Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -9AzT4oBgHgl3EQfS_sw/content/tmp_files/2301.01240v1.pdf.txt +1300 -0
- -9AzT4oBgHgl3EQfS_sw/content/tmp_files/load_file.txt +0 -0
- -NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf +3 -0
- -NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss +3 -0
- -NFRT4oBgHgl3EQfrTfI/vector_store/index.pkl +3 -0
- .gitattributes +72 -0
- 0NFST4oBgHgl3EQfVTgy/content/tmp_files/2301.13776v1.pdf.txt +1515 -0
- 0NFST4oBgHgl3EQfVTgy/content/tmp_files/load_file.txt +0 -0
- 19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf +3 -0
- 19FKT4oBgHgl3EQfPS1l/content/tmp_files/2301.11762v1.pdf.txt +788 -0
- 19FKT4oBgHgl3EQfPS1l/content/tmp_files/load_file.txt +0 -0
- 1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf +3 -0
- 1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss +3 -0
- 1NFPT4oBgHgl3EQfUTQQ/vector_store/index.pkl +3 -0
- 3NE2T4oBgHgl3EQf5wjH/content/tmp_files/2301.04194v1.pdf.txt +2870 -0
- 3NE2T4oBgHgl3EQf5wjH/content/tmp_files/load_file.txt +0 -0
- 3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss +3 -0
- 59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf +3 -0
- 59E1T4oBgHgl3EQfTAPi/vector_store/index.pkl +3 -0
- 8dE1T4oBgHgl3EQfCAI3/content/tmp_files/2301.02858v1.pdf.txt +2437 -0
- 8dE1T4oBgHgl3EQfCAI3/content/tmp_files/load_file.txt +0 -0
- 8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss +3 -0
- 9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss +3 -0
- 9tE0T4oBgHgl3EQffwDm/vector_store/index.pkl +3 -0
- C9E2T4oBgHgl3EQfoAjs/content/tmp_files/2301.04015v1.pdf.txt +1048 -0
- C9E2T4oBgHgl3EQfoAjs/content/tmp_files/load_file.txt +0 -0
- CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf +3 -0
- CdE0T4oBgHgl3EQfyQI7/vector_store/index.pkl +3 -0
- CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss +3 -0
- EdAzT4oBgHgl3EQfiv0h/content/tmp_files/2301.01503v1.pdf.txt +1378 -0
- EdAzT4oBgHgl3EQfiv0h/content/tmp_files/load_file.txt +0 -0
- GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf +3 -0
- GdAzT4oBgHgl3EQfHfsT/vector_store/index.pkl +3 -0
- GtFLT4oBgHgl3EQfHC_F/content/tmp_files/2301.11995v1.pdf.txt +1568 -0
- GtFLT4oBgHgl3EQfHC_F/content/tmp_files/load_file.txt +0 -0
- H9E1T4oBgHgl3EQfrgXE/content/tmp_files/2301.03356v1.pdf.txt +531 -0
- H9E1T4oBgHgl3EQfrgXE/content/tmp_files/load_file.txt +531 -0
- I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf +3 -0
- I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss +3 -0
- I9E1T4oBgHgl3EQfGAMz/vector_store/index.pkl +3 -0
- I9FIT4oBgHgl3EQfYyvF/content/tmp_files/2301.11250v1.pdf.txt +1870 -0
- I9FIT4oBgHgl3EQfYyvF/content/tmp_files/load_file.txt +0 -0
- INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf +3 -0
- ItAyT4oBgHgl3EQf5vr6/content/tmp_files/2301.00812v1.pdf.txt +1909 -0
- ItAyT4oBgHgl3EQf5vr6/content/tmp_files/load_file.txt +0 -0
- JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf +3 -0
- JdE0T4oBgHgl3EQfSACX/vector_store/index.pkl +3 -0
- JtAyT4oBgHgl3EQfsPmi/content/tmp_files/2301.00574v1.pdf.txt +1006 -0
- K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf +3 -0
- K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss +3 -0
-9AzT4oBgHgl3EQfS_sw/content/tmp_files/2301.01240v1.pdf.txt
ADDED
|
@@ -0,0 +1,1300 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
1
|
| 2 |
+
Modeling Effective Lifespan of Payment
|
| 3 |
+
Channels
|
| 4 |
+
Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
|
| 5 |
+
Abstract—While being decentralized, secure, and reliable, Bitcoin and many other blockchain-based cryptocurrencies suffer from
|
| 6 |
+
scalability issues. One of the promising proposals to address this problem is off-chain payment channels. Since, not all nodes are
|
| 7 |
+
connected directly to each other, they can use a payment network to route their payments. Each node allocates a balance that is frozen
|
| 8 |
+
during the channel’s lifespan. Spending and receiving transactions will shift the balance to one side of the channel. A channel becomes
|
| 9 |
+
unbalanced when there is not sufficient balance in one direction. In this case, we say the effective lifespan of the channel has ended.
