on
|
| 115 |
+
multidimensional cuboids or orthants by Schmidt and Schwabe (2017). These authors
|
| 116 |
+
gave the following four conditions on the intensity function λ:
|
| 117 |
+
(A1) λ is positive on R and twice continuously differentiable.
|
| 118 |
+
(A2) The first derivative λ′ is positive on R.
|
| 119 |
+
(A3) The second derivative u′′ of u = 1
|
| 120 |
+
λ is injective on R.
|
| 121 |
+
(A4) The function λ′
|
| 122 |
+
λ is non-increasing.
|
| 123 |
+
Condition (A2) is the motivation for the name class of monotonous intensity functions.
|
| 124 |
+
The intensity functions of this class have to satisfy always (A1) to (A3). (A4) is an extra
|
| 125 |
+
condition to guarantee uniqueness. For a concise notation
|
| 126 |
+
q(x1) = λ(β0 + β1x1)
|
| 127 |
+
is used and the properties (A1), (A2), (A3) and (A4) transfer to q for β1 > 0, respectively,
|
| 128 |
+
and vice versa. Poisson regression with intensity function qP(x1) = exp(β0 + β1x1) and
|
| 129 |
+
negative binomial regression as well as special proportional hazard models with censoring,
|
| 130 |
+
see Schmidt and Schwabe (2017), satisfy all four conditions.
|
| 131 |
+
If β1 = 0 then the intensity function q is always a constant. This yields to a (locally)
|
| 132 |
+
D-optimal design as it can be found in linear models. In Pukelsheim (1993, section 15.12)
|
| 133 |
+
such a design consists of the equally weighted vertices of a regular simplex inscribed in the
|
| 134 |
+
unit sphere, the boundary of the design space. The orientation of the simplex is arbitrary.
|
| 135 |
+
The main result for β1 > 0 in Radloff and Schwabe (2019b) is recited for the readers’
|
| 136 |
+
convenience.
|
| 137 |
+
Theorem 1. There is a (locally) D-optimal design for the multiple regression prob-
|
| 138 |
+
lem (3.1) with β1 > 0 and intensity function satisfying (A1)-(A3) which has one support
|
| 139 |
+
point equal to (1, 0, . . . , 0)⊤ and the other k support points are the vertices of an arbi-
|
| 140 |
+
trarily rotated (k − 1)-dimensional regular simplex which is maximally inscribed in the
|
| 141 |
+
intersection of the k-dimensional unit ball and a hyperplane with x1 = x∗
|
| 142 |
+
12.
|
| 143 |
+
• For k ≥ 2 the position x∗
|
| 144 |
+
12 ∈ (−1, 1) is solution of
|
| 145 |
+
q′(x∗
|
| 146 |
+
12)
|
| 147 |
+
q(x∗
|
| 148 |
+
12) = 2 (1 + kx∗
|
| 149 |
+
12)
|
| 150 |
+
k (1 − x∗ 2
|
| 151 |
+
12 ) .
|
| 152 |
+
If additionally (A4) is satisfied, the solution x∗
|
| 153 |
+
12 is unique.
|
| 154 |
+
3
|
| 155 |
+
|
| 156 |
+
Martin Radloff, Rainer Schwabe
|
| 157 |
+
Exact Designs on the Ball
|
| 158 |
+
• For k = 1 the position x∗
|
| 159 |
+
12 ∈ [−1, 1) is either solution of
|
| 160 |
+
q′(x∗
|
| 161 |
+
12)
|
| 162 |
+
q(x∗
|
| 163 |
+
12) =
|
| 164 |
+
2
|
| 165 |
+
1 − x∗
|
| 166 |
+
12
|
| 167 |
+
,
|
| 168 |
+
if such a solution exists in [−1, 1), or otherwise x∗
|
| 169 |
+
12 = −1.
|
| 170 |
+
If additionally (A4) is satisfied, the solution x∗
|
| 171 |
+
12 is unique.
|
| 172 |
+
The design is equally weighted with
|
| 173 |
+
1
|
| 174 |
+
k+1.
|
| 175 |
+
It should be noted, that for fixed β this theorem does not need (A1) to (A4) on the
|
| 176 |
+
entire real line R. It is enough to have it in the ball and so on x1 ∈ [−1, 1] for q and on
|
| 177 |
+
[β0 − β1, β0 + β1] for λ, respectively. But the model has to satisfy the conditions always
|
| 178 |
+
on the whole real line.
|
| 179 |
+
In our second paper — Radloff and Schwabe (2019a) — the conditions (A2) and (A3)
|
| 180 |
+
were replaced by (A2′) and (A3′) and a fifth property (A5) was added.
|
| 181 |
+
(A2′) λ is unimodal with mode c(A2′)
|
| 182 |
+
λ
|
| 183 |
+
∈ R.
|
| 184 |
+
(A3′) There exists a threshold c(A3′)
|
| 185 |
+
λ
|
| 186 |
+
∈ R so that the second derivative u′′ of u = 1
|
| 187 |
+
λ is
|
| 188 |
+
both injective on (−∞, c(A3′)
|
| 189 |
+
λ
|
| 190 |
+
] and injective on [c(A3′)
|
| 191 |
+
λ
|
| 192 |
+
, ∞).
|
| 193 |
+
(A5) u = 1
|
| 194 |
+
λ dominates z2 asymptotically for z → ∞.
|
| 195 |
+
In this context condition (A2′) means that there exists a c(A2′)
|
| 196 |
+
λ
|
| 197 |
+
∈ R so that λ′ is positive
|
| 198 |
+
on (−∞, c(A2′)
|
| 199 |
+
λ
|
| 200 |
+
) and negative on (c(A2′)
|
| 201 |
+
λ
|
| 202 |
+
, ∞).
|
| 203 |
+
Hence, there is only one local maximum
|
| 204 |
+
which is simultaneously the global maximum. So the class of intensity functions, which
|
| 205 |
+
satisfy (A1), (A2′) and (A3′), is called class of unimodal intensity functions.
|
| 206 |
+
Indeed (A2) or (A3) do not imply (A2′) or (A3′), respectively. As mentioned before, we
|
| 207 |
+
only focus on the unit ball and the interval x1 ∈ [−1, 1] for q or [β0 − β1, β0 + β1] for λ.
|
| 208 |
+
So in our special case (A2) and (A3) can be transferred to (A2′) and (A3′) by using an
|
| 209 |
+
arbitrary cλ > β0 + β1, which means that cq lies outside the interval [−1, 1] and only one
|
| 210 |
+
branch of the function is considered.
|
| 211 |
+
Property (A5) means
|
| 212 |
+
lim
|
| 213 |
+
z→∞
|
| 214 |
+
����
|
| 215 |
+
u(z)
|
| 216 |
+
z2
|
| 217 |
+
���� = ∞ .
|
| 218 |
+
This means that u(z) =
|
| 219 |
+
1
|
| 220 |
+
λ(z) goes faster to (±) infinity than z2 for z → ∞.
|
| 221 |
+
As (A1) to (A4) the conditions (A2′), (A3′) and (A5) transfer from the intensity function
|
| 222 |
+
λ to the abbreviated form q for β1 > 0 and vice versa — analogously c(·)
|
| 223 |
+
q
|
| 224 |
+
=
|
| 225 |
+
c(·)
|
| 226 |
+
λ −β0
|
| 227 |
+
β1
|
| 228 |
+
with
|
| 229 |
+
(·) is (A2′), (A3′) or empty.
|
| 230 |
+
The logit model has the intensity function
|
| 231 |
+
qlogit(x1) =
|
| 232 |
+
exp(β0 + β1x1)
|
| 233 |
+
(1 + exp(β0 + β1x1))2
|
| 234 |
+
and probit model has
|
| 235 |
+
qprobit(x1) =
|
| 236 |
+
φ2(β0 + β1x1)
|
| 237 |
+
Φ(β0 + β1x1) · (1 − Φ(β0 + β1x1))
|
| 238 |
+
4
|
| 239 |
+
|
| 240 |
+
Martin Radloff, Rainer Schwabe
|
| 241 |
+
Exact Designs on the Ball
|
| 242 |
+
with the density function φ and cumulative distribution function Φ of the standard normal
|
| 243 |
+
distribution. Both models satisfy all five conditions (A1), (A2′), (A3′), (A4), (A5) and
|
| 244 |
+
share a common c(A2′)
|
| 245 |
+
λ
|
| 246 |
+
= c(A3′)
|
| 247 |
+
λ
|
| 248 |
+
= 0, say cλ = 0. Analogously cq = − β0
|
| 249 |
+
β1 for q.
|
| 250 |
+
Beside these two models other models like the complementary log-log model, see Ford
|
| 251 |
+
et al (1992), with intensity function λcomp log log(z) =
|
| 252 |
+
exp(2z)
|
| 253 |
+
exp(exp(z))−1 satisfy all five conditions
|
| 254 |
+
with c(A2′)
|
| 255 |
+
λ
|
| 256 |
+
≈ 0.466011 and c(A3′)
|
| 257 |
+
λ
|
| 258 |
+
≈ 0.049084, but here mode c(A2′)
|
| 259 |
+
λ
|
| 260 |
+
and threshold c(A3′)
|
| 261 |
+
λ
|
| 262 |
+
do
|
| 263 |
+
not coincide.
|
| 264 |
+
We showed that if the (concise) intensity function q satisfies (A1), (A2′), (A3′) and (A5)
|
| 265 |
+
the (locally) D-optimal design ξ∗ = ξ∗
|
| 266 |
+
1 ⊗η is concentrated on exactly two orbits, which are
|
| 267 |
+
the support points of the marginal design ξ∗
|
| 268 |
+
1. The idea of the proof is based on Biedermann
|
| 269 |
+
et al (2006) and Konstantinou et al (2014).
|
| 270 |
+
The next theorem is the main result of our second paper — Radloff and Schwabe (2019a)
|
| 271 |
+
— and is reproduced for the readers’ convenience. It characterizes the positions of the
|
| 272 |
+
two support points of the optimal marginal design ξ∗
|
| 273 |
+
1.
|
| 274 |
+
Theorem 2. For k ≥ 2 the simplified problem (3.1) with β1 > 0 and intensity function q
|
| 275 |
+
satisfying (A1), (A2′), (A3′) and (A5) has a (locally) D-optimal marginal design ξ∗
|
| 276 |
+
1 with
|
| 277 |
+
exactly 2 support points x∗
|
| 278 |
+
11 and x∗
|
| 279 |
+
12 with x∗
|
| 280 |
+
11 > x∗
|
| 281 |
+
12 and weights w1 = ξ∗
|
| 282 |
+
1(x∗
|
| 283 |
+
11) and w2 =
|
| 284 |
+
ξ∗
|
| 285 |
+
1(x∗
|
| 286 |
+
12).
|
| 287 |
+
There are 3 cases:
|
| 288 |
+
(a) If c(A2′)
|
| 289 |
+
q
|
| 290 |
+
> 1 and c(A3′)
|
| 291 |
+
q
|
| 292 |
+
/∈ [−1, 1], then x∗
|
| 293 |
+
11 = 1, w1 =
|
| 294 |
+
1
|
| 295 |
+
k+1, w2 =
|
| 296 |
+
k
|
| 297 |
+
k+1 and x∗
|
| 298 |
+
12 ∈ (−1, 1)
|
| 299 |
+
is solution of
|
| 300 |
+
q′(x∗
|
| 301 |
+
12)
|
| 302 |
+
q(x∗
|
| 303 |
+
12) = 2 (1 + kx∗
|
| 304 |
+
12)
|
| 305 |
+
k (1 − x∗ 2
|
| 306 |
+
12 ) .
|
| 307 |
+
(3.2)
|
| 308 |
+
If additionally (A4) is satisfied, the solution x∗
|
| 309 |
+
12 is unique.
|
| 310 |
+
(b) If c(A2′)
|
| 311 |
+
q
|
| 312 |
+
< −1 and c(A3′)
|
| 313 |
+
q
|
| 314 |
+
/∈ [−1, 1], then x∗
|
| 315 |
+
12 = −1, w1 =
|
| 316 |
+
k
|
| 317 |
+
k+1, w2 =
|
| 318 |
+
1
|
| 319 |
+
k+1 and
|
| 320 |
+
x∗
|
| 321 |
+
11 ∈ (−1, 1) is solution of
|
| 322 |
+
q′(x∗
|
| 323 |
+
11)
|
| 324 |
+
q(x∗
|
| 325 |
+
11) = 2 (−1 + kx∗
|
| 326 |
+
11)
|
| 327 |
+
k (1 − x∗ 2
|
| 328 |
+
11 )
|
| 329 |
+
.
|
| 330 |
+
(3.3)
|
| 331 |
+
If additionally (A4) is satisfied, the solution x∗
|
| 332 |
+
11 is unique.
|
| 333 |
+
(c) Otherwise c(A2′)
|
| 334 |
+
q
|
| 335 |
+
∈ [−1, 1] or c(A3′)
|
| 336 |
+
q
|
| 337 |
+
∈ [−1, 1].
|
| 338 |
+
Let x, y ∈ R with x > y and α ∈
|
| 339 |
+
�
|
| 340 |
+
− 1
|
| 341 |
+
2, 1
|
| 342 |
+
2
|
| 343 |
+
�
|
| 344 |
+
be solution of the equation system:
|
| 345 |
+
q′(x)
|
| 346 |
+
q(x) +
|
| 347 |
+
2
|
| 348 |
+
x−y + (k−1) q′(x) (1−x2) ( 1
|
| 349 |
+
2 −α) + q(x) (−2 x) ( 1
|
| 350 |
+
2 −α)
|
| 351 |
+
q(x) (1−x2) ( 1
|
| 352 |
+
2 −α) + q(y) (1−y2) ( 1
|
| 353 |
+
2 +α) = 0
|
| 354 |
+
(3.4)
|
| 355 |
+
q′(y)
|
| 356 |
+
q(y) −
|
| 357 |
+
2
|
| 358 |
+
x−y + (k−1) q′(y) (1−y2) ( 1
|
| 359 |
+
2 +α) + q(y) (−2 y) ( 1
|
| 360 |
+
2 +α)
|
| 361 |
+
q(x) (1−x2) ( 1
|
| 362 |
+
2 −α) + q(y) (1−y2) ( 1
|
| 363 |
+
2 +α) = 0
|
| 364 |
+
(3.5)
|
| 365 |
+
1
|
| 366 |
+
1
|
| 367 |
+
2 −α −
|
| 368 |
+
1
|
| 369 |
+
1
|
| 370 |
+
2 +α + (k−1)
|
| 371 |
+
q(x) (1−x2) − q(y) (1−y2)
|
| 372 |
+
q(x) (1−x2) ( 1
|
| 373 |
+
2 −α) + q(y) (1−y2) ( 1
|
| 374 |
+
2 +α) = 0
|
| 375 |
+
(3.6)
|
| 376 |
+
5
|
| 377 |
+
|
| 378 |
+
Martin Radloff, Rainer Schwabe
|
| 379 |
+
Exact Designs on the Ball
|
| 380 |
+
Figure 1: Logit model for k = 3 and β1 = 1: Dependence of x∗
|
| 381 |
+
11 and x∗
|
| 382 |
+
12 (solid lines) and
|
| 383 |
+
the corresponding weights w1 and w2 = 1 − w1 (dashed lines) on −β0 = − β0
|
| 384 |
+
β1 =
|
| 385 |
+
cq ∈ [−1.2, 1.2].
|
| 386 |
+
(c0) If x, y ∈ (−1, 1) with x > y and α ∈ (− 1
|
| 387 |
+
2, 1
|
| 388 |
+
2) is a solution of the equation
|
| 389 |
+
system, the orbit positions are x∗
|
| 390 |
+
11 = x, x∗
|
| 391 |
+
12 = y with weights w1 =
|
| 392 |
+
1
|
| 393 |
+
2 − α
|
| 394 |
+
and w2 = 1
|
| 395 |
+
2 + α.
|
| 396 |
+
(c1) If x
|
| 397 |
+
≥
|
| 398 |
+
1 and y
|
| 399 |
+
∈
|
| 400 |
+
(−1, 1), then x∗
|
| 401 |
+
11
|
| 402 |
+
=
|
| 403 |
+
1, w1
|
| 404 |
+
=
|
| 405 |
+
1
|
| 406 |
+
k+1, w2
|
| 407 |
+
=
|
| 408 |
+
k
|
| 409 |
+
k+1
|
| 410 |
+
and x∗
|
| 411 |
+
12 ∈ (−1, 1) is the solution of the equation (3.2).
|
| 412 |
+
(c2) If y ≤ −1 and x ∈ (−1, 1), then x∗
|
| 413 |
+
12 = −1, w1 =
|
| 414 |
+
k
|
| 415 |
+
k+1, w2 =
|
| 416 |
+
1
|
| 417 |
+
k+1
|
| 418 |
+
and x∗
|
| 419 |
+
11 ∈ (−1, 1) is the solution of the equation (3.3).
|
| 420 |
+
Remark 1. Instead of reproducing the whole theorem for k = 1, only the two main
|
| 421 |
+
changes in case (c) should be mentioned. So the weights are always w1 = w2 = 1
|
| 422 |
+
2 and the
|
| 423 |
+
equation system (3.4)–(3.6) is replaced by
|
| 424 |
+
q′(x)
|
| 425 |
+
q(x) +
|
| 426 |
+
2
|
| 427 |
+
x − y = 0
|
| 428 |
+
and
|
| 429 |
+
q′(y)
|
| 430 |
+
q(y) −
|
| 431 |
+
2
|
| 432 |
+
x − y = 0 .
|
| 433 |
+
(3.7)
|
| 434 |
+
To illustrate this complex issue we revisit the logit model in dimension k = 3 with β1 = 1.
|
| 435 |
+
We (numerically) plot the orbit positions x∗
|
| 436 |
+
11 and x∗
|
| 437 |
+
12 and corresponding weights w1 and
|
| 438 |
+
w2 = 1 − w1 depending on −β0 = − β0
|
| 439 |
+
β1 = cq, see Figure 1. The cases (a) and (b) go along
|
| 440 |
+
with Theorem 1 and the results from Radloff and Schwabe (2019b). The cases (c1) and
|
| 441 |
+
(c2) yield marginal extremum solutions which are identical to (a) and (b). So for these
|
| 442 |
+
four cases there is always an exact minimally supported (locally) D-optimal design. As
|
| 443 |
+
described in Theorem 1, it consists of a pole point in x1 = −1 or else x1 = 1 and the k
|
| 444 |
+
vertices of a (regular) simplex which is maximally inscribed in the non-degenerated orbit.
|
| 445 |
+
But the problematic case is (c0) because the (locally) D-optimal (generalized) design
|
| 446 |
+
consists of two non-degenerated orbits and additionally the weights are rarely appropriate
|
| 447 |
+
for a discretization. In Radloff and Schwabe (2019a) we showed two examples for the logit
|
| 448 |
+
model (k = 3, β1 = 1) from which we derived (nearly) exact designs.
|
| 449 |
+
For −β0 = 0 the two orbit positions are symmetrical around 0, that is x∗
|
| 450 |
+
11 = −x∗
|
| 451 |
+
12 ≈ 0.52,
|
| 452 |
+
and the weights are ξ∗
|
| 453 |
+
1(x∗
|
| 454 |
+
11) = ξ∗
|
| 455 |
+
1(x∗
|
| 456 |
+
12) =
|
| 457 |
+
1
|
| 458 |
+
2. These two orbits were discretized by two
|
| 459 |
+
6
|
| 460 |
+
|
| 461 |
+
Martin Radloff, Rainer Schwabe
|
| 462 |
+
Exact Designs on the Ball
|
| 463 |
+
2-dimensional simplices — overall 6 equally weighted support points; see Figure 2 (left
|
| 464 |
+
image).
|
| 465 |
+
For −β0 = −0.1 it is x∗
|
| 466 |
+
11 ≈ 0.42, x∗
|
| 467 |
+
12 ≈ −0.62 and ξ∗
|
| 468 |
+
1(x∗
|
| 469 |
+
11) ≈ 0.4297, while 0.4297 ≈ 3
|
| 470 |
+
7.
|
| 471 |
+
We took the rounded design ξ≈ with the same support points x∗
|
| 472 |
+
11 and x∗
|
| 473 |
+
12 but with the
|
| 474 |
+
marginal design ξ≈
|
| 475 |
+
1 (x∗
|
| 476 |
+
11) = 3
|
| 477 |
+
7 and ξ≈
|
| 478 |
+
1 (x∗
|
| 479 |
+
12) = 4
|
| 480 |
+
7. So it was possible to substitute one orbit
|
| 481 |
+
by the vertices of a 2-dimensional simplex (3 points — an equilateral triangle) and one
|
| 482 |
+
by the vertices of a 2-dimensional cube or cross polytope (4 points — a square). Because
|
| 483 |
+
of rounding the design ξ≈ is not optimal but exact and has a high D-efficiency, which
|
| 484 |
+
compares the rounded design ξ≈ and the optimal design ξ∗
|
| 485 |
+
β0 with respect to β0 — here
|
| 486 |
+
p = k + 1 = 4 and β0 = (0.1, 1, 0, 0)⊤:
|
| 487 |
+
EffD(ξ≈, β0) =
|
| 488 |
+
�
|
| 489 |
+
det(M(ξ≈, β0))
|
| 490 |
+
det(M(ξ∗
|
| 491 |
+
β0, β0))
|
| 492 |
+
�1
|
| 493 |
+
p
|
| 494 |
+
≈ 0.999757 .
|
| 495 |
+
These designs are not very satisfactory. On the one hand the number of support points
|
| 496 |
+
is not minimal. On the other hand only special cases have appropriate rational weights
|
| 497 |
+
which allow a discretization or otherwise the optimality is lost by rounding. Therefore we
|
| 498 |
+
want to establish minimal supported exact designs for the case (c0) in this paper. Mostly
|
| 499 |
+
these designs wont be optimal but (highly) efficient.
|
| 500 |
+
But we start with the reduction of the system of three equations in Theorem 2 to only one
|
| 501 |
+
single equation for special unimodal intensity functions — symmetrical unimodal intensity
|
| 502 |
+
functions — which can be found, for example, in binary response models with logit and
|
| 503 |
+
probit link.
|
| 504 |
+
4. Optimal Design for Symmetrical Unimodal
|
| 505 |
+
Intensity Functions
|
| 506 |
+
An interesting observation was made in the discussion section in Radloff and Schwabe
|
| 507 |
+
(2019a). For models with unimodal intensity function in which the mode and threshold
|
| 508 |
+
coincide (c(A2′)
|
| 509 |
+
λ
|
| 510 |
+
= c(A3′)
|
| 511 |
+
λ
|
| 512 |
+
= cλ) and which are symmetrical, also the two orbit positions are
|
| 513 |
+
symmetrical in a certain way, which we want to investigate here. For one dimension this
|
| 514 |
+
has been considered and shown in Ford et al (1992, Section 6.5 and 6.6), but this proof
|
| 515 |
+
cannot be extended to higher dimensions directly.
|
| 516 |
+
Definition 1. An unimodal intensity function in which the mode and threshold coincide
|
| 517 |
+
(c(A2′)
|
| 518 |
+
λ
|
| 519 |
+
= c(A3′)
|
| 520 |
+
λ
|
| 521 |
+
= cλ) will be called symmetrical to cλ if
|
| 522 |
+
λ(cλ + z) = λ(cλ − z)
|
| 523 |
+
for all z ∈ R.
|
| 524 |
+
The intensity functions of the logit and probit models are symmetrical with cλ = 0. But
|
| 525 |
+
the unimodal intensity function of the complementary log-log model has c(A2′)
|
| 526 |
+
λ
|
| 527 |
+
̸= c(A3′)
|
| 528 |
+
λ
|
| 529 |
+
and cannot be symmetrical for this reason.
|
| 530 |
+
Lemma 1. Let the intensity function λ be symmetrical to cλ in the situation of Theo-
|
| 531 |
+
rem 2 (c0).
|
| 532 |
+
7
|
| 533 |
+
|
| 534 |
+
Martin Radloff, Rainer Schwabe
|
| 535 |
+
Exact Designs on the Ball
|
| 536 |
+
• For given β0 ̸= cλ let r solve
|
| 537 |
+
λ′(cλ+r)
|
| 538 |
+
λ(cλ+r) = −
|
| 539 |
+
−2 k r2 (β2
|
| 540 |
+
1 +c2−r2)+(β2
|
| 541 |
+
1 −c2−r2)2−4 c2 r2
|
| 542 |
+
+(β2
|
| 543 |
+
1 −c2+r2)
|
| 544 |
+
�
|
| 545 |
+
(β2
|
| 546 |
+
1 −c2−r2)2+4 (k2−1) c2 r2
|
| 547 |
+
(k+1) r (r+c−β1)(r+c+β1)(r−c+β1)(r−c−β1)
|
| 548 |
+
(4.8)
|
| 549 |
+
with c := cλ − β0. Then
|
| 550 |
+
x = c
|
| 551 |
+
β1
|
| 552 |
+
+ r
|
| 553 |
+
β1
|
| 554 |
+
,
|
| 555 |
+
(4.9)
|
| 556 |
+
y = c
|
| 557 |
+
β1
|
| 558 |
+
− r
|
| 559 |
+
β1
|
| 560 |
+
,
|
| 561 |
+
(4.10)
|
| 562 |
+
α =
|
| 563 |
+
−(β2
|
| 564 |
+
1 −c2−r2)+
|
| 565 |
+
�
|
| 566 |
+
(β2
|
| 567 |
+
1 −c2−r2)2+4 (k2−1) c2 r2
|
| 568 |
+
4 (k+1) c r
|
| 569 |
+
(4.11)
|
| 570 |
+
is a solution of the equation system (3.4)–(3.6).
|
| 571 |
+
• For given β0 = cλ it is x =
|
| 572 |
+
r
|
| 573 |
+
β1, y = − r
|
| 574 |
+
β1 and α = 0. Here r is the solution of
|
| 575 |
+
λ′(cλ + r)
|
| 576 |
+
λ(cλ + r) = −
|
| 577 |
+
2 (β2
|
| 578 |
+
1 − k r2)
|
| 579 |
+
(k + 1) r (β2
|
| 580 |
+
1 − r2) .
|
| 581 |
+
(4.12)
|
| 582 |
+
Remark 2. For k = 1, see Remark 1, let λ be symmetrical to cλ. Then x = cλ−β0
|
| 583 |
+
β1
|
| 584 |
+
+
|
| 585 |
+
r
|
| 586 |
+
β1
|
| 587 |
+
and y = cλ−β0
|
| 588 |
+
β1
|
| 589 |
+
− r
|
| 590 |
+
β1 with r is solution of
|
| 591 |
+
λ′(cλ + r)
|
| 592 |
+
λ(cλ + r) = −1
|
| 593 |
+
r
|
| 594 |
+
(4.13)
|
| 595 |
+
solve the equation system (3.7).
|
| 596 |
+
Lemma 1, whose proof sketch can be found in Appendix B, and Remark 2 in combination
|
| 597 |
+
with Theorem 2 give (locally) D-optimal designs for models with symmetrical unimodal
|
| 598 |
+
intensity functions. As a result we reduced the system of equations (3.4)–(3.6) to only
|
| 599 |
+
one single equation (4.8).
|
| 600 |
+
But now there is the question if condition (A4) can guarantee a unique solution as in
|
| 601 |
+
Theorem 1 or in Theorem 2 (a) and (b) because Theorem 2 (c), especially (c0), tells
|
| 602 |
+
nothing about uniqueness. But we want to add a remark about the values of r before.
|
| 603 |
+
Remark 3. Since the system of equations (3.4)–(3.6) in Theorem 2 (c0) should have a
|
| 604 |
+
solution with two inner support points for the marginal design, x, y ∈ (−1, 1) is required.
|
| 605 |
+
So
|
| 606 |
+
−1 < cλ − β0
|
| 607 |
+
β1
|
| 608 |
+
± r
|
| 609 |
+
β1
|
| 610 |
+
< 1
|
| 611 |
+
must be valid. This leads with β1 > 0 to r ∈ (−(cλ − β0) − β1, −(cλ − β0) + β1) and r ∈
|
| 612 |
+
((cλ − β0) − β1, (cλ − β0) + β1). Consequently, both intervals must overlap. This happens
|
| 613 |
+
for cλ − β0 > 0 at 0 < cλ − β0 < β1 and for cλ − β0 < 0 at −β1 < cλ − β0 < 0.
|
| 614 |
+
Thus cλ − β0 ∈ (−β1, β1) and in particular β2
|
| 615 |
+
1 > (cλ − β0)2 must hold. Then r is in the
|
| 616 |
+
interval (|cλ − β0| − β1, −|cλ − β0| + β1). But Theorem 2 (c) need x > y and consequently
|
| 617 |
+
r > 0. Hence, r ∈ (0, −|cλ − β0| + β1).
|
| 618 |
+
This remains valid in particular for β0 = cλ, i. e. cλ − β0 = 0. So r ∈ (−β1, β1). With
|
| 619 |
+
r > 0 it is r ∈ (0, β1).
|
| 620 |
+
8
|
| 621 |
+
|
| 622 |
+
Martin Radloff, Rainer Schwabe
|
| 623 |
+
Exact Designs on the Ball
|
| 624 |
+
Lemma 2. In situation of Lemma 1 let the intensity function λ additionally satisfy
|
| 625 |
+
condition (A4), then equation (4.8), whose right hand side is continuously continued
|
| 626 |
+
in −|cλ − β0| + β1, has a unique solution in r ∈ (0, |cλ − β0| + β1).
|
| 627 |
+
This also holds for β0 = cλ and equation (4.12), which has exactly one solution in r ∈
|
| 628 |
+
(0, β1).
|
| 629 |
+
Remark 4. For k = 1, see Remark 2, and for an intensity function satisfying (A4) there
|
| 630 |
+
is only one solution of (4.13).
|
| 631 |
+
The proof sketch of Lemma 2 can be found in Appendix B. Lemma 2 guarantees a unique
|
| 632 |
+
solution in r ∈ (0, |cλ − β0| + β1). But Remark 3 points out that for Theorem 2 (c0)
|
| 633 |
+
we need r ∈ (0, −|cλ − β0| + β1). This means that the unique solution can result in the
|
| 634 |
+
two-orbit case or in the one-orbit one-pole case of Theorem 2 (c).
|
| 635 |
+
5. Minimally Supported Designs
|
| 636 |
+
In the situation of Theorem 1 and Theorem 2 (a), (b), (c1) and (c2) the designs have
|
| 637 |
+
always the minimal number of support points to estimate the parameter vector β. These
|
| 638 |
+
are k + 1 support points.
|
| 639 |
+
In Radloff and Schwabe (2019a) revisited here in the introductory section we indicated
|
| 640 |
+
exemplarily a (locally) D-optimal design for the logit model on the 3-dimensional ball
|
| 641 |
+
with −β0 = 0 and β1 = 1.
|
| 642 |
+
This design consists of six support points which are the
|
| 643 |
+
vertices of two regular 2-dimensional simplices — equilateral triangles; see Figure 2 (left
|
| 644 |
+
image). But this is not the minimum of support points to estimate the four parameters.
|
| 645 |
+
So the question arises whether it is possible to reduce the number of support points as it
|
| 646 |
+
can be found in the concept of fractional factorial designs, see, for example, Pukelsheim
|
| 647 |
+
(1993, section 15.11). Instead of using all vertices of the hypercube [−1, 1]k as in the
|
| 648 |
+
full factorial design the fractional factorial design picks only a special percentage of these
|
| 649 |
+
points. For k = 3
|
| 650 |
+
(−1, −1, 1)⊤, (−1, 1, −1)⊤, (1, −1, −1)⊤, (1, 1, 1)⊤
|
| 651 |
+
represent a 23−1-fractional factorial design.
|
| 652 |
+
In our issue we do not want to pick four of the six points, but we want to use the
|
| 653 |
+
orthogonality of the spaces spanned by the points (without the x1-component) in the
|
| 654 |
+
two orbits (x1 = −1 and x1 = 1) of the given 23−1-fractional factorial design.
|
| 655 |
+
Here
|
| 656 |
+
span{(−1, 1)⊤, (1, −1)⊤} ⊥ span{(−1, −1)⊤, (1, 1)⊤}.
|
| 657 |
+
The idea for our problem is il-
|
| 658 |
+
lustrated in Figure 2 (right image).
|
| 659 |
+
The spanned spaces by points (without the x1-
|
| 660 |
+
component) in the orbits are orthogonal to each other. And all points span a simplex.
|
| 661 |
+
As stated above a (generalized) design ξ which is rotation invariant with fixed x1 —
|
| 662 |
+
invariant with respect to all orthogonal transformations in O(k) which do not change
|
| 663 |
+
the x1-component — and which has all mass on the unit sphere can be decomposed
|
| 664 |
+
into a marginal design ξ1 on [−1, 1] and a probability kernel η (conditional design), i. e.
|
| 665 |
+
ξ = ξ1 ⊗ η. For fixed x1 the kernel η(x1, ·) is the uniform distribution on the surface of a
|
| 666 |
+
(k − 1)-dimensional ball with radius
|
| 667 |
+
�
|
| 668 |
+
1 − x2
|
| 669 |
+
1 — the orbit at position x1. If x1 ∈ {−1, 1},
|
| 670 |
+
the (k − 1)-dimensional ball with the uniform distribution reduces to a single point and
|
| 671 |
+
represents only a one-point-measure.
|
| 672 |
+
Remembering q(x1) = λ(β0 + β1x1) the related
|
| 673 |
+
9
|
| 674 |
+
|
| 675 |
+
Martin Radloff, Rainer Schwabe
|
| 676 |
+
Exact Designs on the Ball
|
| 677 |
+
information matrix, see Radloff and Schwabe (2019b), is
|
| 678 |
+
M(ξ1 ⊗ η, β0) =
|
| 679 |
+
�
|
| 680 |
+
�
|
| 681 |
+
�
|
| 682 |
+
�
|
| 683 |
+
q dξ1
|
| 684 |
+
�
|
| 685 |
+
q id dξ1
|
| 686 |
+
�
|
| 687 |
+
q id dξ1
|
| 688 |
+
�
|
| 689 |
+
q id2 dξ1
|
| 690 |
+
O2×(k−1)
|
| 691 |
+
O(k−1)×2
|
| 692 |
+
1
|
| 693 |
+
k−1
|
| 694 |
+
�
|
| 695 |
+
q (1 − id2) dξ1 Ik−1
|
| 696 |
+
�
|
| 697 |
+
�
|
| 698 |
+
�
|
| 699 |
+
(5.14)
|
| 700 |
+
with β0 = (β0, β1, 0, . . . , 0)⊤.
|
| 701 |
+
The information matrix for a design on the k-dimensional unit sphere Sk−1, which is
|
| 702 |
+
based on exactly two orbits, can be determined analogously to this result. Additionally
|
| 703 |
+
the uniform distribution does not cover the the full orbits but only sub-spheres.
|
| 704 |
+
Lemma 3. Let ξ1 be the two-point-measure in x11 and x12 with ξ1(x11) =
|
| 705 |
+
1
|
| 706 |
+
2 − α and
|
| 707 |
+
ξ1(x12) =
|
| 708 |
+
1
|
| 709 |
+
2 + α with α ∈
|
| 710 |
+
�
|
| 711 |
+
− 1
|
| 712 |
+
2, 1
|
| 713 |
+
2
|
| 714 |
+
�
|
| 715 |
+
. Further let η(x11, ·) be a uniform distribution on
|
| 716 |
+
Sm−2
|
| 717 |
+
��
|
| 718 |
+
1 − x2
|
| 719 |
+
11
|
| 720 |
+
�
|
| 721 |
+
× {0}k−m and likewise η(x12, ·) be a uniform distribution on {0}m−1 ×
|
| 722 |
+
Sk−m−1
|
| 723 |
+
��
|
| 724 |
+
1 − x2
|
| 725 |
+
12
|
| 726 |
+
�
|
| 727 |
+
. Then the information matrix is
|
| 728 |
+
M(ξ1 ⊗ η, β0) =
|
| 729 |
+
�
|
| 730 |
+
�
|
| 731 |
+
�
|
| 732 |
+
�
|
| 733 |
+
�
|
| 734 |
+
�
|
| 735 |
+
q dξ1
|
| 736 |
+
�
|
| 737 |
+
q id dξ1
|
| 738 |
+
�
|
| 739 |
+
q id dξ1
|
| 740 |
+
�
|
| 741 |
+
q id2 dξ1
|
| 742 |
+
O2×(k−1)
|
| 743 |
+
O(k−1)×2
|
| 744 |
+
c1 Im−1
|
| 745 |
+
O(m−1)×(k−m)
|
| 746 |
+
O(k−m)×(m−1)
|
| 747 |
+
c2 Ik−m
|
| 748 |
+
�
|
| 749 |
+
�
|
| 750 |
+
�
|
| 751 |
+
�
|
| 752 |
+
�
|
| 753 |
+
(5.15)
|
| 754 |
+
with c1 =
|
| 755 |
+
1
|
| 756 |
+
m−1 q(x11) (1−x2
|
| 757 |
+
11) ( 1
|
| 758 |
+
2 −α) and c2 =
|
| 759 |
+
1
|
| 760 |
+
k−m q(x12) (1−x2
|
| 761 |
+
12) ( 1
|
| 762 |
+
2 +α).
|
| 763 |
+
Now the optimality case in Theorem 2 (c0) on two orbits should be used to investigate
|
| 764 |
+
when both information matrices (5.14) und (5.15) are identical. With that both related
|
| 765 |
+
(generalized) designs would be (locally) D-optimal.
|
| 766 |
+
Lemma 4. Both information matrices (5.14) and (5.15) are identical in the situation of
|
| 767 |
+
Theorem 2 (c0) if and only if α = 1
|
| 768 |
+
2 −
|
| 769 |
+
m
|
| 770 |
+
k+1.
|
| 771 |
+
The proof can be found in Appendix B.
|
| 772 |
+
Consequently both orbits need the weights ξ1(x11) =
|
| 773 |
+
m
|
| 774 |
+
k+1 and ξ1(x12) = k−m+1
|
| 775 |
+
k+1
|
| 776 |
+
to coincide
|
| 777 |
+
both information matrices. This allows an experimental design, which has the same value
|
| 778 |
+
for the D-optimality criterion, consisting of two orbits with m and with k −m+1 support
|
| 779 |
+
Figure 2: Logit model for k = 3 and β1 = 1 and −β0 = 0: discretized (locally) D-optimal
|
| 780 |
+
designs with 6 or 4 support points.
|
| 781 |
+
10
|
| 782 |
+
|
| 783 |
+
1Martin Radloff, Rainer Schwabe
|
| 784 |
+
Exact Designs on the Ball
|
| 785 |
+
Figure 3: D-efficiency for the logit model with k = 3 and β1 = 1: comparison of designs
|
| 786 |
+
with exactly k+1 = 4 equally weighted support points in −β0 ∈ (−0.403, 0.403)
|
| 787 |
+
(rounded).
|
| 788 |
+
points. This can be done by two regular simplices — one simplex in dimension m − 1
|
| 789 |
+
and one in dimension k − m.
|
| 790 |
+
So the simplices are the discretizations of the uniform
|
| 791 |
+
distributions on Sm−2
|
| 792 |
+
��
|
| 793 |
+
1 − x2
|
| 794 |
+
11
|
| 795 |
+
�
|
| 796 |
+
× {0}k−m and on {0}m−1 × Sk−m−1
|
| 797 |
+
��
|
| 798 |
+
1 − x2
|
| 799 |
+
12
|
| 800 |
+
�
|
| 801 |
+
.
|
| 802 |
+
Let Sm ∈ Rm×(m+1) be a matrix, where the columns represent the m + 1 vertices of an
|
| 803 |
+
m-dimensional regular simplex (in Rm). Then the columns of the matrix
|
| 804 |
+
�
|
| 805 |
+
�
|
| 806 |
+
�
|
| 807 |
+
x111⊤
|
| 808 |
+
m
|
| 809 |
+
x121⊤
|
| 810 |
+
k−m+1
|
| 811 |
+
R1 Sm−1
|
| 812 |
+
O(m−1)×(k−m+1)
|
| 813 |
+
O(k−m)×m
|
| 814 |
+
R2 Sk−m
|
| 815 |
+
�
|
| 816 |
+
�
|
| 817 |
+
�
|
| 818 |
+
with arbitrary orthogonal transformations R1 ∈ O(m − 1) and R2 ∈ O(k − m) represent
|
| 819 |
+
the support points of such a minimal supported design.
|
| 820 |
+
��
|
| 821 |
+
m + 1
|
| 822 |
+
m
|
| 823 |
+
Im + 1 − √m + 1
|
| 824 |
+
m√m
|
| 825 |
+
1m1⊤
|
| 826 |
+
m
|
| 827 |
+
����� −
|
| 828 |
+
1
|
| 829 |
+
√m 1m
|
| 830 |
+
�
|
| 831 |
+
∈ Rm×(m+1)
|
| 832 |
+
is an example for Sm. In this notation Im stands for the standard simplex which needs
|
| 833 |
+
to be scaled and shifted appropriately so that it is in combination with the last vertex
|
| 834 |
+
− 1
|
| 835 |
+
√m 1m (last column) a regular simplex on the unit sphere Sm−1.
|
| 836 |
+
Finally, we want to look at the D-efficiency, here with β0 = (β0, β1, 0, . . . , 0)⊤,
|
| 837 |
+
EffD(ξ, β0) =
|
| 838 |
+
�
|
| 839 |
+
det(M(ξ, β0))
|
| 840 |
+
det(M(ξ∗
|
| 841 |
+
β0, β0))
|
| 842 |
+
�1
|
| 843 |
+
p
|
| 844 |
+
∈ [0, 1]
|
| 845 |
+
for designs ξ with exactly p = k + 1 equally weighted support points in the region where
|
| 846 |
+
two non-degenerated orbits occur.
|
| 847 |
+
As an example, the logit model with β1 = 1 is used to determine the D-efficiency in
|
| 848 |
+
dimensions k = 3 and k = 6. In Figure 3 and Figure 4 only the regions for −β0 with
|
| 849 |
+
11
|
| 850 |
+
|
| 851 |
+
Martin Radloff, Rainer Schwabe
|
| 852 |
+
Exact Designs on the Ball
|
| 853 |
+
two non-degenerated orbits in the optimal design (case (c0) in Theorem 2), i. e. −β0 ∈
|
| 854 |
+
(−0.403, 0.403) (rounded) for k = 3 and −β0 ∈ (−0.480, 0.480) (rounded) for k = 6, are
|
| 855 |
+
plotted.
|
| 856 |
+
For this purpose, three different types of exact designs are compared with the (locally)
|
| 857 |
+
D-optimal design ξ∗
|
| 858 |
+
β0.
|
| 859 |
+
The optimal design is a generalized design with real weights.
|
| 860 |
+
Therefore it cannot be discretized as an exact design in general.
|
| 861 |
+
First, the two optimal exact designs with one pole and one orbit, which are discretized as
|
| 862 |
+
a regular (k−1)-dimensional simplex, are used for comparison. The orbit position remains
|
| 863 |
+
unchanged and is determined at the boundary values −β0 ≈ ±0.403 or −β0 ≈ ±0.480.
|
| 864 |
+
See the solid lines in both figures.
|
| 865 |
+
Second, the designs with the same orbit position as the associated design which is (locally)
|
| 866 |
+
optimal for −β0 are the next alternative.
|
| 867 |
+
Only the weights were rounded/shifted to
|
| 868 |
+
integral multiples of
|
| 869 |
+
1
|
| 870 |
+
k+1. See the dotted lines.
|
| 871 |
+
Third, the designs with fixed design weights which are integral multiples of
|
| 872 |
+
1
|
| 873 |
+
k+1 represent
|
| 874 |
+
the last model category. So only the positions of the orbits have to be optimized with
|
| 875 |
+
these fixed design weights. This can be done by solving only the equations (3.4) and (3.5)
|
| 876 |
+
with the selected weights in Theorem 2 (c). Equation (3.6) is omitted. See the dashed
|
| 877 |
+
lines in both plots.
|
| 878 |
+
The Figure 3 reveals for dimension k = 3 that there are only three positions in the
|
| 879 |
+
range −β0 ∈ [−0.403, 0.403] (rounded) where (locally) D-optimal designs with the min-
|
| 880 |
+
imal number of support points — four points — exists. For −β0 ≈ −0.403 this is the
|
| 881 |
+
design consisting of the pole x∗
|
| 882 |
+
12 = −1 and one orbit at x∗
|
| 883 |
+
11 with three points as vertices
|
| 884 |
+
of an equilateral triangle. Then for −β0 = 0 there are two orbits with two points each.
|
| 885 |
+
And, at −β0 ≈ 0.403 the design consists of one orbit at x∗
|
| 886 |
+
12 with three equally weighted
|
| 887 |
+
support points and the pole x∗
|
| 888 |
+
11 = 1. In the span between these optimality positions the
|
| 889 |
+
considered discretizations provide a fairly high efficiency. Using the transition directly
|
| 890 |
+
from pole and orbit to orbit and pole, the efficiency is always greater than 0.988 (intersec-
|
| 891 |
+
tion of the solid lines). If the two orbits are also discretized in between, the efficiency is
|
| 892 |
+
greater than 0.993 (intersection of dotted line and solid lines) or even greater than 0.997
|
| 893 |
+
(intersection of dashed line and solid lines).
|
| 894 |
+
For dimension k = 6, see figure 4, an efficiency of more than 0.986 is possible by stepping
|
| 895 |
+
directly from pole and orbit with six support points to orbit with six design points and
|
| 896 |
+
pole. If the intermediate steps — two orbits with 2 and 5 points, 3 and 4 points, 4 and
|
| 897 |
+
3 points as well as 5 and 2 points — are used, then by simple rounding of the weights to
|
| 898 |
+
integral multiples of
|
| 899 |
+
1
|
| 900 |
+
k+1 an efficiency greater than 0.995 (dotted lines) and with additional
|
| 901 |
+
optimization of the orbit positions even greater than 0.999 (dashed lines) can be achieved.
|
| 902 |
+
6. Conclusion
|
| 903 |
+
In summary it can be postulated that very efficient designs are generated based on only
|
| 904 |
+
k + 1 design points which is the minimal number of support points to estimate the pa-
|
| 905 |
+
rameter vector. It seems that higher dimensions enable designs with higher D-efficiency,
|
| 906 |
+
in particular using the third option of discretization. Here we only considered designs
|
| 907 |
+
with exactly two orbits. Thus it cannot be excluded that there are designs with a better
|
| 908 |
+
efficiency or even (locally) optimal designs which are supported by exactly k + 1 points.
|
| 909 |
+
Maybe these designs have support points which lie not on the orbit but are jittered a little
|
| 910 |
+
bit. This as well as a potential lower efficiency bound needs further investigations.
|
| 911 |
+
12
|
| 912 |
+
|
| 913 |
+
Martin Radloff, Rainer Schwabe
|
| 914 |
+
Exact Designs on the Ball
|
| 915 |
+
Figure 4: D-efficiency for the logit model with k = 6 and β1 = 1: comparison of designs
|
| 916 |
+
with exactly k+1 = 7 equally weighted support points in −β0 ∈ (−0.480, 0.480)
|
| 917 |
+
(rounded).
|
| 918 |
+
On the other side the reduction of the equation system to one single equation for deter-
|
| 919 |
+
mining (locally) D-optimal design for symmetrical unimodal intensity functions is a nice
|
| 920 |
+
feature and can help to decrease computing costs.
|
| 921 |
+
Also the question of optimal designs on the ball with respect to other optimality criteria
|
| 922 |
+
should be considered in future.
|
| 923 |
+
Finally, we want to emphasize that the established designs do not only work for the
|
| 924 |
+
unit ball. By using the concept of equivariance for linear transformations, say scaling,
|
| 925 |
+
reflecting and rotating, the class of design spaces can be extended to k-dimensional balls
|
| 926 |
+
with arbitrary radius or any k-dimensional ellipsoid.