|
| 10 |
+
In this paper, we develop a mathematical model to predict the expected effective lifespan of a channel based on the network’s topology.
|
| 11 |
+
We investigate the impact of channel unbalancing on the payment network and individual channels. We also discuss the effect of
|
| 12 |
+
certain characteristics of payment channels on their lifespan. Our case study on a snapshot of the Lightning Network shows how the
|
| 13 |
+
effective lifespan is distributed, and how it is correlated with other network characteristics. Our results show that central unbalanced
|
| 14 |
+
channels have a drastic effect on the network performance.
|
| 15 |
+
Index Terms—Bitcoin, Lightning Network, Payment Channel, Lifespan, Random Walk.
|
| 16 |
+
!
|
| 17 |
+
1
|
| 18 |
+
INTRODUCTION
|
| 19 |
+
B
|
| 20 |
+
ITCOIN is the first decentralized cryptocurrency, in-
|
| 21 |
+
troduced in 2008 which provides security, anonymity,
|
| 22 |
+
transparency, and democracy without any trusted third
|
| 23 |
+
party [1]. Most of these properties are achieved by using
|
| 24 |
+
a blockchain as a distributed ledger. An inherent problem
|
| 25 |
+
with using a blockchain over a network is that it sacrifices
|
| 26 |
+
scalability [2], [3]. The reason is that all nodes, potentially
|
| 27 |
+
tens of thousands, must exchange, store, and verify each
|
| 28 |
+
and every transaction in the system [4]. Furthermore, each
|
| 29 |
+
block has a limited size and blocks get generated at regular
|
| 30 |
+
intervals (approximately every 10 minutes). This means that
|
| 31 |
+
with the current blocksize of 1 MB the throughput of Bitcoin
|
| 32 |
+
is about 4.6 transactions per second, which is much slower
|
| 33 |
+
than centralized systems like Visa, WeChatPay, and PayPal
|
| 34 |
+
[5]; making the use of Bitcoin in everyday transactions
|
| 35 |
+
impractical.
|
| 36 |
+
Another trade-off the Bitcoin consensus makes is that it
|
| 37 |
+
ensures security by waiting for other miners to confirm a
|
| 38 |
+
transaction by extending the block holding that transaction,
|
| 39 |
+
which reduces the throughput. This way it makes sure that
|
| 40 |
+
the double spending attack is highly improbable. Currently,
|
| 41 |
+
the standard waiting time for a block to be confirmed is 6
|
| 42 |
+
blocks, which is almost one hour [6].
|
| 43 |
+
Bitcoin’s capacity limitations are being felt by users in
|
| 44 |
+
the form of increased transaction fees and latency. With
|
| 45 |
+
an increasing demand for making transactions, users need
|
| 46 |
+
to pay more transaction fees in order to make sure that
|
| 47 |
+
their transaction is more profitable for the miners; hence
|
| 48 |
+
have a higher chance of making it into a block. Queuing of
|
| 49 |
+
transactions and network bandwidth will lead to a longer
|
| 50 |
+
delay time for a transaction to appear in the blockchain.