|
| 927 |
+
Appendix A
|
| 928 |
+
Notation
|
| 929 |
+
Bk
|
| 930 |
+
k-dimensional unit ball
|
| 931 |
+
Bk(r)
|
| 932 |
+
k-dimensional ball with radius r
|
| 933 |
+
Sk−1
|
| 934 |
+
unit sphere, which is the surface of Bk
|
| 935 |
+
Sk−1(r)
|
| 936 |
+
sphere with radius r, which is the surface of Bk(r)
|
| 937 |
+
Ok
|
| 938 |
+
k-dimensional zero-vector
|
| 939 |
+
Ok1×k2
|
| 940 |
+
(k1 × k2)-dimensional zero-matrix
|
| 941 |
+
1k
|
| 942 |
+
k-dimensional one-vector
|
| 943 |
+
Ik
|
| 944 |
+
(k × k)-dimensional identity matrix
|
| 945 |
+
id
|
| 946 |
+
identity function
|
| 947 |
+
13
|
| 948 |
+
|
| 949 |
+
Martin Radloff, Rainer Schwabe
|
| 950 |
+
Exact Designs on the Ball
|
| 951 |
+
Appendix B
|
| 952 |
+
Proofs
|
| 953 |
+
Proof sketch of Lemma 1. By plugging (4.9) and (4.10) into (3.6) and using the sym-
|
| 954 |
+
metry to simplify, we get
|
| 955 |
+
−2 α (4 c r α+(β2
|
| 956 |
+
1 −c2−r2))+4 (k−1) c r
|
| 957 |
+
� 1
|
| 958 |
+
2 −α
|
| 959 |
+
� � 1
|
| 960 |
+
2 +α
|
| 961 |
+
�
|
| 962 |
+
� 1
|
| 963 |
+
2 −α
|
| 964 |
+
� � 1
|
| 965 |
+
2 +α
|
| 966 |
+
�
|
| 967 |
+
(4 c r α+(β2
|
| 968 |
+
1 −c2−r2))
|
| 969 |
+
= 0 .
|
| 970 |
+
In the numerator there is a polynomial of degree two in α with the two roots α∓(r)
|
| 971 |
+
depending on r:
|
| 972 |
+
α∓(r) :=
|
| 973 |
+
− (β2
|
| 974 |
+
1 − c2 − r2) ∓
|
| 975 |
+
�
|
| 976 |
+
(β2
|
| 977 |
+
1 − c2 − r2)2 + 4 (k + 1) (k − 1) c2 r2
|
| 978 |
+
4 (k + 1) c r
|
| 979 |
+
.
|
| 980 |
+
Now we examine the values of α∓(r) depending on r. Only −|c| − β1, |c| − β1, −|c| + β1
|
| 981 |
+
or |c| + β1 can solve the expression α∓(r) = ± 1
|
| 982 |
+
2. But −|c| − β1 and |c| + β1 are not in the
|
| 983 |
+
interesting region for r. We have
|
| 984 |
+
α− (±(|c| − β1)) = ±1
|
| 985 |
+
2 sign(c)
|
| 986 |
+
and
|
| 987 |
+
α+ (±(|c| − β1)) = ∓1
|
| 988 |
+
2 sign(c) k − 1
|
| 989 |
+
k + 1 .
|
| 990 |
+
Because of limr↗0 α− (r) = sign(c)∞ and limr↘0 α− (r) = − sign(c)∞ the root α−(r) has
|
| 991 |
+
in the interval r ∈ [|c| − β1, −|c| + β1] only values outside (− 1
|
| 992 |
+
2, 1
|
| 993 |
+
2). Hence, α−(r) is not a
|
| 994 |
+
relevant root.
|
| 995 |
+
Since limr→0 α+ (r) = 0 the discontinuity of the root α+(r) in r = 0 can be removed.
|
| 996 |
+
So α+(r) has only values in (− 1
|
| 997 |
+
2, 1
|
| 998 |
+
2) on the interval r ∈ [|c| − β1, −|c| + β1] and α+(r),
|
| 999 |
+
which is (4.11), is the only relevant root.
|
| 1000 |
+
After inserting (4.9) and (4.10) into (3.4) as well as (4.9) and (4.10) into (3.5) and sub-
|
| 1001 |
+
tracting both obtained equations and simplifying by using the symmetry, we get
|
| 1002 |
+
(k + 1) λ′(cλ + r)
|
| 1003 |
+
λ(cλ + r)
|
| 1004 |
+
= −(k − 1)
|
| 1005 |
+
−2 r + α · 4 c
|
| 1006 |
+
(β2
|
| 1007 |
+
1 − c2 − r2) + α · 4 c r − 2
|
| 1008 |
+
r .
|
| 1009 |
+
Equation (4.8) follows by plugging α+(r) as α into it and by some simplifications.
|
| 1010 |
+
For β0 = cλ, i. e. c = cλ − β0 = 0, we get directly α = 0 by inserting x =
|
| 1011 |
+
r
|
| 1012 |
+
β1 and y = − r
|
| 1013 |
+
β1
|
| 1014 |
+
in (3.6) and exploiting the symmetry. This is inserted in (3.4) and in (3.5). The difference
|
| 1015 |
+
between these two equations results in (4.12).
|
| 1016 |
+
Proof sketch of Lemma 2. This proof is a lot of curve sketching. We start with β0 ̸=
|
| 1017 |
+
cλ. The denominator of the right hand side of (4.8) has five roots in r. −|cλ −β0|−β1 < 0
|
| 1018 |
+
and |cλ − β0| − β1 < 0 are not in the considered interval (0, |cλ − β0| + β1). In r = −|cλ −
|
| 1019 |
+
β0| + β1 there is a discontinuity which can be removed. In r = 0 and in r = |cλ − β0| + β1
|
| 1020 |
+
there are two poles. Analyzing these poles for the considered interval we see that the
|
| 1021 |
+
values start from −∞ (r ↘ 0) and go up to +∞ (r ↗ |cλ − β0| + β1). Sophisticated
|
| 1022 |
+
curve sketching shows that the right hand side of (4.8) is strictly monotonically increasing
|
| 1023 |
+
on (0, |cλ − β0| + β1). So it is strictly monotonically increasing and covers (−∞, ∞). In
|
| 1024 |
+
combination with (A4) for the left hand side of (4.8) (monotonically decreasing) there is
|
| 1025 |
+
exactly one solution.
|
| 1026 |
+
For β0 = cλ we can mention that the right hand side of (4.12) is also strictly monotonically
|
| 1027 |
+
increasing on (0, β1). Hence, there is only one solution.
|
| 1028 |
+
An analogue result holds for the situation in Remark 4.
|
| 1029 |
+
14
|
| 1030 |
+
|
| 1031 |
+
Martin Radloff, Rainer Schwabe
|
| 1032 |
+
Exact Designs on the Ball
|
| 1033 |
+
Proof of Lemma 4. Rearranging equation (3.6) equivalently in two ways gives
|
| 1034 |
+
q(x12) (1−x2
|
| 1035 |
+
12) ( 1
|
| 1036 |
+
2 +α) = q(x11) (1−x2
|
| 1037 |
+
11) ( 1
|
| 1038 |
+
2 −α) k ( 1
|
| 1039 |
+
2 +α)−( 1
|
| 1040 |
+
2 −α)
|
| 1041 |
+
k ( 1
|
| 1042 |
+
2 −α)−( 1
|
| 1043 |
+
2 +α)
|
| 1044 |
+
and
|
| 1045 |
+
q(x11) (1−x2
|
| 1046 |
+
11) ( 1
|
| 1047 |
+
2 −α) = q(x12) (1−x2
|
| 1048 |
+
12) ( 1
|
| 1049 |
+
2 +α) k ( 1
|
| 1050 |
+
2 −α)−( 1
|
| 1051 |
+
2 +α)
|
| 1052 |
+
k ( 1
|
| 1053 |
+
2 +α)−( 1
|
| 1054 |
+
2 −α) .
|
| 1055 |
+
The two denominators are zero if and only if α = 1
|
| 1056 |
+
2 −
|
| 1057 |
+
1
|
| 1058 |
+
k+1 and α = 1
|
| 1059 |
+
2 −
|
| 1060 |
+
k
|
| 1061 |
+
k+1, respectively.
|
| 1062 |
+
But this cannot happen to non-degenerated orbits because 1
|
| 1063 |
+
2 −
|
| 1064 |
+
k
|
| 1065 |
+
k+1 < α < 1
|
| 1066 |
+
2 −
|
| 1067 |
+
1
|
| 1068 |
+
k+1.
|
| 1069 |
+
Putting both equations into the diagonal entry of the information matrix (5.14) yield
|
| 1070 |
+
1
|
| 1071 |
+
k − 1
|
| 1072 |
+
�
|
| 1073 |
+
q (1 − id2) dξ1
|
| 1074 |
+
= q(x11) (1−x2
|
| 1075 |
+
11) ( 1
|
| 1076 |
+
2 −α)
|
| 1077 |
+
�
|
| 1078 |
+
1
|
| 1079 |
+
k − 1 +
|
| 1080 |
+
1
|
| 1081 |
+
k − 1 · k ( 1
|
| 1082 |
+
2 +α)−( 1
|
| 1083 |
+
2 −α)
|
| 1084 |
+
k ( 1
|
| 1085 |
+
2 −α)−( 1
|
| 1086 |
+
2 +α)
|
| 1087 |
+
�
|
| 1088 |
+
and
|
| 1089 |
+
1
|
| 1090 |
+
k − 1
|
| 1091 |
+
�
|
| 1092 |
+
q (1 − id2) dξ1
|
| 1093 |
+
= q(x12) (1−x2
|
| 1094 |
+
12) ( 1
|
| 1095 |
+
2 −α)
|
| 1096 |
+
�
|
| 1097 |
+
1
|
| 1098 |
+
k − 1 · k ( 1
|
| 1099 |
+
2 −α)−( 1
|
| 1100 |
+
2 +α)
|
| 1101 |
+
k ( 1
|
| 1102 |
+
2 +α)−( 1
|
| 1103 |
+
2 −α) +
|
| 1104 |
+
1
|
| 1105 |
+
k − 1
|
| 1106 |
+
�
|
| 1107 |
+
They are identical to the diagonal entries of the information matrix (5.15) in Lemma 3 if
|
| 1108 |
+
and only if
|
| 1109 |
+
1
|
| 1110 |
+
k−1 +
|
| 1111 |
+
1
|
| 1112 |
+
k−1 · k ( 1
|
| 1113 |
+
2 +α)−( 1
|
| 1114 |
+
2 −α)
|
| 1115 |
+
k ( 1
|
| 1116 |
+
2 −α)−( 1
|
| 1117 |
+
2 +α) =
|
| 1118 |
+
1
|
| 1119 |
+
m−1 and
|
| 1120 |
+
1
|
| 1121 |
+
k−1 · k ( 1
|
| 1122 |
+
2 −α)−( 1
|
| 1123 |
+
2 +α)
|
| 1124 |
+
k ( 1
|
| 1125 |
+
2 +α)−( 1
|
| 1126 |
+
2 −α) +
|
| 1127 |
+
1
|
| 1128 |
+
k−1 =
|
| 1129 |
+
1
|
| 1130 |
+
k−m
|
| 1131 |
+
which are both equivalent to α = 1
|
| 1132 |
+
2 −
|
| 1133 |
+
m
|
| 1134 |
+
k+1.
|
| 1135 |
+
References
|
| 1136 |
+
Biedermann S, Dette H, Zhu W (2006) Optimal designs for dose-response models with
|
| 1137 |
+
restricted design spaces. Journal of the American Statistical Association 101:747–759
|
| 1138 |
+
Dette H, Melas VB, Pepelyshev A, et al (2005) Optimal designs for three-dimensional
|
| 1139 |
+
shape analysis with spherical harmonic descriptors. The Annals of Statistics 33:2758–
|
| 1140 |
+
2788
|
| 1141 |
+
Dette H, Melas VB, Pepelyshev A (2007) Optimal designs for statistical analysis with
|
| 1142 |
+
zernike polynomials. Statistics 41:453–470
|
| 1143 |
+
Farrell RH, Kiefer J, Walbran A (1967) Optimum multivariate designs. In: Proceedings
|
| 1144 |
+
of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume
|
| 1145 |
+
1: Statistics. University of California Press, Berkeley, Calif., pp 113–138
|
| 1146 |
+
Ford I, Torsney B, Wu C (1992) The use of a canonical form in the construction of locally
|
| 1147 |
+
optimal designs for non-linear problems. Journal of the Royal Statistical Society: Series
|
| 1148 |
+
B (Statistical Methodology) 54:569–583
|
| 1149 |
+
15
|
| 1150 |
+
|
| 1151 |
+
Martin Radloff, Rainer Schwabe
|
| 1152 |
+
Exact Designs on the Ball
|
| 1153 |
+
Hirao M, Sawa M, Jimbo M (2015) Constructions of φp-optimal rotatable designs on the
|
| 1154 |
+
ball. Sankhya A : The Indian Journal of Statistics 77:211–236
|
| 1155 |
+
Kiefer JC (1961) Optimum experimental designs v, with applications to systematic and
|
| 1156 |
+
rotatable designs. In: Proceedings of the Fourth Berkeley Symposium on Mathematical
|
| 1157 |
+
Statistics and Probability, Univ of California Press, pp 381–405
|
| 1158 |
+
Konstantinou M, Biedermann S, Kimber A (2014) Optimal designs for two-parameter
|
| 1159 |
+
nonlinear models with application to survival models. Statistica Sinica 24:415–428
|
| 1160 |
+
Lau TS (1988) d-optimal designs on the unit q-ball. Journal of statistical planning and
|
| 1161 |
+
inference 19:299–315
|
| 1162 |
+
Pukelsheim F (1993) Optimal Design of Experiments. Wiley Series in Probability and
|
| 1163 |
+
Statistics
|
| 1164 |
+
Radloff M, Schwabe R (2016) Invariance and equivariance in experimental design for
|
| 1165 |
+
nonlinear models. In: Kunert J, Müller CH, Atkinson AC (eds) mODa 11-Advances in
|
| 1166 |
+
Model-Oriented Design and Analysis. Springer, p 217–224
|
| 1167 |
+
Radloff M, Schwabe R (2019a) Locally d-optimal designs for a wider class of non-linear
|
| 1168 |
+
models on the k-dimensional ball with applications to logit and probit models. Statis-
|
| 1169 |
+
tical Papers 60:165–177
|
| 1170 |
+
Radloff M, Schwabe R (2019b) Locally d-optimal designs for non-linear models on the
|
| 1171 |
+
k-dimensional ball. Journal of Statistical Planning and Inference 203:106–116
|
| 1172 |
+
Schmidt D, Schwabe R (2017) Optimal design for multiple regression with information
|
| 1173 |
+
driven by the linear predictor. Statistica Sinica 27:1371–1384
|
| 1174 |
+
16
|
| 1175 |
+
|
8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,427 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf,len=426
|
| 2 |
+
page_content='D-Optimal and Nearly D-Optimal Exact Designs for Binary Response on the Ball Martin Radloff† and Rainer Schwabe‡ Abstract: In this paper the results of Radloff and Schwabe (2019a) will be extended for a special class of symmetrical intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 3 |
+
page_content=' This includes binary response models with logit and probit link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 4 |
+
page_content=' To evaluate the position and the weights of the two non-degenerated orbits on the k-dimensional ball usually a system of three equations has to be solved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 5 |
+
page_content=' The symmetry allows to reduce this system to a single equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 6 |
+
page_content=' As a further result, the number of support points can be reduced to the minimal number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 7 |
+
page_content=' These minimally sup- ported designs are highly efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 8 |
+
page_content=' The results can be generalized to arbitrary ellipsoidal design regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 9 |
+
page_content=' Key words and phrases: Binary response models, D-optimality, k-dimensional ball, logit and probit model, multiple regression models, simplex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 10 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 11 |
+
page_content=' Introduction Spherical design spaces can occur in engineering or physics problems where the validity of a model may be assumed on a spherical region around a target value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 12 |
+
page_content=' So (linear) models on spherical design spaces were investigated early in publications like Kiefer (1961) and Farrell et al (1967) which discuss polynomial regression on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 13 |
+
page_content=' These ideas were followed up by papers in which also only linear problems were focused.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 14 |
+
page_content=' So Lau (1988) fitted polynomials on the k-dimensional unit ball by using canonical moments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 15 |
+
page_content=' In Dette et al (2005, 2007) and Hirao et al (2015) harmonic polynomials and Zernike polynomials were used to be fit on the unit disc (2-dimensional unit ball), the 3- and k-dimensional unit ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 16 |
+
page_content=' On the other hand generalized linear models are also well-examined and used in practical application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 17 |
+
page_content=' Logit and probit models, for example, in one dimension on an interval have already been investigated by Ford et al (1992) and Biedermann et al (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 18 |
+
page_content=' But there seems to be no available literature which combines both topics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 19 |
+
page_content=' In our publication Radloff and Schwabe (2019b) we took the first step to bring non- linearity or generalized linear models, respectively, and spherical design regions together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 20 |
+
page_content=' These results were extended to a wider class of non-linear models in our follow-up paper Radloff and Schwabe (2019a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 21 |
+
page_content=' †corresponding author: Martin Radloff, Institute for Mathematical Stochastics, Otto-von-Guericke- University, PF 4120, 39016 Magdeburg, Germany, martin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 22 |
+
page_content='radloff@ovgu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 23 |
+
page_content='de ‡Rainer Schwabe, Institute for Mathematical Stochastics, Otto-von-Guericke-University, PF 4120, 39016 Magdeburg, Germany, rainer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 24 |
+
page_content='schwabe@ovgu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 25 |
+
page_content='de arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 26 |
+
page_content='02859v1 [stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 27 |
+
page_content='ME] 7 Jan 2023 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For better comprehensibility, we will start with the model description and give a brief overview of the findings so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 28 |
+
page_content=' Then we will consider a special class of intensity func- tions which allows to reduce the the complexity of finding (locally) D-optimal designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 29 |
+
page_content=' Afterwards we will tackle the problem, that the optimal designs are not exact designs in general, by establishing highly efficient designs on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 30 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 31 |
+
page_content=' General Model Description As in Radloff and Schwabe (2019b) and Radloff and Schwabe (2019a), where we described (locally) D-optimal designs for two special classes of linear and non-linear models on a k-dimensional unit ball Bk = {x ∈ Rk : x2 1 + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 32 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 33 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 34 |
+
page_content=' + x2 k ≤ 1} with k ∈ N, we solely focus (non-linear) multiple regression models, which means the linear predictor is f(x)⊤β = β0 + β1x1 + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 35 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 36 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 37 |
+
page_content=' + βkxk with regression function f : Bk → Rk+1, x �→ (1, x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 38 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 39 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 40 |
+
page_content=' , xk)⊤, and parameter vector β = (β0, β1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 41 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 42 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 43 |
+
page_content=' , βk)⊤ ∈ Rk+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 44 |
+
page_content=' The one-support-point (or elemental) information matrix should be representable in the form M(x, β) = λ � f(x)⊤β � f(x)f(x)⊤ with an intensity (or efficiency) function λ which only depends on the value of the linear predictor f(x)⊤β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 45 |
+
page_content=' These one-support-point (or elemental) information matrices are the base for the information matrix of a (generalized) design ξ with independent observations M(ξ, β) = � M(x, β) ξ(dx) = � λ � f(x)⊤β � f(x)f(x)⊤ξ(dx) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 46 |
+
page_content=' Here generalized design means an arbitrary probability measure on the design region Bk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 47 |
+
page_content=' These information matrices allow to define the (local) D-optimality, which is one of the most popular criteria in experimental design theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 48 |
+
page_content=' A design ξ∗ β0 with regular infor- mation matrix M(ξ∗ β0, β0) is called (locally) D-optimal (at β0) if det(M(ξ∗ β0, β0)) ≥ det(M(ξ, β0)) holds for all suitable probability measures ξ on the design space — here Bk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 49 |
+
page_content=' This optimality criterion can be interpreted as the minimization of the volume of the (asymptotic) confidence ellipsoid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 50 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 51 |
+
page_content=' Prior Results In Radloff and Schwabe (2016) we stated results on equivariance and invariance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 52 |
+
page_content=' By rotating the design space Bk — the k-dimensional unit ball — and the parameter space Rk+1 in an analogous way the linear predictor of the multiple regression problem reduces to f(x)⊤β = β0 + β1x1 and β1 ≥ 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 53 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 54 |
+
page_content='1) Using the rotation invariance with fixed x1, this means the invariance to all orthogonal transformations in O(k) which let the x1-component unchanged, the (locally) D-optimal (generalized) design ξ∗ can be decomposed (ξ∗ = ξ∗ 1 ⊗ η) in a marginal probability measure ξ∗ 1 on [−1, 1] for x1 and a probability kernel η given x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 55 |
+
page_content=' For fixed x1 the kernel η(x1, ·) is 2 Martin Radloff, Rainer Schwabe Exact Designs on the Ball the uniform distribution on the surface of a (k − 1)-dimensional ball with radius � 1 − x2 1 — the orbit at position x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 56 |
+
page_content=' As a consequence the multidimensional problem collapses to a one-dimensional marginal problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 57 |
+
page_content=' Only the positions of the orbits and their weights have to be determined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 58 |
+
page_content=' To get an exact design the uniform orbits have to be discretized, for example, by using regular simplices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 59 |
+
page_content=' In our first paper — Radloff and Schwabe (2019b) — we started with models where the intensity function belongs to the class of monotonous functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 60 |
+
page_content=' Such models have already been investigated in one dimension, for example, by Konstantinou et al (2014) and on multidimensional cuboids or orthants by Schmidt and Schwabe (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 61 |
+
page_content=' These authors gave the following four conditions on the intensity function λ: (A1) λ is positive on R and twice continuously differentiable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 62 |
+
page_content=' (A2) The first derivative λ′ is positive on R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 63 |
+
page_content=' (A3) The second derivative u′′ of u = 1 λ is injective on R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 64 |
+
page_content=' (A4) The function λ′ λ is non-increasing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 65 |
+
page_content=' Condition (A2) is the motivation for the name class of monotonous intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 66 |
+
page_content=' The intensity functions of this class have to satisfy always (A1) to (A3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 67 |
+
page_content=' (A4) is an extra condition to guarantee uniqueness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 68 |
+
page_content=' For a concise notation q(x1) = λ(β0 + β1x1) is used and the properties (A1), (A2), (A3) and (A4) transfer to q for β1 > 0, respectively, and vice versa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 69 |
+
page_content=' Poisson regression with intensity function qP(x1) = exp(β0 + β1x1) and negative binomial regression as well as special proportional hazard models with censoring, see Schmidt and Schwabe (2017), satisfy all four conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 70 |
+
page_content=' If β1 = 0 then the intensity function q is always a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 71 |
+
page_content=' This yields to a (locally) D-optimal design as it can be found in linear models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 72 |
+
page_content=' In Pukelsheim (1993, section 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 73 |
+
page_content='12) such a design consists of the equally weighted vertices of a regular simplex inscribed in the unit sphere, the boundary of the design space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 74 |
+
page_content=' The orientation of the simplex is arbitrary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 75 |
+
page_content=' The main result for β1 > 0 in Radloff and Schwabe (2019b) is recited for the readers’ convenience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 76 |
+
page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 77 |
+
page_content=' There is a (locally) D-optimal design for the multiple regression prob- lem (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 78 |
+
page_content='1) with β1 > 0 and intensity function satisfying (A1)-(A3) which has one support point equal to (1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 79 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 80 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 81 |
+
page_content=' , 0)⊤ and the other k support points are the vertices of an arbi- trarily rotated (k − 1)-dimensional regular simplex which is maximally inscribed in the intersection of the k-dimensional unit ball and a hyperplane with x1 = x∗ 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 82 |
+
page_content=' For k ≥ 2 the position x∗ 12 ∈ (−1, 1) is solution of q′(x∗ 12) q(x∗ 12) = 2 (1 + kx∗ 12) k (1 − x∗ 2 12 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 83 |
+
page_content=' If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 84 |
+
page_content=' 3 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For k = 1 the position x∗ 12 ∈ [−1, 1) is either solution of q′(x∗ 12) q(x∗ 12) = 2 1 − x∗ 12 , if such a solution exists in [−1, 1), or otherwise x∗ 12 = −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 85 |
+
page_content=' If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 86 |
+
page_content=' The design is equally weighted with 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 87 |
+
page_content=' It should be noted, that for fixed β this theorem does not need (A1) to (A4) on the entire real line R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 88 |
+
page_content=' It is enough to have it in the ball and so on x1 ∈ [−1, 1] for q and on [β0 − β1, β0 + β1] for λ, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 89 |
+
page_content=' But the model has to satisfy the conditions always on the whole real line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 90 |
+
page_content=' In our second paper — Radloff and Schwabe (2019a) — the conditions (A2) and (A3) were replaced by (A2′) and (A3′) and a fifth property (A5) was added.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 91 |
+
page_content=' (A2′) λ is unimodal with mode c(A2′) λ ∈ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 92 |
+
page_content=' (A3′) There exists a threshold c(A3′) λ ∈ R so that the second derivative u′′ of u = 1 λ is both injective on (−∞, c(A3′) λ ] and injective on [c(A3′) λ , ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 93 |
+
page_content=' (A5) u = 1 λ dominates z2 asymptotically for z → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 94 |
+
page_content=' In this context condition (A2′) means that there exists a c(A2′) λ ∈ R so that λ′ is positive on (−∞, c(A2′) λ ) and negative on (c(A2′) λ , ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 95 |
+
page_content=' Hence, there is only one local maximum which is simultaneously the global maximum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 96 |
+
page_content=' So the class of intensity functions, which satisfy (A1), (A2′) and (A3′), is called class of unimodal intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 97 |
+
page_content=' Indeed (A2) or (A3) do not imply (A2′) or (A3′), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 98 |
+
page_content=' As mentioned before, we only focus on the unit ball and the interval x1 ∈ [−1, 1] for q or [β0 − β1, β0 + β1] for λ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 99 |
+
page_content=' So in our special case (A2) and (A3) can be transferred to (A2′) and (A3′) by using an arbitrary cλ > β0 + β1, which means that cq lies outside the interval [−1, 1] and only one branch of the function is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 100 |
+
page_content=' Property (A5) means lim z→∞ ���� u(z) z2 ���� = ∞ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 101 |
+
page_content=' This means that u(z) = 1 λ(z) goes faster to (±) infinity than z2 for z → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 102 |
+
page_content=' As (A1) to (A4) the conditions (A2′), (A3′) and (A5) transfer from the intensity function λ to the abbreviated form q for β1 > 0 and vice versa — analogously c(·) q = c(·) λ −β0 β1 with (·) is (A2′), (A3′) or empty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 103 |
+
page_content=' The logit model has the intensity function qlogit(x1) = exp(β0 + β1x1) (1 + exp(β0 + β1x1))2 and probit model has qprobit(x1) = φ2(β0 + β1x1) Φ(β0 + β1x1) · (1 − Φ(β0 + β1x1)) 4 Martin Radloff, Rainer Schwabe Exact Designs on the Ball with the density function φ and cumulative distribution function Φ of the standard normal distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 104 |
+
page_content=' Both models satisfy all five conditions (A1), (A2′), (A3′), (A4), (A5) and share a common c(A2′) λ = c(A3′) λ = 0, say cλ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 105 |
+
page_content=' Analogously cq = − β0 β1 for q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 106 |
+
page_content=' Beside these two models other models like the complementary log-log model, see Ford et al (1992), with intensity function λcomp log log(z) = exp(2z) exp(exp(z))−1 satisfy all five conditions with c(A2′) λ ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 107 |
+
page_content='466011 and c(A3′) λ ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 108 |
+
page_content='049084, but here mode c(A2′) λ and threshold c(A3′) λ do not coincide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 109 |
+
page_content=' We showed that if the (concise) intensity function q satisfies (A1), (A2′), (A3′) and (A5) the (locally) D-optimal design ξ∗ = ξ∗ 1 ⊗η is concentrated on exactly two orbits, which are the support points of the marginal design ξ∗ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 110 |
+
page_content=' The idea of the proof is based on Biedermann et al (2006) and Konstantinou et al (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 111 |
+
page_content=' The next theorem is the main result of our second paper — Radloff and Schwabe (2019a) — and is reproduced for the readers’ convenience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 112 |
+
page_content=' It characterizes the positions of the two support points of the optimal marginal design ξ∗ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 113 |
+
page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 114 |
+
page_content=' For k ≥ 2 the simplified problem (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 115 |
+
page_content='1) with β1 > 0 and intensity function q satisfying (A1), (A2′), (A3′) and (A5) has a (locally) D-optimal marginal design ξ∗ 1 with exactly 2 support points x∗ 11 and x∗ 12 with x∗ 11 > x∗ 12 and weights w1 = ξ∗ 1(x∗ 11) and w2 = ξ∗ 1(x∗ 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 116 |
+
page_content=' There are 3 cases: (a) If c(A2′) q > 1 and c(A3′) q /∈ [−1, 1], then x∗ 11 = 1, w1 = 1 k+1, w2 = k k+1 and x∗ 12 ∈ (−1, 1) is solution of q′(x∗ 12) q(x∗ 12) = 2 (1 + kx∗ 12) k (1 − x∗ 2 12 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 117 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 118 |
+
page_content='2) If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 119 |
+
page_content=' (b) If c(A2′) q < −1 and c(A3′) q /∈ [−1, 1], then x∗ 12 = −1, w1 = k k+1, w2 = 1 k+1 and x∗ 11 ∈ (−1, 1) is solution of q′(x∗ 11) q(x∗ 11) = 2 (−1 + kx∗ 11) k (1 − x∗ 2 11 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 120 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 121 |
+
page_content='3) If additionally (A4) is satisfied, the solution x∗ 11 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 122 |
+
page_content=' (c) Otherwise c(A2′) q ∈ [−1, 1] or c(A3′) q ∈ [−1, 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 123 |
+
page_content=' Let x, y ∈ R with x > y and α ∈ � − 1 2, 1 2 � be solution of the equation system: q′(x) q(x) + 2 x−y + (k−1) q′(x) (1−x2) ( 1 2 −α) + q(x) (−2 x) ( 1 2 −α) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 124 |
+
page_content='4) q′(y) q(y) − 2 x−y + (k−1) q′(y) (1−y2) ( 1 2 +α) + q(y) (−2 y) ( 1 2 +α) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 125 |
+
page_content='5) 1 1 2 −α − 1 1 2 +α + (k−1) q(x) (1−x2) − q(y) (1−y2) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 126 |
+
page_content='6) 5 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 1: Logit model for k = 3 and ��1 = 1: Dependence of x∗ 11 and x∗ 12 (solid lines) and the corresponding weights w1 and w2 = 1 − w1 (dashed lines) on −β0 = − β0 β1 = cq ∈ [−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 127 |
+
page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 128 |
+
page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 129 |
+
page_content=' (c0) If x, y ∈ (−1, 1) with x > y and α ∈ (− 1 2, 1 2) is a solution of the equation system, the orbit positions are x∗ 11 = x, x∗ 12 = y with weights w1 = 1 2 − α and w2 = 1 2 + α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 130 |
+
page_content=' (c1) If x ≥ 1 and y ∈ (−1, 1), then x∗ 11 = 1, w1 = 1 k+1, w2 = k k+1 and x∗ 12 ∈ (−1, 1) is the solution of the equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 131 |
+
page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 132 |
+
page_content=' (c2) If y ≤ −1 and x ∈ (−1, 1), then x∗ 12 = −1, w1 = k k+1, w2 = 1 k+1 and x∗ 11 ∈ (−1, 1) is the solution of the equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 133 |
+
page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 134 |
+
page_content=' Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 135 |
+
page_content=' Instead of reproducing the whole theorem for k = 1, only the two main changes in case (c) should be mentioned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 136 |
+
page_content=' So the weights are always w1 = w2 = 1 2 and the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 137 |
+
page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 138 |
+
page_content='6) is replaced by q′(x) q(x) + 2 x − y = 0 and q′(y) q(y) − 2 x − y = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 139 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 140 |
+
page_content='7) To illustrate this complex issue we revisit the logit model in dimension k = 3 with β1 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 141 |
+
page_content=' We (numerically) plot the orbit positions x∗ 11 and x∗ 12 and corresponding weights w1 and w2 = 1 − w1 depending on −β0 = − β0 β1 = cq, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 142 |
+
page_content=' The cases (a) and (b) go along with Theorem 1 and the results from Radloff and Schwabe (2019b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 143 |
+
page_content=' The cases (c1) and (c2) yield marginal extremum solutions which are identical to (a) and (b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 144 |
+
page_content=' So for these four cases there is always an exact minimally supported (locally) D-optimal design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 145 |
+
page_content=' As described in Theorem 1, it consists of a pole point in x1 = −1 or else x1 = 1 and the k vertices of a (regular) simplex which is maximally inscribed in the non-degenerated orbit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 146 |
+
page_content=' But the problematic case is (c0) because the (locally) D-optimal (generalized) design consists of two non-degenerated orbits and additionally the weights are rarely appropriate for a discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 147 |
+
page_content=' In Radloff and Schwabe (2019a) we showed two examples for the logit model (k = 3, β1 = 1) from which we derived (nearly) exact designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 148 |
+
page_content=' For −β0 = 0 the two orbit positions are symmetrical around 0, that is x∗ 11 = −x∗ 12 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 149 |
+
page_content='52, and the weights are ξ∗ 1(x∗ 11) = ξ∗ 1(x∗ 12) = 1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 150 |
+
page_content=' These two orbits were discretized by two 6 Martin Radloff, Rainer Schwabe Exact Designs on the Ball 2-dimensional simplices — overall 6 equally weighted support points;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 151 |
+
page_content=' see Figure 2 (left image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 152 |
+
page_content=' For −β0 = −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 153 |
+
page_content='1 it is x∗ 11 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 154 |
+
page_content='42, x∗ 12 ≈ −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 155 |
+
page_content='62 and ξ∗ 1(x∗ 11) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 156 |
+
page_content='4297, while 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 157 |
+
page_content='4297 ≈ 3 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 158 |
+
page_content=' We took the rounded design ξ≈ with the same support points x∗ 11 and x∗ 12 but with the marginal design ξ≈ 1 (x∗ 11) = 3 7 and ξ≈ 1 (x∗ 12) = 4 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 159 |
+
page_content=' So it was possible to substitute one orbit by the vertices of a 2-dimensional simplex (3 points — an equilateral triangle) and one by the vertices of a 2-dimensional cube or cross polytope (4 points — a square).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 160 |
+
page_content=' Because of rounding the design ξ≈ is not optimal but exact and has a high D-efficiency, which compares the rounded design ξ≈ and the optimal design ξ∗ β0 with respect to β0 — here p = k + 1 = 4 and β0 = (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 161 |
+
page_content='1, 1, 0, 0)⊤: EffD(ξ≈, β0) = � det(M(ξ≈, β0)) det(M(ξ∗ β0, β0)) �1 p ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 162 |
+
page_content='999757 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 163 |
+
page_content=' These designs are not very satisfactory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 164 |
+
page_content=' On the one hand the number of support points is not minimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 165 |
+
page_content=' On the other hand only special cases have appropriate rational weights which allow a discretization or otherwise the optimality is lost by rounding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 166 |
+
page_content=' Therefore we want to establish minimal supported exact designs for the case (c0) in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 167 |
+
page_content=' Mostly these designs wont be optimal but (highly) efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 168 |
+
page_content=' But we start with the reduction of the system of three equations in Theorem 2 to only one single equation for special unimodal intensity functions — symmetrical unimodal intensity functions — which can be found, for example, in binary response models with logit and probit link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 169 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 170 |
+
page_content=' Optimal Design for Symmetrical Unimodal Intensity Functions An interesting observation was made in the discussion section in Radloff and Schwabe (2019a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 171 |
+
page_content=' For models with unimodal intensity function in which the mode and threshold coincide (c(A2′) λ = c(A3′) λ = cλ) and which are symmetrical, also the two orbit positions are symmetrical in a certain way, which we want to investigate here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 172 |
+
page_content=' For one dimension this has been considered and shown in Ford et al (1992, Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 173 |
+
page_content='5 and 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 174 |
+
page_content='6), but this proof cannot be extended to higher dimensions directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 175 |
+
page_content=' Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 176 |
+
page_content=' An unimodal intensity function in which the mode and threshold coincide (c(A2′) λ = c(A3′) λ = cλ) will be called symmetrical to cλ if λ(cλ + z) = λ(cλ − z) for all z ∈ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 177 |
+
page_content=' The intensity functions of the logit and probit models are symmetrical with cλ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 178 |
+
page_content=' But the unimodal intensity function of the complementary log-log model has c(A2′) λ ̸= c(A3′) λ and cannot be symmetrical for this reason.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 179 |
+
page_content=' Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 180 |
+
page_content=' Let the intensity function λ be symmetrical to cλ in the situation of Theo- rem 2 (c0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 181 |
+
page_content=' 7 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For given β0 ̸= cλ let r solve λ′(cλ+r) λ(cλ+r) = − −2 k r2 (β2 1 +c2−r2)+(β2 1 −c2−r2)2−4 c2 r2 +(β2 1 −c2+r2) � (β2 1 −c2−r2)2+4 (k2−1) c2 r2 (k+1) r (r+c−β1)(r+c+β1)(r−c+β1)(r−c−β1) (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 182 |
+
page_content='8) with c := cλ − β0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 183 |
+
page_content=' Then x = c β1 + r β1 , (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 184 |
+
page_content='9) y = c β1 − r β1 , (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 185 |
+
page_content='10) α = −(β2 1 −c2−r2)+ � (β2 1 −c2−r2)2+4 (k2−1) c2 r2 4 (k+1) c r (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 186 |
+
page_content='11) is a solution of the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 187 |
+
page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 188 |
+
page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 189 |
+
page_content=' For given β0 = cλ it is x = r β1, y = − r β1 and α = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 190 |
+
page_content=' Here r is the solution of λ′(cλ + r) λ(cλ + r) = − 2 (β2 1 − k r2) (k + 1) r (β2 1 − r2) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 191 |
+
page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 192 |
+
page_content='12) Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 193 |
+
page_content=' For k = 1, see Remark 1, let λ be symmetrical to cλ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 194 |
+
page_content=' Then x = cλ−β0 β1 + r β1 and y = cλ−β0 β1 − r β1 with r is solution of λ′(cλ + r) λ(cλ + r) = −1 r (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 195 |
+
page_content='13) solve the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 196 |
+
page_content='7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 197 |
+
page_content=' Lemma 1, whose proof sketch can be found in Appendix B, and Remark 2 in combination with Theorem 2 give (locally) D-optimal designs for models with symmetrical unimodal intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 198 |
+
page_content=' As a result we reduced the system of equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 199 |
+
page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 200 |
+
page_content='6) to only one single equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 201 |
+
page_content='8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 202 |
+
page_content=' But now there is the question if condition (A4) can guarantee a unique solution as in Theorem 1 or in Theorem 2 (a) and (b) because Theorem 2 (c), especially (c0), tells nothing about uniqueness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 203 |
+
page_content=' But we want to add a remark about the values of r before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 204 |
+
page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 205 |
+
page_content=' Since the system of equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 206 |
+
page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 207 |
+
page_content='6) in Theorem 2 (c0) should have a solution with two inner support points for the marginal design, x, y ∈ (−1, 1) is required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 208 |
+
page_content=' So −1 < cλ − β0 β1 ± r β1 < 1 must be valid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 209 |
+
page_content=' This leads with β1 > 0 to r ∈ (−(cλ − β0) − β1, −(cλ − β0) + β1) and r ∈ ((cλ − β0) − β1, (cλ − β0) + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 210 |
+
page_content=' Consequently, both intervals must overlap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 211 |
+
page_content=' This happens for cλ − β0 > 0 at 0 < cλ − β0 < β1 and for cλ − β0 < 0 at −β1 < cλ − β0 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 212 |
+
page_content=' Thus cλ − β0 ∈ (−β1, β1) and in particular β2 1 > (cλ − β0)2 must hold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 213 |
+
page_content=' Then r is in the interval (|cλ − β0| − β1, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 214 |
+
page_content=' But Theorem 2 (c) need x > y and consequently r > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 215 |
+
page_content=' Hence, r ∈ (0, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 216 |
+
page_content=' This remains valid in particular for β0 = cλ, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 217 |
+
page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 218 |
+
page_content=' cλ − β0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 219 |
+
page_content=' So r ∈ (−β1, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 220 |
+
page_content=' With r > 0 it is r ∈ (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 221 |
+
page_content=' 8 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 222 |
+
page_content=' In situation of Lemma 1 let the intensity function λ additionally satisfy condition (A4), then equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 223 |
+
page_content='8), whose right hand side is continuously continued in −|cλ − β0| + β1, has a unique solution in r ∈ (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 224 |
+
page_content=' This also holds for β0 = cλ and equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 225 |
+
page_content='12), which has exactly one solution in r ∈ (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 226 |
+
page_content=' Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 227 |
+
page_content=' For k = 1, see Remark 2, and for an intensity function satisfying (A4) there is only one solution of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 228 |
+
page_content='13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 229 |
+
page_content=' The proof sketch of Lemma 2 can be found in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 230 |
+
page_content=' Lemma 2 guarantees a unique solution in r ∈ (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 231 |
+
page_content=' But Remark 3 points out that for Theorem 2 (c0) we need r ∈ (0, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 232 |
+
page_content=' This means that the unique solution can result in the two-orbit case or in the one-orbit one-pole case of Theorem 2 (c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 233 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 234 |
+
page_content=' Minimally Supported Designs In the situation of Theorem 1 and Theorem 2 (a), (b), (c1) and (c2) the designs have always the minimal number of support points to estimate the parameter vector β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 235 |
+
page_content=' These are k + 1 support points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 236 |
+
page_content=' In Radloff and Schwabe (2019a) revisited here in the introductory section we indicated exemplarily a (locally) D-optimal design for the logit model on the 3-dimensional ball with −β0 = 0 and β1 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 237 |
+
page_content=' This design consists of six support points which are the vertices of two regular 2-dimensional simplices — equilateral triangles;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 238 |
+
page_content=' see Figure 2 (left image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 239 |
+
page_content=' But this is not the minimum of support points to estimate the four parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 240 |
+
page_content=' So the question arises whether it is possible to reduce the number of support points as it can be found in the concept of fractional factorial designs, see, for example, Pukelsheim (1993, section 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 241 |
+
page_content='11).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 242 |
+
page_content=' Instead of using all vertices of the hypercube [−1, 1]k as in the full factorial design the fractional factorial design picks only a special percentage of these points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 243 |
+
page_content=' For k = 3 (−1, −1, 1)⊤, (−1, 1, −1)⊤, (1, −1, −1)⊤, (1, 1, 1)⊤ represent a 23−1-fractional factorial design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 244 |
+
page_content=' In our issue we do not want to pick four of the six points, but we want to use the orthogonality of the spaces spanned by the points (without the x1-component) in the two orbits (x1 = −1 and x1 = 1) of the given 23−1-fractional factorial design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 245 |
+
page_content=' Here span{(−1, 1)⊤, (1, −1)⊤} ⊥ span{(−1, −1)⊤, (1, 1)⊤}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 246 |
+
page_content=' The idea for our problem is il- lustrated in Figure 2 (right image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 247 |
+
page_content=' The spanned spaces by points (without the x1- component) in the orbits are orthogonal to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 248 |
+
page_content=' And all points span a simplex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 249 |
+
page_content=' As stated above a (generalized) design ξ which is rotation invariant with fixed x1 — invariant with respect to all orthogonal transformations in O(k) which do not change the x1-component — and which has all mass on the unit sphere can be decomposed into a marginal design ξ1 on [−1, 1] and a probability kernel η (conditional design), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 250 |
+
page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 251 |
+
page_content=' ξ = ξ1 ⊗ η.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 252 |
+
page_content=' For fixed x1 the kernel η(x1, ·) is the uniform distribution on the surface of a (k − 1)-dimensional ball with radius � 1 − x2 1 — the orbit at position x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 253 |
+
page_content=' If x1 ∈ {−1, 1}, the (k − 1)-dimensional ball with the uniform distribution reduces to a single point and represents only a one-point-measure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 254 |
+
page_content=' Remembering q(x1) = λ(β0 + β1x1) the related 9 Martin Radloff, Rainer Schwabe Exact Designs on the Ball information matrix, see Radloff and Schwabe (2019b), is M(ξ1 ⊗ η, β0) = � � � � q dξ1 � q id dξ1 � q id dξ1 � q id2 dξ1 O2×(k−1) O(k−1)×2 1 k−1 � q (1 − id2) dξ1 Ik−1 � � � (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 255 |
+
page_content='14) with β0 = (β0, β1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 256 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 257 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 258 |
+
page_content=' , 0)⊤.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 259 |
+
page_content=' The information matrix for a design on the k-dimensional unit sphere Sk−1, which is based on exactly two orbits, can be determined analogously to this result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 260 |
+
page_content=' Additionally the uniform distribution does not cover the the full orbits but only sub-spheres.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 261 |
+
page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 262 |
+
page_content=' Let ξ1 be the two-point-measure in x11 and x12 with ξ1(x11) = 1 2 − α and ξ1(x12) = 1 2 + α with α ∈ � − 1 2, 1 2 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 263 |
+
page_content=' Further let η(x11, ·) be a uniform distribution on Sm−2 �� 1 − x2 11 � × {0}k−m and likewise η(x12, ·) be a uniform distribution on {0}m−1 × Sk−m−1 �� 1 − x2 12 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 264 |
+
page_content=' Then the information matrix is M(ξ1 ⊗ η, β0) = � � � � � � q dξ1 � q id dξ1 � q id dξ1 � q id2 dξ1 O2×(k−1) O(k−1)×2 c1 Im−1 O(m−1)×(k−m) O(k−m)×(m−1) c2 Ik−m � � � � � (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 265 |
+
page_content='15) with c1 = 1 m−1 q(x11) (1−x2 11) ( 1 2 −α) and c2 = 1 k−m q(x12) (1−x2 12) ( 1 2 +α).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 266 |
+
page_content=' Now the optimality case in Theorem 2 (c0) on two orbits should be used to investigate when both information matrices (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 267 |
+
page_content='14) und (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 268 |
+
page_content='15) are identical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 269 |
+
page_content=' With that both related (generalized) designs would be (locally) D-optimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 270 |
+
page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 271 |
+
page_content=' Both information matrices (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 272 |
+
page_content='14) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 273 |
+
page_content='15) are identical in the situation of Theorem 2 (c0) if and only if α = 1 2 − m k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 274 |
+
page_content=' The proof can be found in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 275 |
+
page_content=' Consequently both orbits need the weights ξ1(x11) = m k+1 and ξ1(x12) = k−m+1 k+1 to coincide both information matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 276 |
+
page_content=' This allows an experimental design, which has the same value for the D-optimality criterion, consisting of two orbits with m and with k −m+1 support Figure 2: Logit model for k = 3 and β1 = 1 and −β0 = 0: discretized (locally) D-optimal designs with 6 or 4 support points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 277 |
+
page_content=' 10 1Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 3: D-efficiency for the logit model with k = 3 and β1 = 1: comparison of designs with exactly k+1 = 4 equally weighted support points in −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 278 |
+
page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 279 |
+
page_content='403) (rounded).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 280 |
+
page_content=' points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 281 |
+
page_content=' This can be done by two regular simplices — one simplex in dimension m − 1 and one in dimension k − m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 282 |
+
page_content=' So the simplices are the discretizations of the uniform distributions on Sm−2 �� 1 − x2 11 � × {0}k−m and on {0}m−1 × Sk−m−1 �� 1 − x2 12 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 283 |
+
page_content=' Let Sm ∈ Rm×(m+1) be a matrix, where the columns represent the m + 1 vertices of an m-dimensional regular simplex (in Rm).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 284 |
+
page_content=' Then the columns of the matrix � � � x111⊤ m x121⊤ k−m+1 R1 Sm−1 O(m−1)×(k−m+1) O(k−m)×m R2 Sk−m � � � with arbitrary orthogonal transformations R1 ∈ O(m − 1) and R2 ∈ O(k − m) represent the support points of such a minimal supported design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 285 |
+
page_content=' �� m + 1 m Im + 1 − √m + 1 m√m 1m1⊤ m ����� − 1 √m 1m � ∈ Rm×(m+1) is an example for Sm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 286 |
+
page_content=' In this notation Im stands for the standard simplex which needs to be scaled and shifted appropriately so that it is in combination with the last vertex − 1 √m 1m (last column) a regular simplex on the unit sphere Sm−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 287 |
+
page_content=' Finally, we want to look at the D-efficiency, here with β0 = (β0, β1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 288 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 289 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 290 |
+
page_content=' , 0)⊤, EffD(ξ, β0) = � det(M(ξ, β0)) det(M(ξ∗ β0, β0)) �1 p ∈ [0, 1] for designs ξ with exactly p = k + 1 equally weighted support points in the region where two non-degenerated orbits occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 291 |
+
page_content=' As an example, the logit model with β1 = 1 is used to determine the D-efficiency in dimensions k = 3 and k = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 292 |
+
page_content=' In Figure 3 and Figure 4 only the regions for −β0 with 11 Martin Radloff, Rainer Schwabe Exact Designs on the Ball two non-degenerated orbits in the optimal design (case (c0) in Theorem 2), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 293 |
+
page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 294 |
+
page_content=' −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 295 |
+
page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 296 |
+
page_content='403) (rounded) for k = 3 and −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 297 |
+
page_content='480, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 298 |
+
page_content='480) (rounded) for k = 6, are plotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 299 |
+
page_content=' For this purpose, three different types of exact designs are compared with the (locally) D-optimal design ξ∗ β0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 300 |
+
page_content=' The optimal design is a generalized design with real weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 301 |
+
page_content=' Therefore it cannot be discretized as an exact design in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 302 |
+
page_content=' First, the two optimal exact designs with one pole and one orbit, which are discretized as a regular (k−1)-dimensional simplex, are used for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 303 |
+
page_content=' The orbit position remains unchanged and is determined at the boundary values −β0 ≈ ±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 304 |
+
page_content='403 or −β0 ≈ ±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 305 |
+
page_content='480.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 306 |
+
page_content=' See the solid lines in both figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 307 |
+
page_content=' Second, the designs with the same orbit position as the associated design which is (locally) optimal for −β0 are the next alternative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 308 |
+
page_content=' Only the weights were rounded/shifted to integral multiples of 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 309 |
+
page_content=' See the dotted lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 310 |
+
page_content=' Third, the designs with fixed design weights which are integral multiples of 1 k+1 represent the last model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 311 |
+
page_content=' So only the positions of the orbits have to be optimized with these fixed design weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 312 |
+
page_content=' This can be done by solving only the equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 313 |
+
page_content='4) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 314 |
+
page_content='5) with the selected weights in Theorem 2 (c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 315 |
+
page_content=' Equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 316 |
+
page_content='6) is omitted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 317 |
+
page_content=' See the dashed lines in both plots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 318 |
+
page_content=' The Figure 3 reveals for dimension k = 3 that there are only three positions in the range −β0 ∈ [−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 319 |
+
page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 320 |
+
page_content='403] (rounded) where (locally) D-optimal designs with the min- imal number of support points — four points — exists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 321 |
+
page_content=' For −β0 ≈ −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 322 |
+
page_content='403 this is the design consisting of the pole x∗ 12 = −1 and one orbit at x∗ 11 with three points as vertices of an equilateral triangle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 323 |
+
page_content=' Then for −β0 = 0 there are two orbits with two points each.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 324 |
+
page_content=' And, at −β0 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 325 |
+
page_content='403 the design consists of one orbit at x∗ 12 with three equally weighted support points and the pole x∗ 11 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 326 |
+
page_content=' In the span between these optimality positions the considered discretizations provide a fairly high efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 327 |
+
page_content=' Using the transition directly from pole and orbit to orbit and pole, the efficiency is always greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 328 |
+
page_content='988 (intersec- tion of the solid lines).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 329 |
+
page_content=' If the two orbits are also discretized in between, the efficiency is greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 330 |
+
page_content='993 (intersection of dotted line and solid lines) or even greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 331 |
+
page_content='997 (intersection of dashed line and solid lines).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 332 |
+
page_content=' For dimension k = 6, see figure 4, an efficiency of more than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 333 |
+
page_content='986 is possible by stepping directly from pole and orbit with six support points to orbit with six design points and pole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 334 |
+
page_content=' If the intermediate steps — two orbits with 2 and 5 points, 3 and 4 points, 4 and 3 points as well as 5 and 2 points — are used, then by simple rounding of the weights to integral multiples of 1 k+1 an efficiency greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 335 |
+
page_content='995 (dotted lines) and with additional optimization of the orbit positions even greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 336 |
+
page_content='999 (dashed lines) can be achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 337 |
+
page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 338 |
+
page_content=' Conclusion In summary it can be postulated that very efficient designs are generated based on only k + 1 design points which is the minimal number of support points to estimate the pa- rameter vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 339 |
+
page_content=' It seems that higher dimensions enable designs with higher D-efficiency, in particular using the third option of discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 340 |
+
page_content=' Here we only considered designs with exactly two orbits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 341 |
+
page_content=' Thus it cannot be excluded that there are designs with a better efficiency or even (locally) optimal designs which are supported by exactly k + 1 points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 342 |
+
page_content=' Maybe these designs have support points which lie not on the orbit but are jittered a little bit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 343 |
+
page_content=' This as well as a potential lower efficiency bound needs further investigations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 344 |
+
page_content=' 12 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 4: D-efficiency for the logit model with k = 6 and β1 = 1: comparison of designs with exactly k+1 = 7 equally weighted support points in −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 345 |
+
page_content='480, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 346 |
+
page_content='480) (rounded).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 347 |
+
page_content=' On the other side the reduction of the equation system to one single equation for deter- mining (locally) D-optimal design for symmetrical unimodal intensity functions is a nice feature and can help to decrease computing costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 348 |
+
page_content=' Also the question of optimal designs on the ball with respect to other optimality criteria should be considered in future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 349 |
+
page_content=' Finally, we want to emphasize that the established designs do not only work for the unit ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 350 |
+
page_content=' By using the concept of equivariance for linear transformations, say scaling, reflecting and rotating, the class of design spaces can be extended to k-dimensional balls with arbitrary radius or any k-dimensional ellipsoid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 351 |
+
page_content=' Appendix A Notation Bk k-dimensional unit ball Bk(r) k-dimensional ball with radius r Sk−1 unit sphere, which is the surface of Bk Sk−1(r) sphere with radius r, which is the surface of Bk(r) Ok k-dimensional zero-vector Ok1×k2 (k1 × k2)-dimensional zero-matrix 1k k-dimensional one-vector Ik (k × k)-dimensional identity matrix id identity function 13 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Appendix B Proofs Proof sketch of Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 352 |
+
page_content=' By plugging (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 353 |
+
page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 354 |
+
page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 355 |
+
page_content='6) and using the sym- metry to simplify, we get −2 α (4 c r α+(β2 1 −c2−r2))+4 (k−1) c r � 1 2 −α � � 1 2 +α � � 1 2 −α � � 1 2 +α � (4 c r α+(β2 1 −c2−r2)) = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 356 |
+
page_content=' In the numerator there is a polynomial of degree two in α with the two roots α∓(r) depending on r: α∓(r) := − (β2 1 − c2 − r2) ∓ � (β2 1 − c2 − r2)2 + 4 (k + 1) (k − 1) c2 r2 4 (k + 1) c r .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 357 |
+
page_content=' Now we examine the values of α∓(r) depending on r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 358 |
+
page_content=' Only −|c| − β1, |c| − β1, −|c| + β1 or |c| + β1 can solve the expression α∓(r) = ± 1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 359 |
+
page_content=' But −|c| − β1 and |c| + β1 are not in the interesting region for r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 360 |
+
page_content=' We have α− (±(|c| − β1)) = ±1 2 sign(c) and α+ (±(|c| − β1)) = ∓1 2 sign(c) k − 1 k + 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 361 |
+
page_content=' Because of limr↗0 α− (r) = sign(c)∞ and limr↘0 α− (r) = − sign(c)∞ the root α−(r) has in the interval r ∈ [|c| − β1, −|c| + β1] only values outside (− 1 2, 1 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 362 |
+
page_content=' Hence, α−(r) is not a relevant root.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 363 |
+
page_content=' Since limr→0 α+ (r) = 0 the discontinuity of the root α+(r) in r = 0 can be removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 364 |
+
page_content=' So α+(r) has only values in (− 1 2, 1 2) on the interval r ∈ [|c| − β1, −|c| + β1] and α+(r), which is (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 365 |
+
page_content='11), is the only relevant root.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 366 |
+
page_content=' After inserting (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 367 |
+
page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 368 |
+
page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 369 |
+
page_content='4) as well as (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 370 |
+
page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 371 |
+
page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 372 |
+
page_content='5) and sub- tracting both obtained equations and simplifying by using the symmetry, we get (k + 1) λ′(cλ + r) λ(cλ + r) = −(k − 1) −2 r + α · 4 c (β2 1 − c2 − r2) + α · 4 c r − 2 r .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 373 |
+
page_content=' Equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 374 |
+
page_content='8) follows by plugging α+(r) as α into it and by some simplifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 375 |
+
page_content=' For β0 = cλ, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 376 |
+
page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 377 |
+
page_content=' c = cλ − β0 = 0, we get directly α = 0 by inserting x = r β1 and y = − r β1 in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 378 |
+
page_content='6) and exploiting the symmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 379 |
+
page_content=' This is inserted in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 380 |
+
page_content='4) and in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 381 |
+
page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 382 |
+
page_content=' The difference between these two equations results in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 383 |
+
page_content='12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 384 |
+
page_content=' Proof sketch of Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 385 |
+
page_content=' This proof is a lot of curve sketching.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 386 |
+
page_content=' We start with β0 ̸= cλ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 387 |
+
page_content=' The denominator of the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 388 |
+
page_content='8) has five roots in r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 389 |
+
page_content=' −|cλ −β0|−β1 < 0 and |cλ − β0| − β1 < 0 are not in the considered interval (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 390 |
+
page_content=' In r = −|cλ − β0| + β1 there is a discontinuity which can be removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 391 |
+
page_content=' In r = 0 and in r = |cλ − β0| + β1 there are two poles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 392 |
+
page_content=' Analyzing these poles for the considered interval we see that the values start from −∞ (r ↘ 0) and go up to +∞ (r ↗ |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 393 |
+
page_content=' Sophisticated curve sketching shows that the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 394 |
+
page_content='8) is strictly monotonically increasing on (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 395 |
+
page_content=' So it is strictly monotonically increasing and covers (−∞, ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 396 |
+
page_content=' In combination with (A4) for the left hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 397 |
+
page_content='8) (monotonically decreasing) there is exactly one solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 398 |
+
page_content=' For β0 = cλ we can mention that the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 399 |
+
page_content='12) is also strictly monotonically increasing on (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 400 |
+
page_content=' Hence, there is only one solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 401 |
+
page_content=' An analogue result holds for the situation in Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 402 |
+
page_content=' 14 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 403 |
+
page_content=' Rearranging equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 404 |
+
page_content='6) equivalently in two ways gives q(x12) (1−x2 12) ( 1 2 +α) = q(x11) (1−x2 11) ( 1 2 −α) k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) and q(x11) (1−x2 11) ( 1 2 −α) = q(x12) (1−x2 12) ( 1 2 +α) k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 405 |
+
page_content=' The two denominators are zero if and only if α = 1 2 − 1 k+1 and α = 1 2 − k k+1, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 406 |
+
page_content=' But this cannot happen to non-degenerated orbits because 1 2 − k k+1 < α < 1 2 − 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 407 |
+
page_content=' Putting both equations into the diagonal entry of the information matrix (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 408 |
+
page_content='14) yield 1 k − 1 � q (1 − id2) dξ1 = q(x11) (1−x2 11) ( 1 2 −α) � 1 k − 1 + 1 k − 1 · k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) � and 1 k − 1 � q (1 − id2) dξ1 = q(x12) (1−x2 12) ( 1 2 −α) � 1 k − 1 · k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) + 1 k − 1 � They are identical to the diagonal entries of the information matrix (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 409 |
+
page_content='15) in Lemma 3 if and only if 1 k−1 + 1 k−1 · k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) = 1 m−1 and 1 k−1 · k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) + 1 k−1 = 1 k−m which are both equivalent to α = 1 2 − m k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 410 |
+
page_content=' References Biedermann S, Dette H, Zhu W (2006) Optimal designs for dose-response models with restricted design spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 411 |
+
page_content=' Journal of the American Statistical Association 101:747–759 Dette H, Melas VB, Pepelyshev A, et al (2005) Optimal designs for three-dimensional shape analysis with spherical harmonic descriptors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 412 |
+
page_content=' The Annals of Statistics 33:2758– 2788 Dette H, Melas VB, Pepelyshev A (2007) Optimal designs for statistical analysis with zernike polynomials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 413 |
+
page_content=' Statistics 41:453–470 Farrell RH, Kiefer J, Walbran A (1967) Optimum multivariate designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 414 |
+
page_content=' In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 415 |
+
page_content=' University of California Press, Berkeley, Calif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 416 |
+
page_content=', pp 113–138 Ford I, Torsney B, Wu C (1992) The use of a canonical form in the construction of locally optimal designs for non-linear problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 417 |
+
page_content=' Journal of the Royal Statistical Society: Series B (Statistical Methodology) 54:569–583 15 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Hirao M, Sawa M, Jimbo M (2015) Constructions of φp-optimal rotatable designs on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 418 |
+
page_content=' Sankhya A : The Indian Journal of Statistics 77:211–236 Kiefer JC (1961) Optimum experimental designs v, with applications to systematic and rotatable designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 419 |
+
page_content=' In: Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Univ of California Press, pp 381–405 Konstantinou M, Biedermann S, Kimber A (2014) Optimal designs for two-parameter nonlinear models with application to survival models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 420 |
+
page_content=' Statistica Sinica 24:415–428 Lau TS (1988) d-optimal designs on the unit q-ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 421 |
+
page_content=' Journal of statistical planning and inference 19:299–315 Pukelsheim F (1993) Optimal Design of Experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 422 |
+
page_content=' Wiley Series in Probability and Statistics Radloff M, Schwabe R (2016) Invariance and equivariance in experimental design for nonlinear models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 423 |
+
page_content=' In: Kunert J, Müller CH, Atkinson AC (eds) mODa 11-Advances in Model-Oriented Design and Analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 424 |
+
page_content=' Springer, p 217–224 Radloff M, Schwabe R (2019a) Locally d-optimal designs for a wider class of non-linear models on the k-dimensional ball with applications to logit and probit models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 425 |
+
page_content=' Statis- tical Papers 60:165–177 Radloff M, Schwabe R (2019b) Locally d-optimal designs for non-linear models on the k-dimensional ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 426 |
+
page_content=' Journal of Statistical Planning and Inference 203:106–116 Schmidt D, Schwabe R (2017) Optimal design for multiple regression with information driven by the linear predictor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
| 427 |
+
page_content=' Statistica Sinica 27:1371–1384 16' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
|
9NA0T4oBgHgl3EQfO_8B/content/tmp_files/2301.02167v1.pdf.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
9NA0T4oBgHgl3EQfO_8B/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/2301.01712v1.pdf.txt
ADDED
|
@@ -0,0 +1,2499 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.01712v1 [math.PR] 4 Jan 2023
|
| 2 |
+
1
|
| 3 |
+
Mesoscopic eigenvalue statistics for Wigner-type matrices
|
| 4 |
+
Volodymyr Riabov∗
|
| 5 |
+
Institute of Science and Technology Austria
|
| 6 |
+
volodymyr.riabov@ist.ac.at
|
| 7 |
+
Abstract. We prove a universal mesoscopic central limit theorem for linear eigenvalue statistics of a Wigner-
|
| 8 |
+
type matrix inside the bulk of the spectrum with compactly supported twice continuously differentiable test
|
| 9 |
+
functions. The main novel ingredient is an optimal local law for the two-point function T(z, ζ) and a general
|
| 10 |
+
class of related quantities involving two resolvents at nearby spectral parameters.