|
| 51 |
+
There are many different proposals to solve the scala-
|
| 52 |
+
bility problem. Most of the proposals fall into three cate-
|
| 53 |
+
gories: Layer0, Layer1, and Layer2 solutions [7]. Layer0
|
| 54 |
+
solutions try to enhance the infrastructure, like the network
|
| 55 |
+
that connects the nodes. Layer1 solutions try to enhance
|
| 56 |
+
the blockchain’s shortcomings by changing the consensus
|
| 57 |
+
mechanism and protocols [8], [9]. Layer2 solutions propose
|
| 58 |
+
ways to move away from the blockchain, and for this reason,
|
| 59 |
+
they are also called off-chain solutions [10].
|
| 60 |
+
In 2016 the idea of Lightning Network (LN) was pro-
|
| 61 |
+
posed to move the transactions to the second layer (off-
|
| 62 |
+
chain) [4]. The Lightning Network consists of payment
|
| 63 |
+
channels in a P2P fashion. Payment channels allow two
|
| 64 |
+
parties to exchange payments with negligible time and cost,
|
| 65 |
+
but both parties must freeze an initial fund in the channel
|
| 66 |
+
so no one can spend more money than they own and no
|
| 67 |
+
double spending occurs. It is important to note that the sum
|
| 68 |
+
of funds in each channel remains constant throughout the
|
| 69 |
+
channel’s lifespan and only the channel’s balance changes.
|
| 70 |
+
When two parties that do not have a direct channel want to
|
| 71 |
+
exchange payments they can use other parties to route their
|
| 72 |
+
payments. So a network of nodes is constructed and all the
|
| 73 |
+
connected nodes can send each other payments.
|
| 74 |
+
This system moves the cost of submitting a transaction
|
| 75 |
+
off the blockchain. Only the final states between two nodes
|
| 76 |
+
will eventually make it into the blockchain, which signifi-
|
| 77 |
+
cantly increases throughput. Furthermore, no time is needed
|
| 78 |
+
for the transaction to be confirmed and all transactions in a
|
| 79 |
+
channel happen almost instantly.
|
| 80 |
+
After several transactions through a channel, the channel
|
| 81 |
+
starts to get unbalanced; meaning all of its funds have gone
|
| 82 |
+
to one of the parties and the other node cannot route any
|
| 83 |
+
more payments through the channel. In this case, it is best
|
| 84 |
+
to close the unbalanced channel or open a new one.
|
| 85 |
+
In this paper, we investigate the expected effective lifes-
|
| 86 |
+
pan of a channel in a payment network. Our contributions
|
| 87 |
+
can be summarized as follows:
|
| 88 |
+
•
|
| 89 |
+
We provide simulation evidence of how channel
|
| 90 |
+
unbalancing impacts its throughput. Moreover, we
|
| 91 |
+
show how the performance of the payment network
|
| 92 |
+
arXiv:2301.01240v1 [cs.DC] 11 Sep 2022
|
| 93 |
+
|
| 94 |
+
2
|
| 95 |
+
can be affected if a number of channels become
|
| 96 |
+
unbalanced.
|
| 97 |
+
•
|
| 98 |
+
We present a mathematical model of payment chan-
|
| 99 |
+
nels to predict the expected time for a channel to get
|
| 100 |
+
unbalanced considering the channel’s position in the
|
| 101 |
+
network and its initial balance. We call this time the
|
| 102 |
+
Effective Lifespan of the channel.
|
| 103 |
+
•
|
| 104 |
+
We evaluate our model through simulation, and
|
| 105 |
+
observe how the Effective Lifespan of a channel is
|
| 106 |
+
affected if we change any of its characteristics.
|
| 107 |
+
•
|
| 108 |
+
By analyzing a recent snapshot of the Lightning Net-
|
| 109 |
+
work, we find the distribution of real-world chan-
|
| 110 |
+
nel lifespans and its correlation with the network’s
|
| 111 |
+
topological parameters. We also investigate the rela-
|
| 112 |
+
tionship between the centrality of a channel in the
|
| 113 |
+
network and its effective lifespan.
|
| 114 |
+
2
|
| 115 |
+
RELATED WORK
|
| 116 |
+
While the LN white paper [4] does not discuss channel re-
|
| 117 |
+
balancing, there exists some research on channel balances
|
| 118 |
+
and their significance.
|
| 119 |
+
The importance of channel balances is mainly discussed
|
| 120 |
+
in four major areas; re-balancing, security, performance, and
|
| 121 |
+
financial.
|
| 122 |
+
Re-balancing: [11] proposes a method for re-balancing
|
| 123 |
+
payment channels. This work allows arbitrary sets of users
|
| 124 |
+
to securely re-balance their channels. However, this paper
|
| 125 |
+
does not discuss the application of re-balancing, and how
|
| 126 |
+
frequently it should be performed. [12] also proposes meth-
|
| 127 |
+
ods for rebalancing LN channels, but does not discuss the
|
| 128 |
+
frequency of rebalancing.
|
| 129 |
+
Performance: In [13] the authors discuss why it is in
|
| 130 |
+
the best interest of the network to have balanced channels.
|
| 131 |
+
They propose a method to re-balance some channels to
|
| 132 |
+
improve the network’s performance. [14] presents a method
|
| 133 |
+
in which a node can make its channels balanced through
|
| 134 |
+
circular subgraphs. It also develops a method for measuring
|
| 135 |
+
imbalance in a payment network.
|
| 136 |
+
Security: There has been some research on the security
|
| 137 |
+
aspects of channel unbalancing. In [14], [15], and [16] the
|
| 138 |
+
authors describe a method in which it is possible for an
|
| 139 |
+
adversary to uncover channel balances. Having unbalanced
|
| 140 |
+
channels poses the threat of griefing attacks. The incentive
|
| 141 |
+
for honest behavior in the LN channels is the penalty for
|
| 142 |
+
misbehavior. If a node cheats by publishing an old contract,
|
| 143 |
+
it will be penalized and all of the channel funds can be
|
| 144 |
+
claimed by the victim. When channels are unbalanced the
|
| 145 |
+
penalty is less so there is less incentive for honest behav-
|
| 146 |
+
ior. In [17] the authors discuss some countermeasures like
|
| 147 |
+
watchtowers to keep the misbehaving nodes from closing
|
| 148 |
+
the channel.
|
| 149 |
+
Financial: Routing payments through a channel can
|
| 150 |
+
make revenue for the owner. So payment channels can be
|
| 151 |
+
looked at as investments. In [18] the authors do an in-depth
|
| 152 |
+
financial analysis on how much should payment channels
|
| 153 |
+
charge for routing payments. One of the key factors in this
|
| 154 |
+
analysis is the lifespan of payment channels. In order to
|
| 155 |
+
analyze investing in a payment channel, nodes should be
|
| 156 |
+
able to have an estimate on how long the investment stays
|
| 157 |
+
profitable and what is the impact of channel unbalancing on
|
| 158 |
+
the profits of a channel. Branzei et al. [18] assume an equal
|
| 159 |
+
probability of having a payment from each side in a channel
|
| 160 |
+
and use the lifetime of channels for financial analyses. We
|
| 161 |
+
will show how the lifespan of a channel could be affected
|
| 162 |
+
by this probability.
|
| 163 |
+
In this paper we focus on the details of estimating chan-
|
| 164 |
+
nel lifespans; considering parameters such as the placement
|
| 165 |
+
of the channel in the topology and payment rates between
|
| 166 |
+
each pair and explain the importance of estimating channel
|
| 167 |
+
lifespans. This gives us a better and more realistic estimation
|
| 168 |
+
of the channel’s lifespan compared to existing work. More-
|
| 169 |
+
over, we measure the impact of imbalanced channels on the
|
| 170 |
+
network.