|
| 11 |
+
Date: January 5, 2023
|
| 12 |
+
Keywords and phrases: Wigner-type matrix, mesoscopic eigenvalue statistics, central limit theorem
|
| 13 |
+
2010 Mathematics Subject Classification: 60B20, 15B52
|
| 14 |
+
1
|
| 15 |
+
Introduction
|
| 16 |
+
In the study of the eigenvalue distribution of large random matrices, the most celebrated analog of
|
| 17 |
+
the Law of Large Numbers is the Wigner semicircle law [25]. It states that the empirical density of
|
| 18 |
+
eigenvalues converges to a deterministic limit known as the semicircle distribution ρsc. More explicitly,
|
| 19 |
+
if H is an N ×N Wigner matrix and f is a sufficiently smooth test function, then the linear eigenvalue
|
| 20 |
+
statistics N −1 Tr f(H) converge in probability to
|
| 21 |
+
�
|
| 22 |
+
R f(x)ρsc(x)dx in the large N limit.
|
| 23 |
+
The corresponding Central Limit Theorem (CLT) asserts that the asymptotic fluctuations of the
|
| 24 |
+
linear eigenvalue statistics Tr f(H)−E [Tr f(H)] are Gaussian. The absence of the N −1/2 normalization
|
| 25 |
+
factor, appearing in the classical CLT, can be viewed as a manifestation of the strongly-correlated
|
| 26 |
+
nature of the eigenvalues. For the special case of f(x) = (x − z)−1 with Im z ̸= 0, this result was
|
| 27 |
+
obtained by Khorunzhy, Khoruzhenko and Pastur [16]. Johansson obtained the CLT for invariant
|
| 28 |
+
ensembles with arbitrary polynomial potentials in [15].
|
| 29 |
+
In [4], Bai and Yao used martingale CLT
|
| 30 |
+
to establish the result for Wigner matrices with analytic test functions. The proof for bounded test
|
| 31 |
+
functions f with bounded derivatives appeared in the work of Lytova and Pastur [22]. In subsequent
|
| 32 |
+
works, different moment conditions on the matrix and regularity conditions on the test function were
|
| 33 |
+
studied extensively by many authors, e.g., [6, 18, 23, 24].
|
| 34 |
+
While fixed test functions represent macroscopic averaging in the spectrum, one can introduce N-
|
| 35 |
+
dependent scaling and consider scaled test functions of the form f(x) = g(η−1
|
| 36 |
+
0 (x − E0)), where E0
|
| 37 |
+
is a fixed reference energy in the bulk, η0 ≡ η0(N) ≪ 1 is a scaling parameter, and g is compactly
|
| 38 |
+
supported. Then Tr f(H) involves only about Nη0 eigenvalues of H. In particular, on mesoscopic
|
| 39 |
+
scales, corresponding to N −1 ≪ η0 ≪ 1, the limiting variance is given by the square of the
|
| 40 |
+
˙H1/2
|
| 41 |
+
norm of g.
|
| 42 |
+
Mesoscopic test functions were first studied by Boutet de Monvel and Khorunzhy in
|
| 43 |
+
[7] for the Gaussian Orthogonal Ensemble, with subsequent extension to real Wigner matrices in [8]
|
| 44 |
+
with N −1/8 ≪ η0 ≪ 1. In [13], He and Knowles proved the CLT for Wigner matrices with general
|
| 45 |
+
mesoscopic test functions for all scaling parameters N −1 ≪ η0 ≪ 1.
|
| 46 |
+
∗Supported by the ERC Advanced Grant ”RMTBeyond” No. 101020331
|
| 47 |
+
|
| 48 |
+
The result was extended to ensembles of greater generality in the more recent works, see, e.g., [5]
|
| 49 |
+
and [20]. In particular, Li and Xu obtained mesoscopic CLT for generalized Wigner matrices 1 in the
|
| 50 |
+
bulk and at the spectral edge with C2
|
| 51 |
+
c test functions in the full range of scales [21].
|
| 52 |
+
Finally, Landon, Lopatto, and Sosoe proved the bulk CLT for the much more general ensemble
|
| 53 |
+
of Wigner-type matrices in [17] for two classes of C∞ test functions. For a special class of globally
|
| 54 |
+
supported regularized bump functions , the proof is performed via resolvent techniques for large scales
|
| 55 |
+
and extended to the entire mesoscopic range using Dyson Brownian motion (DBM) dynamics. For
|
| 56 |
+
the more conventional compactly supported scaled test functions, the bulk CLT is established on all
|
| 57 |
+
mesoscopic scales N −1 ≪ η0 ≪ 1 using a combination of DBM and Green’s function comparison.
|
| 58 |
+
Wigner-type matrices were first introduced in [2]; they have centered entries Hjk independent up
|
| 59 |
+
to the symmetry constraint H = H∗. The matrix of variances S, defined by Sjk := E
|
| 60 |
+
�
|
| 61 |
+
|Hjk|2�
|
| 62 |
+
, is
|
| 63 |
+
assumed to be flat, i.e., Sjk ∼ N −1 and satisfy a piece-wise H¨older regularity condition (see (B)).
|
| 64 |
+
As the main step towards CLT in the present paper, we prove the optimal averaged and entry-wise
|
| 65 |
+
local laws (Corollary 3.3) for the two-point function T , defined by
|
| 66 |
+
Txy(z, ζ) :=
|
| 67 |
+
�
|
| 68 |
+
a̸=y
|
| 69 |
+
SxaGay(z)Gya(ζ),
|
| 70 |
+
x, y ∈ {1, . . ., N},
|
| 71 |
+
(1.1)
|
| 72 |
+
where G(z) is the resolvent of H. The corresponding result in the simpler setting of generalized Wigner
|
| 73 |
+
matrices was obtained in [21]. Using the optimal local law for T (z, ζ), we prove the bulk mesoscopic
|
| 74 |
+
CLT for Wigner-type matrices in the full range of scales N −1 ≪ η0 ≪ 1 for compactly supported C2
|
| 75 |
+
scaled test functions (Theorem 2.2). Our proof relies entirely on resolvent methods, circumventing the
|
| 76 |
+
DBM dynamics used in [17].
|
| 77 |
+
Understanding T (z, ζ) is the crucial ingredient for the CLT as it was realized in [17]. In fact, a
|
| 78 |
+
suboptimal entry-wise local law for Txy(z, ζ) was proved in Proposition 5.1 of [17]. If one relies solely
|
| 79 |
+
on resolvent methods, this local law provides sufficient control for mesoscopic CLT only on scales
|
| 80 |
+
η0 ≫ N −1/5. The main reason for this limitation is that the error term in [17] contains the norm of
|
| 81 |
+
the inverted stability operator (defined in (4.5)). In the present paper, we show that this factor can be
|
| 82 |
+
removed by separating the destabilizing eigendirection corresponding to the smallest eigenvalue of the
|
| 83 |
+
stability operator. Using this method, we prove a local law for a general class of quantities involving
|
| 84 |
+
two resolvents (Theorem 3.2) and deduce the optimal averaged and entry-wise local laws for T (z, ζ).
|
| 85 |
+
In particular, this allows us to obtain the CLT on all mesoscopic scales without relying on DBM.
|
| 86 |
+
The main difficulty lies in the fact that the deterministic approximation of the resolvent for Wigner-
|
| 87 |
+
type matrices is not a multiple of the identity matrix, contrary to the generalized Wigner case [21].
|
| 88 |
+
Consequently, the destabilizing direction is no longer parallel to the vector of ones, and generally, no
|
| 89 |
+
closed-form expression is known for the corresponding eigenprojector. It is important to note that for
|
| 90 |
+
the deformed Wigner matrices studied in [20], the deterministic approximation is also not a multiple
|
| 91 |
+
of the identity, but Sjk = N −1. Therefore, the two-point function can be expressed as the square of
|
| 92 |
+
the resolvent and can be studied using the local law, similarly to the standard Wigner case.
|
| 93 |
+
Instead of approximating the destabilizing direction to circumvent this difficulty, we use a contour
|
| 94 |
+
integral representation for the eigenprojector. It allows us to extend the decomposition approach of
|
| 95 |
+
[21] to the Wigner-type ensembles. This method benefits from yielding an integral representation for
|
| 96 |
+
the variance on all mesoscopic scales, under weaker regularity conditions on the test function than in
|
| 97 |
+
[17], and relying only on resolvent methods.
|
| 98 |
+
The paper is organized in the following way. Section 2 contains the precise definition of the model
|
| 99 |
+
and the statement of our main mesoscopic CLT result, Theorem 2.2. In Section 3, we present our main
|
| 100 |
+
technical result, the optimal local law for two-point functions in Theorem 3.2. In Section 4, we collect
|
| 101 |
+
notations and preliminary results to which we refer throughout the paper. In Section 5, we deduce
|
| 102 |
+
Theorem 2.2 from Propositions 5.1 and 5.2, and prove Proposition 5.1 using a local law for T (z, ζ)
|
| 103 |
+
(Corollary 3.3) as an input. The proofs of Theorem 3.2 and Corollary 3.3 are presented in Section 6.
|
| 104 |
+
In Section 7, we prove Proposition 5.2, which relates the variance of the linear eigenvalue statistics to
|
| 105 |
+
the ˙H1/2-norm.
|
| 106 |
+
Acknowledgments.
|
| 107 |
+
I would like to express my gratitude to L´aszl´o Erd˝os for suggesting the project and supervising my
|
| 108 |
+
work. I am also thankful to Yuanyuan Xu and Oleksii Kolupaiev for many helpful discussions.
|
| 109 |
+
1Generalized Wigner matrices are characterized by a flat doubly-stochastic matrix of variances S. Unlike the Wigner
|
| 110 |
+
case, the entries Sjk are not assumed to be equal. The limiting eigenvalue distribution remains semicircular.
|
| 111 |
+
2
|
| 112 |
+
|
| 113 |
+
2
|
| 114 |
+
Model and Main Result
|
| 115 |
+
We begin with the definition of Wigner-type matrices originally introduced in Section 1.1 of [2].
|
| 116 |
+
Definition 2.1 (Wigner-type matrices). Let H = (Hjk)N
|
| 117 |
+
j,k=1 be an N × N matrix with independent
|
| 118 |
+
entries up to the Hermitian symmetry condition H = H∗ satisfying
|
| 119 |
+
E [Hjk] = 0.
|
| 120 |
+
(2.1)
|
| 121 |
+
We consider both real and complex Wigner-type matrices. In case the matrix H is complex we assume
|
| 122 |
+
additionally that Re Hjk and Im Hjk are independent and E[H2
|
| 123 |
+
jk] = 0 for k ̸= j.
|
| 124 |
+
Denote by S the matrix of variances Sjk := E[|Hjk|2], and assume it satisfies
|
| 125 |
+
cinf
|
| 126 |
+
N
|
| 127 |
+
≤ Sjk ≤ Csup
|
| 128 |
+
N ,
|
| 129 |
+
(A)
|
| 130 |
+
for all j, k ∈ {1, . . ., N} and some strictly positive constants Csup, cinf.
|
| 131 |
+
We assume a uniform bound on all other moments of
|
| 132 |
+
√
|
| 133 |
+
NHjk, that is, for any p ∈ N there exists
|
| 134 |
+
a positive constant Cp such that
|
| 135 |
+
E
|
| 136 |
+
�
|
| 137 |
+
|
|
| 138 |
+
√
|
| 139 |
+
NHjk|p�
|
| 140 |
+
≤ Cp
|
| 141 |
+
(2.2)
|
| 142 |
+
holds for all j, k ∈ {1, . . ., N}.
|
| 143 |
+
Additionally, we assume that S satisfies a H¨older regularity condition1, that is,
|
| 144 |
+
|Sjk − Sj′k′| ≤ L
|
| 145 |
+
N
|
| 146 |
+
�|j − j′| + |k − k′|
|
| 147 |
+
N
|
| 148 |
+
�1/2
|
| 149 |
+
,
|
| 150 |
+
(B)
|
| 151 |
+
for all j, j′, k, k′ ∈ {1, . . ., N} and some positive constant L. The constants cinf, Csup, Cp and L are
|
| 152 |
+
independent of N.
|
| 153 |
+
2.1
|
| 154 |
+
Central Limit Theorem for Mesoscopic Linear Eigenvalue Statistics
|
| 155 |
+
Theorem 2.2. (c.f. Theorem 2.5 in [17]) Let g be a C2
|
| 156 |
+
c (R) test function. Let ε0 be a small fixed
|
| 157 |
+
constant and let N −1+ε0 ≤ η0 ≤ N −ε0, and let E0 be a fixed reference energy in the bulk of the
|
| 158 |
+
spectrum, that is, ρ(E0) ≥ ε0 (here ρ is the density of states to be defined in (3.3) below ). Define the
|
| 159 |
+
scaled test function f to be
|
| 160 |
+
f(x) := g
|
| 161 |
+
�x − E0
|
| 162 |
+
η0
|
| 163 |
+
�
|
| 164 |
+
,
|
| 165 |
+
(2.3)
|
| 166 |
+
then
|
| 167 |
+
Tr f(H) − E [Tr f(H)]
|
| 168 |
+
d−→ N
|
| 169 |
+
�
|
| 170 |
+
0,
|
| 171 |
+
1
|
| 172 |
+
2βπ2 ∥g∥2
|
| 173 |
+
˙H1/2
|
| 174 |
+
��
|
| 175 |
+
,
|
| 176 |
+
(2.4)
|
| 177 |
+
where β = 1 and β = 2 corresponds to real symmetric and complex Hermitian H, respectively.
|
| 178 |
+
Remark 2.3. We remark that the universal limiting variance in (2.4) coincides with the corre-
|
| 179 |
+
sponding formulas for standard Wigner matrices [13], where Sjk = N −1, mj(z) = msc(z) for all
|
| 180 |
+
j, k ∈ {1, . . . , N}, and msc(z) is the Stieltjes transform of the semicircle law.
|
| 181 |
+
1As stated in [2], assumption (B) can be weakened to piece-wise 1/2-H¨older regularity condition for some positive
|
| 182 |
+
constant L on finitely many intervals, in the sense that
|
| 183 |
+
max
|
| 184 |
+
a,b
|
| 185 |
+
max
|
| 186 |
+
j,j′∈(NIb)
|
| 187 |
+
max
|
| 188 |
+
k,k′∈(NIa) N3/2
|
| 189 |
+
|Sjk − Sj′k′|
|
| 190 |
+
|j − j′|1/2 + |k − k′|1/2 ≤ L,
|
| 191 |
+
where {Ia}n
|
| 192 |
+
a=1 is a fixed finite partition of [0, 1] into smaller intervals, and (NIa) denotes the set of positive integers j
|
| 193 |
+
such that j/N lies in Ia.
|
| 194 |
+
3
|
| 195 |
+
|
| 196 |
+
3
|
| 197 |
+
Local Laws for the Two-point Functions
|
| 198 |
+
In this section, we introduce our main technical result, local laws for quantities that involve two
|
| 199 |
+
resolvents of a Wigner-type matrix. Our prime motivation is to study the function T (z, ζ) defined in
|
| 200 |
+
(1.1), but our methods allow us to estimate a more general class of quantities, namely
|
| 201 |
+
�
|
| 202 |
+
a̸=y
|
| 203 |
+
waGαa(z)Gaβ(ζ),
|
| 204 |
+
�
|
| 205 |
+
b
|
| 206 |
+
�
|
| 207 |
+
a̸=b
|
| 208 |
+
WabGba(z)Gab(ζ),
|
| 209 |
+
(3.1)
|
| 210 |
+
for fixed indices α, β, y, and deterministic weights wa, Wab satisfying |wa|, |Wab| ≤ cN −1 for some
|
| 211 |
+
constant c > 0.
|
| 212 |
+
Here G(z) := (H − z)−1 denotes the resolvent of H.
|
| 213 |
+
Objects of this type were
|
| 214 |
+
first studied in [11] in the setting of random band matrices. We obtain the estimates in the sense of
|
| 215 |
+
stochastic domination.
|
| 216 |
+
Definition 3.1. (Definition 2.1 in [12]) Let X = X (N)(u) and Y = Y(N)(u) be two families of random
|
| 217 |
+
variables possibly depending on a parameter u ∈ U (N). We say that Y stochastically dominates X
|
| 218 |
+
uniformly in u if for any ε > 0 and D > 0 there exists N0(ε, D) such that for any N ≥ N0(ε, D),
|
| 219 |
+
sup
|
| 220 |
+
u∈U(N) P
|
| 221 |
+
�
|
| 222 |
+
X (N)(u) > N εY(N)(u)
|
| 223 |
+
�
|
| 224 |
+
< N −D.
|
| 225 |
+
We denote this relation by X ≺ Y or X = O≺(Y).
|
| 226 |
+
We consider spectral parameters z lying in the domain D, defined by
|
| 227 |
+
D := {z ∈ C : N −1+τ ≤ | Im z| ≤ τ −1, | Re z| ≤ τ −1},
|
| 228 |
+
(3.2)
|
| 229 |
+
for a fixed τ > 0. As in Theorem 2.2, our analysis is limited to the bulk of the spectrum, which we
|
| 230 |
+
define via the self-consistent density of states ρ(E) ≡ ρN(E). The density ρ(E) is recovered by the
|
| 231 |
+
Stieltjes inversion formula,
|
| 232 |
+
ρ(E) := π−1 lim
|
| 233 |
+
η→+0 Im m(E + iη),
|
| 234 |
+
(3.3)
|
| 235 |
+
where m(z) := N −1 �N
|
| 236 |
+
j=1 mj(z), and m(z) = (mj(z))N
|
| 237 |
+
j=1 is the unique (Theorem 4.1 in [2]) solution
|
| 238 |
+
to the vector Dyson equation
|
| 239 |
+
−1
|
| 240 |
+
m(z) = z + Sm(z),
|
| 241 |
+
Im m(z) Im z > 0.
|
| 242 |
+
(3.4)
|
| 243 |
+
Let I be the set on which ρ(E) is positive. Theorem 4.1 of [2] guarantees that I consists of a finite
|
| 244 |
+
union of open intervals (a(j), b(j)). Then for κ > 0, we define the bulk domain by
|
| 245 |
+
Dκ := {z ∈ D : Re z ∈ Iκ},
|
| 246 |
+
Iκ :=
|
| 247 |
+
�
|
| 248 |
+
j
|
| 249 |
+
[a(j) + κ, b(j) − κ].
|
| 250 |
+
(3.5)
|
| 251 |
+
In particular, for all z ∈ Dκ, ρ(z) ≥ C(κ) for some constant C(κ) > 0. Given E0 as in Theorem 2.2,
|
| 252 |
+
we choose κ so that E0 ∈ I2κ.
|
| 253 |
+
Theorem 3.2. There exists a positive constant ǫ = ǫκ which is independent of N, such that for all
|
| 254 |
+
z, ζ in Dκ with | Re ζ − Re z| ≤ ǫ, and deterministic vectors w ∈ CN satisfying ∥w∥∞ ≤ cN −1, the
|
| 255 |
+
following estimate holds,
|
| 256 |
+
�
|
| 257 |
+
a̸=y
|
| 258 |
+
waGαa(z)Gaβ(ζ) = δαβ
|
| 259 |
+
�
|
| 260 |
+
m(z)m(ζ)
|
| 261 |
+
�
|
| 262 |
+
1 − Sm(z)m(ζ)
|
| 263 |
+
�−1w
|
| 264 |
+
�
|
| 265 |
+
α − δαβδαy[m(z)m(ζ)w]α
|
| 266 |
+
+ O≺
|
| 267 |
+
�
|
| 268 |
+
(Ψ(z) + Ψ(ζ))(Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0} min{Θ(z), Θ(ζ)})
|
| 269 |
+
�
|
| 270 |
+
,
|
| 271 |
+
(3.6)
|
| 272 |
+
where the vector m is identified with the diagonal operator diag (m).
|
| 273 |
+
Under the same conditions on z, ζ, for any deterministic N ×N matrix W satisfying |Wab| ≤ cN −1
|
| 274 |
+
for all a, b, the following estimate holds,
|
| 275 |
+
�
|
| 276 |
+
b
|
| 277 |
+
�
|
| 278 |
+
a̸=b
|
| 279 |
+
WabGba(z)Gab(ζ) = Tr
|
| 280 |
+
�
|
| 281 |
+
m(z)m(ζ)Sm(z)m(ζ)
|
| 282 |
+
�
|
| 283 |
+
1 − Sm(z)m(ζ)
|
| 284 |
+
�−1W
|
| 285 |
+
�
|
| 286 |
+
+ NO≺
|
| 287 |
+
�
|
| 288 |
+
(Ψ(z) + Ψ(ζ))Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}Θ(z)Θ(ζ)
|
| 289 |
+
�
|
| 290 |
+
.
|
| 291 |
+
(3.7)
|
| 292 |
+
4
|
| 293 |
+
|
| 294 |
+
Here Ψ(z) and Θ(z) denote control parameters defined as
|
| 295 |
+
Ψ(z) :=
|
| 296 |
+
�
|
| 297 |
+
| Im m(z)|
|
| 298 |
+
N|η|
|
| 299 |
+
+
|
| 300 |
+
1
|
| 301 |
+
N|η|,
|
| 302 |
+
Θ(z) :=
|
| 303 |
+
1
|
| 304 |
+
N|η|,
|
| 305 |
+
z = E + iη ∈ C\R.
|
| 306 |
+
(3.8)
|
| 307 |
+
Theorem 3.2 implies the following averaged and entry-wise local laws for T (z, ζ) from (1.1) .
|
| 308 |
+
Corollary 3.3. Let z, ζ satisfy the assumptions of Theorem 3.2.
|
| 309 |
+
The entries Txy(z, ζ) admit the
|
| 310 |
+
estimate
|
| 311 |
+
Txy(z, ζ) =
|
| 312 |
+
�
|
| 313 |
+
(Sm(z)m(ζ))2 �
|
| 314 |
+
1 − Sm(z)m(ζ)
|
| 315 |
+
�−1�
|
| 316 |
+
xy
|
| 317 |
+
+ O≺
|
| 318 |
+
�
|
| 319 |
+
(Ψ(z) + Ψ(ζ))
|
| 320 |
+
�
|
| 321 |
+
Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0} min{Θ(z), Θ(ζ)}
|
| 322 |
+
��
|
| 323 |
+
.
|
| 324 |
+
(3.9)
|
| 325 |
+
Furthermore, for all deterministic N × N matrices A, the following equality holds
|
| 326 |
+
Tr[A T (z, ζ)] = Tr[A
|
| 327 |
+
�
|
| 328 |
+
1 − Sm(z)m(ζ)
|
| 329 |
+
�−1�
|
| 330 |
+
Sm(z)m(ζ)
|
| 331 |
+
�2]
|
| 332 |
+
+ N ∥A∥ℓ∞→ℓ∞ O≺
|
| 333 |
+
�
|
| 334 |
+
(Ψ(z) + Ψ(ζ))Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}Θ(z)Θ(ζ)
|
| 335 |
+
�
|
| 336 |
+
.
|
| 337 |
+
(3.10)
|
| 338 |
+
Remark 3.4. The error estimates in the entry-wise local law (3.6), and hence in (3.9) are optimal.
|
| 339 |
+
Indeed, for Sjk := N −1, which corresponds to the standard Wigner matrices, and ζ = ¯z, a simple
|
| 340 |
+
calculation using the Ward identity shows that
|
| 341 |
+
Txy(z, ¯z) = N −1| Im z|−1 Im msc(z) − N −1|msc(z)|2 + O≺
|
| 342 |
+
�
|
| 343 |
+
Θ(z)Ψ(z)
|
| 344 |
+
�
|
| 345 |
+
.
|
| 346 |
+
(3.11)
|
| 347 |
+
The error estimate in (3.7) is not optimal; it can be improved to
|
| 348 |
+
O≺
|
| 349 |
+
�
|
| 350 |
+
N(Ψ(z) + Ψ(ζ))2�
|
| 351 |
+
Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}NΘ(z)Θ(ζ)
|
| 352 |
+
��
|
| 353 |
+
(3.12)
|
| 354 |
+
However, (3.7) is sufficient for establishing the CLT, so for the sake of brevity, we do not present the
|
| 355 |
+
proof of (3.12) in full detail. We only indicate the necessary ingredients in Remark 6.8 below.
|
| 356 |
+
4
|
| 357 |
+
Notations and Preliminaries
|
| 358 |
+
4.1
|
| 359 |
+
Notations
|
| 360 |
+
For a vector x = (xj)N
|
| 361 |
+
j=1 ∈ CN we use the standard definitions of ℓ2 and ℓ∞ norms, namely,
|
| 362 |
+
∥x∥2 =
|
| 363 |
+
� N
|
| 364 |
+
�
|
| 365 |
+
j=1
|
| 366 |
+
|xj|2
|
| 367 |
+
�1/2
|
| 368 |
+
,
|
| 369 |
+
∥x∥∞ = max
|
| 370 |
+
j
|
| 371 |
+
|xj|.
|
| 372 |
+
For a linear operator T : CN → CN, we denote its matrix norms induced by ℓ2 and ℓ∞ norms,
|
| 373 |
+
respectively, by
|
| 374 |
+
∥T ∥ℓ2→ℓ2 =
|
| 375 |
+
sup
|
| 376 |
+
∥x∥2=1
|
| 377 |
+
∥T x∥2 ,
|
| 378 |
+
∥T ∥ℓ∞→ℓ∞ =
|
| 379 |
+
sup
|
| 380 |
+
∥x∥∞=1
|
| 381 |
+
∥T x∥∞ .
|
| 382 |
+
For two vectors x, y ∈ CN we use angle brackets to denote the ℓ2 scalar product, while for a single
|
| 383 |
+
vector x ∈ CN angle brackets denote the average of its coordinates
|
| 384 |
+
⟨x, y⟩ =
|
| 385 |
+
N
|
| 386 |
+
�
|
| 387 |
+
j=1
|
| 388 |
+
¯xjyj,
|
| 389 |
+
⟨x⟩ = 1
|
| 390 |
+
N
|
| 391 |
+
N
|
| 392 |
+
�
|
| 393 |
+
j=1
|
| 394 |
+
xj.
|
| 395 |
+
We use xy to denote a coordinate-wise product of vectors x and y,
|
| 396 |
+
(xy)j = xjyj,
|
| 397 |
+
j ∈ {1, . . . , N}.
|
| 398 |
+
Similarly, for a given vector x with non-zero entries, 1x denotes a coordinate-wise multiplicative inverse
|
| 399 |
+
� 1
|
| 400 |
+
x
|
| 401 |
+
�
|
| 402 |
+
j
|
| 403 |
+
= 1
|
| 404 |
+
xj
|
| 405 |
+
,
|
| 406 |
+
j ∈ {1, . . ., N}.
|
| 407 |
+
5
|
| 408 |
+
|
| 409 |
+
We use 1 to denote the vector of ones (1, . . . , 1)t in CN.
|
| 410 |
+
For a measurable function f : R → R we use the standard definition of the Lp norms for p ≥ 1,
|
| 411 |
+
and the following definition of the ˙H1/2 norm
|
| 412 |
+
∥f∥ ˙H1/2 =
|
| 413 |
+
|
| 414 |
+
|
| 415 |
+
��
|
| 416 |
+
R2
|
| 417 |
+
|f(x) − f(y)|2
|
| 418 |
+
|x − y|2
|
| 419 |
+
dxdy
|
| 420 |
+
|
| 421 |
+
|
| 422 |
+
1/2
|
| 423 |
+
.
|
| 424 |
+
For two deterministic quantities X, Y ∈ R depending on N, we write X ≪ Y if there exists ε, N0 > 0
|
| 425 |
+
such that |X| ≤ N −ε|Y | for all N ≥ N0. Similarly, we write X ≲ Y if there exists a constant C, N0 > 0
|
| 426 |
+
such that |X| ≤ C|Y | for all N ≥ N0, and X ∼ Y if both X ≲ Y and Y ≲ X hold.
|
| 427 |
+
We use C and c to denote constants, the precise value of which is irrelevant and may change from
|
| 428 |
+
line to line.
|
| 429 |
+
4.2
|
| 430 |
+
Local Law for the Resolvent
|
| 431 |
+
In this subsection, we summarize the facts on Wigner-type matrices that we use throughout our proofs.
|
| 432 |
+
Majority of these results were obtained in [1] (see also [3]), but we refer to their concise versions from
|
| 433 |
+
[2] adapted for the Wigner-type setting.
|
| 434 |
+
Lemma 4.1. (Theorem 4.1 in [2]) The solution m(z) of (3.4) satisfies the following properties:
|
| 435 |
+
(1) For every j ∈ {1, . . ., N} there exists a generating probability measure νj(dx) such that
|
| 436 |
+
mj(z) =
|
| 437 |
+
�
|
| 438 |
+
R
|
| 439 |
+
νj(dx)
|
| 440 |
+
x − z .
|
| 441 |
+
(4.1)
|
| 442 |
+
(2) If the matrix of variances S satisfies conditions (A) and (B), then for all z ∈ C\R, the solution
|
| 443 |
+
admits the following bounds
|
| 444 |
+
∥m(z)∥∞ ≤
|
| 445 |
+
c
|
| 446 |
+
1 + |z|,
|
| 447 |
+
����
|
| 448 |
+
1
|
| 449 |
+
m(z)
|
| 450 |
+
����
|
| 451 |
+
∞
|
| 452 |
+
≤ C(1 + |z|).
|
| 453 |
+
(4.2)
|
| 454 |
+
We now state the optimal averaged and isotropic local laws for Wigner-type matrices.
|
| 455 |
+
Theorem 4.2. (Corollary 1.8 in [2]) Let w, x, y be deterministic vectors in CN satisfying ∥w∥∞ = 1
|
| 456 |
+
and ∥x∥2 = ∥y∥2 = 1. Then the following estimates hold uniformly in z ∈ D:
|
| 457 |
+
N −1��Tr
|
| 458 |
+
�
|
| 459 |
+
w(G(z) − m(z))
|
| 460 |
+
��� ≺ Θ(z),
|
| 461 |
+
��⟨x, (G(z) − m(z))y⟩
|
| 462 |
+
�� ≺ Ψ(z),
|
| 463 |
+
(4.3)
|
| 464 |
+
where vectors m and w are associated with corresponding diagonal matrices.
|
| 465 |
+
In particular, it follows from the isotropic local law (4.3) that for any j, k ∈ {1, . . ., N},
|
| 466 |
+
|Gjk(z) − δjkmj(z)| ≺ Ψ(z).
|
| 467 |
+
(4.4)
|
| 468 |
+
4.3
|
| 469 |
+
Preliminary Bounds on the Stability Operator
|
| 470 |
+
A significant part of our proof revolves around the stability operator, originally introduced in [1], that
|
| 471 |
+
emerges when studying the two-point function T (z, ζ) defined in (1.1). In this subsection, we collect
|
| 472 |
+
the known bounds on the stability and related operators.
|
| 473 |
+
The stability operator (1 − Sm(z)m(ζ)) is defined by the matrix with entries
|
| 474 |
+
(1 − Sm(z)m(ζ))jk := δjk − Sjkmk(z)mk(ζ),
|
| 475 |
+
j, k ∈ {1, . . ., N},
|
| 476 |
+
z, ζ ∈ C\R.
|
| 477 |
+
(4.5)
|
| 478 |
+
Throughout this paper we use m (and various functions of m, such as Im m, |m|, m−1, m′) to
|
| 479 |
+
denote both a vector (mj)N
|
| 480 |
+
j=1 and the corresponding multiplication operator, i.e., diag
|
| 481 |
+
�
|
| 482 |
+
(mj)N
|
| 483 |
+
j=1
|
| 484 |
+
�
|
| 485 |
+
. Note
|
| 486 |
+
that this notation agrees with the point-wise multiplication of two vectors if the first multiplicand is
|
| 487 |
+
interpreted as an operator. We stress which interpretation is used whenever ambiguity may arise.
|
| 488 |
+
6
|
| 489 |
+
|
| 490 |
+
The analysis of the stability operator relies on the corresponding saturated self-energy operator F,
|
| 491 |
+
studied in [17], that depends on two spectral parameters z, ζ, and is defined as
|
| 492 |
+
Fjk(z, ζ) := |mj(z)mj(ζ)|1/2Sjk|mk(z)mk(ζ)|1/2,
|
| 493 |
+
j, k ∈ {1, . . ., N},
|
| 494 |
+
z, ζ ∈ C\R.
|
| 495 |
+
(4.6)
|
| 496 |
+
The following statements encompass the main properties of F and preliminary bounds on the stability
|
| 497 |
+
operator.
|
| 498 |
+
Proposition 4.3. (Proposition 4.3 in [17], c.f. Proposition 7.2.9 and Lemma 7.4.4 in [9]) For any
|
| 499 |
+
z, ζ ∈ C, the principal eigenvalue of F defined in (4.6) is positive and simple, the corresponding ℓ2-
|
| 500 |
+
normalized eigenvector v(z, ζ) has strictly positive entries. The norm of F admits the following upper
|
| 501 |
+
bound
|
| 502 |
+
∥F(z, ζ)∥ℓ2→ℓ2 ��� 1 − 1
|
| 503 |
+
2
|
| 504 |
+
�
|
| 505 |
+
| Im z| ⟨v(z, z), |m(z)|⟩
|
| 506 |
+
⟨v(z, z), | Im m(z)|
|
| 507 |
+
|m(z)| ⟩
|
| 508 |
+
+ | Im ζ| ⟨v(ζ, ζ), |m(ζ)|⟩
|
| 509 |
+
⟨v(ζ, ζ), | Im m(ζ)|
|
| 510 |
+
|m(ζ)| ⟩
|
| 511 |
+
�
|
| 512 |
+
.
|
| 513 |
+
(4.7)
|
| 514 |
+
If |z|, |ζ| ≲ 1, then the entries of v(z, ζ) are comparable in size, that is
|
| 515 |
+
cκ ≤
|
| 516 |
+
√
|
| 517 |
+
Nvj(z, ζ) ≤ Cκ,
|
| 518 |
+
j ∈ {1, . . ., N},
|
| 519 |
+
(4.8)
|
| 520 |
+
and moreover, let Gap (F) denote the difference between the two largest eigenvalues of |F| =
|
| 521 |
+
√
|
| 522 |
+
FF ∗,
|
| 523 |
+
then Gap (F) admits the bound
|
| 524 |
+
Gap (F) ≥ �δ,
|
| 525 |
+
(4.9)
|
| 526 |
+
where �δ is a constant that depends only on the constants in conditions (A), (B) and κ.
|
| 527 |
+
Furthermore, for a fixed κ > 0 and z, ζ ∈ Dκ there exists a positive constant �cκ such that
|
| 528 |
+
∥F(z, ζ)∥ℓ2→ℓ2 ≤ 1 − �cκ (| Im z| + | Im ζ|) ,
|
| 529 |
+
(4.10)
|
| 530 |
+
Proposition 4.4. (Proposition 4.6 and Lemma 4.7 in [17]) Let z, ζ ∈ C, such that |z|, |ζ| ≲ 1 and
|
| 531 |
+
Re z, Re ζ ∈ Iκ, then
|
| 532 |
+
��(1 − Sm(z)m(ζ))−1��
|
| 533 |
+
ℓ2→ℓ2 +
|
| 534 |
+
��(1 − Sm(z)m(ζ))−1��
|
| 535 |
+
ℓ∞→ℓ∞ ≲
|
| 536 |
+
1
|
| 537 |
+
| Im z| + | Im ζ|.
|
| 538 |
+
(4.11)
|
| 539 |
+
If additionally Im z Im ζ > 0, the estimate is improved to
|
| 540 |
+
��(1 − Sm �m)−1��
|
| 541 |
+
ℓ∞→ℓ∞ ≤ Cκ,
|
| 542 |
+
(4.12)
|
| 543 |
+
where Cκ > 0 is a positive constants dependent on κ.
|
| 544 |
+
Finally, we state the bounds on the stability operator in the special case of ζ = z, which is related
|
| 545 |
+
to the derivative of m via the (vector) identity m′(z) = (1 − m2(z)S)−1m2(z), obtained by taking the
|
| 546 |
+
derivative of (3.4).
|
| 547 |
+
Lemma 4.5. (Lemma 5.9 in [1], Lemma 7.3.2 in [9]) Let C > 0 be a positive constant, then for
|
| 548 |
+
z ∈ C\R with |z| ≤ C we have
|
| 549 |
+
��(1 − m2(z)S)−1��
|
| 550 |
+
ℓ2→ℓ2 +
|
| 551 |
+
��(1 − m2(z)S)−1��
|
| 552 |
+
ℓ∞→ℓ∞ ≲ |ρ(z)|−2,
|
| 553 |
+
(4.13)
|
| 554 |
+
where ρ(z) = π−1⟨Im m(z)⟩ is the harmonic extension of ρ(E) defined in (3.3).
|
| 555 |
+
Therefore for all z ∈ C\R with Re z ∈ Iκ we have
|
| 556 |
+
∥m′(z)∥∞ ≲ 1.
|
| 557 |
+
(4.14)
|
| 558 |
+
4.4
|
| 559 |
+
Cumulant Expansion Formula
|
| 560 |
+
Lemma 4.6. (Section II in [7], Lemma 3.1 in [13]) Let h be a real-valued random variable with finite
|
| 561 |
+
moments, let f be a C∞(R) function. Then for any ℓ ∈ N the following expansion holds,
|
| 562 |
+
E [h · f(h)] =
|
| 563 |
+
ℓ
|
| 564 |
+
�
|
| 565 |
+
j=0
|
| 566 |
+
1
|
| 567 |
+
j!c(j+1)(h) E
|
| 568 |
+
� dj
|
| 569 |
+
dhj f(h)
|
| 570 |
+
�
|
| 571 |
+
+ Rℓ+1,
|
| 572 |
+
(4.15)
|
| 573 |
+
7
|
| 574 |
+
|
| 575 |
+
where c(j) is the j-th cumulant of h defined by
|
| 576 |
+
c(j)(h) = (−i)j dj
|
| 577 |
+
dtj
|
| 578 |
+
�
|
| 579 |
+
log E
|
| 580 |
+
�
|
| 581 |
+
eith������
|
| 582 |
+
t=0
|
| 583 |
+
,
|
| 584 |
+
and the remainder term Rℓ+1 satisfies
|
| 585 |
+
|Rℓ+1| ≤ Cl E
|
| 586 |
+
�
|
| 587 |
+
|h|ℓ+2�
|
| 588 |
+
sup
|
| 589 |
+
|x|≤M
|
| 590 |
+
|f (ℓ+1)(x)| + Cl E
|
| 591 |
+
�
|
| 592 |
+
|h|ℓ+2 · 1|h|>M
|
| 593 |
+
� ���f (ℓ+1)(x)
|
| 594 |
+
���
|
| 595 |
+
∞ ,
|
| 596 |
+
(4.16)
|
| 597 |
+
for any M > 0.
|
| 598 |
+
We apply formula (4.15) with h equal to the matrix element Hjk. Correspondingly, in the real
|
| 599 |
+
case (β = 1), C(p) denotes the matrix of p-th cumulants of H, C(p)
|
| 600 |
+
jk := C(p)(Hjk). In the complex case
|
| 601 |
+
(β = 2), C(p) is used as a notational shortcut and denotes the sum of matrices of p-th cumulants of
|
| 602 |
+
real and imaginary parts of H, that is C(p)
|
| 603 |
+
jk := C(p)(Re Hjk) + C(p)(Im Hjk).
|
| 604 |
+
5
|
| 605 |
+
Proof of the Main Result
|
| 606 |
+
Proof of Theorem 2.2. We divide the proof into two parts contained in the following propositions. We
|
| 607 |
+
indicate their analogs in the settings of [21] and [17] in parenthesis.
|
| 608 |
+
Proposition 5.1. (c.f. Theorem 2.2 in [21] and (5.76) in [17]) Let η0, ε0 > 0 and E0 satisfy the
|
| 609 |
+
assumptions of Theorem 2.2, let f be a scaled test function defined in (2.3), and let φ(λ) be the
|
| 610 |
+
characteristic function of Tr f(H) − E [Tr f(H)],
|
| 611 |
+
φ(λ) := E [exp{iλ (Tr f(H) − E [Tr f(H)])}] ,
|
| 612 |
+
λ ∈ R.
|
| 613 |
+
(5.1)
|
| 614 |
+
Then its derivative φ′(λ) satisfies the following equation,
|
| 615 |
+
φ′(λ) = −λφ(λ)V (f) + O≺
|
| 616 |
+
�
|
| 617 |
+
N −1/2η−1/2
|
| 618 |
+
0
|
| 619 |
+
(1 + |λ|4) + (1 + |λ|)N −ε0/2�
|
| 620 |
+
,
|
| 621 |
+
λ ∈ R,
|
| 622 |
+
(5.2)
|
| 623 |
+
provided c ≤ V (f) ≤ C for some positive N-independent constants c and C.
|
| 624 |
+
Here the variance V (f) for a scaled test function f is defined by
|
| 625 |
+
V (f) := 1
|
| 626 |
+
π2
|
| 627 |
+
�
|
| 628 |
+
Ω0
|
| 629 |
+
�
|
| 630 |
+
Ω′
|
| 631 |
+
0
|
| 632 |
+
∂ �f(ζ)
|
| 633 |
+
∂¯ζ
|
| 634 |
+
∂ �f(z)
|
| 635 |
+
∂¯z
|
| 636 |
+
K(z, ζ)d¯ζdζd¯zdz,
|
| 637 |
+
(5.3)
|
| 638 |
+
where for z, ζ ∈ C/R the kernel K(z, ζ) is defined by
|
| 639 |
+
K(z, ζ) := 2
|
| 640 |
+
β
|
| 641 |
+
∂
|
| 642 |
+
∂ζ Tr
|
| 643 |
+
�m′(z)
|
| 644 |
+
m(z)
|
| 645 |
+
�
|
| 646 |
+
1 − Sm(z)m(ζ)
|
| 647 |
+
�−1
|
| 648 |
+
�
|
| 649 |
+
+
|
| 650 |
+
�
|
| 651 |
+
1 − 2
|
| 652 |
+
β
|
| 653 |
+
�
|
| 654 |
+
Tr [Sm′(z)m′(ζ)] + 1
|
| 655 |
+
2
|
| 656 |
+
∂2
|
| 657 |
+
∂z∂ζ
|
| 658 |
+
�
|
| 659 |
+
m(z)m(ζ), C(4)m(z)m(ζ)
|
| 660 |
+
�
|
| 661 |
+
,
|
| 662 |
+
(5.4)
|
| 663 |
+
with C(4) denoting the matrix of fourth cumulants C(4)
|
| 664 |
+
jk . The integration domains Ω0, Ω′
|
| 665 |
+
0 in (5.3) are
|
| 666 |
+
defined as
|
| 667 |
+
Ω0 := {z ∈ C : | Im z| > N −ε0/2η0},
|
| 668 |
+
Ω′
|
| 669 |
+
0 := {z ∈ C : | Im z| > 2N −ε0/2η0},
|
| 670 |
+
(5.5)
|
| 671 |
+
and �f is the quasi-analytic extension of f, defined by
|
| 672 |
+
�f(x + iη) = χ(η) (f(x) + iηf ′(x)) ,
|
| 673 |
+
(5.6)
|
| 674 |
+
where χ : R → [0, 1] is an even C∞
|
| 675 |
+
c (R) function supported on [−1, 1], satisfying χ(η) = 1 for |η| < 1/2.
|
| 676 |
+
Proposition 5.2. (c.f. Lemma 6.7 in [17]) Let E0, η0 satisfy the conditions of Theorem 2.2. Let f be
|
| 677 |
+
the scaled test function with g ∈ C2
|
| 678 |
+
c (R) given in (2.3), and let V (f) be the variance defined in (5.3),
|
| 679 |
+
then
|
| 680 |
+
V (f) =
|
| 681 |
+
1
|
| 682 |
+
2βπ2 ∥g∥2
|
| 683 |
+
˙H1/2 + O
|
| 684 |
+
�
|
| 685 |
+
η0 log N + N −ε0�
|
| 686 |
+
.
|
| 687 |
+
(5.7)
|
| 688 |
+
8
|
| 689 |
+
|
| 690 |
+
Proposition 5.2 implies that V (f) satisfies the condition of Proposition 5.1, hence
|
| 691 |
+
φ′(λ) = −λφ(λ)V (f) + o (1) ,
|
| 692 |
+
(5.8)
|
| 693 |
+
as N → ∞, for any fixed λ ∈ R. It then follows by L´evy’s continuity theorem that Tr f(H)−E [Tr f(H)]
|
| 694 |
+
converges in distribution to a centered Gaussian with variance (2βπ2)−1 ∥g∥2
|
| 695 |
+
˙H1/2. Therefore, to estab-
|
| 696 |
+
lish Theorem 2.2, it suffices to show that Propositions 5.1 and 5.2 hold, which is done in Sections 5.1
|
| 697 |
+
and 7, respectively.
|
| 698 |
+
Remark 5.3. We restrict the proof to the real symmetric (β = 1) matrices for the sake of presentation.
|
| 699 |
+
The complex Hermitian (β = 2) case differs solely in replacing the cumulant expansion formula (Lemma
|
| 700 |
+
4.6) with its complex analog. The obvious modifications are left to the reader.
|
| 701 |
+
5.1
|
| 702 |
+
Characteristic Function of Linear Eigenvalue Statistics
|
| 703 |
+
Proof of Proposition 5.1. Using standard techniques of the characteristic function method imported
|
| 704 |
+
from, e.g., Section 5.2 of [17] (see also Section 4.2 of [19] and references therein), we can obtain the
|
| 705 |
+
following series of estimates on the characteristic function of the linear eigenvalue statistics φ(λ) and
|
| 706 |
+
its derivative φ′(λ). The proof is a relatively straightforward modification of similar arguments in [17],
|
| 707 |
+
so we defer it to Appendix A.
|
| 708 |
+
Lemma 5.4. Let φ(λ) be the characteristic function defined in (5.1), then, under the conditions of
|
| 709 |
+
Theorem 2.2, the following estimates hold
|
| 710 |
+
φ(λ) = E [�e(λ)] + O≺
|
| 711 |
+
�
|
| 712 |
+
N −ε0/2�
|
| 713 |
+
,
|
| 714 |
+
φ′(λ) = i
|
| 715 |
+
π
|
| 716 |
+
�
|
| 717 |
+
Ω0
|
| 718 |
+
∂ �f
|
| 719 |
+
∂¯z E [�e(λ) {1 − E} [Tr G(z)]] d¯zdz + O≺
|
| 720 |
+
�
|
| 721 |
+
|λ|N −ε0/2�
|
| 722 |
+
,
|
| 723 |
+
(5.9)
|
| 724 |
+
where
|
| 725 |
+
�e(λ) := exp
|
| 726 |
+
�iλ
|
| 727 |
+
π
|
| 728 |
+
�
|
| 729 |
+
Ω′
|
| 730 |
+
0
|
| 731 |
+
∂ �f
|
| 732 |
+
∂¯z {1 − E} [Tr G(z)] d¯zdz
|
| 733 |
+
�
|
| 734 |
+
.
|
| 735 |
+
(5.10)
|
| 736 |
+
Furthermore, for all z ∈ Dκ, we have
|
| 737 |
+
E [�e(λ) {1 − E} [Tr G(z)]] = E [�e(λ) {1 − E} T (z, z)] + 2iλ
|
| 738 |
+
π E
|
| 739 |
+
�
|
| 740 |
+
�e(λ)
|
| 741 |
+
�
|
| 742 |
+
Ω′
|
| 743 |
+
0
|
| 744 |
+
∂ �f
|
| 745 |
+
∂¯ζ
|
| 746 |
+
∂
|
| 747 |
+
∂ζ T (z, ζ)d¯ζdζ
|
| 748 |
+
�
|
| 749 |
+
+ iλ
|
| 750 |
+
π E [�e(λ)]
|
| 751 |
+
�
|
| 752 |
+
Ω′
|
| 753 |
+
0
|
| 754 |
+
∂ �f
|
| 755 |
+
∂¯ζ Tr [Sm′(z)m′(ζ)] d¯ζdζ
|
| 756 |
+
+ iλ
|
| 757 |
+
2π E [�e(λ)]
|
| 758 |
+
�
|
| 759 |
+
Ω′
|
| 760 |
+
0
|
| 761 |
+
∂ �f
|
| 762 |
+
∂¯ζ
|
| 763 |
+
∂2
|
| 764 |
+
∂z∂ζ
|
| 765 |
+
�
|
| 766 |
+
m(z)m(ζ), C(4)m(z)m(ζ)
|
| 767 |
+
�
|
| 768 |
+
d¯ζdζ
|
| 769 |
+
+ O≺
|
| 770 |
+
�
|
| 771 |
+
(1 + |λ|4)(NΨ(z)Θ(z) + Ψ(z)η−1/2
|
| 772 |
+
0
|
| 773 |
+
)
|
| 774 |
+
�
|
| 775 |
+
,
|
| 776 |
+
(5.11)
|
| 777 |
+
where the random function T (z, ζ) is defined as
|
| 778 |
+
T (z, ζ) := Tr
|
| 779 |
+
�m′(z)
|
| 780 |
+
m(z) T (z, ζ)
|
| 781 |
+
�
|
| 782 |
+
.
|
| 783 |
+
(5.12)
|
| 784 |
+
We now proceed to estimate the first two terms on the right-hand side of (5.11) in such a way
|
| 785 |
+
that E [�e(λ)] factors out. By definition of the scaled test function (2.3), the support of �f is contained
|
| 786 |
+
inside a vertical strip centered at E0 of width ∼ η0, hence we limit the further analysis to the regime
|
| 787 |
+
| Re ζ − Re z| ≲ η0 ≪ ǫ, where ǫ is defined in the statement of Theorem 3.2. We estimate the function
|
| 788 |
+
T (z, ζ) using Corollary 3.3 with weight matrix A := m′(z)
|
| 789 |
+
m(z) . It follows from the bounds (4.2) and (4.14)
|
| 790 |
+
that ∥A∥ℓ∞→ℓ∞ ≲ 1, hence for all z, ζ ∈ Dκ with Re z, Re ζ ∈ supp(f),
|
| 791 |
+
T (z, ζ) = Tr
|
| 792 |
+
�m′(z)
|
| 793 |
+
m(z)
|
| 794 |
+
�
|
| 795 |
+
1 − Sm(z)m(ζ)
|
| 796 |
+
�−1�
|
| 797 |
+
Sm(z)m(ζ)
|
| 798 |
+
�2
|
| 799 |
+
�
|
| 800 |
+
+ E(z, ζ),
|
| 801 |
+
(5.13)
|
| 802 |
+
9
|
| 803 |
+
|
| 804 |
+
where the error term E(z, ζ) is analytic in both variables and admits the bound
|
| 805 |
+
E(z, ζ) ≺ NΨ2(z)Ψ(ζ) + NΨ(z)Ψ2(ζ) + 1{Im z Im ζ<0}NΘ(z)Θ(ζ).
|
| 806 |
+
(5.14)
|
| 807 |
+
It follows from (5.13) and (5.14) for ζ = z that
|
| 808 |
+
E [�e(λ){1 − E} [T (z, z)]] ≺ NΨ(z)3,
|
| 809 |
+
(5.15)
|
| 810 |
+
yielding the desired bound on the first term on the right-hand side of (5.11).
|
| 811 |
+
We now estimate the second term in (5.11). Fix z ∈ Dκ, and consider ζ that lie in Ω′
|
| 812 |
+
0 defined in
|
| 813 |
+
(5.5). Differentiating (5.13) with respect to ζ yields
|
| 814 |
+
∂
|
| 815 |
+
∂ζ T (z, ζ) = ∂
|
| 816 |
+
∂ζ Tr
|
| 817 |
+
�m′(z)
|
| 818 |
+
m(z)
|
| 819 |
+
�
|
| 820 |
+
1 − Sm(z)m(ζ)
|
| 821 |
+
�−1�
|
| 822 |
+
Sm(z)m(ζ)
|
| 823 |
+
�2
|
| 824 |
+
�
|
| 825 |
+
+ ∂
|
| 826 |
+
∂ζ E(z, ζ).
|
| 827 |
+
(5.16)
|
| 828 |
+
To bound the derivative of the error term E(z, ζ), we use the following technical lemma.
|
| 829 |
+
Lemma 5.5. (Lemma 5.5 in [17]) Let K(z) be a holomorphic function on C\R, then for all z ∈ C\R
|
| 830 |
+
and any p ∈ N,
|
| 831 |
+
����
|
| 832 |
+
∂pK
|
| 833 |
+
∂zp (z)
|
| 834 |
+
���� ≤ Cp| Im z|−p
|
| 835 |
+
sup
|
| 836 |
+
|ζ−z|≤| Im z|/2
|
| 837 |
+
|K(ζ)|,
|
| 838 |
+
(5.17)
|
| 839 |
+
where Cp > 0 is a constant depending only on p.
|
| 840 |
+
Lemma 5.5 applied to the estimate (5.14) implies that the error term ∂ζE(z, ζ) admits the bound
|
| 841 |
+
∂
|
| 842 |
+
∂ζ E(z, ζ) ≺ N| Im ζ|−1�
|
| 843 |
+
Ψ(z)2Ψ(ζ) + Ψ(z)Ψ(ζ)2 + Θ(z)Θ(ζ)
|
| 844 |
+
�
|
| 845 |
+
.
|
| 846 |
+
(5.18)
|
| 847 |
+
To proceed we require another technical lemma.
|
| 848 |
+
Lemma 5.6. (c.f. Lemma 4.4 in [19]) Let f be the scaled test function defined in (2.3). Let Ω be a
|
| 849 |
+
domain of the form
|
| 850 |
+
Ω := {z ∈ C : cN −τ ′η0 < | Im z| < 1, a < Re z < b},
|
| 851 |
+
(5.19)
|
| 852 |
+
such that supp(f) ⊂ (a, b) and τ ′, c are positive constants. Let K(z) be a holomorphic function on Ω
|
| 853 |
+
satisfying
|
| 854 |
+
|K(z)| ≤ C| Im z|−s,
|
| 855 |
+
z ∈ Ω,
|
| 856 |
+
(5.20)
|
| 857 |
+
for some 0 ≤ s ≤ 2. Then there exists a constant C′ > 0 depending only on g in (2.3), χ in (5.6), and
|
| 858 |
+
s, such that
|
| 859 |
+
����
|
| 860 |
+
�
|
| 861 |
+
Ω
|
| 862 |
+
∂ �f
|
| 863 |
+
∂¯z (x + iy)K(x + iy)dxdy
|
| 864 |
+
���� ≤ CC′η1−s
|
| 865 |
+
0
|
| 866 |
+
log N.
|
| 867 |
+
(5.21)
|
| 868 |
+
Proof of Lemma 5.6. It follows from (2.3) that ∥f∥1 ∼ η0, ∥f ′∥1 ∼ 1, ∥f ′′∥1 ∼ η−1
|
| 869 |
+
0 . In case 1 ≤ s ≤ 2
|
| 870 |
+
the inequality (5.21) follows from Lemma 4.4 in [19]. For 0 ≤ s < 1, the proof is conducted along the
|
| 871 |
+
same lines, except the integration by parts is performed twice in the regime η0 ≤ | Im z| ≤ 1.
|
| 872 |
+
Lemma 5.6 and the matrix identity (1−X)−1X2 = (1−X)−1−X −1 yield the following expression.
|
| 873 |
+
E
|
| 874 |
+
�
|
| 875 |
+
�e(λ)
|
| 876 |
+
�
|
| 877 |
+
Ω′
|
| 878 |
+
0
|
| 879 |
+
∂ �f
|
| 880 |
+
∂¯ζ
|
| 881 |
+
∂T
|
| 882 |
+
∂ζ d¯ζdζ
|
| 883 |
+
�
|
| 884 |
+
= E [�e(λ)]
|
| 885 |
+
�
|
| 886 |
+
Ω′
|
| 887 |
+
0
|
| 888 |
+
∂ �f
|
| 889 |
+
∂¯ζ
|
| 890 |
+
∂
|
| 891 |
+
∂ζ Tr
|
| 892 |
+
�m′(z)
|
| 893 |
+
m(z)
|
| 894 |
+
�
|
| 895 |
+
1 − Sm(z)m(ζ)
|
| 896 |
+
�−1
|
| 897 |
+
�
|
| 898 |
+
d¯ζdζ
|
| 899 |
+
− E [�e(λ)]
|
| 900 |
+
�
|
| 901 |
+
Ω′
|
| 902 |
+
0
|
| 903 |
+
∂ �f
|
| 904 |
+
∂¯ζ Tr
|
| 905 |
+
�
|
| 906 |
+
Sm′(z)m′(ζ)
|
| 907 |
+
�
|
| 908 |
+
d¯ζdζ
|
| 909 |
+
+O≺
|
| 910 |
+
�
|
| 911 |
+
N 1/2Ψ(z)2η−1/2
|
| 912 |
+
0
|
| 913 |
+
+ Ψ(z)η−1
|
| 914 |
+
0
|
| 915 |
+
+ Θ(z)η−1
|
| 916 |
+
0
|
| 917 |
+
�
|
| 918 |
+
,
|
| 919 |
+
(5.22)
|
| 920 |
+
Finally, from (5.11) and (5.22), combined with (5.9) we conclude that
|
| 921 |
+
φ′(λ) = −λV (f) E [�e(λ)] + �E(λ),
|
| 922 |
+
(5.23)
|
| 923 |
+
10
|
| 924 |
+
|
| 925 |
+
where V (f) is defined in (5.3), and �E(λ) is the total error term collected from previous derivations
|
| 926 |
+
and integrated over d¯zdz. Lemma 5.6 together with error estimates in (5.9), (5.11), (5.15) and (5.18)
|
| 927 |
+
provides the following bound on the error term
|
| 928 |
+
�E = O≺
|
| 929 |
+
�
|
| 930 |
+
N −1/2η−1/2
|
| 931 |
+
0
|
| 932 |
+
(1 + |λ|4) + |λ|N −ε0/2�
|
| 933 |
+
.
|
| 934 |
+
(5.24)
|
| 935 |
+
Under the conditions of Proposition 5.1 V (f) is bounded, hence we conclude from the first estimate
|
| 936 |
+
in (5.9) and (5.23) that (5.2) holds. This concludes the proof of Proposition 5.1.
|
| 937 |
+
6
|
| 938 |
+
Proof of the Local Laws for Two-point Functions
|
| 939 |
+
In this section, we derive all the tools necessary to prove Theorem 3.2 and its specification for the two-
|
| 940 |
+
point function T (z, ζ), Corollary 3.3. To make the notation more concise we introduce the convention
|
| 941 |
+
G ≡ G(z), �G ≡ G(ζ), m ≡ m(z), �m ≡ m(ζ), �Ψ ≡ Ψ(ζ), Ψ ≡ Ψ(z), Θ ≡ Θ(z), �Θ ≡ Θ(ζ).
|
| 942 |
+
For a deterministic matrix W with entries |Wab| ≲ N −1, the quantity �
|
| 943 |
+
a̸=y WaxGαa �Gaβ can be
|
| 944 |
+
readily estimated in two special cases. First, if each column of W is proportional to the vector of ones,
|
| 945 |
+
i.e., Wab = wb depends only on b, then the summation over a yields wx([G �G]αβ − Gαy �Gyβ), and the
|
| 946 |
+
estimate follows from the resolvent identity and the local laws in Theorem 4.2. Second, if the entries
|
| 947 |
+
of X := (1 − Sm �m)−1W are bounded by CN −1, then one can obtain the estimate from Lemma 6.1
|
| 948 |
+
below. We show that these two special cases are exhaustive in the sense that any W can be represented
|
| 949 |
+
as their linear combination with controlled coefficients.
|
| 950 |
+
To this end, we prove that in the relevant regime, the operator (1 − Sm �m) has a very small
|
| 951 |
+
destabilizing eigenvalue and an order one spectral gap above it. Moreover, if Π is the eigenprojector
|
| 952 |
+
corresponding to the principal eigenvalue of (1 − Sm �m), then the ℓ∞ → ℓ∞-norm of the restriction
|
| 953 |
+
of (1 − Sm �m)−1 to the kernel of Π is also an order one quantity. Finally, we show that the vector of
|
| 954 |
+
ones 1 is sufficiently separated from the kernel of Π.
|
| 955 |
+
6.1
|
| 956 |
+
Stable Direction Local Law
|
| 957 |
+
For any N × N deterministic matrix W, and any indices x, y, α, β, we define the quantities
|
| 958 |
+
Fxy
|
| 959 |
+
αβ(W) :=
|
| 960 |
+
�
|
| 961 |
+
a̸=y
|
| 962 |
+
WaxGαa �Gaβ,
|
| 963 |
+
f xy
|
| 964 |
+
α (W) := mα �mα([(1 − Sm �m)−1W]αx − δαyWαx).
|
| 965 |
+
(6.1)
|
| 966 |
+
We prove the following estimate.
|
| 967 |
+
Lemma 6.1. For any z, ζ ∈ Dκ and any deterministic N × N matrix X,
|
| 968 |
+
Fxy
|
| 969 |
+
αβ((1 − Sm �m)X) = δαβf xy
|
| 970 |
+
α ((1 − Sm �m)X) + O≺
|
| 971 |
+
�
|
| 972 |
+
N ∥X∥max Ψ�Ψ(Ψ + �Ψ)
|
| 973 |
+
�
|
| 974 |
+
.
|
| 975 |
+
(6.2)
|
| 976 |
+
provided ∥X∥max := max
|
| 977 |
+
j,k |Xjk| ≲ 1.
|
| 978 |
+
We use the following self-improving mechanism for stochastic domination bounds, borrowed, e.g.,
|
| 979 |
+
from [14].
|
| 980 |
+
Lemma 6.2. (Lemma 6.3 in [14]) Let X be a random variable such that 0 ≤ X ≺ N C for some C > 0,
|
| 981 |
+
and let Ξ ≥ 0 be a deterministic quantity. Suppose there exists a constant q ∈ [0, 1), such that for any
|
| 982 |
+
Φ satisfying Ξ ≤ Φ ≤ N C, and any d ∈ N, we have the implication
|
| 983 |
+
X ≺ Φ
|
| 984 |
+
=⇒
|
| 985 |
+
E
|
| 986 |
+
�
|
| 987 |
+
|X|2d�
|
| 988 |
+
≺
|
| 989 |
+
2d
|
| 990 |
+
�
|
| 991 |
+
k=1
|
| 992 |
+
�
|
| 993 |
+
ΦqΞ1−q)k E
|
| 994 |
+
�
|
| 995 |
+
|X|2d−k�
|
| 996 |
+
,
|
| 997 |
+
(6.3)
|
| 998 |
+
then X ≺ Ξ.
|
| 999 |
+
Proof of Lemma 6.1. Let Y := (1 − Sm �m)X, then the quantity we need to estimate is [GY ]yx =
|
| 1000 |
+
Fxy
|
| 1001 |
+
yy (Y ). It follows from the local law in the form (4.4) that
|
| 1002 |
+
Fxy
|
| 1003 |
+
αβ(Y ) ≺ N ∥X∥max Ψ�Ψ =: Λ.
|
| 1004 |
+
(6.4)
|
| 1005 |
+
11
|
| 1006 |
+
|
| 1007 |
+
Let Φ be a deterministic control parameter admitting the bounds (Ψ + �Ψ)Λ ≤ Φ ≤ Λ, such that
|
| 1008 |
+
Fxy
|
| 1009 |
+
αβ(Y ) − δαβf xy
|
| 1010 |
+
α (Y ) ≺ Φ.
|
| 1011 |
+
(6.5)
|
| 1012 |
+
It follows trivially from (6.4) and (6.5) that
|
| 1013 |
+
Fxy
|
| 1014 |
+
αβ(Y ) ≺ Φ + δαβΛ.
|
| 1015 |
+
(6.6)
|
| 1016 |
+
Let ∂jk denote the partial derivative with respect to the matrix element Hjk, then the partial derivatives
|
| 1017 |
+
of Fxy
|
| 1018 |
+
αβ are given by
|
| 1019 |
+
∂abFxy
|
| 1020 |
+
αβ(Y ) = −(1 + δab)−1(GαaFxy
|
| 1021 |
+
bβ (Y ) + GαbFxy
|
| 1022 |
+
aβ(Y ) + Fxy
|
| 1023 |
+
αb (Y ) �Gaβ + Fxy
|
| 1024 |
+
αa(Y ) �Gbβ).
|
| 1025 |
+
(6.7)
|
| 1026 |
+
We combine the vector Dyson equation (3.4) and the resolvent identity zG = HG − 1 to obtain
|
| 1027 |
+
�Gaβ = − �ma
|
| 1028 |
+
�
|
| 1029 |
+
b
|
| 1030 |
+
�
|
| 1031 |
+
Hab �Gbβ + Sab �mb �Gaβ
|
| 1032 |
+
�
|
| 1033 |
+
+ �maδaβ.
|
| 1034 |
+
(6.8)
|
| 1035 |
+
Let d ∈ N, define P ≡ P(d − 1, d) := (Fxy
|
| 1036 |
+
αβ(Y ) − δαβf xy
|
| 1037 |
+
α (Y ))d−1(Fxy
|
| 1038 |
+
αβ(Y ) − δαβf xy
|
| 1039 |
+
α (Y ))d. For any
|
| 1040 |
+
p ∈ N, define Mp := E
|
| 1041 |
+
�
|
| 1042 |
+
|Fxy
|
| 1043 |
+
αβ(Y ) − δαβf xy
|
| 1044 |
+
α (Y )|p�
|
| 1045 |
+
. Plugging (6.8) into the definition (6.1) and applying
|
| 1046 |
+
the cumulant expansion formula of Lemma 4.6, we obtain
|
| 1047 |
+
E
|
| 1048 |
+
�
|
| 1049 |
+
Fxy
|
| 1050 |
+
αβ(X)P
|
| 1051 |
+
�
|
| 1052 |
+
=
|
| 1053 |
+
�
|
| 1054 |
+
a̸=y
|
| 1055 |
+
ma �maXax E
|
| 1056 |
+
�
|
| 1057 |
+
Fay
|
| 1058 |
+
αβ(S)P
|
| 1059 |
+
�
|
| 1060 |
+
+ δαβf xy
|
| 1061 |
+
α (Y ) E[P] + δαβδβySyym2
|
| 1062 |
+
y �m2
|
| 1063 |
+
yXyx E[P]
|
| 1064 |
+
(6.9a)
|
| 1065 |
+
+ E
|
| 1066 |
+
��
|
| 1067 |
+
a̸=y
|
| 1068 |
+
�
|
| 1069 |
+
b
|
| 1070 |
+
�maXaxSab
|
| 1071 |
+
�
|
| 1072 |
+
Gαa( �Gbb − �mb) �Gaβ + Gαb(Gaa − ma) �Gbβ
|
| 1073 |
+
�P
|
| 1074 |
+
�
|
| 1075 |
+
(6.9b)
|
| 1076 |
+
+ E
|
| 1077 |
+
��
|
| 1078 |
+
a̸=y
|
| 1079 |
+
�
|
| 1080 |
+
b̸=a
|
| 1081 |
+
�maXaxSabGαa
|
| 1082 |
+
�
|
| 1083 |
+
Gba + �Gba
|
| 1084 |
+
� �GbβP
|
| 1085 |
+
�
|
| 1086 |
+
+ R2
|
| 1087 |
+
(6.9c)
|
| 1088 |
+
+
|
| 1089 |
+
�
|
| 1090 |
+
a̸=y
|
| 1091 |
+
Xaxma �maSay E
|
| 1092 |
+
��
|
| 1093 |
+
Gαy �Gyβ − δαyδyβmy �my
|
| 1094 |
+
�P
|
| 1095 |
+
�
|
| 1096 |
+
(6.9d)
|
| 1097 |
+
+ δβ̸=y �mβXβx E
|
| 1098 |
+
�
|
| 1099 |
+
(Gαβ − δαβmβ)P
|
| 1100 |
+
�
|
| 1101 |
+
− E
|
| 1102 |
+
��
|
| 1103 |
+
a̸=y
|
| 1104 |
+
�maXaxGαa
|
| 1105 |
+
�
|
| 1106 |
+
b
|
| 1107 |
+
Sab �Gbβ∂abP
|
| 1108 |
+
�
|
| 1109 |
+
,
|
| 1110 |
+
(6.9e)
|
| 1111 |
+
where R2 is the total error coming from the higher order cumulants, and all unrestricted summations
|
| 1112 |
+
are from 1 to N. We successively bound the terms (6.9b)-(6.9e) appearing on the right-hand side of
|
| 1113 |
+
(6.9). By condition (A), local law (4.4), upper bound (4.2), and (6.5), it follows that the terms (6.9b)
|
| 1114 |
+
and the first term in (6.9c) are bounded by O≺((Ψ + �Ψ)ΛM2d−1). Similarly, the term (6.9d) and the
|
| 1115 |
+
first term in (6.9e) are bounded by O≺(∥X∥max (Ψ + �Ψ)M2d−1).
|
| 1116 |
+
We bound the second term in (6.9e). It follows by (A), (4.4), bounds (4.2), (6.6), and (6.7) that
|
| 1117 |
+
�
|
| 1118 |
+
b
|
| 1119 |
+
Sab �Gbβ∂abP ≺ (Ψ + �Ψ + δαa + δaβ)�ΨΦM2d−2.
|
| 1120 |
+
(6.10)
|
| 1121 |
+
Hence, the second term in (6.9e) is bounded by O≺
|
| 1122 |
+
�
|
| 1123 |
+
(Ψ + �Ψ)ΛΦM2d−2
|
| 1124 |
+
�
|
| 1125 |
+
. Finally, it is easy to check
|
| 1126 |
+
using estimates (4.16), (6.6) and identity (6.7), together with condition (A) and (4.2), that the error
|
| 1127 |
+
term R2 ≺ (Ψ + �Ψ)ΛM2d−1 + (Ψ + �Ψ)ΛΦM2d−2 + (Ψ + �Ψ)ΛΦ2M2d−3.
|
| 1128 |
+
Observe that the first term on the right-hand side of (6.9a) can be expressed as
|
| 1129 |
+
�
|
| 1130 |
+
a̸=y
|
| 1131 |
+
ma �maXax E
|
| 1132 |
+
�
|
| 1133 |
+
Fay
|
| 1134 |
+
αβ(S)P
|
| 1135 |
+
�
|
| 1136 |
+
= E
|
| 1137 |
+
�
|
| 1138 |
+
Fay
|
| 1139 |
+
αβ(X)P
|
| 1140 |
+
�
|
| 1141 |
+
− E
|
| 1142 |
+
�
|
| 1143 |
+
Fay
|
| 1144 |
+
αβ(Y )P
|
| 1145 |
+
�
|
| 1146 |
+
− my �myXyx E
|
| 1147 |
+
�
|
| 1148 |
+
Fyy
|
| 1149 |
+
αβ(S)P
|
| 1150 |
+
�
|
| 1151 |
+
,
|
| 1152 |
+
(6.11)
|
| 1153 |
+
where the last term is bounded by O≺(N −1ΛM2d−1). Combining (6.9) and (6.11) yields
|
| 1154 |
+
E
|
| 1155 |
+
�
|
| 1156 |
+
|Fxy
|
| 1157 |
+
αβ(Y ) − δαβf xy
|
| 1158 |
+
α (Y )|2d�
|
| 1159 |
+
≺
|
| 1160 |
+
�
|
| 1161 |
+
Ψ + �Ψ
|
| 1162 |
+
�
|
| 1163 |
+
ΛΦ2M2d−3,
|
| 1164 |
+
(6.12)
|
| 1165 |
+
for any control parameter Φαβ,y satisfying (6.5). Hence, by Lemma 6.2,
|
| 1166 |
+
Fxy
|
| 1167 |
+
αβ(Y ) = δαβf xy
|
| 1168 |
+
α (Y ) + O≺
|
| 1169 |
+
�
|
| 1170 |
+
Λ(Ψ + �Ψ)
|
| 1171 |
+
�
|
| 1172 |
+
,
|
| 1173 |
+
(6.13)
|
| 1174 |
+
which concludes the proof of Lemma 6.1.
|
| 1175 |
+
12
|
| 1176 |
+
|
| 1177 |
+
Remark 6.3. If z and ζ are in the same (upper or lower) half-plane, Lemma 6.1 implies Theorem 3.2.
|
| 1178 |
+
Indeed, the bound (4.12) in Proposition 4.4 shows that provided η�η > 0, X := (1−Sm �m)−1W satisfies
|
| 1179 |
+
|Xjk| ≲ N −1. Applying Lemma 6.1 to X = (1 − Sm �m)−1W then yields (3.6), and (3.7) follows by
|
| 1180 |
+
summing (3.6). We turn to the case of z and ζ lying in different (upper and lower) half-planes.
|
| 1181 |
+
6.2
|
| 1182 |
+
Stability Operator Analysis
|
| 1183 |
+
In this subsection we obtain all the properties of the stability operator (1 − Sm(z)m(ζ)) that we use
|
| 1184 |
+
in combination with Lemma 6.1 to finish the proof of Theorem 3.2 for z, ζ lying in opposite half-planes,
|
| 1185 |
+
as outlined in the beginning of Section 6.
|
| 1186 |
+
For two spectral parameters z, ζ, let η := Im z, and �η := Im ζ. Without loss of generality, we assume
|
| 1187 |
+
in the following that Re z ∈ Iκ, η > 0 and Re ζ ∈ Iκ, �η < 0. For the remainder of this subsection, we
|
| 1188 |
+
use the following notation
|
| 1189 |
+
F ≡ F(z) := |m(z)|S|m(z)|,
|
| 1190 |
+
B ≡ B(z, ζ) := 1 − Sm(z)m(ζ),
|
| 1191 |
+
B0 ≡ B0(z) := 1 − S|m(z)|2 = |m(z)|−1(1 − F)|m(z)|.
|
| 1192 |
+
(6.14)
|
| 1193 |
+
We view the operator B as a perturbation of B0 = B(z, ¯z), since |ζ − ¯z| is small. We deduce the
|
| 1194 |
+
desired properties of B from those of B0, which, in turn, follow from the lower bound on the spectral
|
| 1195 |
+
gap of F found in (4.9).
|
| 1196 |
+
Let {ψj}N
|
| 1197 |
+
j=1 denote the eigenvalues of F (with multiplicity) in descending order. Then, by Per-
|
| 1198 |
+
ron–Frobenius theorem, the principal eigenvalue ψ1 is real, and it coincides with the spectral radius
|
| 1199 |
+
∥F∥ℓ2→ℓ2. Furthermore, by taking the imaginary part of the vector Dyson equation (3.4) and multi-
|
| 1200 |
+
plying both sides by |m| coordinate-wise, we obtain
|
| 1201 |
+
�
|
| 1202 |
+
1 − F
|
| 1203 |
+
�Im m
|
| 1204 |
+
|m| = η|m|.
|
| 1205 |
+
(6.15)
|
| 1206 |
+
Furthermore, by condition (A), for every j we have (S Im m)j ∼ ⟨Im m(z)⟩ ∼ ρ(z), where ρ(z) is
|
| 1207 |
+
the harmonic extension of the self-consistent density of states ρ(x) defined in (3.3) into C. Hence by
|
| 1208 |
+
taking the imaginary part of (3.4), we get
|
| 1209 |
+
Im mj
|
| 1210 |
+
|mj|
|
| 1211 |
+
∼ |mj|(ρ(z) + η), ,
|
| 1212 |
+
j ∈ {1, . . . , N}.
|
| 1213 |
+
(6.16)
|
| 1214 |
+
Therefore, by (6.15) and (6.16), 1 − ψ1 ≲ η. Together with an upper bound (4.10) on ∥F∥ℓ2→ℓ2, this
|
| 1215 |
+
implies that 1 − ψ1 ∼ η. It follows from (4.9) that the principal eigenvalue of F is separated from the
|
| 1216 |
+
rest of the spectrum by an annulus, i.e., there exist r > 0 and δ > 0 independent of z and N such that
|
| 1217 |
+
|1 − ψ1| < r − δ,
|
| 1218 |
+
and
|
| 1219 |
+
|1 − ψj| > r + δ,
|
| 1220 |
+
j ∈ {2, . . . , N}.
|
| 1221 |
+
(6.17)
|
| 1222 |
+
In the remainder of this subsection, we show that for all ζ sufficiently close to ¯z, the eigenvalue of
|
| 1223 |
+
B with the smallest modulus is also separated from the rest of the spectrum by an annulus of order
|
| 1224 |
+
one width.
|
| 1225 |
+
Using the argument principle and Jacobi’s formula, one can express the number of eigenvalues
|
| 1226 |
+
(with multiplicity) of a matrix X inside a domain Ω by a contour integral
|
| 1227 |
+
NX(Ω) =
|
| 1228 |
+
1
|
| 1229 |
+
2πi
|
| 1230 |
+
�
|
| 1231 |
+
∂Ω
|
| 1232 |
+
Tr(w − X)−1dw.
|
| 1233 |
+
(6.18)
|
| 1234 |
+
To show the eigenvalue separation for B, we begin by estimating the norm of the resolvent of B inside
|
| 1235 |
+
the annulus
|
| 1236 |
+
Ar,δ := {w ∈ C : r − 3δ/4 ≤ |w| ≤ r + 3δ/4},
|
| 1237 |
+
(6.19)
|
| 1238 |
+
with r and δ as in (6.17).
|
| 1239 |
+
13
|
| 1240 |
+
|
| 1241 |
+
Claim 6.4. There exists ε1 > 0 and �C > 0 independent of N and z such that
|
| 1242 |
+
���(w − B(z, ζ))−1��� ≤ �C
|
| 1243 |
+
(6.20)
|
| 1244 |
+
holds for all w ∈ Ar,δ and all ζ such that Re ζ ∈ Iκ, Im ζ < 0 and |ζ − ¯z| ≤ ε1. (The norm ∥·∥ is
|
| 1245 |
+
induced by either ℓ2 or ℓ∞.)
|
| 1246 |
+
Proof. Observe that
|
| 1247 |
+
��(w − B)−1�� ≤
|
| 1248 |
+
���
|
| 1249 |
+
�
|
| 1250 |
+
1 − (w − B0)−1(B − B0)
|
| 1251 |
+
�−1���
|
| 1252 |
+
��(w − B0)−1��.
|
| 1253 |
+
Since (w − B0)−1 = −|m|−1(1 − w − F)−1|m| and |m| ∼ 1, (6.17) implies that
|
| 1254 |
+
��(w − B0)−1�� ≤
|
| 1255 |
+
C
|
| 1256 |
+
min
|
| 1257 |
+
j
|
| 1258 |
+
|ψj − w| ≤ 4C
|
| 1259 |
+
δ ,
|
| 1260 |
+
w ∈ Ar,δ.
|
| 1261 |
+
(6.21)
|
| 1262 |
+
From the uniform bounds (4.2), (4.14) on |m| and |m′| we have ∥B − B0∥ ≲ |ζ − ¯z|, which implies
|
| 1263 |
+
that there exists ε1 > 0 such that
|
| 1264 |
+
∀ζ : |ζ − ¯z| ≤ ε1, ∥B − B0∥ ≤
|
| 1265 |
+
δ
|
| 1266 |
+
8C ,
|
| 1267 |
+
(6.22)
|
| 1268 |
+
where C is the constant in (6.21).
|
| 1269 |
+
It follows immediately that
|
| 1270 |
+
���
|
| 1271 |
+
�
|
| 1272 |
+
1 − (w − B0)−1(B − B0)
|
| 1273 |
+
�−1��� ≤ 2 and hence
|
| 1274 |
+
��(w − B)−1�� ≤ 8C
|
| 1275 |
+
δ .
|
| 1276 |
+
(6.23)
|
| 1277 |
+
Claim 6.4 implies that for any sufficiently large fixed N the integrand in (6.18) with X := B is
|
| 1278 |
+
uniformly bounded in Ω := Ar,δ for all ζ such that |ζ − ¯z| ≤ ε1, hence by analyticity
|
| 1279 |
+
NB(z,ζ)(Ar,δ) = 0,
|
| 1280 |
+
|ζ − ¯z| ≤ ε1.
|
| 1281 |
+
(6.24)
|
| 1282 |
+
Since the eigenvalues of B(z, ζ) are continuous in ζ, (6.24) implies that no eigenvalue can move between
|
| 1283 |
+
the two connected components of C\Ar,δ, which together with (6.17) yields the following claim.
|
| 1284 |
+
Claim 6.5. For any sufficiently large N, the equalities
|
| 1285 |
+
NB({|w| < r − 3δ/4}) = NB0({|w| < r − 3δ/4}) = 1,
|
| 1286 |
+
NB({|w| > r + 3δ/4}) = NB0({|w| > r + 3δ/4}) = N − 1,
|
| 1287 |
+
(6.25)
|
| 1288 |
+
hold for any ζ such that Re ζ ∈ Iκ, Im ζ < 0 and |ζ − ¯z| ≤ ε1.
|
| 1289 |
+
Claim 6.5 now allows us to define the principal eigenprojector Π of B as a contour integral
|
| 1290 |
+
Π ≡ Π(z, ζ) :=
|
| 1291 |
+
1
|
| 1292 |
+
2πi
|
| 1293 |
+
�
|
| 1294 |
+
|ξ|=r
|
| 1295 |
+
(ξ − B(z, ζ))−1dξ.
|
| 1296 |
+
(6.26)
|
| 1297 |
+
Claim 6.5 asserts that the contour {|ξ| = r} encircles exactly one eigenvalue of B with multiplicity,
|
| 1298 |
+
hence Π is a rank one eigenprojector.
|
| 1299 |
+
We now prove that the restriction of B−1 to the range of (1 − Π) is bounded by a constant.
|
| 1300 |
+
Claim 6.6. For all z, ζ such that Re z, Re ζ ∈ Iκ, Im z Im ζ < 0 and |ζ − ¯z| ≤ ε1,
|
| 1301 |
+
��B−1(1 − Π)
|
| 1302 |
+
��
|
| 1303 |
+
ℓ∞→ℓ∞ ≤ �c,
|
| 1304 |
+
(6.27)
|
| 1305 |
+
where �c depends only on the constants in conditions (A), (B) and κ.
|
| 1306 |
+
Proof. By expression (6.26) for Π we have
|
| 1307 |
+
B−1(1 − Π) = − 1
|
| 1308 |
+
2πi
|
| 1309 |
+
�
|
| 1310 |
+
|ξ|=r
|
| 1311 |
+
1
|
| 1312 |
+
ξ (ξ − B)−1dξ
|
| 1313 |
+
(6.28)
|
| 1314 |
+
14
|
| 1315 |
+
|
| 1316 |
+
Hence the norm of B−1(1 − Π) is bounded by
|
| 1317 |
+
��B−1(1 − Π)
|
| 1318 |
+
��
|
| 1319 |
+
ℓ∞→ℓ∞ ≤ 1
|
| 1320 |
+
2π
|
| 1321 |
+
2π
|
| 1322 |
+
�
|
| 1323 |
+
0
|
| 1324 |
+
���
|
| 1325 |
+
�
|
| 1326 |
+
reiθ − B
|
| 1327 |
+
�−1���
|
| 1328 |
+
ℓ∞→ℓ∞ dθ ≤ 8C
|
| 1329 |
+
δ ,
|
| 1330 |
+
(6.29)
|
| 1331 |
+
using the bound in Claim 6.4 on the circle {|ξ| = r} which lies inside Ar,δ.