|
| 171 |
+
Despite the importance of payment channel’s lifespan, to
|
| 172 |
+
the best of our knowledge, the expected lifespan of channels
|
| 173 |
+
in the payment network has not been discussed in detail.
|
| 174 |
+
3
|
| 175 |
+
TECHNICAL BACKGROUND
|
| 176 |
+
In this section, we provide a technical background to under-
|
| 177 |
+
stand the remainder of this paper thoroughly.
|
| 178 |
+
Payment Channels
|
| 179 |
+
Payment channel is a financial contract between two parties
|
| 180 |
+
in a cryptocurrency like Bitcoin. The contract allocates a
|
| 181 |
+
balance of funds from both parties. The contract is estab-
|
| 182 |
+
lished by a 2-of-2 multisignature address which requires the
|
| 183 |
+
cooperation of both parties to spend the funds.
|
| 184 |
+
Payments are made off the blockchain by passing on
|
| 185 |
+
a new version of the contract with a different balance of
|
| 186 |
+
allocated funds on the spending transaction; which both
|
| 187 |
+
parties have to sign. The channel is closed when one of
|
| 188 |
+
the parties publishes the latest version of the contract to
|
| 189 |
+
the blockchain. We define the payment direction to be the
|
| 190 |
+
direction in which funds are moving during a transaction.
|
| 191 |
+
In this paper, we call the sum of locked funds in a
|
| 192 |
+
channel the channel’s capacity. When all of the funds of
|
| 193 |
+
a channel are allocated to one of the parties, the channel
|
| 194 |
+
becomes unbalanced. In this case payments can only be made
|
| 195 |
+
from one side of the channel. A channel’s effective lifespan is
|
| 196 |
+
the time from creation of a channel until the first imbalance
|
| 197 |
+
occurs. A channel’s success probability is defined as the
|
| 198 |
+
number of successful payments made through the channel
|
| 199 |
+
divided by the total number of payment attempts.
|
| 200 |
+
Several connected payment channels can form a pay-
|
| 201 |
+
ment network, in the case of Bitcoin, this network is called
|
| 202 |
+
the Lightning Network [4]. This network is used to route
|
| 203 |
+
payments through intermediate channels between nodes
|
| 204 |
+
who do not have a direct channel between them. We de-
|
| 205 |
+
fine a network’s success probability as the total number of
|
| 206 |
+
successful payments made on the network divided by the
|
| 207 |
+
total attempts to route payments through the network [19].
|
| 208 |
+
Random Walk
|
| 209 |
+
The random walk model has been used in a wide variety
|
| 210 |
+
of contexts to model the movement of objects in different
|
| 211 |
+
spaces. This paper uses one-dimensional random walk to
|
| 212 |
+
model the liquidity balance in a payment channel. Two
|
| 213 |
+
endpoints on the left and right sides of the random walk
|
| 214 |
+
are assumed to represent the channel imbalance condition.
|
| 215 |
+
|
| 216 |
+
3
|
| 217 |
+
Fig. 1. Relation of network success rate with percentage of unbalanced
|
| 218 |
+
channels in the network.
|
| 219 |
+
In our model, each payment corresponds to one step of
|
| 220 |
+
the random walk model, and the direction of the payment
|
| 221 |
+
determines the direction of that step. Suppose we take prob-
|
| 222 |
+
abilities p and 1 − p as the probability of payment direction
|
| 223 |
+
(i.e., step direction). We can find the expected number of
|
| 224 |
+
payments (steps) needed for the channel (the random walk
|
| 225 |
+
model)to get unbalanced (to reach one of the endpoints).