|
| 1332 |
+
Finally, we show that the vector of ones is sufficiently separated from the kernel of Π. This ensures
|
| 1333 |
+
a stable decomposition of the space into the direct sum of the range of (1 − Π) and the span of 1, so
|
| 1334 |
+
we can apply the local laws to each of the components separately.
|
| 1335 |
+
Claim 6.7. There exists ε > 0 independent of N and z such that for all ζ with Re ζ ∈ Iκ, Im ζ < 0
|
| 1336 |
+
and |ζ − ¯z| ≤ ε,
|
| 1337 |
+
∥Π1∥∞
|
| 1338 |
+
∥Π∥ℓ∞→ℓ∞ ≥ c,
|
| 1339 |
+
(6.30)
|
| 1340 |
+
where c > 0 is a constant independent of N and z.
|
| 1341 |
+
Proof. Define the projector Π0 corresponding to B0 via (6.26). Then Π0 = |m|−1�Π0|m|, where �Π0 is
|
| 1342 |
+
the orthoprojector corresponding to the principal eigenvalue of the Hermitian operator F.
|
| 1343 |
+
Since |m| ∼ 1 we have ∥Π0∥ℓ∞→ℓ∞ ≤ C0. Moreover, by Proposition 4.3, the ℓ2-normalized eigenvector
|
| 1344 |
+
v corresponding to the principal eigenvalue of F has entries vj ≥ 0 with vj ∼ N −1/2, hence
|
| 1345 |
+
∥Π01∥∞ =
|
| 1346 |
+
���|m|−1�Π0|m|1
|
| 1347 |
+
���
|
| 1348 |
+
∞ =
|
| 1349 |
+
��|m|−1v
|
| 1350 |
+
��
|
| 1351 |
+
∞ ⟨v, |m|⟩ ≥ c0,
|
| 1352 |
+
(6.31)
|
| 1353 |
+
where c0 > 0 is a constant independent of N and z.
|
| 1354 |
+
Similarly to the proof of (6.22), for any γ ∈ (0, 1] there exists εγ > 0, such that the bound
|
| 1355 |
+
∥B − B0∥ℓ∞→ℓ∞ ≤ γ δ
|
| 1356 |
+
8C
|
| 1357 |
+
(6.32)
|
| 1358 |
+
holds for all ζ ∈ D−
|
| 1359 |
+
κ with |ζ − ¯z| ≤ εγ. Here δ is defined in (6.17) and C > 0 is the constant in (6.21).
|
| 1360 |
+
We choose εγ to be smaller than ε1 of Claim 6.4, then for all ζ with Re ζ ∈ Iκ, Im ζ < 0 such that
|
| 1361 |
+
|ζ − ¯z| ≤ εγ we have
|
| 1362 |
+
∥Π − Π0∥ℓ∞→ℓ∞ ≤ r
|
| 1363 |
+
2π
|
| 1364 |
+
2π
|
| 1365 |
+
�
|
| 1366 |
+
0
|
| 1367 |
+
��(reiθ − B)−1 − (reiθ − B0)−1��
|
| 1368 |
+
ℓ∞→ℓ∞ dθ
|
| 1369 |
+
≤ r
|
| 1370 |
+
2π
|
| 1371 |
+
2π
|
| 1372 |
+
�
|
| 1373 |
+
0
|
| 1374 |
+
��(reiθ − B)−1(B − B0)(reiθ − B0)−1��
|
| 1375 |
+
ℓ∞→ℓ∞ dθ
|
| 1376 |
+
≤ r · 8C
|
| 1377 |
+
δ · γ δ
|
| 1378 |
+
8C · 4C
|
| 1379 |
+
δ
|
| 1380 |
+
= γ 4Cr
|
| 1381 |
+
δ
|
| 1382 |
+
.
|
| 1383 |
+
(6.33)
|
| 1384 |
+
Here we used inequalities (6.21) and (6.23) in the second to last step. We set the value of γ to be
|
| 1385 |
+
γ0 := min
|
| 1386 |
+
�
|
| 1387 |
+
1, c0δ
|
| 1388 |
+
8Cr
|
| 1389 |
+
�
|
| 1390 |
+
, which guarantees that
|
| 1391 |
+
∥Π1∥∞ ≥
|
| 1392 |
+
��∥Π01∥∞ − ��Π − Π0∥ℓ∞→ℓ∞ ∥1∥∞
|
| 1393 |
+
�� ≥ c0 − γ0
|
| 1394 |
+
4Cr
|
| 1395 |
+
δ
|
| 1396 |
+
≥ c0
|
| 1397 |
+
2 .
|
| 1398 |
+
(6.34)
|
| 1399 |
+
Finally, observe that
|
| 1400 |
+
∥Π∥ℓ∞→ℓ∞ ≤ ∥Π0∥ℓ∞→ℓ∞ + ∥Π − Π0∥ℓ∞→ℓ∞ ≤ C0 + c0/2.
|
| 1401 |
+
(6.35)
|
| 1402 |
+
This proves the claim with c := c0/(2C0 + c0).
|
| 1403 |
+
15
|
| 1404 |
+
|
| 1405 |
+
6.3
|
| 1406 |
+
Finishing the Proof of Theorem 3.2
|
| 1407 |
+
Proof of Theorem 3.2. Recall that the objective is to estimate the quantities defined in (3.1).
|
| 1408 |
+
In-
|
| 1409 |
+
stead of estimating �
|
| 1410 |
+
a̸=y waGαa �Gaβ directly, it is more convenient to work with objects of the type
|
| 1411 |
+
�
|
| 1412 |
+
a̸=y WaxGαa �Gaβ, since they generalize quantities appearing in both (3.6) and (3.7). The redundant
|
| 1413 |
+
index x can be eliminated by setting Wax := wa.
|
| 1414 |
+
In the case Im z Im ζ > 0, (3.6) and (3.7) follow immediately from (4.12) and Lemma 6.1 (see
|
| 1415 |
+
Remark 6.3). Therefore, we focus on the case Im z Im ζ < 0.
|
| 1416 |
+
Since Π has rank one and Claim 6.7 asserts that Π1 ̸= 0, the kernel of Π together with 1 span
|
| 1417 |
+
CN. Therefore we can decompose each column of the matrix W into a linear combination of 1 and an
|
| 1418 |
+
element of ker Π, that is, there exists an N × N matrix Y and a vector s ∈ CN such that
|
| 1419 |
+
W = Y + 1s∗,
|
| 1420 |
+
ΠY = 0.
|
| 1421 |
+
(6.36)
|
| 1422 |
+
We multiply the first equality in (6.36) by Π from the left, apply both sides to the a-th standard basis
|
| 1423 |
+
vector ea of CN and take the ℓ∞-norm to deduce
|
| 1424 |
+
∥ΠWea∥∞ = |sa| ∥Π1∥∞ ,
|
| 1425 |
+
a ∈ {1, . . ., N}.
|
| 1426 |
+
(6.37)
|
| 1427 |
+
By assumption, ∥W∥max ≲ N −1, hence ∥Wea∥∞ ≲ N −1. Using Claim 6.7 we get
|
| 1428 |
+
|sa| ≲ N −1 ∥Π∥ℓ∞→ℓ∞
|
| 1429 |
+
∥Π1∥∞
|
| 1430 |
+
≲ N −1,
|
| 1431 |
+
a ∈ {1, . . . , N}.
|
| 1432 |
+
(6.38)
|
| 1433 |
+
We combine (6.36) and the resolvent identity in the form (z − ζ)G �G = G − �G to obtain
|
| 1434 |
+
�
|
| 1435 |
+
a̸=y
|
| 1436 |
+
WaxGαa �Gaβ =
|
| 1437 |
+
�
|
| 1438 |
+
a̸=y
|
| 1439 |
+
YaxGαa �Gaβ + gy
|
| 1440 |
+
αβ¯sx,
|
| 1441 |
+
gy
|
| 1442 |
+
αβ := Gαβ − �Gαβ
|
| 1443 |
+
z − ζ
|
| 1444 |
+
− Gαy �Gyβ.
|
| 1445 |
+
(6.39)
|
| 1446 |
+
Define the N × N matrix X := (1 − Sm �m)−1 Y . It follows from (6.36) that Y = (1 − Π)Y , hence
|
| 1447 |
+
X = (1 − Sm �m)−1(1 − Π)Y . Furthermore, estimates ∥W∥max ≲ N −1, (6.36), and (6.38) imply that
|
| 1448 |
+
|Yab| ≲ N −1 for all a and b. Since by Claim 6.6
|
| 1449 |
+
��(1 − Sm �m)−1(1 − Π)
|
| 1450 |
+
��
|
| 1451 |
+
ℓ∞→ℓ∞ ≲ 1, we conclude that
|
| 1452 |
+
∥X∥max = max
|
| 1453 |
+
a,b |Xab| ≲ N −1.
|
| 1454 |
+
(6.40)
|
| 1455 |
+
First, using (6.40), we can apply Lemma 6.1 to the first term in (6.39) to obtain
|
| 1456 |
+
�
|
| 1457 |
+
a̸=y
|
| 1458 |
+
YaxGαa �Gaβ = δαβmα �mα([(1 − Sm �m)−1Y ]αx − δαyYαx) + O≺
|
| 1459 |
+
�
|
| 1460 |
+
Ψ2 �Ψ + Ψ�Ψ2�
|
| 1461 |
+
.
|
| 1462 |
+
(6.41)
|
| 1463 |
+
Using (6.36), we proceed by computing
|
| 1464 |
+
mα �mα[(1 − Sm �m)−1Y ]αx =
|
| 1465 |
+
�
|
| 1466 |
+
m �m
|
| 1467 |
+
�
|
| 1468 |
+
1 − Sm �m
|
| 1469 |
+
�−1 (W − 1s∗)
|
| 1470 |
+
�
|
| 1471 |
+
αx
|
| 1472 |
+
=
|
| 1473 |
+
�
|
| 1474 |
+
m �m
|
| 1475 |
+
�
|
| 1476 |
+
1 − Sm �m
|
| 1477 |
+
�−1W
|
| 1478 |
+
�
|
| 1479 |
+
αx −
|
| 1480 |
+
�
|
| 1481 |
+
m �m
|
| 1482 |
+
�
|
| 1483 |
+
1 − Sm �m
|
| 1484 |
+
�−11
|
| 1485 |
+
�
|
| 1486 |
+
α¯sx.
|
| 1487 |
+
(6.42)
|
| 1488 |
+
Finally, it follows from subtracting the vector Dyson equations (3.4) for z and ζ that
|
| 1489 |
+
m �m
|
| 1490 |
+
�
|
| 1491 |
+
1 − Sm �m
|
| 1492 |
+
�−11 = m − �m
|
| 1493 |
+
z − ζ .
|
| 1494 |
+
(6.43)
|
| 1495 |
+
Next, we estimate the second term in (6.39). Applying the local law in the form (4.4), we obtain
|
| 1496 |
+
gy
|
| 1497 |
+
αβ = δαβ
|
| 1498 |
+
mα − �mα
|
| 1499 |
+
z − ζ
|
| 1500 |
+
− δαβδαymα �mα + O≺
|
| 1501 |
+
�
|
| 1502 |
+
(|η| + |�η|)−1(Ψ + �Ψ)
|
| 1503 |
+
�
|
| 1504 |
+
,
|
| 1505 |
+
(6.44)
|
| 1506 |
+
where we used that |z − ζ| ≥ |η| + |�η|, since η�η < 0. Combining (6.38), (6.39), and (6.41)-(6.44) yields
|
| 1507 |
+
�
|
| 1508 |
+
a̸=y
|
| 1509 |
+
WaxGαa �Gaβ = δαβ
|
| 1510 |
+
�
|
| 1511 |
+
m �m
|
| 1512 |
+
�
|
| 1513 |
+
1 − Sm �m
|
| 1514 |
+
�−1W
|
| 1515 |
+
�
|
| 1516 |
+
αx − δαβδαy[m �mW]αx
|
| 1517 |
+
+ O≺
|
| 1518 |
+
�
|
| 1519 |
+
(Ψ + �Ψ)(Ψ�Ψ + min{Θ, �Θ})
|
| 1520 |
+
�
|
| 1521 |
+
,
|
| 1522 |
+
(6.45)
|
| 1523 |
+
16
|
| 1524 |
+
|
| 1525 |
+
which proves (3.6) by setting Wax := wa.
|
| 1526 |
+
To prove (3.7), we observe that by setting x = y = α = β = b in (6.39) and summing over b yields
|
| 1527 |
+
�
|
| 1528 |
+
b
|
| 1529 |
+
�
|
| 1530 |
+
a̸=b
|
| 1531 |
+
WabGba �Gab =
|
| 1532 |
+
�
|
| 1533 |
+
b
|
| 1534 |
+
�
|
| 1535 |
+
a̸=b
|
| 1536 |
+
YabGaa �Gab+⟨s, g⟩,
|
| 1537 |
+
gb := Gbb − �Gbb
|
| 1538 |
+
z − ζ
|
| 1539 |
+
−Gbb �Gbb, b ∈ {1, . . ., N}. (6.46)
|
| 1540 |
+
To estimate ⟨s, g⟩, we use (6.38) and the averaged local law (4.3) to obtain
|
| 1541 |
+
�
|
| 1542 |
+
s, g
|
| 1543 |
+
�
|
| 1544 |
+
=
|
| 1545 |
+
�
|
| 1546 |
+
s, m − �m
|
| 1547 |
+
z − ζ
|
| 1548 |
+
− m �m
|
| 1549 |
+
�
|
| 1550 |
+
+ O≺
|
| 1551 |
+
�
|
| 1552 |
+
(|η| + |�η|)−1(Θ + �Θ)
|
| 1553 |
+
�
|
| 1554 |
+
,
|
| 1555 |
+
(6.47)
|
| 1556 |
+
where we used that |z − ζ| ≥ |η| + |�η|, since η�η < 0.
|
| 1557 |
+
Setting x = y = α = β = b in (6.41), summing over b, using the identities (6.42) and (6.43), and
|
| 1558 |
+
combining the result with (6.47), we deduce that
|
| 1559 |
+
�
|
| 1560 |
+
b
|
| 1561 |
+
�
|
| 1562 |
+
a̸=b
|
| 1563 |
+
WabGba �Gab = Tr
|
| 1564 |
+
�
|
| 1565 |
+
m �mSm �m
|
| 1566 |
+
�
|
| 1567 |
+
1 − Sm �m
|
| 1568 |
+
�−1W
|
| 1569 |
+
�
|
| 1570 |
+
+ NO≺
|
| 1571 |
+
�
|
| 1572 |
+
Ψ�Ψ(Ψ + �Ψ) + Θ�Θ
|
| 1573 |
+
�
|
| 1574 |
+
,
|
| 1575 |
+
(6.48)
|
| 1576 |
+
where we used that (|η| + |�η|)−1(Θ + �Θ) = NΘ�Θ. This establishes (3.7) and concludes the proof of
|
| 1577 |
+
Theorem 3.2.
|
| 1578 |
+
Remark 6.8. We outline the steps needed to achieve the optimal error estimate (3.12). First, one
|
| 1579 |
+
needs to adapt the proof of Theorem 3.2. More specifically, replace the decomposition (6.36) with
|
| 1580 |
+
W = Y + 1s∗ + q1∗, such that Π(z, ζ)Y = Y Πt(ζ, z) = 0,
|
| 1581 |
+
(6.49)
|
| 1582 |
+
where Π(z, ζ) is the destabilizing eigenprojector defined in (6.26). The terms involving s and q are
|
| 1583 |
+
handled using the averaged local law (4.3), similarly to (6.47).
|
| 1584 |
+
For the remaining term, R := �
|
| 1585 |
+
y Fyy
|
| 1586 |
+
yy , we adapt the mechanism of Lemma 6.1 by using the
|
| 1587 |
+
following iterative scheme.
|
| 1588 |
+
In the first step, we apply an expansion similar to (6.9) to the partial
|
| 1589 |
+
derivative ∂jkR. This improves the error in the estimate on R by a factor of (Ψ + �Ψ)1/2. If we expand
|
| 1590 |
+
∂lp∂jkR in a similar manner, we gain another (Ψ + �Ψ)1/4. Iterating this approach we can estimate R
|
| 1591 |
+
with an error stochastically dominated by NΨ�Ψ(Ψ + �Ψ)2−2−d for any given integer d (where d is the
|
| 1592 |
+
maximal order of expanded partial derivatives). By Definition 3.1, this is sufficient to establish (3.12).
|
| 1593 |
+
Similar arguments in the context of random band matrices can be found in [10].
|
| 1594 |
+
Proof of Corollary 3.3. Estimate (3.9) on Txy(ζ, z) follows from (3.6) by setting α = β = y and
|
| 1595 |
+
wa := Sxa. Estimate (3.10) on Tr[AT (z, ζ)] follows from (3.7) by setting W := SAt, which satisfies
|
| 1596 |
+
|Wab| ≲ N −1 ∥A∥ℓ∞→ℓ∞. This concludes the proof of Corollary 3.3.
|
| 1597 |
+
Remark 6.9. Note that estimates (3.6) and (3.7) (also with the improved error term (3.12)) hold
|
| 1598 |
+
without omission of indices in the a summation. Indeed, it follows from Theorems 3.2 and 4.2 that
|
| 1599 |
+
�
|
| 1600 |
+
a
|
| 1601 |
+
waGαa �Gaβ = δαβ
|
| 1602 |
+
�
|
| 1603 |
+
m �m
|
| 1604 |
+
�
|
| 1605 |
+
1 − Sm �m
|
| 1606 |
+
�−1w
|
| 1607 |
+
�
|
| 1608 |
+
α + O≺
|
| 1609 |
+
�
|
| 1610 |
+
(Ψ + �Ψ)(Ψ�Ψ + 1{η�η<0} min{Θ, �Θ})
|
| 1611 |
+
�
|
| 1612 |
+
,
|
| 1613 |
+
�
|
| 1614 |
+
a,b
|
| 1615 |
+
WabGba �Gab = Tr
|
| 1616 |
+
�
|
| 1617 |
+
m �m
|
| 1618 |
+
�
|
| 1619 |
+
1 − Sm �m
|
| 1620 |
+
�−1W
|
| 1621 |
+
�
|
| 1622 |
+
+ O≺
|
| 1623 |
+
�
|
| 1624 |
+
N(Ψ + �Ψ)Ψ�Ψ + 1{η�η<0}NΘ�Θ
|
| 1625 |
+
�
|
| 1626 |
+
.
|
| 1627 |
+
(6.50)
|
| 1628 |
+
7
|
| 1629 |
+
Proof of Proposition 5.2
|
| 1630 |
+
In this section, we compute the variance V (f) defined in (5.3) for mesoscopic C2
|
| 1631 |
+
c test functions f. In
|
| 1632 |
+
[17], the limiting variance was computed for several types of C∞ test functions, including compactly
|
| 1633 |
+
supported ones; however, V (f) is computed with an O(1) error (see, e.g., Lemma 6.7 in [17]), which
|
| 1634 |
+
is not negligible in the setting of the present paper. To obtain effective error bounds, we augment the
|
| 1635 |
+
proof laid out in [17] by performing further integration by parts in the integral representation of V (f),
|
| 1636 |
+
thus eliminating the f ′ terms, improving the error by a factor of O(η0).
|
| 1637 |
+
Throughout this section, we adhere to the notation m ≡ m(z), �m ≡ m(ζ), η := Im z, �η := Im ζ.
|
| 1638 |
+
17
|
| 1639 |
+
|
| 1640 |
+
The stability operator (1 − Sm �m) can be expressed in terms of the self-saturated energy operator
|
| 1641 |
+
F, defined in (4.6), via the following identity
|
| 1642 |
+
1 − Sm �m = |m �m|−1/2 (U∗ − F(z, ζ)) |m �m|1/2U,
|
| 1643 |
+
U := m �m
|
| 1644 |
+
|m �m|.
|
| 1645 |
+
(7.1)
|
| 1646 |
+
Furthermore, by (4.9), the operator F can be decomposed such that
|
| 1647 |
+
F(z, ζ) = ψ1(z, ζ) v(z, ζ)
|
| 1648 |
+
�
|
| 1649 |
+
v(z, ζ)
|
| 1650 |
+
�∗ + A(z, ζ),
|
| 1651 |
+
A(z, ζ)v(z, ζ) = 0,
|
| 1652 |
+
∥A(z, ζ)∥ℓ2→ℓ2 ≤ 1 − �δ,
|
| 1653 |
+
(7.2)
|
| 1654 |
+
where ψ1, v is the principal eigenvalue-eigenvector pair of F, and �δ is the constant in (4.9).
|
| 1655 |
+
Let R ≡ R(z, ζ) denote (U∗(z, ζ) − A(z, ζ))−1. In the sequel, we drop the arguments and write
|
| 1656 |
+
A ≡ A(z, ζ). Lower bound (4.8) and the inequality in (7.2) imply that
|
| 1657 |
+
∥R∥ℓ2→ℓ2 + ∥R∥ℓ∞→ℓ∞ ≲ 1.
|
| 1658 |
+
(7.3)
|
| 1659 |
+
In the following lemma, we collect the perturbative estimates on the saturated self-energy operator F
|
| 1660 |
+
and related quantities established in [17].
|
| 1661 |
+
Lemma 7.1. (Proposition 6.5, (6.52), (6.60), (6.71), and (6.67) in [17]) Let w, ζ1, ζ2 be spectral
|
| 1662 |
+
parameters in Iκ + i[−1, 1], and let F be the operator defined in (4.6), then the principal eigenvalue-
|
| 1663 |
+
eigenvector pair ψ1, v of F satisfies
|
| 1664 |
+
∥v(w, ζ1) − v(w, ζ2)∥ℓ2→ℓ2 + |ψ1(w, ζ1) − ψ1(w, ζ2)| ≲ |ζ1 − ζ2|.
|
| 1665 |
+
(7.4)
|
| 1666 |
+
Furthermore, for operator A defined in (7.2), we have the estimate
|
| 1667 |
+
∥F(w, ζ1) − F(w, ζ2)∥ℓ2→ℓ2 + ∥A(w, ζ1) − A(w, ζ2)∥ℓ2→ℓ2 ≲ |ζ1 − ζ2|.
|
| 1668 |
+
(7.5)
|
| 1669 |
+
Let z := x + iη, ζ := y − iη, with x, y ∈ Iκ, 0 ≤ η ≤ 1, then
|
| 1670 |
+
ψ1
|
| 1671 |
+
�
|
| 1672 |
+
v, Rm′
|
| 1673 |
+
m U∗Rv
|
| 1674 |
+
�
|
| 1675 |
+
= ψ1(z, z)
|
| 1676 |
+
�
|
| 1677 |
+
v(z, z)m′
|
| 1678 |
+
m v(z, z)
|
| 1679 |
+
�
|
| 1680 |
+
+ O(|x − y|)
|
| 1681 |
+
(7.6)
|
| 1682 |
+
Let ω ≡ ω(z, ζ) := 1 − ψ1⟨v, Rv⟩, then
|
| 1683 |
+
ω(z, ζ) = 1 − ψ1(z, z) + ψ1(z, z)(x − y)
|
| 1684 |
+
�
|
| 1685 |
+
v(z, z)m′
|
| 1686 |
+
m v(z, z)
|
| 1687 |
+
�
|
| 1688 |
+
+ O(|x − y|2),
|
| 1689 |
+
(7.7)
|
| 1690 |
+
Moreover, there exists ε > 0 independent of N, such that for all x, y ∈ Iκ satisfying |x − y| ≤ ε,
|
| 1691 |
+
|ω(z, ζ)| ≳ η + |x − y|.
|
| 1692 |
+
(7.8)
|
| 1693 |
+
Finally, for z := x + iη with x ∈ Iκ, the following identity holds
|
| 1694 |
+
lim
|
| 1695 |
+
η→+0
|
| 1696 |
+
�
|
| 1697 |
+
v(z, z)m′
|
| 1698 |
+
m v(z, z)
|
| 1699 |
+
�
|
| 1700 |
+
= iπ
|
| 1701 |
+
2 ρ(x)
|
| 1702 |
+
����
|
| 1703 |
+
Im m(x + i0)
|
| 1704 |
+
|m(x)|
|
| 1705 |
+
����
|
| 1706 |
+
−2
|
| 1707 |
+
2
|
| 1708 |
+
(7.9)
|
| 1709 |
+
By our choice of κ, E0 is in the interior of the bulk interval Iκ, defined in (3.5) , hence if we define
|
| 1710 |
+
ˆε := min{ε/4, dist(E0, R\Iκ)}, then ˆε ∼ 1. Furthermore, since the function g is compactly supported,
|
| 1711 |
+
we assume that supp(f) ⊂ [E0 − ˆε, E0 + ˆε] for large N.
|
| 1712 |
+
Lemma 7.2. Let η∗ ≡ η∗(N) satisfy 0 < η∗ ≤ N −100, then V (f), defined in (5.3), admits the estimate
|
| 1713 |
+
V (f) =
|
| 1714 |
+
1
|
| 1715 |
+
4π2
|
| 1716 |
+
��
|
| 1717 |
+
[E0−ˆε,E0+ˆε]2
|
| 1718 |
+
(f(y) − f(x))2 �K(x + iη∗, y − iη∗)dxdy + O
|
| 1719 |
+
�
|
| 1720 |
+
η0 + N −ε0�
|
| 1721 |
+
,
|
| 1722 |
+
(7.10)
|
| 1723 |
+
where
|
| 1724 |
+
�K(z, ζ) := −2 Re Tr
|
| 1725 |
+
�m′
|
| 1726 |
+
m (1 − Sm �m)−1Sm �m′(1 − Sm �m)−1
|
| 1727 |
+
�
|
| 1728 |
+
.
|
| 1729 |
+
(7.11)
|
| 1730 |
+
18
|
| 1731 |
+
|
| 1732 |
+
In preparation for the proof of Lemma 7.2 we define an auxiliary function L(z, ζ)
|
| 1733 |
+
L(z, ζ) := Llog(z, ζ) + L1(z, ζ),
|
| 1734 |
+
Llog(z, ζ) := −2 log det {1 − Sm �m} ,
|
| 1735 |
+
L1(z, ζ) := − Tr [Sm �m] + 1
|
| 1736 |
+
2
|
| 1737 |
+
�
|
| 1738 |
+
m �m, C(4)m ��m
|
| 1739 |
+
�
|
| 1740 |
+
,
|
| 1741 |
+
(7.12)
|
| 1742 |
+
where log is the principal branch of the complex logarithm, and C(4) is the matrix of the fourth cumu-
|
| 1743 |
+
lants of H. By Jacobi’s formula for the derivative of the determinant, it follows from the definitions
|
| 1744 |
+
of L and K, that for all z, ζ ∈ C\R
|
| 1745 |
+
∂2
|
| 1746 |
+
∂ζ∂z L(z, ζ) = K(z, ζ).
|
| 1747 |
+
(7.13)
|
| 1748 |
+
Furthermore, by condition (A) and the upper bound (4.2), it follows that
|
| 1749 |
+
|Llog(z, ζ)| ≤π + log |det {1 − Sm �m}| ≲ 1 + Tr
|
| 1750 |
+
�
|
| 1751 |
+
(1 − Sm �m)∗ (1 − Sm �m) − I
|
| 1752 |
+
�
|
| 1753 |
+
≲ 1,
|
| 1754 |
+
(7.14)
|
| 1755 |
+
where in the last line we used
|
| 1756 |
+
�
|
| 1757 |
+
(1 − Sm �m)∗ (1 − Sm �m) − I
|
| 1758 |
+
�
|
| 1759 |
+
jj ≲ N −1.
|
| 1760 |
+
The partial derivatives of L1 contribute only sub-leading terms to L. Indeed, we have the estimates
|
| 1761 |
+
L1(z, ζ) ≲ 1,
|
| 1762 |
+
∂
|
| 1763 |
+
∂zL1(z, ζ) ≲ 1,
|
| 1764 |
+
∂2
|
| 1765 |
+
∂ζ∂z L1(z, ζ) ≲ 1,
|
| 1766 |
+
(7.15)
|
| 1767 |
+
where we used the moment condition (2.2) to bound Sjk and C(4)
|
| 1768 |
+
jk , (4.2) to get the upper bound
|
| 1769 |
+
m, �m ≲ 1, and (4.14) to obtain m′, �m′ ≲ 1, since [E0 + ˆε, E0 − ˆε] ⊂ Iκ.
|
| 1770 |
+
The following claim collects the bounds on K and ∂zL that together with (7.14) enable integration
|
| 1771 |
+
by parts in the definition (5.3) of the variance V (f), which is the essence of Lemma 7.2.
|
| 1772 |
+
Claim 7.3. (Proposition 6.2 and Proposition 6.6 in [17]) Let K(z, ζ) and L(z, ζ) be as defined in (5.4)
|
| 1773 |
+
(with β = 1) and (7.12) respectively, then for all z, ζ ∈ C\R with Re z, Re ζ ∈ [E0 − ˆε, E0 + ˆε] and
|
| 1774 |
+
| Im z|, | Im ζ| ≤ 1 we have
|
| 1775 |
+
K(z, ζ) ≲ 1 + 1{η�η<0}(|η| + |�η|)−2,
|
| 1776 |
+
∂
|
| 1777 |
+
∂z L(z, ζ) ≲ 1 + (| Re z − Re ζ| + |η| + |�η|)−1,
|
| 1778 |
+
(7.16)
|
| 1779 |
+
where η := Im z, �η := Im ζ.
|
| 1780 |
+
Proof of Lemma 7.2. Define Ω∗ := {z ∈ C : 1 > | Im z| > η∗}. Recall the definition of V (f) from (5.3).
|
| 1781 |
+
First, we prove that
|
| 1782 |
+
V (f) = 1
|
| 1783 |
+
π2
|
| 1784 |
+
�
|
| 1785 |
+
Ω∗
|
| 1786 |
+
�
|
| 1787 |
+
Ω∗
|
| 1788 |
+
∂ �f(ζ)
|
| 1789 |
+
∂¯ζ
|
| 1790 |
+
∂ �f(z)
|
| 1791 |
+
∂¯z
|
| 1792 |
+
K(z, ζ)d¯ζdζd¯zdz + O
|
| 1793 |
+
�
|
| 1794 |
+
N −ε0�
|
| 1795 |
+
.
|
| 1796 |
+
(7.17)
|
| 1797 |
+
It follows from (5.6) that
|
| 1798 |
+
∂ �f
|
| 1799 |
+
∂¯z = 1
|
| 1800 |
+
2
|
| 1801 |
+
�
|
| 1802 |
+
−ηχ′(η)f ′(x) + i
|
| 1803 |
+
�
|
| 1804 |
+
ηχ(η)f ′′(x) + χ′(η)f(x)
|
| 1805 |
+
��
|
| 1806 |
+
.
|
| 1807 |
+
(7.18)
|
| 1808 |
+
Moreover, for all z with | Im z| < 1/2, (7.18) and the properties of χ in (5.6) imply
|
| 1809 |
+
∂ �f
|
| 1810 |
+
∂¯z = i Im z
|
| 1811 |
+
2
|
| 1812 |
+
f ′′(Re z).
|
| 1813 |
+
(7.19)
|
| 1814 |
+
Let V∗(f) denote the integral on right hand side of (7.17), and define η1 := N −ε0/2η0. It follows
|
| 1815 |
+
from the first inequality in (7.16), and (7.19) that
|
| 1816 |
+
|V (f) − V∗(f)| ≲
|
| 1817 |
+
��
|
| 1818 |
+
R2
|
| 1819 |
+
|f ′′(x)f ′′(y)| dxdy
|
| 1820 |
+
η1
|
| 1821 |
+
�
|
| 1822 |
+
η∗
|
| 1823 |
+
2η1
|
| 1824 |
+
�
|
| 1825 |
+
η∗
|
| 1826 |
+
η�η
|
| 1827 |
+
(η + �η)2 d�ηdη.
|
| 1828 |
+
(7.20)
|
| 1829 |
+
19
|
| 1830 |
+
|
| 1831 |
+
Note that η�η ≤ (η + �η)2/4, hence the integral over d�ηdη is bounded by η2
|
| 1832 |
+
1/2, and since ∥f ′′∥1 ∼ η−1
|
| 1833 |
+
0 ,
|
| 1834 |
+
(7.17) is established.
|
| 1835 |
+
We write z := x + iη, ζ := y + i�η and plug (7.13) into the expression (7.17) for V (f). Using the
|
| 1836 |
+
fact that ∂zu = −i∂ηu for any holomorphic function u(z), and integrating by parts in η, we obtain
|
| 1837 |
+
V (f) = i
|
| 1838 |
+
π2
|
| 1839 |
+
��
|
| 1840 |
+
R2
|
| 1841 |
+
dxdy
|
| 1842 |
+
�
|
| 1843 |
+
|�η|>η∗
|
| 1844 |
+
∂ �f(ζ)
|
| 1845 |
+
∂¯ζ
|
| 1846 |
+
�
|
| 1847 |
+
|η|>η∗
|
| 1848 |
+
∂2 �f(z)
|
| 1849 |
+
∂η∂¯z
|
| 1850 |
+
∂
|
| 1851 |
+
∂ζ L(z, ζ)d�ηdη
|
| 1852 |
+
− i
|
| 1853 |
+
π2
|
| 1854 |
+
��
|
| 1855 |
+
R2
|
| 1856 |
+
dxdy
|
| 1857 |
+
�
|
| 1858 |
+
|�η|>η∗
|
| 1859 |
+
∂ �f(ζ)
|
| 1860 |
+
∂¯ζ
|
| 1861 |
+
�
|
| 1862 |
+
η=±η∗
|
| 1863 |
+
∂ �f
|
| 1864 |
+
∂¯z (x + iη) ∂
|
| 1865 |
+
∂ζ L(z, ζ)d�η + O
|
| 1866 |
+
�
|
| 1867 |
+
N −ε0�
|
| 1868 |
+
.
|
| 1869 |
+
(7.21)
|
| 1870 |
+
The second estimate in (7.16), expression (7.18) and the estimates ∥f ′′∥1 ∼ η−1
|
| 1871 |
+
0 , ∥f ′∥1 ∼ 1, ∥f∥1 ∼ η0
|
| 1872 |
+
imply that the boundary term in (7.21) is dominated by O≺(η∗η−2
|
| 1873 |
+
0 ), which is smaller than O (N −ε0).
|
| 1874 |
+
Similarly, integrating the first term on the right hand side of (7.21) by parts in �η we get
|
| 1875 |
+
V (f) = − 1
|
| 1876 |
+
π2
|
| 1877 |
+
�
|
| 1878 |
+
Ω∗
|
| 1879 |
+
�
|
| 1880 |
+
Ω∗
|
| 1881 |
+
∂2 �f(z)
|
| 1882 |
+
∂¯z∂η
|
| 1883 |
+
∂2 �f(ζ)
|
| 1884 |
+
∂¯ζ∂�η L(z, ζ)d¯ζdζd¯zdz
|
| 1885 |
+
+ 1
|
| 1886 |
+
π2
|
| 1887 |
+
��
|
| 1888 |
+
R2
|
| 1889 |
+
dxdy
|
| 1890 |
+
�
|
| 1891 |
+
|η|>η∗
|
| 1892 |
+
∂2 �f(z)
|
| 1893 |
+
∂η∂¯z
|
| 1894 |
+
�
|
| 1895 |
+
�η=±η∗
|
| 1896 |
+
∂ �f
|
| 1897 |
+
∂¯ζ (y + i�η)L(z, y + i�η)dη + O
|
| 1898 |
+
�
|
| 1899 |
+
N −ε0�
|
| 1900 |
+
.
|
| 1901 |
+
(7.22)
|
| 1902 |
+
It follows from (7.14) and the expression (7.18) that the boundary term (the second line of (7.22)) is
|
| 1903 |
+
again dominated by O≺(N −ε0).
|
| 1904 |
+
We apply Stokes’ theorem to (7.22) twice: once in z and once in ζ. Considering that ∂η �f(z) vanishes
|
| 1905 |
+
on the boundary of Ω∗ except for the lines {Im z = ±η∗}, this results in
|
| 1906 |
+
V (f) = 1
|
| 1907 |
+
4π2
|
| 1908 |
+
��
|
| 1909 |
+
R2
|
| 1910 |
+
�
|
| 1911 |
+
η,�η=±η∗
|
| 1912 |
+
sign (η�η) ∂ �f(x + iη)
|
| 1913 |
+
∂η
|
| 1914 |
+
∂ �f(y + i�η)
|
| 1915 |
+
∂�η
|
| 1916 |
+
L(x + iη, y + i�η)dxdy + O
|
| 1917 |
+
�
|
| 1918 |
+
N −ε0�
|
| 1919 |
+
= −
|
| 1920 |
+
1
|
| 1921 |
+
2π2
|
| 1922 |
+
��
|
| 1923 |
+
R2
|
| 1924 |
+
f ′(x)f ′(y) �L(x, y)dxdy + O
|
| 1925 |
+
�
|
| 1926 |
+
N −ε0�
|
| 1927 |
+
,
|
| 1928 |
+
(7.23)
|
| 1929 |
+
where
|
| 1930 |
+
�L(x, y) := Re [L(x + iη∗, y + iη∗) − L(x + iη∗, y − iη∗)]
|
| 1931 |
+
(7.24)
|
| 1932 |
+
We restrict the integrations in (7.23) to [E0 − ˆε, E0 + ˆε], since this interval contains the support of f.
|
| 1933 |
+
Furthermore, for all y ∈ supp(f), y − E0 ≲ η0, hence |y − E0 ± ˆε| ∼ 1. By symmetry of L(z, ζ), and
|
| 1934 |
+
the second estimate in (7.16) it follows that
|
| 1935 |
+
∂
|
| 1936 |
+
∂y
|
| 1937 |
+
�L(E0 ± ˆε, y) ≲ 1,
|
| 1938 |
+
y ∈ supp(f).
|
| 1939 |
+
(7.25)
|
| 1940 |
+
We write f ′(y) = ∂y (f(y) − f(x)), perform integration by parts in y and integrate the boundary term
|
| 1941 |
+
by parts in x to obtain
|
| 1942 |
+
V (f) = 1
|
| 1943 |
+
2π2
|
| 1944 |
+
E0+ˆε
|
| 1945 |
+
�
|
| 1946 |
+
E0−ˆε
|
| 1947 |
+
E0+ˆε
|
| 1948 |
+
�
|
| 1949 |
+
E0−ˆε
|
| 1950 |
+
f ′(x) (f(y) �� f(x)) ∂
|
| 1951 |
+
∂y
|
| 1952 |
+
�L(x, y)dxdy
|
| 1953 |
+
+
|
| 1954 |
+
1
|
| 1955 |
+
4π2
|
| 1956 |
+
E0+ˆε
|
| 1957 |
+
�
|
| 1958 |
+
E0−ˆε
|
| 1959 |
+
(f(x))2 ∂
|
| 1960 |
+
∂x
|
| 1961 |
+
�
|
| 1962 |
+
�L(x, E0 + ˆε) − �L(x, E0 − ˆε)
|
| 1963 |
+
�
|
| 1964 |
+
dx + O
|
| 1965 |
+
�
|
| 1966 |
+
N −ε0�
|
| 1967 |
+
.
|
| 1968 |
+
(7.26)
|
| 1969 |
+
Since ∥f∥2
|
| 1970 |
+
2 ≲ η0, it follows from (7.25) that the second integral in (7.26) is O (η0).
|
| 1971 |
+
Similarly,
|
| 1972 |
+
integrating (7.26) by parts in x and using (7.26) to substitute one of the emerging itegrals for
|
| 1973 |
+
−V (f) + O (N −ε0 + η0), we get
|
| 1974 |
+
2V (f) = 1
|
| 1975 |
+
2π2
|
| 1976 |
+
E0+ˆε
|
| 1977 |
+
�
|
| 1978 |
+
E0−ˆε
|
| 1979 |
+
E0+ˆε
|
| 1980 |
+
�
|
| 1981 |
+
E0−ˆε
|
| 1982 |
+
(f(y) − f(x))2
|
| 1983 |
+
∂2
|
| 1984 |
+
∂x∂y
|
| 1985 |
+
�L(x, y)dxdy + O
|
| 1986 |
+
�
|
| 1987 |
+
η0 + N −ε0�
|
| 1988 |
+
,
|
| 1989 |
+
(7.27)
|
| 1990 |
+
20
|
| 1991 |
+
|
| 1992 |
+
where we again used (7.25) to estimate the boundary term. For any holomorphic function u(z) of
|
| 1993 |
+
z = x + iη, we have ∂xu = Re[∂zu], hence ∂x∂y �L(x, y) = Re [K(x + iη∗, y + iη∗) − K(x + iη∗, y − iη∗)].
|
| 1994 |
+
Finally, in view of in view of the first estimate in (7.16), ∂z∂ζLlog(x + iη∗, y + iη∗) ≲ 1, so its
|
| 1995 |
+
contribution is also bounded by O≺(η0 ∥g∥2
|
| 1996 |
+
2 + η2
|
| 1997 |
+
0 ∥g∥2
|
| 1998 |
+
1). Moreover, it follows from the last estimate in
|
| 1999 |
+
(7.15) that we can replace K(x+iη∗, y −iη∗) by ∂z∂ζLlog(x+iη∗, y −iη∗), since the contribution of the
|
| 2000 |
+
remaining terms is bounded by O≺(η0 ∥g∥2
|
| 2001 |
+
2 + η2
|
| 2002 |
+
0 ∥g∥2
|
| 2003 |
+
1). This concludes the proof of Lemma 7.2.
|
| 2004 |
+
Once Lemma 7.2 is established, we can follow the method of Lemma 6.7 in [17] to finish the proof
|
| 2005 |
+
of Proposition 5.2.
|
| 2006 |
+
Fix x, y ∈ [E0 − ˆε, E0 + ˆε] and write z := x + iη∗, ζ := y − iη∗, as in (7.10). It follows from (7.1)
|
| 2007 |
+
and (7.2) that the kernel �K(z, ζ) can be written as
|
| 2008 |
+
�K(z, ζ) = −2 Re Tr
|
| 2009 |
+
�m′
|
| 2010 |
+
m U∗�
|
| 2011 |
+
R + ψ1
|
| 2012 |
+
ω Rvv∗R
|
| 2013 |
+
�
|
| 2014 |
+
F �m′
|
| 2015 |
+
�m
|
| 2016 |
+
�
|
| 2017 |
+
R + ψ1
|
| 2018 |
+
ω Rvv∗R
|
| 2019 |
+
��
|
| 2020 |
+
,
|
| 2021 |
+
(7.28)
|
| 2022 |
+
where ω is defined in (7.7). Expanding the brackets in (7.28), collecting like terms according to the
|
| 2023 |
+
powers of ω−1, and using the cyclic property of trace yields
|
| 2024 |
+
�K(z, ζ) = −2 Re
|
| 2025 |
+
�ψ2
|
| 2026 |
+
1
|
| 2027 |
+
ω2
|
| 2028 |
+
�
|
| 2029 |
+
v, Rm′
|
| 2030 |
+
m U∗Rv
|
| 2031 |
+
��
|
| 2032 |
+
v, RF �m′
|
| 2033 |
+
�m Rv
|
| 2034 |
+
��
|
| 2035 |
+
+ O
|
| 2036 |
+
�
|
| 2037 |
+
1 + ω−1�
|
| 2038 |
+
,
|
| 2039 |
+
(7.29)
|
| 2040 |
+
since Tr
|
| 2041 |
+
� m′
|
| 2042 |
+
m U∗RF �
|
| 2043 |
+
m′
|
| 2044 |
+
�
|
| 2045 |
+
m R
|
| 2046 |
+
�
|
| 2047 |
+
, Tr
|
| 2048 |
+
� m′
|
| 2049 |
+
m U∗RF �
|
| 2050 |
+
m′
|
| 2051 |
+
�
|
| 2052 |
+
m Rvv∗R
|
| 2053 |
+
�
|
| 2054 |
+
, and Tr
|
| 2055 |
+
� m′
|
| 2056 |
+
m U∗Rvv∗RF �
|
| 2057 |
+
m′
|
| 2058 |
+
�
|
| 2059 |
+
m R
|
| 2060 |
+
�
|
| 2061 |
+
are all O(1). The first
|
| 2062 |
+
scalar product in (7.29) can be estimated using (7.6).
|
| 2063 |
+
We compute the second scalar product in (7.29). It follows from uniform bounds (4.2) and (4.14)
|
| 2064 |
+
that ∥m(z)− m(¯ζ)∥∞ ≲ |x− y|, and hence ∥U(z, ζ) − 1∥ℓ2→ℓ2 ≲ |x− y|. Together with estimates (7.5)
|
| 2065 |
+
and (7.4), this yields
|
| 2066 |
+
ψ1
|
| 2067 |
+
�
|
| 2068 |
+
v, RF �m′
|
| 2069 |
+
�m Rv
|
| 2070 |
+
�
|
| 2071 |
+
= ⟨v(ζ, ζ), F(ζ, ζ) �
|
| 2072 |
+
m′
|
| 2073 |
+
�m v(ζ, ζ)
|
| 2074 |
+
�
|
| 2075 |
+
+ O(|x − y|),
|
| 2076 |
+
(7.30)
|
| 2077 |
+
where we used the identity R(¯ζ, ζ)v(ζ, ζ) = (1 − A(ζ, ζ))−1v(ζ, ζ) = v(ζ, ζ).
|
| 2078 |
+
It follows from the estimate on v in (7.4) that ∥v(ζ, ζ) − v(y, y)∥2 ≲ η∗. Vector v(y, y) is the ℓ2-
|
| 2079 |
+
normalization of |m(y)|−1 Im m(y + i0), hence it satisfies F(y, y)v(y, y) = v(y, y) by (3.4). Therefore
|
| 2080 |
+
using (4.14) and the lower bound in (7.5), we obtain
|
| 2081 |
+
∥F(ζ, ζ)v(ζ, ζ) − v(ζ, ζ)∥2 ≲ η∗.
|
| 2082 |
+
(7.31)
|
| 2083 |
+
Substituting (7.31) into (7.30) yields
|
| 2084 |
+
ψ1
|
| 2085 |
+
�
|
| 2086 |
+
v, RF �m′
|
| 2087 |
+
�m Rv
|
| 2088 |
+
�
|
| 2089 |
+
= ⟨v(ζ, ζ), �m′
|
| 2090 |
+
�m v(ζ, ζ)
|
| 2091 |
+
�
|
| 2092 |
+
+ O(|x − y| + η∗),
|
| 2093 |
+
(7.32)
|
| 2094 |
+
Combining (7.28) with estimates (7.4), (7.6), (7.8) and (7.32) yield
|
| 2095 |
+
�K(z, ζ) = −2 Re
|
| 2096 |
+
�ψ1(z, z)ψ1(ζ, ζ)
|
| 2097 |
+
ω2
|
| 2098 |
+
�
|
| 2099 |
+
v(z, z)m′
|
| 2100 |
+
m v(z, z)
|
| 2101 |
+
�
|
| 2102 |
+
⟨v(ζ, ζ), �m′
|
| 2103 |
+
�m v(ζ, ζ)
|
| 2104 |
+
��
|
| 2105 |
+
+ O(1 + ω−1).
|
| 2106 |
+
(7.33)
|
| 2107 |
+
It follows by (7.9) and (7.7) that
|
| 2108 |
+
lim
|
| 2109 |
+
η∗→+0
|
| 2110 |
+
�K(x + iη∗, y − iη∗) = 2|x − y|−2 + O(|x − y|−1).
|
| 2111 |
+
(7.34)
|
| 2112 |
+
Since f ∈ C2
|
| 2113 |
+
c (R), (7.33) implies that the integrand in (7.10) is uniformly bounded in η∗ ∈ [0, N −100].
|
| 2114 |
+
Therefore, we can take the limit η∗ → 0 in (7.10), and apply the boundary estimate (7.34) to obtain.
|
| 2115 |
+
V (f) =
|
| 2116 |
+
1
|
| 2117 |
+
2π2
|
| 2118 |
+
��
|
| 2119 |
+
[E0−ˆε,E0+ˆε]2
|
| 2120 |
+
(f(x) − f(y))2
|
| 2121 |
+
(x − y)2
|
| 2122 |
+
dxdy + O
|
| 2123 |
+
�
|
| 2124 |
+
η0 log N + N −ε0�
|
| 2125 |
+
,
|
| 2126 |
+
(7.35)
|
| 2127 |
+
because the contribution of O(|x − y|−1) to the integral (7.10) is bounded by O(η0 log N).
|
| 2128 |
+
21
|
| 2129 |
+
|
| 2130 |
+
Finally, the contribution of the regime (x, y) /∈ [E0 − ˆε, E0 + ˆε]2 to the integral
|
| 2131 |
+
��
|
| 2132 |
+
R2
|
| 2133 |
+
(f(x) − f(y))2
|
| 2134 |
+
(x − y)2
|
| 2135 |
+
dxdy = ∥f∥2
|
| 2136 |
+
˙H1/2 = ∥g∥2
|
| 2137 |
+
˙H1/2 ,
|
| 2138 |
+
(7.36)
|
| 2139 |
+
is bounded by O≺(η0), therefore
|
| 2140 |
+
V (f) =
|
| 2141 |
+
1
|
| 2142 |
+
2π2 ∥g∥2
|
| 2143 |
+
˙H1/2 + O
|
| 2144 |
+
�
|
| 2145 |
+
η0 log N + N −ε0�
|
| 2146 |
+
.
|
| 2147 |
+
(7.37)
|
| 2148 |
+
This concludes the proof of Proposition 5.2.
|
| 2149 |
+
Appendix A
|
| 2150 |
+
Proof of Lemma 5.4
|
| 2151 |
+
We use the Helffer–Sj¨ostrand representation to express the linear eigenvalue statistics in terms of the
|
| 2152 |
+
resolvent of H (see Section 4.2 in [19] for references),
|
| 2153 |
+
{1 − E} [Tr f(H)] = 1
|
| 2154 |
+
2π
|
| 2155 |
+
�
|
| 2156 |
+
C
|
| 2157 |
+
∂ �f
|
| 2158 |
+
∂¯z {1 − E} [Tr G(z)] d¯zdz.
|
| 2159 |
+
(A.1)
|
| 2160 |
+
The characteristic function φ then admits the form
|
| 2161 |
+
φ(λ) = E [e(λ)] ,
|
| 2162 |
+
e(λ) := exp
|
| 2163 |
+
�
|
| 2164 |
+
iλ 1
|
| 2165 |
+
2π
|
| 2166 |
+
�
|
| 2167 |
+
C
|
| 2168 |
+
∂ �f
|
| 2169 |
+
∂¯z {1 − E} [Tr G(z)] d¯zdz
|
| 2170 |
+
�
|
| 2171 |
+
,
|
| 2172 |
+
λ ∈ R,
|
| 2173 |
+
(A.2)
|
| 2174 |
+
and its derivative φ′ is given by
|
| 2175 |
+
φ′(λ) = E
|
| 2176 |
+
�
|
| 2177 |
+
e(λ) i
|
| 2178 |
+
2π
|
| 2179 |
+
�
|
| 2180 |
+
C
|
| 2181 |
+
∂ �f
|
| 2182 |
+
∂¯z {1 − E} [Tr G(z)] d¯zdz
|
| 2183 |
+
�
|
| 2184 |
+
,
|
| 2185 |
+
λ ∈ R.
|
| 2186 |
+
(A.3)
|
| 2187 |
+
As observed in [19], the regime | Im z| ≤ N −ε0/2η0, referred to as the ultra-local scales, does not
|
| 2188 |
+
contribute to the integrals in (A.2) and (A.3). This yields the estimates (5.9) (see equations (4.21)
|
| 2189 |
+
and (4.22) in [19] for further detail).
|
| 2190 |
+
It remains to show that (5.11) holds.
|
| 2191 |
+
Applying the cumulant expansion formula (4.15) to the
|
| 2192 |
+
quantity E [�e(λ) {1 − E} [Gjj(z)]] yields the following lemma.
|
| 2193 |
+
Lemma A.1. (Lemma 5.7 in [17]) For all z ∈ D defined in (3.2) and j ∈ {1, . . ., N} we have
|
| 2194 |
+
−1
|
| 2195 |
+
mj(z) E [�e(λ) {1 − E} [Gjj(z)]] = − mj(z)
|
| 2196 |
+
N
|
| 2197 |
+
�
|
| 2198 |
+
k=1
|
| 2199 |
+
Sjk E [�e(λ) {1 − E} [Gkk(z)]]
|
| 2200 |
+
− E [�e(λ) {1 − E} [Tjj(z, z)]]
|
| 2201 |
+
+ E
|
| 2202 |
+
� N
|
| 2203 |
+
�
|
| 2204 |
+
k=1
|
| 2205 |
+
SjkGkj(z)∂�e(λ)
|
| 2206 |
+
∂Hjk
|
| 2207 |
+
�
|
| 2208 |
+
− 1
|
| 2209 |
+
2
|
| 2210 |
+
N
|
| 2211 |
+
�
|
| 2212 |
+
k=1
|
| 2213 |
+
C(4)
|
| 2214 |
+
jk mj(z)mk(z) E
|
| 2215 |
+
�∂2�e(λ)
|
| 2216 |
+
∂H2
|
| 2217 |
+
jk
|
| 2218 |
+
�
|
| 2219 |
+
+ O≺
|
| 2220 |
+
�
|
| 2221 |
+
(1 + |λ|4)
|
| 2222 |
+
�
|
| 2223 |
+
Ψ(z)Θ(z) + N −1Ψ(z)η−1/2
|
| 2224 |
+
0
|
| 2225 |
+
��
|
| 2226 |
+
,
|
| 2227 |
+
(A.4)
|
| 2228 |
+
where η0 is from (2.3), and for a, b ∈ {1, . . ., N}, z, ζ ∈ C\R, Txy(z, ζ) is defined in (1.1).
|
| 2229 |
+
Let gj := E [�e(λ) {1 − E} [Gjj(z)]] and let rj denote the right-hand side of (A.4) without the first
|
| 2230 |
+
term, then (A.4) reads
|
| 2231 |
+
��
|
| 2232 |
+
1 − Sm2(z)
|
| 2233 |
+
�g
|
| 2234 |
+
�
|
| 2235 |
+
j = −mj(z)rj. The operator
|
| 2236 |
+
�
|
| 2237 |
+
1 − Sm2(z)
|
| 2238 |
+
�
|
| 2239 |
+
can be inverted to
|
| 2240 |
+
22
|
| 2241 |
+
|
| 2242 |
+
deduce that gj = −
|
| 2243 |
+
��
|
| 2244 |
+
1 − Sm2(z)
|
| 2245 |
+
�−1 m(z)r
|
| 2246 |
+
�
|
| 2247 |
+
j, where m(z) is interpreted as a multiplication operator
|
| 2248 |
+
acting on the vector r. Summing over j, we obtain
|
| 2249 |
+
E [�e(λ) {1 − E} [Tr G(z)]] =
|
| 2250 |
+
N
|
| 2251 |
+
�
|
| 2252 |
+
j=1
|
| 2253 |
+
gj = −
|
| 2254 |
+
N
|
| 2255 |
+
�
|
| 2256 |
+
j,k=1
|
| 2257 |
+
��
|
| 2258 |
+
1 − Sm2(z)
|
| 2259 |
+
�−1�
|
| 2260 |
+
jk mk(z)r k = −
|
| 2261 |
+
N
|
| 2262 |
+
�
|
| 2263 |
+
j=1
|
| 2264 |
+
m′
|
| 2265 |
+
j(z)
|
| 2266 |
+
mj(z)rj,
|
| 2267 |
+
(A.5)
|
| 2268 |
+
where in the last step we applied the identity m′(z)/m2(z) = (1 − Sm2(z))−11. The second term on
|
| 2269 |
+
the right-hand side of (A.4) contributes the first term to the right hand side of (5.11), which, as we
|
| 2270 |
+
show in Section 6, is negligible. Therefore, it suffices to estimate the contribution of the third and
|
| 2271 |
+
fourth terms on the right-hand side. The necessary estimates on the partial derivatives of �e(λ) are
|
| 2272 |
+
collected in the following lemma.
|
| 2273 |
+
Lemma A.2. (Lemma 5.6 in [17]) For all j, k ∈ {1, . . . , N} we have
|
| 2274 |
+
∂�e(λ)
|
| 2275 |
+
∂Hjk
|
| 2276 |
+
= −iλ
|
| 2277 |
+
π
|
| 2278 |
+
2
|
| 2279 |
+
1 + δjk
|
| 2280 |
+
�e(λ)
|
| 2281 |
+
�
|
| 2282 |
+
Ω′
|
| 2283 |
+
0
|
| 2284 |
+
∂ �f
|
| 2285 |
+
∂¯ζ
|
| 2286 |
+
∂Gkj(ζ)
|
| 2287 |
+
∂ζ
|
| 2288 |
+
d¯ζdζ.
|
| 2289 |
+
(A.6)
|
| 2290 |
+
Moreover, for all p ∈ N, the following bound holds
|
| 2291 |
+
����
|
| 2292 |
+
∂p�e(λ)
|
| 2293 |
+
∂Hp
|
| 2294 |
+
jk
|
| 2295 |
+
���� = O≺
|
| 2296 |
+
�
|
| 2297 |
+
(1 + |λ|)p�
|
| 2298 |
+
,
|
| 2299 |
+
(A.7)
|
| 2300 |
+
and for k ̸= j
|
| 2301 |
+
����
|
| 2302 |
+
∂�e(λ)
|
| 2303 |
+
∂Hjk
|
| 2304 |
+
���� = O≺
|
| 2305 |
+
�
|
| 2306 |
+
N −1/2(1 + |λ|)η−1/2
|
| 2307 |
+
0
|
| 2308 |
+
�
|
| 2309 |
+
.
|
| 2310 |
+
(A.8)
|
| 2311 |
+
Second derivatives with k ̸= j are given by
|
| 2312 |
+
∂2�e(λ)
|
| 2313 |
+
∂H2
|
| 2314 |
+
jk
|
| 2315 |
+
= 2iλ
|
| 2316 |
+
π �e(λ)
|
| 2317 |
+
�
|
| 2318 |
+
Ω′
|
| 2319 |
+
0
|
| 2320 |
+
∂ �f
|
| 2321 |
+
∂¯ζ
|
| 2322 |
+
∂ {mj(ζ)mk(ζ)}
|
| 2323 |
+
∂ζ
|
| 2324 |
+
d¯ζdζ + O≺
|
| 2325 |
+
�
|
| 2326 |
+
N −1/2(1 + |λ|)2η−1/2
|
| 2327 |
+
0
|
| 2328 |
+
�
|
| 2329 |
+
.
|
| 2330 |
+
(A.9)
|
| 2331 |
+
The form in which we write the error terms in Lemmas A.1 and A.2 slightly differs from their
|
| 2332 |
+
original form in [17] because we have already applied the estimate ∥f ′′∥1 ∼ η−1
|
| 2333 |
+
0 . The leading term in
|
| 2334 |
+
(A.9) results in the third line of (5.11).
|
| 2335 |
+
Using Lemmas A.2 and 5.6 we proceed to estimate the third term on the right hand side of (A.4).
|
| 2336 |
+
Lemma A.3. (c.f. Equation (5.65) of Lemma 5.8 in [17]) For all z ∈ D defined in (3.2) and all
|
| 2337 |
+
j ∈ {1, . . . , N} we have
|
| 2338 |
+
E
|
| 2339 |
+
� N
|
| 2340 |
+
�
|
| 2341 |
+
k=1
|
| 2342 |
+
SjkGkj(z)∂�e(λ)
|
| 2343 |
+
∂Hjk
|
| 2344 |
+
�
|
| 2345 |
+
= − 2iλ
|
| 2346 |
+
π E
|
| 2347 |
+
�
|
| 2348 |
+
�e(λ)
|
| 2349 |
+
�
|
| 2350 |
+
Ω′
|
| 2351 |
+
0
|
| 2352 |
+
∂ �f
|
| 2353 |
+
∂¯ζ
|
| 2354 |
+
∂Tjj(z, ζ)
|
| 2355 |
+
∂ζ
|
| 2356 |
+
d¯ζdζ
|
| 2357 |
+
�
|
| 2358 |
+
− iλ
|
| 2359 |
+
π Sjj E [�e(λ)]
|
| 2360 |
+
�
|
| 2361 |
+
Ω′
|
| 2362 |
+
0
|
| 2363 |
+
∂ �f
|
| 2364 |
+
∂¯ζ m′
|
| 2365 |
+
j(ζ)mj(z)d¯ζdζ + O≺
|
| 2366 |
+
�Ψ(z)(1 + |λ|)
|
| 2367 |
+
Nη1/2
|
| 2368 |
+
0
|
| 2369 |
+
�
|
| 2370 |
+
.
|
| 2371 |
+
(A.10)
|
| 2372 |
+
Proof of Lemma A.3. In view of (1.1), multiplying (A.6) by SjkGkj(z), summing over k ̸= j and
|
| 2373 |
+
taking expectations gives the first term on the right hand side of (A.4). For the remaining k = j term,
|
| 2374 |
+
observe that the function K(ζ) := Gjj(ζ) − mj(ζ) is analytic in C\R and is stochastically dominated
|
| 2375 |
+
by Ψ(ζ) in D. Applying Lemma 5.5 with p = 1 to K(ζ), we obtain
|
| 2376 |
+
∂Gjj(ζ)
|
| 2377 |
+
∂ζ
|
| 2378 |
+
= m′
|
| 2379 |
+
j(ζ) + O≺
|
| 2380 |
+
�
|
| 2381 |
+
| Im ζ|−1Ψ(ζ)
|
| 2382 |
+
�
|
| 2383 |
+
.
|
| 2384 |
+
(A.11)
|
| 2385 |
+
Plugging (A.11) into (A.6) with k = j and applying Lemma 5.6 with K(ζ) := ∂ζGjj(ζ) − m′
|
| 2386 |
+
j(ζ) with
|
| 2387 |
+
s = 3/2, we get
|
| 2388 |
+
∂�e(λ)
|
| 2389 |
+
∂Hjj
|
| 2390 |
+
= −iλ
|
| 2391 |
+
π �e(λ)
|
| 2392 |
+
�
|
| 2393 |
+
Ω′
|
| 2394 |
+
0
|
| 2395 |
+
∂ �f
|
| 2396 |
+
∂¯ζ m′
|
| 2397 |
+
j(ζ)d¯ζdζ + O≺
|
| 2398 |
+
�
|
| 2399 |
+
1 + |λ|)N −1/2η−1/2
|
| 2400 |
+
0
|
| 2401 |
+
�
|
| 2402 |
+
.
|
| 2403 |
+
(A.12)
|
| 2404 |
+
23
|
| 2405 |
+
|
| 2406 |
+
where we used the the fact that |e(λ)| = 1 and the first line of (5.9) to bound |�e(λ)| by O≺(1).
|
| 2407 |
+
Multiplying (A.12) by SjjGjj(z) and using the local law (4.4) to estimate Gjj(z) gives the second
|
| 2408 |
+
term on the right hand side of (A.4). Application of the local law (4.4) is justified by (A.7) with p = 1.
|
| 2409 |
+
This concludes the proof of Lemma A.3.
|
| 2410 |
+
Summing up the leading terms in (A.10) results in the second and third terms on the right-hand
|
| 2411 |
+
side of (5.11). Collecting all the error terms, the estimate in (5.11) now follows from (4.13), (A.5),
|
| 2412 |
+
(A.7) (A.9) and Lemma A.3. This concludes the proof of Lemma 5.4.
|
| 2413 |
+
References
|
| 2414 |
+
[1]
|
| 2415 |
+
Oskari Ajanki, L´aszl´o Erd˝os, and Torben Kr¨uger. Quadratic Vector Equations On Complex
|
| 2416 |
+
Upper Half-Plane. Memoirs of the American Mathematical Society 261.1261 (2019).
|
| 2417 |
+
[2]
|
| 2418 |
+
Oskari Ajanki, L´aszl´o Erd˝os, and Torben Kr¨uger. Universality for general Wigner-type matrices.
|
| 2419 |
+
Probability Theory and Related Fields 169 (2015), pp. 667–727.
|
| 2420 |
+
[3]
|
| 2421 |
+
Oskari Ajanki, Torben Kr¨uger, and L´aszl´o Erd˝os. Singularities of Solutions to Quadratic Vector
|
| 2422 |
+
Equations on the Complex Upper Half-Plane. Communications on Pure and Applied Mathematics
|
| 2423 |
+
70 (2017), pp. 1672–1705.
|
| 2424 |
+
[4]
|
| 2425 |
+
Zhidong Bai and Jian-Feng Yao. On the convergence of the spectral empirical process of Wigner
|
| 2426 |
+
matrices. Bernoulli 11 (2005), pp. 1059–1092.
|
| 2427 |
+
[5]
|
| 2428 |
+
Zhigang Bao, Kevin Schnelli, and Yuanyuan Xu. Central Limit Theorem for Mesoscopic Eigen-
|
| 2429 |
+
value Statistics of the Free Sum of Matrices. International Mathematics Research Notices 2022.7
|
| 2430 |
+
(2020), pp. 5320–5382.
|
| 2431 |
+
[6]
|
| 2432 |
+
Zhigang Bao and Junshan Xie. CLT for Linear Spectral Statistics of Hermitian Wigner Matrices
|
| 2433 |
+
with General Moment Conditions. Theory of Probability & Its Applications 60.2 (2016), pp. 187–
|
| 2434 |
+
206.
|
| 2435 |
+
[7]
|
| 2436 |
+
Anne Marie Boutet de Monvel and Alexei Khorunzhy. Asymptotic distribution of smoothed
|
| 2437 |
+
eigenvalue density. I. Gaussian random matrices. Random Oper. Stochastic Equations 7 (1999),
|
| 2438 |
+
pp. 1–22.
|
| 2439 |
+
[8]
|
| 2440 |
+
Anne Marie Boutet de Monvel and Alexei Khorunzhy. Asymptotic distribution of smoothed
|
| 2441 |
+
eigenvalue density. II. Wigner random matrices. Random Oper. Stochastic Equations 7 (1999),
|
| 2442 |
+
pp. 149–168.
|
| 2443 |
+
[9]
|
| 2444 |
+
L´aszl´o Erd˝os. The matrix Dyson equation and its applications for random matrices. Random
|
| 2445 |
+
matrices. Vol. 26. IAS/Park City Math. Ser. 2019, pp. 75–158.
|
| 2446 |
+
[10]
|
| 2447 |
+
L´aszl´o Erd˝os, Antti Knowles, and Horng-Tzer Yau. Averaging Fluctuations in Resolvents of
|
| 2448 |
+
Random Band Matrices. Annales Henri Poincar´e 14 (2013), pp. 1837–1926.
|
| 2449 |
+
[11]
|
| 2450 |
+
L´aszl´o Erd˝os, Antti Knowles, Horng-Tzer Yau, and Jun Yin. Delocalization and Diffusion Profile
|
| 2451 |
+
for Random Band Matrices. Communications in Mathematical Physics 323 (2013), 367––416.
|
| 2452 |
+
[12]
|
| 2453 |
+
L´aszl´o Erd˝os, Antti Knowles, Horng-Tzer Yau, and Jun Yin. The local semicircle law for a general
|
| 2454 |
+
class of random matrices. Electronic Journal of Probability 18.none (2013), pp. 1–58.
|
| 2455 |
+
[13]
|
| 2456 |
+
Yukun He and Antti Knowles. Mesoscopic eigenvalue statistics of Wigner matrices. The Annals
|
| 2457 |
+
of Applied Probability 27 (2017), pp. 1510–1550.
|
| 2458 |
+
[14]
|
| 2459 |
+
Yukun He and Matteo Marcozzi. Diffusion profile for random band matrices: a short proof. J.
|
| 2460 |
+
Stat. Phys. 177 (2019), pp. 666–716.
|
| 2461 |
+
[15]
|
| 2462 |
+
Kurt Johansson. On fluctuations of eigenvalues of random Hermitian matrices. Duke Mathemat-
|
| 2463 |
+
ical Journal 91 (1998), pp. 151–204.
|
| 2464 |
+
[16]
|
| 2465 |
+
Alexei Khorunzhy, Boris Khoruzhenko, and Leonid Pastur. Asymptotic properties of large ran-
|
| 2466 |
+
dom matrices with independent entries. Journal of Mathematical Physics 37 (1996), pp. 5033–
|
| 2467 |
+
5060.
|
| 2468 |
+
[17]
|
| 2469 |
+
Benjamin Landon, Patrick Lopatto, and Philippe Sosoe. Single eigenvalue fluctuations of general
|
| 2470 |
+
Wigner-type matrices. 2021. arXiv:2105.01178.
|
| 2471 |
+
24
|
| 2472 |
+
|
| 2473 |
+
[18]
|
| 2474 |
+
Benjamin Landon and Philippe Sosoe. Almost-optimal bulk regularity conditions in the CLT for
|
| 2475 |
+
Wigner matrices. 2022. arXiv:2204.03419.
|
| 2476 |
+
[19]
|
| 2477 |
+
Benjamin Landon and Philippe Sosoe. Applications of mesoscopic CLTs in random matrix theory.
|
| 2478 |
+
The Annals of Applied Probability 30 (2020), pp. 2769–2795.
|
| 2479 |
+
[20]
|
| 2480 |
+
Yiting Li, Kevin Schnelli, and Yuanyuan Xu. Central limit theorem for mesoscopic eigenvalue
|
| 2481 |
+
statistics of deformed Wigner matrices and sample covariance matrices. Annales de l’Institut
|
| 2482 |
+
Henri Poincar´e, Probabilit´es et Statistiques 57 (2021), pp. 506–546.
|
| 2483 |
+
[21]
|
| 2484 |
+
Yiting Li and Yuanyuan Xu. On fluctuations of global and mesoscopic linear statistics of gener-
|
| 2485 |
+
alized Wigner matrices. Bernoulli 27 (2021), pp. 1057–1076.
|
| 2486 |
+
[22]
|
| 2487 |
+
Anna Lytova and Leonid Pastur. Central limit theorem for linear eigenvalue statistics of random
|
| 2488 |
+
matrices with independent entries. The Annals of Probability 37 (2009), pp. 1778–1840.
|
| 2489 |
+
[23]
|
| 2490 |
+
Mariya Shcherbina. Central Limit Theorem for linear eigenvalue statistics of the Wigner and
|
| 2491 |
+
sample covariance random matrices. Zh. Mat. Fiz. Anal. Geom. 7 (2011), pp. 176–192.
|
| 2492 |
+
[24]
|
| 2493 |
+
Philippe Sosoe and Percy Wong. Regularity conditions in the CLT for linear eigenvalue statistics
|
| 2494 |
+
of Wigner matrices. Advances in Mathematics 249 (2013), pp. 37–87.
|
| 2495 |
+
[25]
|
| 2496 |
+
Eugene Wigner. Characteristics Vectors of Bordered Matrices with Infinite Dimensions II. Annals
|
| 2497 |
+
of Mathematics 65.2 (1957), pp. 203–207.
|
| 2498 |
+
25
|
| 2499 |
+
|
ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/2301.00075v1.pdf.txt
ADDED
|
@@ -0,0 +1,597 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
s
|
| 2 |
+
er
|
| 3 |
+
ne
|
| 4 |
+
ngi
|
| 5 |
+
E
|
| 6 |
+
al
|
| 7 |
+
ci
|
| 8 |
+
han
|
| 9 |
+
c
|
| 10 |
+
e
|
| 11 |
+
M
|
| 12 |
+
of Iranian Society of
|
| 13 |
+
|
| 14 |
+
ce
|
| 15 |
+
en
|
| 16 |
+
er
|
| 17 |
+
f
|
| 18 |
+
Con
|
| 19 |
+
|
| 20 |
+
al
|
| 21 |
+
on
|
| 22 |
+
i
|
| 23 |
+
nat
|
| 24 |
+
nter
|
| 25 |
+
I
|
| 26 |
+
ual
|
| 27 |
+
n
|
| 28 |
+
An
|
| 29 |
+
|
| 30 |
+
th
|
| 31 |
+
30
|
| 32 |
+
The
|
| 33 |
+
|
| 34 |
+
10 to 12 May, 2022, Tehran, Iran.
|
| 35 |
+
|
| 36 |
+
|
| 37 |
+
ISME2022-IC1332
|
| 38 |
+
|
| 39 |
+
|
| 40 |
+
10 to 12 May, 2022
|
| 41 |
+
|
| 42 |
+
|
| 43 |
+
Optimal Motion Generation of the Bipedal Under-Actuated Planar Robot for Stair Climbing
|
| 44 |
+
|
| 45 |
+
Aref Amiri 1, Hassan Salarieh 2
|
| 46 |
+
|
| 47 |
+
1Graduate Student, Sharif University of Technology, Tehran; aref.amiri@mech.sharif.edu
|
| 48 |
+
2Professor, Sharif University of Technology, Tehran; salarieh@sharif.edu
|
| 49 |
+
|
| 50 |
+
Abstract
|
| 51 |
+
The importance of humanoid robots in today's world is
|
| 52 |
+
undeniable, one of the most important features of
|
| 53 |
+
humanoid robots is the ability to maneuver in
|
| 54 |
+
environments such as stairs that other robots can not
|
| 55 |
+
easily cross. A suitable algorithm to generate the path
|
| 56 |
+
for the bipedal robot to climb is very important. In this
|
| 57 |
+
paper, an optimization-based method to generate an
|
| 58 |
+
optimal stairway for under-actuated bipedal robots
|
| 59 |
+
without an ankle actuator is presented. The generated
|
| 60 |
+
paths are based on zero and non-zero dynamics of the
|
| 61 |
+
problem, and according to the satisfaction of the zero
|
| 62 |
+
dynamics constraint in the problem, tracking the path is
|
| 63 |
+
possible, in other words, the problem can be
|
| 64 |
+
dynamically feasible. The optimization method used in
|
| 65 |
+
the problem is a gradient-based method that has a
|
| 66 |
+
suitable
|
| 67 |
+
number
|
| 68 |
+
of
|
| 69 |
+
function
|
| 70 |
+
evaluations
|
| 71 |
+
for
|
| 72 |
+
computational processing. This method can also be
|
| 73 |
+
utilized to go down the stairs.
|
| 74 |
+
|
| 75 |
+
Keywords: Bipedal robot, under-actuated, optimization,
|
| 76 |
+
motion planning
|
| 77 |
+
|
| 78 |
+
Introduction
|
| 79 |
+
Inspired by human body physics, bipedal robots have
|
| 80 |
+
many degrees of freedom and can perform various
|
| 81 |
+
actions with their joint movements. Bipedal robots can
|
| 82 |
+
adapt to different environments that other wheeled
|
| 83 |
+
robots are unable to move. The study of path (trajectory)
|
| 84 |
+
generation methods as a reference for the output of the
|
| 85 |
+
control problem of bipedal robots in this regard is
|
| 86 |
+
essential. For the bipedal robot to climb the stairs, it is
|
| 87 |
+
necessary to analyze the movement of them ascending
|
| 88 |
+
the stairs and to examine the method of planning the
|
| 89 |
+
bipedal robot to move and to determine the position of
|
| 90 |
+
feet for walking on the stairs [1].
|
| 91 |
+
So far, researches have been done on how to go up
|
| 92 |
+
and downstairs and find a suitable or optimal path for
|
| 93 |
+
bipedal robots. Various papers using optimization
|
| 94 |
+
algorithms and considering the robot angles as
|
| 95 |
+
polynomial functions tried to design an optimal path for
|
| 96 |
+
a 6-degree bipedal robot [2]. Some articles have even
|
| 97 |
+
paths planned for multi-legged robots to cross the stairs
|
| 98 |
+
[3]. Some articles also used stability criteria such as
|
| 99 |
+
ZMP in designing their paths [4-7]. But this method is
|
| 100 |
+
only appliable for robots that have feet (soles) with ankle
|
| 101 |
+
joint actuators, which often have much lower speed in
|
| 102 |
+
maneuvering than under-actuated robots without feet,
|
| 103 |
+
and of course, due to the relatively large feet have more
|
| 104 |
+
wasted energy. Some articles also derive their initial path
|
| 105 |
+
using data based on motion capturing and then try to
|
| 106 |
+
optimize their results by combining optimization
|
| 107 |
+
methods [8]. However, according to the existing
|
| 108 |
+
literature, few articles have attempted to design a
|
| 109 |
+
holonomic path for under-actuated bipedal robots
|
| 110 |
+
without feet. Due to the importance of optimal motion
|
| 111 |
+
planning, a lot of work has been done in recent years in
|
| 112 |
+
this area.
|
| 113 |
+
In this paper, the problem of motion planning is
|
| 114 |
+
investigated to find the optimal paths for under-actuated
|
| 115 |
+
bipedal robots to step on the stairs, the results obtained
|
| 116 |
+
as a control output will cause the robot to move properly
|
| 117 |
+
and optimally. This article consists of three sections. In
|
| 118 |
+
the first part, the dynamic model of the bipedal robot is
|
| 119 |
+
derived. In the second part, the constraints of the
|
| 120 |
+
optimization problem are examined, in the third part, the
|
| 121 |
+
cost function and method of optimal problem solving
|
| 122 |
+
and finding a suitable movement gate are examined. In
|
| 123 |
+
the fourth section, the results are presented and
|
| 124 |
+
discussed, and at the end, the research of this article is
|
| 125 |
+
summarized as the conclusion.
|
| 126 |
+
|
| 127 |
+
Dynamics equation
|
| 128 |
+
The dynamic model of the robot is shown in Figure
|
| 129 |
+
1. The robot has 7 degrees of freedom and 5 links,
|
| 130 |
+
each leg has two joints (one in the knee and the
|
| 131 |
+
other in the hip) and 3 degrees of freedom. We
|
| 132 |
+
assume that the contact of the tip of the leg is the
|
| 133 |
+
point.
|
| 134 |
+
|
| 135 |
+
Figure 1. Planar bipedal robot
|
| 136 |
+
|
| 137 |
+
|
| 138 |
+
0.2
|
| 139 |
+
10 to 12 May, 2022
|
| 140 |
+
The robot's motion is planar and the robot has 4
|
| 141 |
+
actuators, two actuators at the knees and two actuators
|
| 142 |
+
at the junction of the hip and the trunk so that there is
|
| 143 |
+
one actuator between each leg and trunk. It is assumed
|
| 144 |
+
that by hitting the tip of the swing leg on the ground, the
|
| 145 |
+
other leg rises from the ground, in other words, the
|
| 146 |
+
robot has no double support phase. So, when moving on
|
| 147 |
+
the stairs, no time is wasted for placing both feet on the
|
| 148 |
+
ground. Therefore, the hybrid dynamic equations of a
|
| 149 |
+
robot are a combination of a single support phase and
|
| 150 |
+
collision phase. The equations of the hybrid model are
|
| 151 |
+
as follows:
|
| 152 |
+
( )
|
| 153 |
+
( )
|
| 154 |
+
:
|
| 155 |
+
(
|
| 156 |
+
)
|
| 157 |
+
x
|
| 158 |
+
f x
|
| 159 |
+
g x u
|
| 160 |
+
x
|
| 161 |
+
x
|
| 162 |
+
x
|
| 163 |
+
x
|
| 164 |
+
|
| 165 |
+
|
| 166 |
+
|
| 167 |
+
|
| 168 |
+
|
| 169 |
+
|
| 170 |
+
|
| 171 |
+
|
| 172 |
+
|
| 173 |
+
|
| 174 |
+
|
| 175 |
+
|
| 176 |
+
(1)
|
| 177 |
+
The vector
|
| 178 |
+
: (
|
| 179 |
+
,
|
| 180 |
+
)
|
| 181 |
+
T
|
| 182 |
+
T T
|
| 183 |
+
x
|
| 184 |
+
q q
|
| 185 |
+
|
| 186 |
+
consists of the vector of
|
| 187 |
+
generalized coordinates and their derivatives. is a map
|
| 188 |
+
to find the states of the system exactly after the collision,
|
| 189 |
+
and the positive and negative symbols indicate the states
|
| 190 |
+
of the system before and after the collision. The switch
|
| 191 |
+
condition is as follows:
|
| 192 |
+
|
| 193 |
+
|
| 194 |
+
2
|
| 195 |
+
2
|
| 196 |
+
( , )
|
| 197 |
+
|
|
| 198 |
+
( )
|
| 199 |
+
0,
|
| 200 |
+
( )
|
| 201 |
+
0
|
| 202 |
+
v
|
| 203 |
+
h
|
| 204 |
+
q q
|
| 205 |
+
x P q
|
| 206 |
+
P
|
| 207 |
+
q
|
| 208 |
+
|
| 209 |
+
|
| 210 |
+
|
| 211 |
+
|
| 212 |
+
(2)
|
| 213 |
+
In equation (2),
|
| 214 |
+
2
|
| 215 |
+
h
|
| 216 |
+
P represents the horizontal position
|
| 217 |
+
of the swing leg and
|
| 218 |
+
2
|
| 219 |
+
v
|
| 220 |
+
P represents its vertical position.
|
| 221 |
+
The dynamic equations of the robot before and after
|
| 222 |
+
the collision and in the single support phase can be
|
| 223 |
+
written as follows:
|
| 224 |
+
|
| 225 |
+
( )
|
| 226 |
+
( , )
|
| 227 |
+
( )
|
| 228 |
+
q
|
| 229 |
+
q q
|
| 230 |
+
q
|
| 231 |
+
q
|
| 232 |
+
M
|
| 233 |
+
q
|
| 234 |
+
C
|
| 235 |
+
q
|
| 236 |
+
G
|
| 237 |
+
B u
|
| 238 |
+
|
| 239 |
+
|
| 240 |
+
|
| 241 |
+
(3)
|
| 242 |
+
Matrix B is also a pre-multiplication matrix in the
|
| 243 |
+
torque vector and is not a square matrix due to the
|
| 244 |
+
under-actuation of the system.
|
| 245 |
+
In Equation 1, there is an expression called zero
|
| 246 |
+
dynamics, and it is easy to separate this term if the
|
| 247 |
+
generalized coordinates of the system are written in
|
| 248 |
+
relative terms (as has been done in this paper). The
|
| 249 |
+
satisfaction of this constraint is important in two ways.
|
| 250 |
+
First, if this constraint is not satisfied, the problem of
|
| 251 |
+
optimizing the input torques is practically ambiguous,
|
| 252 |
+
because these torques are not really applicable to the
|
| 253 |
+
problem. Although it may lead to a feasible kinematic
|
| 254 |
+
equation (kinematically possible), it is not feasible in
|
| 255 |
+
terms of control (open-loop), i.e. it is not dynamically
|
| 256 |
+
possible.
|
| 257 |
+
|
| 258 |
+
Optimization problem
|
| 259 |
+
The most important constraint of the problem, called
|
| 260 |
+
zero dynamics, was introduced in the previous section.
|
| 261 |
+
Other constraints in this issue are important to plan the
|
| 262 |
+
robot movement in the best way; the constraints of the
|
| 263 |
+
optimization problem are generally classified into two
|
| 264 |
+
general modes of constraints based on dynamics and
|
| 265 |
+
constraints based on kinematics.
|
| 266 |
+
|
| 267 |
+
1. Dynamic constraints:
|
| 268 |
+
Torque limit: because the torque generators have a
|
| 269 |
+
certain limit (inequality constraint).
|
| 270 |
+
Zero dynamic: the importance of which was
|
| 271 |
+
mentioned earlier (equality constraint).
|
| 272 |
+
Coefficient of friction limit: for the robot to move on
|
| 273 |
+
real environments, the ratio of horizontal force to
|
| 274 |
+
vertical force should not be more or less than a certain
|
| 275 |
+
limit. In other words, the coefficient of friction required
|
| 276 |
+
for stepping should not exceed a certain limit that can
|
| 277 |
+
not be implemented in real environments. (inequality
|
| 278 |
+
constraint).
|
| 279 |
+
2. Kinematic constraints:
|
| 280 |
+
Configuration: As an initial and final condition, the
|
| 281 |
+
robot needs to move from an initial configuration to a
|
| 282 |
+
final configuration. The best option is for the initial and
|
| 283 |
+
final state to be the same so that the robot has
|
| 284 |
+
periodicity in its movement and the best footprint is in
|
| 285 |
+
the middle of each stair Figure 2 (equality constraint).
|
| 286 |
+
|
| 287 |
+
height
|
| 288 |
+
width
|
| 289 |
+
clearance
|
| 290 |
+
best
|
| 291 |
+
footprint
|
| 292 |
+
r1
|
| 293 |
+
r2
|
| 294 |
+
|
| 295 |
+
Figure 2. Stair properties
|
| 296 |
+
|
| 297 |
+
Angular velocity limit: Because motors have limited
|
| 298 |
+
angular velocity production. (inequality constraint)
|
| 299 |
+
Contact in single support phase: The robot is in
|
| 300 |
+
contact with the ground during the single support phase
|
| 301 |
+
and the acceleration of the contact point in the
|
| 302 |
+
horizontal and vertical direction during this period is
|
| 303 |
+
zero. (equality constraint)
|
| 304 |
+
Swing leg collision: The robot swing leg during the
|
| 305 |
+
single-phase phase, except at the beginning and end of
|
| 306 |
+
the phase, should not collide with the ground, on the
|
| 307 |
+
other hand, should have a suitable distance to the
|
| 308 |
+
obstacles.
|
| 309 |
+
Knees movement limitation: To create maximum
|
| 310 |
+
similarity to human movement, the robot knee should
|
| 311 |
+
not be opened and closed too much.
|
| 312 |
+
Failure to satisfy any of the above constraints will cause
|
| 313 |
+
problems
|
| 314 |
+
in
|
| 315 |
+
creating
|
| 316 |
+
optimal
|
| 317 |
+
and
|
| 318 |
+
appropriate
|
| 319 |
+
movement.
|
| 320 |
+
|
| 321 |
+
Optimization method
|
| 322 |
+
This optimization is a nonlinear, constrained, and single-
|
| 323 |
+
objective problem.
|
| 324 |
+
Cost function: To find the optimal path, various cost
|
| 325 |
+
functions are considered, for example, the norm of
|
| 326 |
+
torque input, system input energy, and cost of transport
|
| 327 |
+
are common options. In this paper, we consider the
|
| 328 |
+
norm of torque inputs as the cost function. By this
|
| 329 |
+
choice, the torques are rational in size and will have
|
| 330 |
+
proper distribution (If the optimization problem is
|
| 331 |
+
solved properly).
|
| 332 |
+
4
|
| 333 |
+
2
|
| 334 |
+
0
|
| 335 |
+
0
|
| 336 |
+
(
|
| 337 |
+
( ))
|
| 338 |
+
T
|
| 339 |
+
i
|
| 340 |
+
i
|
| 341 |
+
J
|
| 342 |
+
u
|
| 343 |
+
d
|
| 344 |
+
|
| 345 |
+
|
| 346 |
+
|
| 347 |
+
|
| 348 |
+
|
| 349 |
+
|
| 350 |
+
(4)
|
| 351 |
+
In the above equation, T is the length of the time
|
| 352 |
+
period.
|
| 353 |
+
Selection of optimization variables: Optimization
|
| 354 |
+
variables can have different types, one of the best
|
| 355 |
+
choices
|
| 356 |
+
is
|
| 357 |
+
the
|
| 358 |
+
paths
|
| 359 |
+
followed
|
| 360 |
+
by
|
| 361 |
+
generalized
|
| 362 |
+
coordinates. Here our choice is a time-varying path as a
|
| 363 |
+
function of polynomials. The polynomial functions are
|
| 364 |
+
|
| 365 |
+
|
| 366 |
+
10 to 12 May, 2022
|
| 367 |
+
uniform and smooth, and they are also simple for
|
| 368 |
+
deriving.
|
| 369 |
+
4
|
| 370 |
+
,
|
| 371 |
+
0
|
| 372 |
+
( )
|
| 373 |
+
n
|
| 374 |
+
i
|
| 375 |
+
k
|
| 376 |
+
k i
|
| 377 |
+
i
|
| 378 |
+
q t
|
| 379 |
+
t
|
| 380 |
+
|
| 381 |
+
|
| 382 |
+
|
| 383 |
+
|
| 384 |
+
(5)
|
| 385 |
+
The degree of this polynomial must be chosen in
|
| 386 |
+
such a way that the number of optimization parameters,
|
| 387 |
+
which are the same as the number of polynomial
|
| 388 |
+
coefficients, are appropriate (minimum value to have a
|
| 389 |
+
smooth motion satisfied the mentioned constraints). In
|
| 390 |
+
this article, we choose the function of order 4 to have
|
| 391 |
+
freedom of action in terms of the optimization problem
|
| 392 |
+
and also not to make the number of optimization
|
| 393 |
+
parameters of the problem irrational and complicated.
|
| 394 |
+
Method of solving the optimization problem: This
|
| 395 |
+
optimization problem is solved by Variable Metric
|
| 396 |
+
methods for constrained optimization. This method is a
|
| 397 |
+
gradient-based method, which provides a desirable and
|
| 398 |
+
fast solution. Another advantage of this method is to not
|
| 399 |
+
get out easily from the feasible area [9].
|
| 400 |
+
|
| 401 |
+
Results and Discussion
|
| 402 |
+
Following the model and algorithm presented above, a
|
| 403 |
+
bipedal robot has been simulated to climb the stairs. The
|
| 404 |
+
height of the stairs is considered 20cm and the width of
|
| 405 |
+
the stairs is 40cm. The robot model specifications are in
|
| 406 |
+
accordance with Table 1. The initial and final angles of
|
| 407 |
+
the bipedal robot as a configuration are given in Table
|
| 408 |
+
2. Here the initial and final configurations are intuitively
|
| 409 |
+
obtained from the human configuration. The speed of
|
| 410 |
+
crossing each step is .5 seconds. The torque limit
|
| 411 |
+
applied to the system is 150 N.m and the maximum
|
| 412 |
+
angular velocity of the motors 10 rad/sec can be.
|
| 413 |
+
|
| 414 |
+
|
| 415 |
+
Table 1. Rabbit robot properties [10]
|
| 416 |
+
Symbol
|
| 417 |
+
Value
|
| 418 |
+
m1, m5
|
| 419 |
+
3.2 kg
|
| 420 |
+
m2, m4
|
| 421 |
+
6.8 kg
|
| 422 |
+
m3
|
| 423 |
+
20 kg
|
| 424 |
+
I1, I5
|
| 425 |
+
0.93 kg-m2
|
| 426 |
+
I2, I4
|
| 427 |
+
1.08 kg-m2
|
| 428 |
+
I3
|
| 429 |
+
2.22 kg-m2
|
| 430 |
+
l1, l5
|
| 431 |
+
0.4 m
|
| 432 |
+
l2, l4
|
| 433 |
+
0.4 m
|
| 434 |
+
l3
|
| 435 |
+
0.625 m
|
| 436 |
+
d1, d5
|
| 437 |
+
0.128 m
|
| 438 |
+
d2, d4
|
| 439 |
+
0.163 m
|
| 440 |
+
d3
|
| 441 |
+
0.2 m
|
| 442 |
+
|
| 443 |
+
|
| 444 |
+
|
| 445 |
+
Table 2. The initial and final configuration
|
| 446 |
+
Parameters
|
| 447 |
+
Initial value(rad)
|
| 448 |
+
Final value(rad)
|
| 449 |
+
q1
|
| 450 |
+
0.2618
|
| 451 |
+
0.1964
|
| 452 |
+
q2
|
| 453 |
+
1.3140
|
| 454 |
+
0
|
| 455 |
+
q3
|
| 456 |
+
-1.2267
|
| 457 |
+
0.0219
|
| 458 |
+
q4
|
| 459 |
+
-0.0219
|
| 460 |
+
1.2267
|
| 461 |
+
q5
|
| 462 |
+
0
|
| 463 |
+
1.3140
|
| 464 |
+
|
| 465 |
+
|
| 466 |
+
Figure 3. Input torques
|
| 467 |
+
|
| 468 |
+
According to Figure 3, the torques have a good
|
| 469 |
+
margin from the saturation and compared to other
|
| 470 |
+
articles and research reviewed in the introduction, more
|
| 471 |
+
optimal results have been obtained, also zero dynamics
|
| 472 |
+
(
|
| 473 |
+
v ) in a very good way is satisfied.
|
| 474 |
+
|
| 475 |
+
Figure 4. Friction coefficient
|
| 476 |
+
|
| 477 |
+
According to Figure 4, it is clear that the generated
|
| 478 |
+
path needs the maximum coefficient of friction .69 to
|
| 479 |
+
slip, so on all surfaces that have a coefficient of friction
|
| 480 |
+
higher than .69 there is the ability to move.
|
| 481 |
+
|
| 482 |
+
Figure 5. Angles vs. angular velocities
|
| 483 |
+
|
| 484 |
+
According to Figure 5, the generated paths, due to
|
| 485 |
+
the nature of the polynomial functions, have a smooth
|
| 486 |
+
|
| 487 |
+
|
| 488 |
+
10 to 12 May, 2022
|
| 489 |
+
and non-breaking behavior, and the angular velocities
|
| 490 |
+
are far from their saturation limit.
|
| 491 |
+
|
| 492 |
+
|
| 493 |
+
Figure 6. Stick diagram of the climbing a stair up
|
| 494 |
+
|
| 495 |
+
As can be seen in Figure 6, the robot's movement is
|
| 496 |
+
quite normal and very similar to human movement. The
|
| 497 |
+
trunk is kept in a good position and also the tip of the
|
| 498 |
+
feet and other links do not touch the surfaces except at
|
| 499 |
+
the beginning and at the end of the movement.
|
| 500 |
+
According to the sum of the presented results, the
|
| 501 |
+
generated path is an optimal path for the proper gait of
|
| 502 |
+
the under-actuated bipedal robot.
|
| 503 |
+
|
| 504 |
+
Conclusions
|
| 505 |
+
In this article, we present a method to generate optimal
|
| 506 |
+
motion for a bipedal robot, we used this method to find
|
| 507 |
+
the paths that the 'rabbit' robot by tracking them can
|
| 508 |
+
optimally climb stairs. This process consists of 3 parts:
|
| 509 |
+
robot dynamic extraction (because optimization is based
|
| 510 |
+
on the model), design of constraints based on dynamics
|
| 511 |
+
and kinematics, and optimization. As a result of the
|
| 512 |
+
problem, a series of virtual holonomic paths were
|
| 513 |
+
extracted in which the zero hybrid dynamics of the
|
| 514 |
+
problem is also satisfied, so tracking the paths are
|
| 515 |
+
possible for under-actuated robots.
|
| 516 |
+
In the future, we plan to use a new method called impact
|
| 517 |
+
invariance to design the above path, which guarantees
|
| 518 |
+
the periodicity of the proposed paths.
|
| 519 |
+
|
| 520 |
+
|
| 521 |
+
References
|
| 522 |
+
|
| 523 |
+
[1] Goldfarb, Nathaniel, Charles Bales, and Gregory S.
|
| 524 |
+
Fischer. "Toward Generalization of Bipedal Gait
|
| 525 |
+
Cycle During Stair Climbing Using Learning From
|
| 526 |
+
Demonstration." IEEE Transactions on Medical
|
| 527 |
+
Robotics and Bionics 3.2 (2021): 446-454.
|
| 528 |
+
[2] Kweon Soo Jeon, Ohung Kwon, Jong Hyeon Park.
|
| 529 |
+
Optimal trajectory generation for a biped robot
|
| 530 |
+
walking
|
| 531 |
+
a
|
| 532 |
+
staircase
|
| 533 |
+
based
|
| 534 |
+
on
|
| 535 |
+
genetic
|
| 536 |
+
algorithms[C]//Proceedings
|
| 537 |
+
of
|
| 538 |
+
2004
|
| 539 |
+
IEEE/RSJ
|
| 540 |
+
International Conference on Intelligent Robots and
|
| 541 |
+
Systems, Sendai, Japan: IEEE, 2004: 2837- 2842.
|
| 542 |
+
[3] Cebe, Oguzhan, et al. "Online dynamic trajectory
|
| 543 |
+
optimization and control for a quadruped robot."
|
| 544 |
+
2021 IEEE International Conference on Robotics
|
| 545 |
+
and Automation (ICRA). IEEE, 2021.
|
| 546 |
+
[4] Kim, Eun-Su, Jo-Hwan Kim, and Jong-Wook Kim.
|
| 547 |
+
"Generation of optimal trajectories for ascending
|
| 548 |
+
and descending a stair of a humanoid based on
|
| 549 |
+
uDEAS." 2009 IEEE International Conference on
|
| 550 |
+
Fuzzy Systems. IEEE, 2009.
|
| 551 |
+
[5] Sugahara, Yusuke, et al. "Walking up and down
|
| 552 |
+
stairs carrying a human by a biped locomotor with
|
| 553 |
+
parallel mechanism." 2005 IEEE/RSJ International
|
| 554 |
+
Conference on Intelligent Robots and Systems.
|
| 555 |
+
IEEE, 2005.
|
| 556 |
+
[6] Zhang, Qin, et al. "Action generation of a biped
|
| 557 |
+
robot climbing stairs." 2013 IEEE International
|
| 558 |
+
Conference on Mechatronics and Automation.
|
| 559 |
+
IEEE, 2013.