|
| 226 |
+
Betweenness Centrality
|
| 227 |
+
Betweenness centrality is a measure based on shortest paths
|
| 228 |
+
for the importance of the location of a node or an edge
|
| 229 |
+
in a graph. Betweenness centrality for an edge(a, b) in the
|
| 230 |
+
network is defined as follows: �
|
| 231 |
+
s,t∈V
|
| 232 |
+
s̸=t
|
| 233 |
+
σ(s,t|edge(a,b))
|
| 234 |
+
σ(s,t)
|
| 235 |
+
, where
|
| 236 |
+
σ(s, t) is the total number of shortest paths between nodes
|
| 237 |
+
s and t and σ(s, t|edge(a, b)) is the total number of shortest
|
| 238 |
+
paths between s and t that pass through edge(a, b).
|
| 239 |
+
4
|
| 240 |
+
MOTIVATION
|
| 241 |
+
One of the important characteristics of a payment network
|
| 242 |
+
is reliability. Reliability can be defined as the probability of
|
| 243 |
+
payment success [19].
|
| 244 |
+
In this section, we analyze the payment routing failure
|
| 245 |
+
probability of a singular channel after unbalancing, and the
|
| 246 |
+
network’s success probability of routing a payment when
|
| 247 |
+
some channels are unbalanced.
|
| 248 |
+
4.1
|
| 249 |
+
Singular Channel
|
| 250 |
+
We ran a simulator of a single payment channel to see how
|
| 251 |
+
much the failure rate increases after the first time that the
|
| 252 |
+
channel becomes unbalanced. Fig. 2 shows the failure rate
|
| 253 |
+
after the first time a channel becomes unbalanced. During
|
| 254 |
+
the simulation, 5000 payments were being routed through
|
| 255 |
+
an initially balanced channel. Then the simulator calculates
|
| 256 |
+
the failure rate after the first time the channel becomes un-
|
| 257 |
+
balanced. As Fig. 2 suggests, the probability of the direction
|
| 258 |
+
of payments (p) is a key factor in determining how much
|
| 259 |
+
the probability of payment success degrades after the first
|
| 260 |
+
imbalance occurs. Channels capacity has little to no impact
|
| 261 |
+
on how well it performs after unbalancing.
|
| 262 |
+
These results show that the probability of payment di-
|
| 263 |
+
rection (p), which depends on the network topology and
|
| 264 |
+
Fig. 2. Failure rate after unbalancing.
|
| 265 |
+
the network’s transaction flow, is one of the most impor-
|
| 266 |
+
tant parameters in determining the channel’s lifespan; more
|
| 267 |
+
importantly, shows the impact of unbalancing on channel
|
| 268 |
+
success probability after the channel becomes unbalanced.
|
| 269 |
+
4.2
|
| 270 |
+
Network Performance
|
| 271 |
+
Using the CLoTH simulator [19] we simulate and measure
|
| 272 |
+
the performance of Lightning Network. In each iteration we
|
| 273 |
+
take channels from the given LN snapshot and make them
|
| 274 |
+
unbalanced, we then measure the success probability after
|
| 275 |
+
attempting 5000 payments. Choosing more central channels
|
| 276 |
+
as unbalanced channels is more reasonable, because they
|
| 277 |
+
route more payments and thus have a higher probability
|
| 278 |
+
of becoming unbalanced in the real world. We considered
|
| 279 |
+
two scenarios for selecting channels to unbalance: choos-
|
| 280 |
+
ing channels randomly and choosing channels that have
|
| 281 |
+
a higher betweenness centrality. As illustrated in Fig. 1,
|
| 282 |
+
as the percentage of unbalanced channels increases, the
|
| 283 |
+
routing success rate decreases dramatically for both channel
|
| 284 |
+
selection scenarios. In the random selection scenario, it is
|
| 285 |
+
noticeable that the first 10 percent of unbalanced channels
|
| 286 |
+
have less effect on the network performance than the last
|
| 287 |
+
10 percent of unbalanced channels. We see that unbalancing
|
| 288 |
+
channels with a higher betweenness centrality has a higher
|
| 289 |
+
impact on the network performance in contrast with the
|
| 290 |
+
random selection scenarios. Therefore, per any percentage of
|
| 291 |
+
unbalanced channels, selection with betweenness centrality
|
| 292 |
+
is more effective.