|
| 560 |
+
[7] Kim, E., T. Kim, and J-W. Kim. "Three-dimensional
|
| 561 |
+
modelling of a humanoid in three planes and a
|
| 562 |
+
motion scheme of biped turning in standing." IET
|
| 563 |
+
control theory & applications 3.9 (2009): 1155-
|
| 564 |
+
1166.
|
| 565 |
+
[8] Powell, Matthew J., Huihua Zhao, and Aaron D.
|
| 566 |
+
Ames. "Motion primitives for human-inspired
|
| 567 |
+
bipedal robotic locomotion: walking and stair
|
| 568 |
+
climbing." 2012 IEEE International Conference on
|
| 569 |
+
Robotics and Automation. IEEE, 2012.Misc, A.,
|
| 570 |
+
2003. Miscellaneous Title. On the WWW, May.
|
| 571 |
+
URL http://www.abc.edu.
|
| 572 |
+
[9] Powell, Michael JD. "A fast algorithm for
|
| 573 |
+
nonlinearly constrained optimization calculations."
|
| 574 |
+
Numerical analysis. Springer, Berlin, Heidelberg,
|
| 575 |
+
1978. 144-157..
|
| 576 |
+
[10] Chevallereau, Christine, et al. "Rabbit: A testbed for
|
| 577 |
+
advanced control theory." IEEE Control Systems
|
| 578 |
+
Magazine 23.5 (2003): 57-79.
|
| 579 |
+
|
| 580 |
+
|
| 581 |
+
|
| 582 |
+
|
| 583 |
+
|
| 584 |
+
|
| 585 |
+
|
| 586 |
+
|
| 587 |
+
|
| 588 |
+
2
|
| 589 |
+
1.5
|
| 590 |
+
0.5
|
| 591 |
+
-0.5
|
| 592 |
+
-0.5
|
| 593 |
+
0
|
| 594 |
+
0.5
|
| 595 |
+
1
|
| 596 |
+
1.5
|
| 597 |
+
2
|
BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,187 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf,len=186
|
| 2 |
+
page_content='s er ne ngi E al ci han c e M of Iranian Society of ce en er f Con al on i nat nter I ual n An th 30 The 10 to 12 May, 2022, Tehran, Iran.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 3 |
+
page_content=' ISME2022-IC1332 10 to 12 May, 2022 Optimal Motion Generation of the Bipedal Under-Actuated Planar Robot for Stair Climbing Aref Amiri 1, Hassan Salarieh 2 1Graduate Student, Sharif University of Technology, Tehran;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 4 |
+
page_content=' aref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 5 |
+
page_content='amiri@mech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 6 |
+
page_content='sharif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 7 |
+
page_content='edu 2Professor, Sharif University of Technology, Tehran;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 8 |
+
page_content=' salarieh@sharif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 9 |
+
page_content="edu Abstract The importance of humanoid robots in today's world is undeniable, one of the most important features of humanoid robots is the ability to maneuver in environments such as stairs that other robots can not easily cross." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 10 |
+
page_content=' A suitable algorithm to generate the path for the bipedal robot to climb is very important.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 11 |
+
page_content=' In this paper, an optimization-based method to generate an optimal stairway for under-actuated bipedal robots without an ankle actuator is presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 12 |
+
page_content=' The generated paths are based on zero and non-zero dynamics of the problem, and according to the satisfaction of the zero dynamics constraint in the problem, tracking the path is possible, in other words, the problem can be dynamically feasible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 13 |
+
page_content=' The optimization method used in the problem is a gradient-based method that has a suitable number of function evaluations for computational processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 14 |
+
page_content=' This method can also be utilized to go down the stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 15 |
+
page_content=' Keywords: Bipedal robot, under-actuated, optimization, motion planning Introduction Inspired by human body physics, bipedal robots have many degrees of freedom and can perform various actions with their joint movements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 16 |
+
page_content=' Bipedal robots can adapt to different environments that other wheeled robots are unable to move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 17 |
+
page_content=' The study of path (trajectory) generation methods as a reference for the output of the control problem of bipedal robots in this regard is essential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 18 |
+
page_content=' For the bipedal robot to climb the stairs, it is necessary to analyze the movement of them ascending the stairs and to examine the method of planning the bipedal robot to move and to determine the position of feet for walking on the stairs [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 19 |
+
page_content=' So far, researches have been done on how to go up and downstairs and find a suitable or optimal path for bipedal robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 20 |
+
page_content=' Various papers using optimization algorithms and considering the robot angles as polynomial functions tried to design an optimal path for a 6-degree bipedal robot [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 21 |
+
page_content=' Some articles have even paths planned for multi-legged robots to cross the stairs [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 22 |
+
page_content=' Some articles also used stability criteria such as ZMP in designing their paths [4-7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 23 |
+
page_content=' But this method is only appliable for robots that have feet (soles) with ankle joint actuators, which often have much lower speed in maneuvering than under-actuated robots without feet, and of course, due to the relatively large feet have more wasted energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 24 |
+
page_content=' Some articles also derive their initial path using data based on motion capturing and then try to optimize their results by combining optimization methods [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 25 |
+
page_content=' However, according to the existing literature, few articles have attempted to design a holonomic path for under-actuated bipedal robots without feet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 26 |
+
page_content=' Due to the importance of optimal motion planning, a lot of work has been done in recent years in this area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 27 |
+
page_content=' In this paper, the problem of motion planning is investigated to find the optimal paths for under-actuated bipedal robots to step on the stairs, the results obtained as a control output will cause the robot to move properly and optimally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 28 |
+
page_content=' This article consists of three sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 29 |
+
page_content=' In the first part, the dynamic model of the bipedal robot is derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 30 |
+
page_content=' In the second part, the constraints of the optimization problem are examined, in the third part, the cost function and method of optimal problem solving and finding a suitable movement gate are examined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 31 |
+
page_content=' In the fourth section, the results are presented and discussed, and at the end, the research of this article is summarized as the conclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 32 |
+
page_content=' Dynamics equation The dynamic model of the robot is shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 33 |
+
page_content=' The robot has 7 degrees of freedom and 5 links, each leg has two joints (one in the knee and the other in the hip) and 3 degrees of freedom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 34 |
+
page_content=' We assume that the contact of the tip of the leg is the point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 35 |
+
page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 36 |
+
page_content=' Planar bipedal robot 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 37 |
+
page_content="2 10 to 12 May, 2022 The robot's motion is planar and the robot has 4 actuators, two actuators at the knees and two actuators at the junction of the hip and the trunk so that there is one actuator between each leg and trunk." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 38 |
+
page_content=' It is assumed that by hitting the tip of the swing leg on the ground, the other leg rises from the ground, in other words, the robot has no double support phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 39 |
+
page_content=' So, when moving on the stairs, no time is wasted for placing both feet on the ground.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 40 |
+
page_content=' Therefore, the hybrid dynamic equations of a robot are a combination of a single support phase and collision phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 41 |
+
page_content=' The equations of the hybrid model are as follows: ( ) ( ) : ( ) x f x g x u x x x x \uf02d \uf02b \uf02d \uf02d \uf0ec \uf03d \uf02b \uf0cf\uf047 \uf0ef \uf053 \uf0ed \uf03d \uf044 \uf0ce\uf047 \uf0ef\uf0ee (1) The vector : ( , ) T T T x q q \uf03d consists of the vector of generalized coordinates and their derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 42 |
+
page_content=' \uf044 is a map to find the states of the system exactly after the collision, and the positive and negative symbols indicate the states of the system before and after the collision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 43 |
+
page_content=' The switch condition is as follows: \uf07b \uf07d 2 2 ( , ) | ( ) 0, ( ) 0 v h q q x P q P q \uf047 \uf03d \uf0ce \uf03d \uf03e (2) In equation (2), 2 h P represents the horizontal position of the swing leg and 2 v P represents its vertical position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 44 |
+
page_content=' The dynamic equations of the robot before and after the collision and in the single support phase can be written as follows: \uf028 \uf029 ( ) ( , ) ( ) q q q q q M q C q G B u \uf02b \uf02b \uf03d (3) Matrix B is also a pre-multiplication matrix in the torque vector and is not a square matrix due to the under-actuation of the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 45 |
+
page_content=' In Equation 1, there is an expression called zero dynamics, and it is easy to separate this term if the generalized coordinates of the system are written in relative terms (as has been done in this paper).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 46 |
+
page_content=' The satisfaction of this constraint is important in two ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 47 |
+
page_content=' First, if this constraint is not satisfied, the problem of optimizing the input torques is practically ambiguous, because these torques are not really applicable to the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 48 |
+
page_content=' Although it may lead to a feasible kinematic equation (kinematically possible), it is not feasible in terms of control (open-loop), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 49 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 50 |
+
page_content=' it is not dynamically possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 51 |
+
page_content=' Optimization problem The most important constraint of the problem, called zero dynamics, was introduced in the previous section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 52 |
+
page_content=' Other constraints in this issue are important to plan the robot movement in the best way;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 53 |
+
page_content=' the constraints of the optimization problem are generally classified into two general modes of constraints based on dynamics and constraints based on kinematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 54 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 55 |
+
page_content=' Dynamic constraints: Torque limit: because the torque generators have a certain limit (inequality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 56 |
+
page_content=' Zero dynamic: the importance of which was mentioned earlier (equality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 57 |
+
page_content=' Coefficient of friction limit: for the robot to move on real environments, the ratio of horizontal force to vertical force should not be more or less than a certain limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 58 |
+
page_content=' In other words, the coefficient of friction required for stepping should not exceed a certain limit that can not be implemented in real environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 59 |
+
page_content=' (inequality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 60 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 61 |
+
page_content=' Kinematic constraints: Configuration: As an initial and final condition, the robot needs to move from an initial configuration to a final configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 62 |
+
page_content=' The best option is for the initial and final state to be the same so that the robot has periodicity in its movement and the best footprint is in the middle of each stair Figure 2 (equality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 63 |
+
page_content=' height width clearance best footprint r1 r2 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 64 |
+
page_content=' Stair properties Angular velocity limit: Because motors have limited angular velocity production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 65 |
+
page_content=' (inequality constraint) Contact in single support phase: The robot is in contact with the ground during the single support phase and the acceleration of the contact point in the horizontal and vertical direction during this period is zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 66 |
+
page_content=' (equality constraint) Swing leg collision: The robot swing leg during the single-phase phase, except at the beginning and end of the phase, should not collide with the ground, on the other hand, should have a suitable distance to the obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 67 |
+
page_content=' Knees movement limitation: To create maximum similarity to human movement, the robot knee should not be opened and closed too much.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 68 |
+
page_content=' Failure to satisfy any of the above constraints will cause problems in creating optimal and appropriate movement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 69 |
+
page_content=' Optimization method This optimization is a nonlinear, constrained, and single- objective problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 70 |
+
page_content=' Cost function: To find the optimal path, various cost functions are considered, for example, the norm of torque input, system input energy, and cost of transport are common options.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 71 |
+
page_content=' In this paper, we consider the norm of torque inputs as the cost function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 72 |
+
page_content=' By this choice, the torques are rational in size and will have proper distribution (If the optimization problem is solved properly).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 73 |
+
page_content=' 4 2 0 0 ( ( )) T i i J u d \uf074 \uf074 \uf03d \uf03d \uf0e5 \uf0f2 (4) In the above equation, T is the length of the time period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 74 |
+
page_content=' Selection of optimization variables: Optimization variables can have different types, one of the best choices is the paths followed by generalized coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 75 |
+
page_content=' Here our choice is a time-varying path as a function of polynomials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 76 |
+
page_content=' The polynomial functions are 10 to 12 May, 2022 uniform and smooth, and they are also simple for deriving.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 77 |
+
page_content=' 4 , 0 ( ) n i k k i i q t t \uf061 \uf03d \uf03d \uf03d\uf0e5 (5) The degree of this polynomial must be chosen in such a way that the number of optimization parameters, which are the same as the number of polynomial coefficients, are appropriate (minimum value to have a smooth motion satisfied the mentioned constraints).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 78 |
+
page_content=' In this article, we choose the function of order 4 to have freedom of action in terms of the optimization problem and also not to make the number of optimization parameters of the problem irrational and complicated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 79 |
+
page_content=' Method of solving the optimization problem: This optimization problem is solved by Variable Metric methods for constrained optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 80 |
+
page_content=' This method is a gradient-based method, which provides a desirable and fast solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 81 |
+
page_content=' Another advantage of this method is to not get out easily from the feasible area [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 82 |
+
page_content=' Results and Discussion Following the model and algorithm presented above, a bipedal robot has been simulated to climb the stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 83 |
+
page_content=' The height of the stairs is considered 20cm and the width of the stairs is 40cm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 84 |
+
page_content=' The robot model specifications are in accordance with Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 85 |
+
page_content=' The initial and final angles of the bipedal robot as a configuration are given in Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 86 |
+
page_content=' Here the initial and final configurations are intuitively obtained from the human configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 87 |
+
page_content=' The speed of crossing each step is .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 88 |
+
page_content='5 seconds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 89 |
+
page_content=' The torque limit applied to the system is 150 N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 90 |
+
page_content='m and the maximum angular velocity of the motors 10 rad/sec can be.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 91 |
+
page_content=' Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 92 |
+
page_content=' Rabbit robot properties [10] Symbol Value m1, m5 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 93 |
+
page_content='2 kg m2, m4 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 94 |
+
page_content='8 kg m3 20 kg I1, I5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 95 |
+
page_content='93 kg-m2 I2, I4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 96 |
+
page_content='08 kg-m2 I3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 97 |
+
page_content='22 kg-m2 l1, l5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 98 |
+
page_content='4 m l2, l4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 99 |
+
page_content='4 m l3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 100 |
+
page_content='625 m d1, d5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 101 |
+
page_content='128 m d2, d4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 102 |
+
page_content='163 m d3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 103 |
+
page_content='2 m Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 104 |
+
page_content=' The initial and final configuration Parameters Initial value(rad) Final value(rad) q1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 105 |
+
page_content='2618 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 106 |
+
page_content='1964 q2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 107 |
+
page_content='3140 0 q3 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 108 |
+
page_content='2267 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 109 |
+
page_content='0219 q4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 110 |
+
page_content='0219 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 111 |
+
page_content='2267 q5 0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 112 |
+
page_content='3140 Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 113 |
+
page_content=' Input torques According to Figure 3, the torques have a good margin from the saturation and compared to other articles and research reviewed in the introduction, more optimal results have been obtained, also zero dynamics ( v\uf074 ) in a very good way is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 114 |
+
page_content=' Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 115 |
+
page_content=' Friction coefficient According to Figure 4, it is clear that the generated path needs the maximum coefficient of friction .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 116 |
+
page_content='69 to slip, so on all surfaces that have a coefficient of friction higher than .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 117 |
+
page_content='69 there is the ability to move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 118 |
+
page_content=' Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 119 |
+
page_content=' Angles vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 120 |
+
page_content=' angular velocities According to Figure 5, the generated paths, due to the nature of the polynomial functions, have a smooth 10 to 12 May, 2022 and non-breaking behavior, and the angular velocities are far from their saturation limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 121 |
+
page_content=' Figure 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 122 |
+
page_content=" Stick diagram of the climbing a stair up As can be seen in Figure 6, the robot's movement is quite normal and very similar to human movement." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 123 |
+
page_content=' The trunk is kept in a good position and also the tip of the feet and other links do not touch the surfaces except at the beginning and at the end of the movement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 124 |
+
page_content=' According to the sum of the presented results, the generated path is an optimal path for the proper gait of the under-actuated bipedal robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 125 |
+
page_content=" Conclusions In this article, we present a method to generate optimal motion for a bipedal robot, we used this method to find the paths that the 'rabbit' robot by tracking them can optimally climb stairs." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 126 |
+
page_content=' This process consists of 3 parts: robot dynamic extraction (because optimization is based on the model), design of constraints based on dynamics and kinematics, and optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 127 |
+
page_content=' As a result of the problem, a series of virtual holonomic paths were extracted in which the zero hybrid dynamics of the problem is also satisfied, so tracking the paths are possible for under-actuated robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 128 |
+
page_content=' In the future, we plan to use a new method called impact invariance to design the above path, which guarantees the periodicity of the proposed paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 129 |
+
page_content=' References [1] Goldfarb, Nathaniel, Charles Bales, and Gregory S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 130 |
+
page_content=' Fischer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 131 |
+
page_content=' "Toward Generalization of Bipedal Gait Cycle During Stair Climbing Using Learning From Demonstration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 132 |
+
page_content='" IEEE Transactions on Medical Robotics and Bionics 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 133 |
+
page_content='2 (2021): 446-454.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 134 |
+
page_content=' [2] Kweon Soo Jeon, Ohung Kwon, Jong Hyeon Park.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 135 |
+
page_content=' Optimal trajectory generation for a biped robot walking a staircase based on genetic algorithms[C]//Proceedings of 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan: IEEE, 2004: 2837- 2842.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 136 |
+
page_content=' [3] Cebe, Oguzhan, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 137 |
+
page_content=' "Online dynamic trajectory optimization and control for a quadruped robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 138 |
+
page_content='" 2021 IEEE International Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 139 |
+
page_content=' IEEE, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 140 |
+
page_content=' [4] Kim, Eun-Su, Jo-Hwan Kim, and Jong-Wook Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 141 |
+
page_content=' "Generation of optimal trajectories for ascending and descending a stair of a humanoid based on uDEAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 142 |
+
page_content='" 2009 IEEE International Conference on Fuzzy Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 143 |
+
page_content=' IEEE, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 144 |
+
page_content=' [5] Sugahara, Yusuke, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 145 |
+
page_content=' "Walking up and down stairs carrying a human by a biped locomotor with parallel mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 146 |
+
page_content='" 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 147 |
+
page_content=' IEEE, 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 148 |
+
page_content=' [6] Zhang, Qin, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 149 |
+
page_content=' "Action generation of a biped robot climbing stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 150 |
+
page_content='" 2013 IEEE International Conference on Mechatronics and Automation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 151 |
+
page_content=' IEEE, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 152 |
+
page_content=' [7] Kim, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 153 |
+
page_content=', T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 154 |
+
page_content=' Kim, and J-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 155 |
+
page_content=' Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 156 |
+
page_content=' "Three-dimensional modelling of a humanoid in three planes and a motion scheme of biped turning in standing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 157 |
+
page_content='" IET control theory & applications 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 158 |
+
page_content='9 (2009): 1155- 1166.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 159 |
+
page_content=' [8] Powell, Matthew J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 160 |
+
page_content=', Huihua Zhao, and Aaron D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 161 |
+
page_content=' Ames.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 162 |
+
page_content=' "Motion primitives for human-inspired bipedal robotic locomotion: walking and stair climbing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 163 |
+
page_content='" 2012 IEEE International Conference on Robotics and Automation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 164 |
+
page_content=' IEEE, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 165 |
+
page_content='Misc, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 166 |
+
page_content=', 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 167 |
+
page_content=' Miscellaneous Title.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 168 |
+
page_content=' On the WWW, May.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 169 |
+
page_content=' URL http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 170 |
+
page_content='abc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 171 |
+
page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 172 |
+
page_content=' [9] Powell, Michael JD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 173 |
+
page_content=' "A fast algorithm for nonlinearly constrained optimization calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 174 |
+
page_content='" Numerical analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 175 |
+
page_content=' Springer, Berlin, Heidelberg, 1978.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 176 |
+
page_content=' 144-157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 177 |
+
page_content='. [10] Chevallereau, Christine, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 178 |
+
page_content=' "Rabbit: A testbed for advanced control theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 179 |
+
page_content='" IEEE Control Systems Magazine 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 180 |
+
page_content='5 (2003): 57-79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 181 |
+
page_content=' 2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 182 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 183 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 184 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 185 |
+
page_content='5 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 186 |
+
page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
| 187 |
+
page_content='5 2' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
|
DtE4T4oBgHgl3EQf6Q5X/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:cf0d72c9bccb4522409c7786e281982bd48758a4e9b8d380d8450d0a67dcd820
|
| 3 |
+
size 98708
|
GNE0T4oBgHgl3EQfRQAC/content/tmp_files/2301.02203v1.pdf.txt
ADDED
|
@@ -0,0 +1,1210 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.02203v1 [math.CO] 5 Jan 2023
|
| 2 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC
|
| 3 |
+
GROUP BY PRIME POWERS
|
| 4 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 5 |
+
In memory of Chandra Sekhar Raju
|
| 6 |
+
Abstract. Let k be a positive integer. We show that, as n goes to infinity, almost every
|
| 7 |
+
entry of the character table of Sn is divisible by k. This proves a conjecture of Miller.
|
| 8 |
+
1. Introduction
|
| 9 |
+
It is a standard fact that the irreducible characters of Sn take only integer values for every
|
| 10 |
+
natural number n. In 2017, Miller [11] computed the character tables of Sn for all n ≤ 38
|
| 11 |
+
and looked at various statistical properties of these integers as n grew. His computations
|
| 12 |
+
suggested that
|
| 13 |
+
(1) the density of even entries seemed to tend to 1,
|
| 14 |
+
(2) the density of entries divisible by 3, the density of entries divisible by 5, and the
|
| 15 |
+
density of entries divisible by 7 seemed to increase as n grew,
|
| 16 |
+
(3) about half of the nonzero entries were positive,
|
| 17 |
+
(4) and the density of zeros in the character table seemed to decrease as n grew, but not
|
| 18 |
+
very quickly.
|
| 19 |
+
Based on this first observation, Miller [11, 13] conjectured that as n goes to infinity, almost
|
| 20 |
+
every entry of the character table of the symmetric group Sn is even.
|
| 21 |
+
Following partial
|
| 22 |
+
progress due to McKay [10], Gluck [5], and Morotti [14], the first author proved this conjec-
|
| 23 |
+
ture in [15]. Based on the second observation, Miller [11, 13] also conjectured, more generally,
|
| 24 |
+
that for any fixed prime p, almost every entry of the character table of Sn is a multiple of
|
| 25 |
+
p as n goes to infinity. We proved this conjecture in [16], with a uniform upper bound for
|
| 26 |
+
the number of entries not divisible by a fixed prime. Recently, Miller [12] conjectured, even
|
| 27 |
+
more generally, that for any fixed prime power q, almost every entry of the character table
|
| 28 |
+
of Sn is a multiple of q as n goes to infinity. In this paper, we prove this most general of
|
| 29 |
+
Miller’s conjectures.
|
| 30 |
+
Theorem 1.1. Let n be large and q ≤ 10−3 log n/(log log n)2 be a prime power. The number
|
| 31 |
+
of entries in the character table of Sn that are not divisible by q is at most
|
| 32 |
+
O
|
| 33 |
+
�
|
| 34 |
+
p(n)2 exp(−(log log n)2)
|
| 35 |
+
�
|
| 36 |
+
.
|
| 37 |
+
It follows immediately from Theorem 1.1 and the union bound that almost every entry of
|
| 38 |
+
the character table of Sn is divisible by any fixed integer as n goes to infinity.
|
| 39 |
+
Corollary 1.2. Let k be any positive integer. Then, as n goes to infinity, the proportion of
|
| 40 |
+
entries in the character table of Sn that are not divisible by k tends to 0.
|
| 41 |
+
Our methods do not seem to shed any light on Miller’s third and fourth observations.
|
| 42 |
+
Most interesting to us is the question of what proportion of character table entries are zero,
|
| 43 |
+
1
|
| 44 |
+
|
| 45 |
+
2
|
| 46 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 47 |
+
and it is not clear from Miller’s data whether the proportion is decreasing to zero or some
|
| 48 |
+
positive constant. Combining the Murnaghan–Nakayama rule and an old result of Erd˝os
|
| 49 |
+
and Lehner [2] on the distribution of the largest part of a uniformly random partition of n
|
| 50 |
+
produces a proportion of
|
| 51 |
+
1
|
| 52 |
+
log n zeros in the character table of Sn, and it appears that no lower
|
| 53 |
+
bound of a larger order of magnitude is known. In the related setting of finite simple groups
|
| 54 |
+
of Lie type, Larsen and Miller [7] have shown that almost every character table entry is zero
|
| 55 |
+
as the rank goes to infinity.
|
| 56 |
+
Acknowledgments.
|
| 57 |
+
The first author is partially supported by the NSF Mathematical
|
| 58 |
+
Sciences Postdoctoral Research Fellowship Program under Grant No. DMS-1903038 and by
|
| 59 |
+
the Oswald Veblen Fund. The second author is partially supported by a grant from the
|
| 60 |
+
National Science Foundation, and a Simons Investigator Grant from the Simons Foundation.
|
| 61 |
+
We thank David Speyer for drawing our attention to Lemma 2.1.
|
| 62 |
+
2. Proof outline
|
| 63 |
+
For any partitions λ and µ of n, let χλ
|
| 64 |
+
µ denote the value of the irreducible character of
|
| 65 |
+
Sn corresponding to λ on the conjugacy class of elements with cycle type corresponding to
|
| 66 |
+
µ. In [16], our argument proceeded by combining two key facts: (i) if µ contains a part
|
| 67 |
+
substantially larger than the typical largest part of a random partition, then χλ
|
| 68 |
+
µ = 0 for
|
| 69 |
+
almost every λ, and (ii) if ν is another partition of n that is obtained from µ by combining
|
| 70 |
+
p parts of the same size m into one part of size pm, then χλ
|
| 71 |
+
µ ≡ χλ
|
| 72 |
+
ν (mod p) for every λ.
|
| 73 |
+
We showed that, for almost every µ, repeatedly combining p parts of the same size in this
|
| 74 |
+
manner produces a partition �µ containing a very large part, large enough so that χλ
|
| 75 |
+
�µ must
|
| 76 |
+
be zero for almost every λ. Our main result on the divisibility of character values by primes
|
| 77 |
+
then followed from the fact that χλ
|
| 78 |
+
µ ≡ χλ
|
| 79 |
+
�µ (mod p) for every λ.
|
| 80 |
+
The second key fact generalizes to a congruence of character value modulo prime powers
|
| 81 |
+
in a straightforward manner.
|
| 82 |
+
Lemma 2.1. Let pr be a power of the prime p. Suppose that µ is a partition of n, and that
|
| 83 |
+
ν is another partition of n obtained from µ by replacing pr parts of the same size m by pr−1
|
| 84 |
+
parts of size pm. Then for all partitions λ of n, we have
|
| 85 |
+
χλ
|
| 86 |
+
µ ≡ χλ
|
| 87 |
+
ν
|
| 88 |
+
(mod pr).
|
| 89 |
+
However, when r > 1, it is no longer the case that starting from a typical partition µ of n
|
| 90 |
+
and repeatedly combining pr parts of the same size m into pr−1 parts of size pm produces a
|
| 91 |
+
partition �µ containing a part substantially larger than the largest part of a typical partition
|
| 92 |
+
of n. The argument from [16] that worked for primes thus breaks down for all other prime
|
| 93 |
+
powers.
|
| 94 |
+
The key idea used to overcome this barrier is a new condition for character values of the
|
| 95 |
+
symmetric group to be divisible by a fixed prime power, which we prove by exploiting certain
|
| 96 |
+
symmetries that appear after applying the Murnaghan–Nakayama rule multiple times.
|
| 97 |
+
Theorem 2.2. Let n, m1, . . . , mr be distinct positive integers. Let µ be a partition of n
|
| 98 |
+
containing parts of size m1, . . . , mr, each appearing at least pr−1 times. If λ is a (�r
|
| 99 |
+
i=1 kimi)-
|
| 100 |
+
core partition of n for all r-tuples (k1, . . . , kr) of integers 0 ≤ k1, . . . , kr ≤ pr−1 for which
|
| 101 |
+
some ki = pr−1, then
|
| 102 |
+
pr | χλ
|
| 103 |
+
µ.
|
| 104 |
+
|
| 105 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 106 |
+
3
|
| 107 |
+
Starting with a partition µ of n, repeatedly combine pr parts of the same size m into pr−1
|
| 108 |
+
parts of size pm, until the process terminates in a partition �µ where no part appears more
|
| 109 |
+
than pr − 1 times. As a preliminary to applying Theorem 2.2 we show that for a typical
|
| 110 |
+
partition µ, the resulting partition �µ will have r parts that are suitably large, and with each
|
| 111 |
+
appearing at least pr−1 times.
|
| 112 |
+
Proposition 2.3. Starting with a partition µ of n, repeatedly replace every occurrence of pr
|
| 113 |
+
parts of the same size m by pr−1 parts of size pm until we arrive at a partition ˜µ where no
|
| 114 |
+
part appears more than pr − 1 times. Then, except for
|
| 115 |
+
O
|
| 116 |
+
�
|
| 117 |
+
p(n) exp
|
| 118 |
+
�
|
| 119 |
+
−n1/20pr��
|
| 120 |
+
initial partitions µ, the partition �µ contains at least r distinct parts m1, . . . , mr, each appear-
|
| 121 |
+
ing at least pr−1 times and satisfying
|
| 122 |
+
pr−1mj >
|
| 123 |
+
�
|
| 124 |
+
1 + 1
|
| 125 |
+
6pr
|
| 126 |
+
�√
|
| 127 |
+
6
|
| 128 |
+
2π
|
| 129 |
+
√n log n.
|
| 130 |
+
This holds uniformly for pr ≤ 10−3 log n/(log log n)2.
|
| 131 |
+
The significance of the lower bound on pr−1mj in Proposition 2.3 is that it lies beyond the
|
| 132 |
+
threshold of values t such that almost every partition of n is a t-core.
|
| 133 |
+
Lemma 2.4. Let 1 ≤ L ≤ log n/ log log n be a real number. Then, for any given integer t
|
| 134 |
+
with
|
| 135 |
+
t ≥
|
| 136 |
+
�
|
| 137 |
+
1 + 1
|
| 138 |
+
L
|
| 139 |
+
�√
|
| 140 |
+
6
|
| 141 |
+
2π
|
| 142 |
+
√n log n,
|
| 143 |
+
all but
|
| 144 |
+
O
|
| 145 |
+
�
|
| 146 |
+
p(n) log n
|
| 147 |
+
n1/2L
|
| 148 |
+
�
|
| 149 |
+
partitions of n are t-cores.
|
| 150 |
+
We can swiftly deduce our main result, Theorem 1.1, from the results stated above.
|
| 151 |
+
Deducing Theorem 1.1. Let µ be a partition of n, and suppose that �µ is as in Proposition 2.3.
|
| 152 |
+
Then, for all but at most
|
| 153 |
+
O
|
| 154 |
+
�
|
| 155 |
+
p(n) exp
|
| 156 |
+
�
|
| 157 |
+
−n1/20pr��
|
| 158 |
+
choices of µ, the partition �µ contains at least r distinct parts m1, . . . , mr, each appearing at
|
| 159 |
+
least pr−1 times and satisfying
|
| 160 |
+
(2.1)
|
| 161 |
+
pr−1mj >
|
| 162 |
+
�
|
| 163 |
+
1 + 1
|
| 164 |
+
6pr
|
| 165 |
+
�√
|
| 166 |
+
6
|
| 167 |
+
2π
|
| 168 |
+
√n log n.
|
| 169 |
+
Consider any r-tuple (k1, . . . , kr) with 0 ≤ k1, . . . , kr ≤ pr−1 and ki = pr−1 for some i.
|
| 170 |
+
Then k1m1 + . . . + krmr also exceeds the bound in (2.1), so that by Lemma 2.4 all but
|
| 171 |
+
O(p(n)(log n)/n
|
| 172 |
+
1
|
| 173 |
+
2L) partitions λ of n are (k1m1 + . . . + krmr)-cores. Since there are at most
|
| 174 |
+
r(pr−1 + 1)r−1 such r-tuples (k1, . . . , kr), by the union bound we see that all but at most
|
| 175 |
+
O
|
| 176 |
+
�
|
| 177 |
+
p(n) log n
|
| 178 |
+
n1/12pr r
|
| 179 |
+
�
|
| 180 |
+
pr−1 + 1
|
| 181 |
+
�r−1
|
| 182 |
+
�
|
| 183 |
+
partitions λ of n are (k1m1 + . . . + krmr)-cores for all choices of the r-tuple (k1, . . . , kr).
|
| 184 |
+
|
| 185 |
+
4
|
| 186 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 187 |
+
Theorem 2.2 now shows that pr divides χλ
|
| 188 |
+
�µ, and since χλ
|
| 189 |
+
µ ≡ χλ
|
| 190 |
+
�µ (mod pr) by Lemma 2.1, it
|
| 191 |
+
also follows that pr divides χλ
|
| 192 |
+
µ. Putting everything together, we conclude that the number
|
| 193 |
+
of partitions λ and µ with pr ∤ χλ
|
| 194 |
+
µ is at most
|
| 195 |
+
O
|
| 196 |
+
�
|
| 197 |
+
p(n)2�
|
| 198 |
+
exp(−n1/(20pr)) +
|
| 199 |
+
1
|
| 200 |
+
n1/13pr r
|
| 201 |
+
�
|
| 202 |
+
pr−1 + 1
|
| 203 |
+
�r−1 ��
|
| 204 |
+
= O
|
| 205 |
+
�
|
| 206 |
+
p(n)2 exp(−(log log n)2)
|
| 207 |
+
�
|
| 208 |
+
,
|
| 209 |
+
in the range pr ≤ 10−3 log n/(log log n)2.
|
| 210 |
+
□
|
| 211 |
+
The rest of the paper is organized as follows.
|
| 212 |
+
We will prove Lemmas 2.1 and 2.4 in
|
| 213 |
+
Section 3, Theorem 2.2 in Sections 4, 5, 6, and 7, and Proposition 2.3 in Sections 8 and 9.
|
| 214 |
+
3. Proofs of Lemmas 2.1 and 2.4
|
| 215 |
+
We begin by proving the two lemmas stated in the previous section.
|
| 216 |
+
Proof of Lemma 2.1. We claim that if Q ∈ Z[x1, . . . , xk] is a polynomial with integer coeffi-
|
| 217 |
+
cients, then
|
| 218 |
+
Q(x1, . . . , xk)pr ≡ Q(xp
|
| 219 |
+
1, . . . , xp
|
| 220 |
+
k)pr−1
|
| 221 |
+
(mod pr).
|
| 222 |
+
As is well known, we may write
|
| 223 |
+
(3.1)
|
| 224 |
+
Q(x1, . . . , xk)p = Q(xp
|
| 225 |
+
1, . . . , xp
|
| 226 |
+
k) + p · R(x1, . . . , xk)
|
| 227 |
+
for some R ∈ Z[x1, . . . , xk], which establishes the claim when r = 1. For r > 1, raise both
|
| 228 |
+
sides of (3.1) to the power pr−1, and expand using the binomial theorem:
|
| 229 |
+
Q(x1, . . . , xk)pr = (Q(xp
|
| 230 |
+
1, . . . , xp
|
| 231 |
+
k) + p · R(x1, . . . , xk))pr−1
|
| 232 |
+
= Q(xp
|
| 233 |
+
1, . . . , xp
|
| 234 |
+
k)pr−1 +
|
| 235 |
+
pr−1
|
| 236 |
+
�
|
| 237 |
+
ℓ=1
|
| 238 |
+
�pr−1
|
| 239 |
+
ℓ
|
| 240 |
+
�
|
| 241 |
+
Q(xp
|
| 242 |
+
1, . . . , xp
|
| 243 |
+
k)pr−1−ℓ(pR(x1, . . . , xk))ℓ.
|
| 244 |
+
Note that for 1 ≤ ℓ ≤ pr−1
|
| 245 |
+
pℓ
|
| 246 |
+
�pr−1
|
| 247 |
+
ℓ
|
| 248 |
+
�
|
| 249 |
+
= pℓpr−1
|
| 250 |
+
ℓ
|
| 251 |
+
�pr−1 − 1
|
| 252 |
+
ℓ − 1
|
| 253 |
+
�
|
| 254 |
+
≡ 0
|
| 255 |
+
(mod pr),
|
| 256 |
+
since the power of p dividing ℓ is certainly at most ℓ − 1. This establishes our claim.
|
| 257 |
+
The lemma now follows by applying this observation to the polynomials appearing in
|
| 258 |
+
Frobenius’s formula for the character values χλ
|
| 259 |
+
µ and χλ
|
| 260 |
+
ν (see Chapter 4 of [4]).
|
| 261 |
+
□
|
| 262 |
+
Proof of Lemma 2.4. The proof is essentially identical to that of Proposition 1 of [16], but
|
| 263 |
+
we include the short argument for completeness. Since every partition of n is a t-core for
|
| 264 |
+
t > n, we may naturally assume that t ≤ n. From Lemma 5 of [14], we know that at most
|
| 265 |
+
(t + 1)p(n − t) partitions of n are not t-cores. By the asymptotic formula
|
| 266 |
+
p(m) ∼
|
| 267 |
+
1
|
| 268 |
+
4
|
| 269 |
+
√
|
| 270 |
+
3m exp
|
| 271 |
+
� 2π
|
| 272 |
+
√
|
| 273 |
+
6
|
| 274 |
+
√m
|
| 275 |
+
�
|
| 276 |
+
for the partition function, we have
|
| 277 |
+
(t + 1)p(n − t) ≪
|
| 278 |
+
t + 1
|
| 279 |
+
n − t + 1 exp
|
| 280 |
+
� 2π
|
| 281 |
+
√
|
| 282 |
+
6
|
| 283 |
+
√
|
| 284 |
+
n − t
|
| 285 |
+
�
|
| 286 |
+
≤
|
| 287 |
+
t + 1
|
| 288 |
+
n − t + 1 exp
|
| 289 |
+
� 2π
|
| 290 |
+
√
|
| 291 |
+
6
|
| 292 |
+
√n −
|
| 293 |
+
πt
|
| 294 |
+
√
|
| 295 |
+
6n
|
| 296 |
+
�
|
| 297 |
+
.
|
| 298 |
+
|
| 299 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 300 |
+
5
|
| 301 |
+
In the range n ≥ t ≥ (1 + 1/L)
|
| 302 |
+
√
|
| 303 |
+
6
|
| 304 |
+
2π
|
| 305 |
+
√n log n, the right-hand side above is maximized at the
|
| 306 |
+
lower endpoint t = (1 + 1/L)
|
| 307 |
+
√
|
| 308 |
+
6
|
| 309 |
+
2π
|
| 310 |
+
√n log n. It follows that the number of partitions of n that
|
| 311 |
+
are not t-cores is
|
| 312 |
+
≪ log n
|
| 313 |
+
√n n−(1+1/L)/2 exp
|
| 314 |
+
� 2π
|
| 315 |
+
√
|
| 316 |
+
6
|
| 317 |
+
√n
|
| 318 |
+
�
|
| 319 |
+
≪ p(n) log n
|
| 320 |
+
n1/2L ,
|
| 321 |
+
where the last step uses again the asymptotic for the partition function.
|
| 322 |
+
□
|
| 323 |
+
4. Partitions and Abaci
|
| 324 |
+
The proof of Theorem 2.2 requires the machinery of the abacus associated to a partition.
|
| 325 |
+
A good reference for this theory is Section 2.7 of of [6], and we recall some salient facts
|
| 326 |
+
below.
|
| 327 |
+
4.1. The notion of an abacus. An abacus is a bi-infinite sequence of 0’s and 1’s beginning
|
| 328 |
+
with an infinite sequence of 1’s and ending with an infinite sequence of 0’s.
|
| 329 |
+
More formally, let
|
| 330 |
+
S := {s : Z → {0, 1} : there exists a k ≥ 0 such that s(−i) = 1 and s(i) = 0 for all i ≥ k}
|
| 331 |
+
denote the set of all sequences of 0’s and 1’s indexed using the integers, that begin with an
|
| 332 |
+
infinite sequence of 1’s and end with an infinite sequence of 0’s. For example,
|
| 333 |
+
. . . , 1, . . . , 1, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 0, . . ., 0, . . .
|
| 334 |
+
is in S. We consider two sequences s and s′ in S to be equivalent if there is some integer j
|
| 335 |
+
such that s(i) = s′(i − j) for all i, that is, if s′ can be produced by shifting the terms in s by
|
| 336 |
+
j. This is an equivalence relation, and an abacus refers to an equivalence class in S under
|
| 337 |
+
this relation. We denote by A the set of such abaci, so that by an element a of A we mean
|
| 338 |
+
the equivalence class consisting of some sequence s ∈ S together with all its shifts.
|
| 339 |
+
4.2. The abacus associated to a partition. We now show how abaci are in one-to-one
|
| 340 |
+
correspondence with partitions of integers. Starting with an integer partition λ, we construct
|
| 341 |
+
an abacus aλ ∈ A as follows. Draw the Young diagram of λ, and trace out the boundary of
|
| 342 |
+
the diagram, moving from the lower left-hand corner to the upper right-hand corner, writing
|
| 343 |
+
a 0 for each horizontal move and a 1 for each vertical move. Then prepend an infinite string of
|
| 344 |
+
1’s and append an infinite string of 0’s to find a representative of the corresponding element
|
| 345 |
+
aλ of A.
|
| 346 |
+
This procedure is easily reversed, and starting with an abacus a in A we obtain a Young
|
| 347 |
+
diagram, which corresponds to a partition λ. If s ∈ S is a representative of a, then the
|
| 348 |
+
partition λ is a partition of the integer n(a) which counts the number of pairs of indices (i, j)
|
| 349 |
+
with i < j such that s(i) = 0 and s(j) = 1.
|
| 350 |
+
To illustrate, consider the partition (6, 5, 3, 1, 1, 1), whose Young diagram is pictured in
|
| 351 |
+
Figure 1.
|
| 352 |
+
If we start in the lower left-hand corner of this diagram and move along the
|
| 353 |
+
boundary to the upper right-hand corner, we move right, up three times, right twice, up,
|
| 354 |
+
right twice, up, right, and up. The correspondence described above produces the string
|
| 355 |
+
(4.1)
|
| 356 |
+
0, 1, 1, 1, 0, 0, 1, 0, 0, 1, 0, 1,
|
| 357 |
+
which we can turn into a bi-infinite sequence by adding an infinite sequence of 1’s to the
|
| 358 |
+
beginning and an infinite sequence of 0’s to the end:
|
| 359 |
+
(4.2)
|
| 360 |
+
. . . , 1, . . . , 1, 1, 1, 0, 1, 1, 1, 0, 0, 1, 0, 0, 1, 0, 1, 0, 0, 0, . . ., 0, . . . .
|
| 361 |
+
|
| 362 |
+
6
|
| 363 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 364 |
+
Figure 1. The Young diagram of (6, 5, 3, 1, 1, 1)
|
| 365 |
+
The equivalence class of this sequence is the abacus associated to (6, 5, 3, 1, 1, 1).
|
| 366 |
+
4.3. Hooks and border strips. Let λ be a partition. The hook h associated to a box b
|
| 367 |
+
in the Young diagram of λ consists of the box b together with all the boxes directly to its
|
| 368 |
+
right and directly below it. The hook-length of h, denoted by ℓ(h), is the number of boxes
|
| 369 |
+
contained in the hook. The height of the hook h, denoted by ht(h), is one less than the
|
| 370 |
+
number of rows in the Young diagram of λ that contain a box of h. Associated to each hook
|
| 371 |
+
is a border strip (also known as a skew hook), denoted bs(h), which is the connected region
|
| 372 |
+
of boundary boxes of the Young diagram running from the rightmost to the bottommost box
|
| 373 |
+
of h. Removing such a border strip leaves behind a smaller Young diagram. These notions
|
| 374 |
+
play a prominent role in the representation theory of the symmetric group, and in particular
|
| 375 |
+
feature in the Murnaghan–Nakayama rule for computing character values, which we next
|
| 376 |
+
recall (see Theorem 2.4.7 of [6], and also Chapter 4 of [4]).
|
| 377 |
+
Theorem 4.1 (The Murnaghan–Nakayama rule). Let n and t be positive integers, with
|
| 378 |
+
t ≤ n. Let σ ∈ Sn be of the form σ = τ · ρ, where ρ is a t-cycle, and τ is a permutation of
|
| 379 |
+
Sn with support disjoint from ρ. Let λ be a partition of n. Then
|
| 380 |
+
(4.3)
|
| 381 |
+
χλ(σ) =
|
| 382 |
+
�
|
| 383 |
+
h∈λ
|
| 384 |
+
ℓ(h)=t
|
| 385 |
+
(−1)ht(h)χλ\bs(h)(τ).
|
| 386 |
+
Above, χλ(σ) denotes the value of the character of the irreducible representation of Sn
|
| 387 |
+
corresponding to the partition λ, evaluated on the conjugacy class of σ, λ \ bs(h) denotes
|
| 388 |
+
the partition of n − t obtained by removing the border strip bs(h) from the Young diagram
|
| 389 |
+
of λ, and χλ\bs(h)(τ) denotes the character value of the irreducible representation of Sn−t
|
| 390 |
+
corresponding to the partition λ \ bs(h) evaluated on the conjugacy class of τ.
|
| 391 |
+
The abacus notation helps with thinking about hook lengths and border strips. Let λ be a
|
| 392 |
+
partition, let aλ denote the corresponding abacus, and let s be a representative in S for the
|
| 393 |
+
abacus aλ. Each hook h in the Young diagram of λ is in natural one-to-one correspondence
|
| 394 |
+
with a pair of indices (i, j), i < j, with s(i) = 0 and s(j) = 1. The length of the hook h is
|
| 395 |
+
j − i. In particular, the partition λ contains no hooks of length t (that is, λ is a t-core) if
|
| 396 |
+
and only if there is no pair of indices (i, i + t) with s(i) = 0 and s(i + t) = 1. The height of
|
| 397 |
+
the hook h equals the number of 1’s in the sequence s lying strictly between the 0 at index
|
| 398 |
+
i and the 1 at index j:
|
| 399 |
+
ht(h) = # {i < k < j : s(k) = 1} .
|
| 400 |
+
|
| 401 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 402 |
+
7
|
| 403 |
+
11 7
|
| 404 |
+
6
|
| 405 |
+
4
|
| 406 |
+
3
|
| 407 |
+
1
|
| 408 |
+
9
|
| 409 |
+
5
|
| 410 |
+
4
|
| 411 |
+
2
|
| 412 |
+
1
|
| 413 |
+
6
|
| 414 |
+
2
|
| 415 |
+
1
|
| 416 |
+
3
|
| 417 |
+
2
|
| 418 |
+
1
|
| 419 |
+
Figure 2. Hook-lengths for (6, 5, 3, 1, 1, 1)
|
| 420 |
+
,
|
| 421 |
+
Figure 3. The Young diagram of (6, 2, 1, 1, 1, 1)
|
| 422 |
+
Further, the abacus notation gives an easy description of the result of removing a border
|
| 423 |
+
strip from a partition. Define, for any pair of distinct integers (i, j) the operator Tij : S → S
|
| 424 |
+
that swaps the terms indexed by i and j in a bi-infinite sequence s ∈ S and leaves all other
|
| 425 |
+
entries fixed. Thus for s ∈ S
|
| 426 |
+
(Tijs)(k) =
|
| 427 |
+
|
| 428 |
+
|
| 429 |
+
|
| 430 |
+
|
| 431 |
+
|
| 432 |
+
s(k)
|
| 433 |
+
k ̸= i, j
|
| 434 |
+
s(j)
|
| 435 |
+
k = i
|
| 436 |
+
s(i)
|
| 437 |
+
k = j.
|
| 438 |
+
With this notation in place, suppose λ is a partition, and s ∈ aλ is a representative of the
|
| 439 |
+
abacus of λ. Let h be a hook of λ, corresponding to the pair of indices (i, j) (with i < j) in
|
| 440 |
+
s. Then Tijs is a representative of the abacus associated to λ \ bs(h).
|
| 441 |
+
Returning to our example of the partition (6, 5, 3, 1, 1, 1), Figure 2 contains its Young
|
| 442 |
+
diagram again, but now with each box filled in with the corresponding hook-length. The
|
| 443 |
+
unique hook h of length 5 in the diagram corresponds to the pair of indices (5, 10) of the
|
| 444 |
+
sequence (4.1). If we remove the corresponding border strip, we obtain the diagram pictured
|
| 445 |
+
in Figure 3, which corresponds to the partition (6, 5, 3, 1, 1, 1) \ bs(h) = (6, 2, 1, 1, 1, 1) and
|
| 446 |
+
the bi-infinite sequence
|
| 447 |
+
. . . , 1, . . . , 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 0, 0, 0, 0, 1, 0, 0, 0 . . ., 0, . . .
|
| 448 |
+
of 0’s and 1’s.
|
| 449 |
+
Note that if we swap the 0 and 1 corresponding to the hook h in the
|
| 450 |
+
representative (4.2) of a(6,5,3,1,1,1), then we get an equivalent bi-infinite sequence.
|
| 451 |
+
4.4. Removing several hooks in succession. In our work below, we will need to remove
|
| 452 |
+
several hooks (more precisely, the border strips corresponding to those hooks) in succession
|
| 453 |
+
|
| 454 |
+
8
|
| 455 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 456 |
+
from a partition. By removing a sequence of hooks h1, . . ., hR from a partition λ, we mean
|
| 457 |
+
the following: h1 is a hook of λ, h2 is a hook of λ \ bs(h1), h3 is a hook of λ \ bs(h1) \ bs(h2),
|
| 458 |
+
and so on, until we arrive at hR which is a hook of λ \ bs(h1) . . . \ bs(hR−1), and when this
|
| 459 |
+
is removed we obtain the final partition λ′ = λ \ bs(h1) . . . \ bs(hR).
|
| 460 |
+
Let s be a representative of the abacus aλ associated to λ. Let (i1, j1) denote the pair of
|
| 461 |
+
indices in s corresponding to the hook h1, (i2, j2) the corresponding pair to h2 (which,
|
| 462 |
+
recall, is a hook of λ \ bs(h1) corresponding to the bi-infinite sequence Ti1,j1s), and so
|
| 463 |
+
on.
|
| 464 |
+
Thus, the sequence of hooks h1, . . ., hR may be encoded by the R-tuple of pairs
|
| 465 |
+
((i1, j1), (i2, j2), . . . , (iR, jR)), and the process of removing these hooks results in the sequence
|
| 466 |
+
s′ = TiR,jRTiR−1,jR−1 · · · Ti1,j1s.
|
| 467 |
+
The sequence s′ is a representative of the abacus aλ′ associated to the partition λ′.
|
| 468 |
+
Of particular interest for us will be the situation where all the hooks have the same length,
|
| 469 |
+
m say. Here jk = ik + m for all 1 ≤ k ≤ R, and we may encode the sequence of hooks by
|
| 470 |
+
simply the R-tuple (i1, . . . , iR). Note that the indices i1, . . ., iR may contain repeats, but
|
| 471 |
+
there are also constraints, such as i2 ̸= i1 (since (i1, i1 + m) is a hook in s and so it cannot
|
| 472 |
+
be a hook in Ti1,i1+ms).
|
| 473 |
+
5. Plan of the proof of Theorem 2.2
|
| 474 |
+
We begin by restating Theorem 2.2 in terms of values of irreducible characters at elements
|
| 475 |
+
of Sn, which will make the notation involved in its proof cleaner.
|
| 476 |
+
Theorem 5.1 (An equivalent formulation of Theorem 2.2). Let n, m1, . . . , mr be distinct
|
| 477 |
+
positive integers. Let σ ∈ Sn be a permutation of the form
|
| 478 |
+
σ = τ ·
|
| 479 |
+
r�
|
| 480 |
+
i=1
|
| 481 |
+
pr−1
|
| 482 |
+
�
|
| 483 |
+
j=1
|
| 484 |
+
ρ(j)
|
| 485 |
+
i ,
|
| 486 |
+
where each ρ(j)
|
| 487 |
+
i
|
| 488 |
+
is a cycle of length mi, the supports of all the cycles ρ(j)
|
| 489 |
+
i
|
| 490 |
+
are disjoint, and
|
| 491 |
+
τ ∈ Sn is a permutation with support disjoint from those of the ρ(j)
|
| 492 |
+
i ’s. Suppose that λ is a
|
| 493 |
+
(�r
|
| 494 |
+
i=1 kimi)-core partition of n for all r-tuples (k1, . . . , kr) of integers 0 ≤ k1, . . . , kr ≤ pr−1
|
| 495 |
+
for which some ki = pr−1. Then
|
| 496 |
+
pr | χλ(σ).
|
| 497 |
+
The proof of Theorem 5.1 rests on the following crucial proposition, which is based on
|
| 498 |
+
applying the Murnaghan–Nakayama rule pr−1 times.
|
| 499 |
+
Proposition 5.2. Let r, m and n be positive integers. Let σ ∈ Sn be of the form
|
| 500 |
+
σ = τ ·
|
| 501 |
+
pr−1
|
| 502 |
+
�
|
| 503 |
+
j=1
|
| 504 |
+
ρ(j),
|
| 505 |
+
where each ρ(j) is an m-cycle, with all the cycles ρ(j) being disjoint, and with τ ∈ Sn being
|
| 506 |
+
a permutation whose support is disjoint from all the cycles ρ(j). Denote by L the set of
|
| 507 |
+
partitions of n − pr−1m that can be obtained from λ by removing, in succession, pr−1 border
|
| 508 |
+
strips of length m. If λ is a pr−1m-core partition of n, then
|
| 509 |
+
χλ(σ) = p
|
| 510 |
+
�
|
| 511 |
+
λ′∈L
|
| 512 |
+
ǫλ′χλ′(τ),
|
| 513 |
+
|
| 514 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 515 |
+
9
|
| 516 |
+
where each ǫλ′ is an integer.
|
| 517 |
+
We will quickly deduce Theorem 5.1 (and hence Theorem 2.2) from Proposition 5.2 and
|
| 518 |
+
the following simple observation.
|
| 519 |
+
Lemma 5.3. Let n, t and m be positive integers. Let λ be a partition of n which is both a
|
| 520 |
+
t-core and a (t + m)-core. Let λ′ be a partition of n − m that can be obtained by removing a
|
| 521 |
+
border strip of length m from λ. Then λ′ is a t-core.
|
| 522 |
+
Proof. If λ has no hook (and thus no border strip) of length m then the lemma holds
|
| 523 |
+
vacuously. Suppose that λ′ arises from removing the border strip corresponding to the hook
|
| 524 |
+
h of length m in λ. Let aλ be the abacus of λ, and s be a representative bi-infinite sequence
|
| 525 |
+
in aλ. Suppose the hook h corresponds to the pair of indices (i, i + m) with s(i) = 0 and
|
| 526 |
+
s(i + m) = 1, so that the partition λ′ corresponds to the abacus containing s′ = Ti,i+ms.
|
| 527 |
+
If λ′ is not a t-core, then there must exist a pair of indices (j, j + t) with s′(j) = 0 and
|
| 528 |
+
s′(j + t) = 1. Since the entries of s and s′ differ only at the indices i and i + m, and since
|
| 529 |
+
λ is a t-core, we must have either j = i + m, or j + t = i. If j = i + m, then s(i) = 0 and
|
| 530 |
+
s(i + t + m) = s′(j + t) = 1 which contradicts the assumption that λ is a (t + m)-core. If
|
| 531 |
+
j = i−t, then s(i−t) = s′(j) = 0 and s(i+m) = 1, which again contradicts the assumption
|
| 532 |
+
that λ is a (t + m)-core.
|
| 533 |
+
□
|
| 534 |
+
Deducing Theorem 5.1 from Proposition 5.2. Apply Proposition 5.2 first with m = mr to
|
| 535 |
+
obtain
|
| 536 |
+
χλ(σ) = p
|
| 537 |
+
�
|
| 538 |
+
λ′∈L
|
| 539 |
+
ǫλ′χλ′�
|
| 540 |
+
τ
|
| 541 |
+
r−1
|
| 542 |
+
�
|
| 543 |
+
i=1
|
| 544 |
+
pr−1
|
| 545 |
+
�
|
| 546 |
+
j=1
|
| 547 |
+
ρ(j)
|
| 548 |
+
i
|
| 549 |
+
�
|
| 550 |
+
.
|
| 551 |
+
If t is any number of the form t = �r−1
|
| 552 |
+
i=1 kimi where the ki lie in [0, pr−1] with at least one
|
| 553 |
+
of them being pr−1, then λ is a (t + krmr)-core for all 0 ≤ kr ≤ pr−1. Since any λ′ ∈ L
|
| 554 |
+
arises from λ by removing pr−1 border strips of length mr, it follows by pr−1 applications of
|
| 555 |
+
Lemma 5.3 that λ′ is a t-core.
|
| 556 |
+
We may now repeat this argument, applying Proposition 5.2 to each λ′ ∈ L and now
|
| 557 |
+
removing pr−1 border strips of length mr−1. Applications of Lemma 5.3 show that the new
|
| 558 |
+
partitions λ′′ that arise are (�r−2
|
| 559 |
+
i=1 kimi)-cores for all choices of 0 ≤ ki ≤ pr−1 with some
|
| 560 |
+
ki = pr−1.
|
| 561 |
+
Carrying this argument out r times, we obtain the desired result.
|
| 562 |
+
□
|
| 563 |
+
The proof of Proposition 5.2 depends on the following two lemmas, which we shall prove
|
| 564 |
+
in the next two sections.
|
| 565 |
+
Lemma 5.4. Let λ be a partition, and let λ′ be obtained from λ by removing a sequence of
|
| 566 |
+
R border strips of the same length m. Let h1, . . ., hR be a sequence of R hooks of length m
|
| 567 |
+
which may be removed from the initial partition λ to result in the final partition λ′. Then
|
| 568 |
+
(−1)ht(h1)+...+ht(hR) = ǫ(λ, λ′)
|
| 569 |
+
where the sign ǫ(λ, λ′) = ±1 depends only on the initial and final partitions λ and λ′ and is
|
| 570 |
+
the same for all such possible sequences of hooks.
|
| 571 |
+
Lemma 5.5. Let λ be a pr−1m-core partition, and let λ′ be a partition that can be obtained
|
| 572 |
+
from λ by removing R = pr−1 border strips of length m. The number of tuples (i1, . . . , iR)
|
| 573 |
+
such that
|
| 574 |
+
s′ = TiR,iR+mTiR−1,iR−1+m · · ·Ti1,i1+ms
|
| 575 |
+
|
| 576 |
+
10
|
| 577 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 578 |
+
is a multiple of p. Here s is a representative of the abacus of λ, and the partition λ′ corre-
|
| 579 |
+
sponds to the abacus containing s′
|
| 580 |
+
Once Lemmas 5.4 and 5.5 are in place, it is a simple matter to deduce Proposition 5.2.
|
| 581 |
+
Deducing Proposition 5.2. We apply the Murnaghan–Nakayama rule repeatedly while re-
|
| 582 |
+
moving in succession R = pr−1 hooks of length m from λ. This will result in an expression
|
| 583 |
+
for χλ(σ) of the form �
|
| 584 |
+
λ′∈L cλ′χλ′(τ), for suitable integers cλ′ which we must show are
|
| 585 |
+
multiples of p. Now
|
| 586 |
+
cλ′ =
|
| 587 |
+
�
|
| 588 |
+
(i1,...,iR)
|
| 589 |
+
(−1)ht(h1)+...+ht(hR)
|
| 590 |
+
where the sum is over all R-tuples (i1, . . . , iR) corresponding to hooks h1, . . ., hR, which
|
| 591 |
+
when removed from λ in order result in the partition λ′. Lemma 5.4 tells us that the sign
|
| 592 |
+
(−1)ht(h1)+...+ht(hR) is the same for all suitable tuples (i1, . . . , iR), and Lemma 5.5 tells us that
|
| 593 |
+
the number of such R-tuples is a multiple of p.
|
| 594 |
+
□
|
| 595 |
+
6. Parity of heights of hooks: Proof of Lemma 5.4
|
| 596 |
+
Let λ be a partition, and s a representative of the abacus aλ associated to λ. Augment s
|
| 597 |
+
by coloring a finite number N of 1’s in s with distinct colors, taking care to color all the 1’s
|
| 598 |
+
appearing to the right of the first zero in s. The 1’s appearing to the left of the first 0 are
|
| 599 |
+
unimportant, but we allow the flexibility of coloring some of them since this situation may
|
| 600 |
+
arise at an intermediate step when we remove hooks from λ. Note that the number of 1’s
|
| 601 |
+
appearing to the right of the first zero equals the number of rows in the partition λ. Thus
|
| 602 |
+
N is at least the number of rows in λ. Color these 1’s in the order of their appearance in s
|
| 603 |
+
using the colors c1, . . ., cN. Call the augmented sequence �s.
|
| 604 |
+
We begin with a general observation on removing hooks. Suppose (i, j) is a pair of indices
|
| 605 |
+
corresponding to a hook h in s (at the moment the hook can have any length j−i). Removing
|
| 606 |
+
this hook produces the sequence Ti,js.
|
| 607 |
+
Considering the augmented sequence �s, we have
|
| 608 |
+
the corresponding augmented sequence Ti,j�s after removing this hook. If we consider the
|
| 609 |
+
sequence of colors among the 1’s in this sequence, we obtain a permutation πij, say, of the
|
| 610 |
+
original sequence of colors (c1, . . . , cN) — the 1 appearing in (Ti,j�s)(i) has the color of the 1
|
| 611 |
+
in �s(j), and all other 1’s in Tij(�s) retain their color in �s. If the height of the hook removed
|
| 612 |
+
is k, then note that �s had k colored 1’s between s(i) = 0 and s(j) = 1 and the permutation
|
| 613 |
+
πij can be obtained by making k-transpositions, each time swapping the color of the 1 at
|
| 614 |
+
position j by the color immediately preceding it. Thus (−1)k = (−1)ht(h) equals the sign of
|
| 615 |
+
the permutation πij.
|
| 616 |
+
If we remove hooks h1, . . ., hℓ in succession (again, their lengths could be arbitrary), then
|
| 617 |
+
the associated permutations of colors multiply, and therefore so do the signs of these permu-
|
| 618 |
+
tations. Thus, after removing these hooks in succession we would arrive at a permutation π
|
| 619 |
+
of the sequence of colors (c1, . . . , cN) and
|
| 620 |
+
(−1)ht(h1)+ht(h2)+...+ht(hℓ) = sgn(π).
|
| 621 |
+
We now turn to the situation of the lemma, where a sequence h1, . . ., hR of R hooks
|
| 622 |
+
is removed all of length m.
|
| 623 |
+
Our observation above shows that removing these hooks in
|
| 624 |
+
order leads to the sequence �s ′ where the color of the 1’s is given by a permutation π of the
|
| 625 |
+
original sequence of colors c1, . . ., cN. Further the sign of this permutation sgn(π) equals
|
| 626 |
+
(−1)ht(h1)+...+ht(hR).
|
| 627 |
+
|
| 628 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 629 |
+
11
|
| 630 |
+
To complete the proof, we will show that every way of removing R hooks of length m
|
| 631 |
+
that leads to the partition λ′ results in the same permutation of colors π. Consider the
|
| 632 |
+
subsequence of �s obtained by restricting to a progression (mod m): namely, (�s(a + ℓm))ℓ∈Z.
|
| 633 |
+
There are m such subsequences corresponding to a = 1, . . ., m. Since the hooks removed all
|
| 634 |
+
have length m, each removal of a hook affects only the terms within one of these subsequences,
|
| 635 |
+
leaving all the other subsequences unaltered. Further within any particular subsequence
|
| 636 |
+
(�s(a + ℓm))ℓ∈Z, it is impossible to alter the original sequence of colors by removing any
|
| 637 |
+
sequence of hooks of length m.
|
| 638 |
+
Therefore we can determine uniquely the color of any
|
| 639 |
+
element in �s ′: the 1’s appearing in this sequence in the progression a (mod m) have colors
|
| 640 |
+
determined by their order of appearance in the original sequence s.
|
| 641 |
+
7. Proof of Lemma 5.5
|
| 642 |
+
Let λ be a pr−1m-core partition, and let s be a representative of its abacus. Let s′ be the
|
| 643 |
+
sequence obtained by removing a sequence of R = pr−1 border strips of length m from λ,
|
| 644 |
+
and let λ′ be the partition associated to s′. Our goal is to show that the number of ways of
|
| 645 |
+
reaching λ′ starting from λ is a multiple of p.
|
| 646 |
+
Let us first note that when r = 1, it is impossible to remove a border strip of length m
|
| 647 |
+
from λ, since λ is m-core by assumption. Thus the number of ways here is 0, and the lemma
|
| 648 |
+
holds (vacuously). Henceforth, assume that r ≥ 2.
|
| 649 |
+
For each a = 1, . . ., m, consider the subsequences of s and s′ obtained by restricting to
|
| 650 |
+
the progression a (mod m): thus, set
|
| 651 |
+
s(a; m) = (s(a + ℓm))ℓ∈Z,
|
| 652 |
+
s′(a; m) = (s′(a + ℓm))ℓ∈Z.
|
| 653 |
+
We may think of s(a; m) and s′(a; m) as corresponding to partitions λ(a; m) and λ′(a; m), and
|
| 654 |
+
note that a hook of length m in the partition λ corresponds to a hook of length 1 (or simply
|
| 655 |
+
a border square) in the partition λ(a; m) (for some choice of a). Since λ′(a; m) arises from
|
| 656 |
+
λ(a; m) by removing some number of hooks of length 1, the Young diagram of the partition
|
| 657 |
+
λ′(a; m) is contained in the Young diagram of the partition λ(a; m) (that is, λi(a; m) ≥
|
| 658 |
+
λ′
|
| 659 |
+
i(a; m) for all i). The difference between the Young diagram of λ(a; m) and λ′(a; m) (in
|
| 660 |
+
other words, the boxes in λ(a; m) that are not in λ′(a; m)) is a skew diagram, which we
|
| 661 |
+
denote by λ(a; m)/λ′(a; m). Let ℓa denote the size of this skew diagram |λ(a; m)/λ′(a; m)|,
|
| 662 |
+
so that ℓa hooks of length 1 must be removed from λ(a; m) to reach λ′(a; m). Since a total
|
| 663 |
+
of R = pr−1 hooks of length m are removed to go from λ to λ′, note that
|
| 664 |
+
R = pr−1 =
|
| 665 |
+
m
|
| 666 |
+
�
|
| 667 |
+
a=1
|
| 668 |
+
ℓa.
|
| 669 |
+
The number of ways to go from λ(a; m) to λ′(a; m) by removing successively ℓa hooks
|
| 670 |
+
of length 1 equals the number of standard Young tableaux of skew shape λ(a; m)/λ′(a; m),
|
| 671 |
+
which we denote (in the usual notation) by fλ(a;m)/λ′(a;m). Recall that a standard Young
|
| 672 |
+
tableau of this skew shape is a numbering of the boxes in the skew diagram using the
|
| 673 |
+
numbers 1 to ℓa such that the entries are increasing from left to right in each row, and
|
| 674 |
+
increasing down each column. Each such tableau corresponds to a way of removing hooks,
|
| 675 |
+
by removing boxes in descending order of their entries.
|
| 676 |
+
We can now count the number of ways of going from λ to λ′ by removing R hooks of
|
| 677 |
+
length m. Note that removing a hook from one subsequence s(a; m) has no impact on the
|
| 678 |
+
|
| 679 |
+
12
|
| 680 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 681 |
+
hooks in any of the other subsequences. Therefore the desired number of ways to proceed
|
| 682 |
+
from λ to λ′ equals
|
| 683 |
+
�
|
| 684 |
+
pr−1
|
| 685 |
+
ℓ1, ℓ2, . . . , ℓm
|
| 686 |
+
� m
|
| 687 |
+
�
|
| 688 |
+
a=1
|
| 689 |
+
fλ(a;m)/λ′(a;m).
|
| 690 |
+
The multinomial coefficient
|
| 691 |
+
�
|
| 692 |
+
pr−1
|
| 693 |
+
ℓ1,ℓ2,...,ℓm
|
| 694 |
+
�
|
| 695 |
+
is a multiple of p, except in the situation where
|
| 696 |
+
ℓa = pr−1 for some a (and all other ℓj are 0). Thus we are left with the case when all the
|
| 697 |
+
hooks of length m in going from λ to λ′ are confined to one subsequence s(a; m). So far, we
|
| 698 |
+
have not made use of the condition that λ is a pr−1m-core, and it is only in this case that
|
| 699 |
+
we need this assumption. The assumption implies that λ(a; m) is pr−1-core, and so the skew
|
| 700 |
+
diagram λ(a; m)/λ′(a; m) (which has size ℓa = pr−1) cannot be a border strip of λ(a; m). In
|
| 701 |
+
this situation, it turns out that fλ(a;m)/λ′(a;m) is a multiple of p. This is implied by our next
|
| 702 |
+
lemma, which is perhaps of independent interest.
|
| 703 |
+
Lemma 7.1. Let π and τ be two partitions, with the Young diagram of π containing the
|
| 704 |
+
Young diagram of τ (thus πi ≥ τi for all i). Suppose the skew diagram π/τ is not a border
|
| 705 |
+
strip of the partition π (equivalently, either π/τ is disconnected, or it contains a 2×2 square),
|
| 706 |
+
and that |π/τ| = pt is a prime power. Then the number of standard Young tableaux of skew
|
| 707 |
+
shape π/τ, denoted fπ/τ, is a multiple of p.
|
| 708 |
+
Proof. First suppose that π/τ is disconnected, and is composed of k ≥ 2 maximally connected
|
| 709 |
+
skew shapes S1, . . ., Sk, with |Sj| = sj ≥ 1. Then
|
| 710 |
+
fπ/τ =
|
| 711 |
+
�
|
| 712 |
+
pt
|
| 713 |
+
s1, . . . , sk
|
| 714 |
+
�
|
| 715 |
+
fS1 · · · fSk,
|
| 716 |
+
is clearly a multiple of p.
|
| 717 |
+
Now suppose that π/τ is a connected skew shape, but contains a 2 × 2 square so that it
|
| 718 |
+
is not a border strip of π. Since fπ/τ depends only on the shape π/τ, we may assume that π
|
| 719 |
+
is minimal, having only as many rows and columns as needed for the skew shape π/τ. Then
|
| 720 |
+
the maximal hook length of π equals the number of border squares of π, which is strictly
|
| 721 |
+
smaller than |π/τ| = pt (since π/τ is not a border strip by assumption).
|
| 722 |
+
It is a basic fact (see Section I.9 of [8], for example — the identity below follows from
|
| 723 |
+
equation (9.1) of [8] by taking the Hall inner product of both sides with the symmetric
|
| 724 |
+
function ept
|
| 725 |
+
1 ) that
|
| 726 |
+
fπ/τ =
|
| 727 |
+
�
|
| 728 |
+
ν⊢pt
|
| 729 |
+
fνcπ
|
| 730 |
+
τν,
|
| 731 |
+
where the sum is over partitions ν of |π/τ| = pt, fν = χν
|
| 732 |
+
(1,...,1) is the degree of the irreducible
|
| 733 |
+
character corresponding to ν and the cπ
|
| 734 |
+
τν are the Littlewood–Richardson coefficients (which
|
| 735 |
+
are integers). By Lemma 2.1, fν ≡ χν
|
| 736 |
+
(pt) (mod p), so that p | fν unless ν is a hook of length
|
| 737 |
+
pt. Suppose now that ν is a hook of length pt. Here we use that the Littlewood–Richardson
|
| 738 |
+
coefficient cπ
|
| 739 |
+
τν is zero unless the Young diagram of the partition ν is contained in that of π
|
| 740 |
+
(see Section I.9 of [8] once again). But all the hooks of π have length < pt, and therefore π
|
| 741 |
+
cannot contain a hook ν of length pt. Thus either cπ
|
| 742 |
+
τν = 0 or p|fν, and therefore the lemma
|
| 743 |
+
follows.
|
| 744 |
+
□
|
| 745 |
+
|
| 746 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 747 |
+
13
|
| 748 |
+
8. Preliminaries for the proof of Proposition 2.3
|
| 749 |
+
As in [16], let �p(k) denote the number of partitions of a nonnegative integer k into powers
|
| 750 |
+
of p, with the convention that �p(0) = 1. Denote by Fp(t) the associated generating function
|
| 751 |
+
Fp(t) :=
|
| 752 |
+
∞
|
| 753 |
+
�
|
| 754 |
+
k=0
|
| 755 |
+
�p(k)e−k/t =
|
| 756 |
+
∞
|
| 757 |
+
�
|
| 758 |
+
j=0
|
| 759 |
+
�
|
| 760 |
+
1 − e−pj/t�−1
|
| 761 |
+
,
|
| 762 |
+
where t > 0 is a real number. We begin by recalling some estimates from our prior work [16].
|
| 763 |
+
Lemma 8.1 (Lemma 2 of [16]). When 0 < t ≤ 1, we have Fp(t) = O(1), and when t ≥ 1,
|
| 764 |
+
we have
|
| 765 |
+
(log t)2
|
| 766 |
+
2 log p + 1
|
| 767 |
+
2 log t + O(1) ≤ log Fp(t) ≤ (log t)2
|
| 768 |
+
2 log p + 1
|
| 769 |
+
2 log t + 1
|
| 770 |
+
8 log p + O(1).
|
| 771 |
+
More precise results are known for fixed primes p, as partitions into prime powers have
|
| 772 |
+
been studied extensively since the work of Mahler [9] and de Bruijn [1]. We will only require
|
| 773 |
+
the estimates of Lemma 8.1, which are cruder but uniform in p.
|
| 774 |
+
Given a partition µ of k into powers of p, let �µ denotes the partition obtained by repeatedly
|
| 775 |
+
replacing every occurrence of pr parts of the same size pj by pr−1 parts of size pj+1 until no
|
| 776 |
+
part appears more than pr − 1 times. For every nonnegative integer s, define �p(k; s) to be
|
| 777 |
+
the number of partitions µ of k into powers of p such that �µ does not contain (at least) pr−1
|
| 778 |
+
parts of the same size pj for any j ≥ s. The second lemma of this section gives a useful lower
|
| 779 |
+
bound for the difference between �p(k) and �p(k; s).
|
| 780 |
+
Lemma 8.2. For all s ≥ 2 and k ≥ pr+s−1(1 + 4/s), we have
|
| 781 |
+
�p(k) − �p(k; s) ≥ ps(s−1)/2
|
| 782 |
+
(s − 1)s−1.
|
| 783 |
+
Proof. We will construct at least ps(s−1)/2/(s − 1)s−1 partitions of k counted in �p(k) but not
|
| 784 |
+
in �p(k; s). For each 1 ≤ i ≤ s − 1, pick an integer ai in the range
|
| 785 |
+
0 ≤ ai ≤ ps−i
|
| 786 |
+
s − 1.
|
| 787 |
+
Each choice of a1, . . . , as−1 gives a partition µ counted in �p(k) by using ai copies of pi for
|
| 788 |
+
1 ≤ i ≤ s − 1 and k − �s−1
|
| 789 |
+
i=1 aipi copies of 1. The number of such partitions is
|
| 790 |
+
s−1
|
| 791 |
+
�
|
| 792 |
+
i=1
|
| 793 |
+
� ps−i
|
| 794 |
+
s − 1
|
| 795 |
+
�
|
| 796 |
+
≥
|
| 797 |
+
s−1
|
| 798 |
+
�
|
| 799 |
+
i=1
|
| 800 |
+
ps−i
|
| 801 |
+
s − 1 =
|
| 802 |
+
ps(s−1)/2
|
| 803 |
+
(s − 1)s−1.
|
| 804 |
+
Note that if i > s − log(s − 1)/ log p, then ai must be zero, so that all of these partitions
|
| 805 |
+
have largest part at most
|
| 806 |
+
ps
|
| 807 |
+
s−1.
|
| 808 |
+
We must check that each such µ is not counted in �p(k; s); that is, that the corresponding
|
| 809 |
+
�µ contains at least pr−1 copies of some part pj with j ≥ s. Suppose that this is not the
|
| 810 |
+
case. Notice that, by construction, the number of times any part appears in µ is congruent
|
| 811 |
+
modulo pr−1 to the number of times it appears in �µ. Since no part can appear more than
|
| 812 |
+
pr − 1 times in �µ, it follows that any part that appears fewer than pr−1 times or more than
|
| 813 |
+
pr − pr−1 times in �µ must have appeared in the original partition µ. Since all the parts of µ
|
| 814 |
+
are below ps/(s − 1), we conclude that �µ can contain (i) at most pr − 1 copies of any part pj
|
| 815 |
+
|
| 816 |
+
14
|
| 817 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 818 |
+
with pj ≤ ps/(s −1), (ii) at most pr −pr−1 copies of any part pj with ps/(s −1) < pj ≤ ps−1,
|
| 819 |
+
and (iii) no parts of size pj with j ≥ s. But these constraints imply that
|
| 820 |
+
k = |�µ| ≤ (pr − 1)
|
| 821 |
+
�
|
| 822 |
+
pj≤ps/(s−1)
|
| 823 |
+
pj + (pr − pr−1)
|
| 824 |
+
�
|
| 825 |
+
ps/(s−1)<pj≤ps−1
|
| 826 |
+
pj
|
| 827 |
+
< (pr−1 − 1)
|
| 828 |
+
ps
|
| 829 |
+
(s − 1)
|
| 830 |
+
�
|
| 831 |
+
1 − 1
|
| 832 |
+
p
|
| 833 |
+
�−1
|
| 834 |
+
+ (pr − pr−1)ps−1�
|
| 835 |
+
1 − 1
|
| 836 |
+
p
|
| 837 |
+
�−1
|
| 838 |
+
< pr+s−1�
|
| 839 |
+
1 + 4
|
| 840 |
+
s
|
| 841 |
+
�
|
| 842 |
+
,
|
| 843 |
+
which contradicts our assumption on the size of k.
|
| 844 |
+
□
|
| 845 |
+
9. Proof of Proposition 2.3
|
| 846 |
+
Let L be a set of positive integers coprime to p, and define p(n; L, s) to be the number of
|
| 847 |
+
partitions µ of n for which �µ contains fewer than pr−1 parts of the same size ℓpj for every
|
| 848 |
+
ℓ ∈ L and j ≥ s. We will prove Proposition 2.3 by obtaining an upper bound for p(n; L, s)
|
| 849 |
+
for well-chosen L and s.
|
| 850 |
+
Lemma 9.1. Suppose that n is large and pr ≤ 10−3 log n/ log log n. Put
|
| 851 |
+
(9.1)
|
| 852 |
+
x =
|
| 853 |
+
√
|
| 854 |
+
6n
|
| 855 |
+
π ,
|
| 856 |
+
s =
|
| 857 |
+
�log √n
|
| 858 |
+
epr
|
| 859 |
+
�
|
| 860 |
+
,
|
| 861 |
+
and let L be the set of integers in the interval [L, L + x/pr+s−1] that are coprime to p, where
|
| 862 |
+
L is a parameter lying in the range
|
| 863 |
+
(9.2)
|
| 864 |
+
√
|
| 865 |
+
6n
|
| 866 |
+
2πpr+s−1 ≤ L ≤
|
| 867 |
+
�
|
| 868 |
+
1 + 1
|
| 869 |
+
5pr
|
| 870 |
+
�
|
| 871 |
+
√
|
| 872 |
+
6n
|
| 873 |
+
2πpr+s−1 log n.
|
| 874 |
+
Then
|
| 875 |
+
p(n; L, s) ≪ p(n)n
|
| 876 |
+
3
|
| 877 |
+
4 exp(−n
|
| 878 |
+
1
|
| 879 |
+
16pr ).
|
| 880 |
+
Before proving the lemma, let us see how Proposition 2.3 would follow. Choose r distinct
|
| 881 |
+
values Lj (with 1 ≤ j ≤ r) all in the range
|
| 882 |
+
�
|
| 883 |
+
1 + 1
|
| 884 |
+
6pr
|
| 885 |
+
�
|
| 886 |
+
√
|
| 887 |
+
6n
|
| 888 |
+
2πpr+s−1 log n ≤ Lj ≤
|
| 889 |
+
�
|
| 890 |
+
1 + 1
|
| 891 |
+
5pr
|
| 892 |
+
�
|
| 893 |
+
√
|
| 894 |
+
6n
|
| 895 |
+
2πpr+s−1 log n,
|
| 896 |
+
such that the corresponding sets Lj are all disjoint. A partition µ for which �µ does not
|
| 897 |
+
contain r distinct parts m1, . . ., mr each appearing at least pr−1 times and suitably large as
|
| 898 |
+
desired in the proposition, must be counted among some p(n; Lj, s) with 1 ≤ j ≤ r. Thus
|
| 899 |
+
by Lemma 9.1 the number of such bad partitions µ is
|
| 900 |
+
≤
|
| 901 |
+
r
|
| 902 |
+
�
|
| 903 |
+
j=1
|
| 904 |
+
p(n; Lj, s) ≪ rp(n)n
|
| 905 |
+
3
|
| 906 |
+
4 exp(−n
|
| 907 |
+
1
|
| 908 |
+
16pr ) ≪ p(n)n exp(−n
|
| 909 |
+
1
|
| 910 |
+
16pr ) ≪ p(n) exp(−n
|
| 911 |
+
1
|
| 912 |
+
20pr ),
|
| 913 |
+
as claimed.
|
| 914 |
+
Proof of Lemma 9.1. Consider the process of going from a partition µ to �µ by combining pr
|
| 915 |
+
parts of the same size m into pr−1 parts of size pm. Suppose that ℓ is coprime to p, and that
|
| 916 |
+
the sum of all parts of the form ℓpj appearing in µ equals ℓk. Restricting our attention to
|
| 917 |
+
these parts, we may think of µ as giving rise to a partition of k into powers of p, and then �µ
|
| 918 |
+
correspondingly gives a partition of k into powers of p obtained by repeatedly combining pr
|
| 919 |
+
|
| 920 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 921 |
+
15
|
| 922 |
+
parts of size pj into pr−1 parts of size pj+1. It follows that p(n; L, s) is the coefficient of zn
|
| 923 |
+
in the generating function
|
| 924 |
+
�
|
| 925 |
+
ℓ/∈L
|
| 926 |
+
(ℓ,p)=1
|
| 927 |
+
∞
|
| 928 |
+
�
|
| 929 |
+
j=0
|
| 930 |
+
�
|
| 931 |
+
1 − zℓpj�−1 �
|
| 932 |
+
ℓ∈L
|
| 933 |
+
�
|
| 934 |
+
∞
|
| 935 |
+
�
|
| 936 |
+
k=0
|
| 937 |
+
�p(k; s)zℓk�
|
| 938 |
+
,
|
| 939 |
+
which equals
|
| 940 |
+
∞
|
| 941 |
+
�
|
| 942 |
+
i=1
|
| 943 |
+
�
|
| 944 |
+
1 − zi�−1 �
|
| 945 |
+
ℓ∈L
|
| 946 |
+
��∞
|
| 947 |
+
k=0 �p(k; s)zℓk
|
| 948 |
+
�∞
|
| 949 |
+
k=0 �p(k)zℓk
|
| 950 |
+
�
|
| 951 |
+
.
|
| 952 |
+
Since all of the coefficients in the generating function for p(n; L, s) are nonnegative, we must
|
| 953 |
+
have, for any 0 < z < 1,
|
| 954 |
+
(9.3)
|
| 955 |
+
p(n; L, s) ≤ 1
|
| 956 |
+
zn
|
| 957 |
+
∞
|
| 958 |
+
�
|
| 959 |
+
i=1
|
| 960 |
+
�
|
| 961 |
+
1 − zi�−1 �
|
| 962 |
+
ℓ∈L
|
| 963 |
+
��∞
|
| 964 |
+
k=0 �p(k; s)zℓk
|
| 965 |
+
�∞
|
| 966 |
+
k=0 �p(k)zℓk
|
| 967 |
+
�
|
| 968 |
+
.
|
| 969 |
+
Recall that x =
|
| 970 |
+
√
|
| 971 |
+
6n/π, and take z = e−1/x in the bound (9.3). Then, by the asymptotic
|
| 972 |
+
formula for the partition function and basic estimates for the generating function of the
|
| 973 |
+
number of partitions (see Section VIII.6 of [3]), we obtain
|
| 974 |
+
(9.4)
|
| 975 |
+
p(n; L, s) ≪ n3/4p(n)
|
| 976 |
+
�
|
| 977 |
+
ℓ∈L
|
| 978 |
+
��∞
|
| 979 |
+
k=0 �p(k; s)zℓk
|
| 980 |
+
�∞
|
| 981 |
+
k=0 �p(k)zℓk
|
| 982 |
+
�
|
| 983 |
+
≪ n3/4p(n) exp(−∆),
|
| 984 |
+
where
|
| 985 |
+
∆ :=
|
| 986 |
+
�
|
| 987 |
+
ℓ∈L
|
| 988 |
+
1
|
| 989 |
+
Fp(x/ℓ)
|
| 990 |
+
∞
|
| 991 |
+
�
|
| 992 |
+
k=0
|
| 993 |
+
(�p(k) − �p(k; s))e−ℓk/x.
|
| 994 |
+
Our work so far applies to any set L of integers that are coprime to p, and we now proceed
|
| 995 |
+
to the situation at hand. The lower bound on L and our choice of x give, for all ℓ ∈ L, the
|
| 996 |
+
bound
|
| 997 |
+
Fp
|
| 998 |
+
�x
|
| 999 |
+
ℓ
|
| 1000 |
+
�
|
| 1001 |
+
≤ Fp
|
| 1002 |
+
� x
|
| 1003 |
+
L
|
| 1004 |
+
�
|
| 1005 |
+
≤ Fp
|
| 1006 |
+
�2pr+s−1
|
| 1007 |
+
log n
|
| 1008 |
+
�
|
| 1009 |
+
.
|
| 1010 |
+
From this estimate, our choice of L, and Lemma 8.2 it follows that
|
| 1011 |
+
(9.5)
|
| 1012 |
+
∆ ≥
|
| 1013 |
+
1
|
| 1014 |
+
Fp(2pr+s−1/ log n)
|
| 1015 |
+
�
|
| 1016 |
+
L≤ℓ≤L+x/pr+s−1
|
| 1017 |
+
(ℓ,p)=1
|
| 1018 |
+
�
|
| 1019 |
+
k≥pr+s−1(1+4/s)
|
| 1020 |
+
ps(s−1)/2
|
| 1021 |
+
(s − 1)s−1e−ℓk/x.
|
| 1022 |
+
For ℓ in the range L ≤ ℓ ≤ L + x/pr+s−1, we have
|
| 1023 |
+
�
|
| 1024 |
+
k≥pr+s−1(1+4/s)
|
| 1025 |
+
e−ℓk/x ≥ exp
|
| 1026 |
+
�
|
| 1027 |
+
− ℓpr+s−1
|
| 1028 |
+
x
|
| 1029 |
+
�
|
| 1030 |
+
1 + 4
|
| 1031 |
+
s
|
| 1032 |
+
��
|
| 1033 |
+
e−ℓ/x
|
| 1034 |
+
1 − e−ℓ/x
|
| 1035 |
+
≥ x
|
| 1036 |
+
2L exp
|
| 1037 |
+
�
|
| 1038 |
+
−
|
| 1039 |
+
�Lpr+s−1
|
| 1040 |
+
x
|
| 1041 |
+
+ 1
|
| 1042 |
+
��
|
| 1043 |
+
1 + 4
|
| 1044 |
+
s
|
| 1045 |
+
��
|
| 1046 |
+
.
|
| 1047 |
+
Inserting this into the right-hand side of (9.5) and noting that (since pr+s−1 is small in
|
| 1048 |
+
comparison to x)
|
| 1049 |
+
|L| ≥
|
| 1050 |
+
�
|
| 1051 |
+
1 − 1
|
| 1052 |
+
p
|
| 1053 |
+
�
|
| 1054 |
+
x
|
| 1055 |
+
pr+s−1 − 2 ≥
|
| 1056 |
+
x
|
| 1057 |
+
3pr+s−1,
|
| 1058 |
+
|
| 1059 |
+
16
|
| 1060 |
+
SARAH PELUSE AND KANNAN SOUNDARARAJAN
|
| 1061 |
+
we obtain (using our choice of x and the range for L)
|
| 1062 |
+
∆ ≥
|
| 1063 |
+
1
|
| 1064 |
+
Fp(2pr+s−1/ log n) · ps(s−1)/2
|
| 1065 |
+
(s − 1)s−1 ·
|
| 1066 |
+
x
|
| 1067 |
+
3pr+s−1 · x
|
| 1068 |
+
2L exp
|
| 1069 |
+
�
|
| 1070 |
+
−
|
| 1071 |
+
�Lpr+s−1
|
| 1072 |
+
x
|
| 1073 |
+
+ 1
|
| 1074 |
+
��
|
| 1075 |
+
1 + 4
|
| 1076 |
+
s
|
| 1077 |
+
��
|
| 1078 |
+
≥ 1
|
| 1079 |
+
6
|
| 1080 |
+
1
|
| 1081 |
+
Fp(2pr+s−1/ log n) · ps(s−1)/2
|
| 1082 |
+
(s − 1)s−1 ·
|
| 1083 |
+
x
|
| 1084 |
+
log n · exp
|
| 1085 |
+
�
|
| 1086 |
+
−
|
| 1087 |
+
�Lpr+s−1
|
| 1088 |
+
x
|
| 1089 |
+
+ 1
|
| 1090 |
+
��
|
| 1091 |
+
1 + 4
|
| 1092 |
+
s
|
| 1093 |
+
��
|
| 1094 |
+
.
|
| 1095 |
+
Using Lemma 8.1 and the bound pr ≤ log √n, it follows that
|
| 1096 |
+
log Fp
|
| 1097 |
+
�2pr+s−1
|
| 1098 |
+
log n
|
| 1099 |
+
�
|
| 1100 |
+
≤
|
| 1101 |
+
1
|
| 1102 |
+
2 log p
|
| 1103 |
+
�
|
| 1104 |
+
log pr+s−1
|
| 1105 |
+
log √n
|
| 1106 |
+
�2
|
| 1107 |
+
+ 1
|
| 1108 |
+
2 log pr+s−1
|
| 1109 |
+
log √n + 1
|
| 1110 |
+
8 log p + O(1)
|
| 1111 |
+
≤
|
| 1112 |
+
1
|
| 1113 |
+
2 log p
|
| 1114 |
+
�
|
| 1115 |
+
log pr+s−1
|
| 1116 |
+
log √n
|
| 1117 |
+
�2
|
| 1118 |
+
+ s
|
| 1119 |
+
2 log p + O(1).
|
| 1120 |
+
Therefore
|
| 1121 |
+
log
|
| 1122 |
+
ps(s−1)/2
|
| 1123 |
+
Fp(2pr+s−1/ log n)(s − 1)s−1 ≥ s2
|
| 1124 |
+
2 log p −
|
| 1125 |
+
1
|
| 1126 |
+
2 log p
|
| 1127 |
+
�
|
| 1128 |
+
log pr+s−1
|
| 1129 |
+
log √n
|
| 1130 |
+
�2
|
| 1131 |
+
− s log ps + O(1)
|
| 1132 |
+
≥ s log log √n
|
| 1133 |
+
prs
|
| 1134 |
+
− (log log √n)2
|
| 1135 |
+
2 log p
|
| 1136 |
+
+ O(1).
|
| 1137 |
+
Recalling our choice of s, we conclude that
|
| 1138 |
+
log ∆ ≥ s log log √n
|
| 1139 |
+
prs
|
| 1140 |
+
+ log √n − (log log √n)2
|
| 1141 |
+
2 log p
|
| 1142 |
+
− log log n − Lpr+s−1
|
| 1143 |
+
x
|
| 1144 |
+
�
|
| 1145 |
+
1 + 4
|
| 1146 |
+
s
|
| 1147 |
+
�
|
| 1148 |
+
+ O(1)
|
| 1149 |
+
≥
|
| 1150 |
+
�
|
| 1151 |
+
1 + 1
|
| 1152 |
+
epr
|
| 1153 |
+
�
|
| 1154 |
+
log √n − Lpr+s−1
|
| 1155 |
+
x
|
| 1156 |
+
− log log n − (log log √n)2
|
| 1157 |
+
2 log p
|
| 1158 |
+
+ O(1)
|
| 1159 |
+
≥
|
| 1160 |
+
� 1
|
| 1161 |
+
epr − 1
|
| 1162 |
+
5pr
|
| 1163 |
+
�
|
| 1164 |
+
log √n − (log log n)2 + O(1) ≥ log n
|
| 1165 |
+
15pr − (log log n)2 + O(1),
|
| 1166 |
+
upon using the upper bound on L in (9.2). In the range pr ≤ 10−3 log n/(log log n)2 we find
|
| 1167 |
+
log ∆ ≥ log n
|
| 1168 |
+
16pr + O(1),
|
| 1169 |
+
which when used in (9.4) yields the lemma.
|
| 1170 |
+
□
|
| 1171 |
+
References
|
| 1172 |
+
[1] N. G. de Bruijn. On Mahler’s partition problem. Nederl. Akad. Wetensch., Proc., 51:659–669 = Inda-
|
| 1173 |
+
gationes Math. 10, 210–220 (1948), 1948.
|
| 1174 |
+
[2] P. Erd˝os and J. Lehner. The distribution of the number of summands in the partitions of a positive
|
| 1175 |
+
integer. Duke Math. J., 8:335–345, 1941.
|
| 1176 |
+
[3] P. Flajolet and R. Sedgewick. Analytic combinatorics. Cambridge University Press, Cambridge, 2009.
|
| 1177 |
+
[4] W. Fulton and J. Harris. Representation theory, volume 129 of Graduate Texts in Mathematics. Springer-
|
| 1178 |
+
Verlag, New York, 1991. A first course, Readings in Mathematics.
|
| 1179 |
+
[5] D. Gluck. Parity in columns of the character table of Sn. Proc. Amer. Math. Soc., 147(3):1005–1011,
|
| 1180 |
+
2019.
|
| 1181 |
+
[6] G. James and A. Kerber. The representation theory of the symmetric group, volume 16 of Encyclopedia
|
| 1182 |
+
of Mathematics and its Applications. Addison-Wesley Publishing Co., Reading, Mass., 1981.
|
| 1183 |
+
[7] M. J. Larsen and A. R. Miller. The sparsity of character tables of high rank groups of Lie type. Represent.
|
| 1184 |
+
Theory, 25:173–192, 2021.
|
| 1185 |
+
|
| 1186 |
+
DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
|
| 1187 |
+
17
|
| 1188 |
+
[8] I. G. Macdonald. Symmetric functions and Hall polynomials. Oxford Mathematical Monographs. The
|
| 1189 |
+
Clarendon Press, Oxford University Press, New York, second edition, 1995. With contributions by A.
|
| 1190 |
+
Zelevinsky, Oxford Science Publications.
|
| 1191 |
+
[9] K. Mahler. On a special functional equation. J. London Math. Soc., 15:115–123, 1940.
|
| 1192 |
+
[10] J. McKay. Irreducible representations of odd degree. J. Algebra, 20:416–418, 1972.
|
| 1193 |
+
[11] A. R. Miller. Note on parity and the irreducible characters of the symmetric group. preprint, 2017.
|
| 1194 |
+
arXiv:1708.03267.
|
| 1195 |
+
[12] A. R. Miller. Congruences in character tables of symmetric groups. preprint, 2019. arXiv:1908.03741.
|
| 1196 |
+
[13] A. R. Miller. On parity and characters of symmetric groups. J. Combin. Theory Ser. A, 162:231–240,
|
| 1197 |
+
2019.
|
| 1198 |
+
[14] L. Morotti. On divisibility by primes in columns of character tables of symmetric groups. Arch. Math.
|
| 1199 |
+
(Basel), 114(4):361–365, 2020.
|
| 1200 |
+
[15] S. Peluse. On even entries in the character table of the symmetric group. preprint,
|
| 1201 |
+
2020.
|
| 1202 |
+
arXiv:2007.06652.
|
| 1203 |
+
[16] S. Peluse and K. Soundararajan. Almost all entries in the character table of the symmetric group are
|
| 1204 |
+
multiples of any given prime. J. Reine Angew. Math., 786:45–53, 2022.
|
| 1205 |
+
School of Mathematics, Institute for Advanced Study, Princeton, NJ, USA, & Depart-
|
| 1206 |
+
ment of Mathematics, Princeton University, Princeton, NJ, USA
|
| 1207 |
+
Email address: speluse@princeton.edu
|
| 1208 |
+
Department of Mathematics, Stanford University, Stanford, CA, USA
|
| 1209 |
+
Email address: ksound@stanford.edu
|
| 1210 |
+
|
GNE0T4oBgHgl3EQfRQAC/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:4e5e4fedec3b2b50f5f1c9636712cb522b0c3eba6428208b999d715077c5dcff
|
| 3 |
+
size 186984
|
H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9e8c949905f3d9f9608832804f2e070a5590c03b98d127ce695c6f51aa670160
|
| 3 |
+
size 2228269
|
IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d34cdefa0e1222397eacb834f311805cffc3382caa0b542a6ed171a9aca85c57
|
| 3 |
+
size 268500
|
IdE4T4oBgHgl3EQfIQyU/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:33ef4ea0fd6e6b2d3beedec570697d235225078363f4599da00ac5787ee28d9d
|
| 3 |
+
size 129590
|
JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:861ed499245a7eaebaaea5831abe31a86998625d3efae4d79ce20fd32e4e2d44
|
| 3 |
+
size 222119
|
JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c710af33abba7d8ba4bc2710764af8f7f09449c1ca7e4eb79f977f0cb46a281a
|
| 3 |
+
size 2031661
|
JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0d708ed6c88dd16206dc8fc77643e2378c6674b6ed0d9c1c0f0a224685c020bc
|
| 3 |
+
size 2973975
|
JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6f5656ed89b8d8f522e9d9e3abc994c86ba1334ec7bdd475441ff97fe802f1ba
|
| 3 |
+
size 4128813
|