|
| 293 |
+
Seres et al. [20] suggest that in the Lightning Network,
|
| 294 |
+
the top 14% central channels will have the most significant
|
| 295 |
+
impact on the network. In a different experiment we made
|
| 296 |
+
15% of the network’s channels unbalanced, we first sort the
|
| 297 |
+
channels by betweenness centrality and take a window of
|
| 298 |
+
15% of the channels per experiment. We start with the 15%
|
| 299 |
+
most central channels and move all the way up to 15%
|
| 300 |
+
least central channels. It can be inferred from the results
|
| 301 |
+
in Fig. 3 that more central channels have more impact on
|
| 302 |
+
the network success rate when they become unbalanced. As
|
| 303 |
+
we can see in Fig. 3, the top 15% central channels have the
|
| 304 |
+
most significant effect on the success rate when they become
|
| 305 |
+
unbalanced. This confirms the result from Fig. 1.
|
| 306 |
+
|
| 307 |
+
100
|
| 308 |
+
Random
|
| 309 |
+
90
|
| 310 |
+
Most central
|
| 311 |
+
80
|
| 312 |
+
rate
|
| 313 |
+
70
|
| 314 |
+
Success
|
| 315 |
+
60
|
| 316 |
+
50
|
| 317 |
+
40
|
| 318 |
+
30
|
| 319 |
+
20
|
| 320 |
+
20
|
| 321 |
+
40
|
| 322 |
+
60
|
| 323 |
+
80
|
| 324 |
+
100
|
| 325 |
+
Percentage of initialy unbalanced channels0.40
|
| 326 |
+
Capacity: 1.2 Msat
|
| 327 |
+
Capacity: 1.8 Msat.
|
| 328 |
+
0.35
|
| 329 |
+
Capacity: 2.4 Msat.
|
| 330 |
+
Capacity: 3.0 Msat.
|
| 331 |
+
0.30
|
| 332 |
+
Capacity: 3.6 Msat.
|
| 333 |
+
0.20
|
| 334 |
+
Fal
|
| 335 |
+
0.15
|
| 336 |
+
0.10
|
| 337 |
+
0.05
|
| 338 |
+
0.300
|
| 339 |
+
0.325
|
| 340 |
+
0.3500.3750.400
|
| 341 |
+
0.425
|
| 342 |
+
0.450
|
| 343 |
+
0.475
|
| 344 |
+
0.500
|
| 345 |
+
probability of payment direction4
|
| 346 |
+
Fig. 3. Per each data point the i-th to (i+4500)-th most central channels
|
| 347 |
+
are unbalanced and the success rate of the network is measured. The
|
| 348 |
+
total number of channels is 30457.
|
| 349 |
+
5
|
| 350 |
+
THE MODEL
|
| 351 |
+
As we discussed in Section 4 channel balances have a sig-
|
| 352 |
+
nificant effect on both channel, and network performance.
|
| 353 |
+
In this section, we introduce a mathematical model to deter-
|
| 354 |
+
mine the expected time for a channel to get unbalanced;
|
| 355 |
+
we call this the channel’s expected lifespan. We model
|
| 356 |
+
the dynamics of a payment channel with a random walk
|
| 357 |
+
problem. Each payment passing through the channel will
|
| 358 |
+
represent a step the random walker takes. We will first
|
| 359 |
+
discuss our assumptions and describe the model in detail.
|
| 360 |
+
We then discuss how to find the model parameters. We
|
| 361 |
+
proceed by doing an analysis on how the expected lifespan
|
| 362 |
+
is affected by changing channel’s characteristics.
|
| 363 |
+
5.1
|
| 364 |
+
Random Walk Model
|
| 365 |
+
Take a payment channel between two nodes A and B, and
|
| 366 |
+
take their initial balance allocated for the channel to be FA
|
| 367 |
+
and FB, respectively. The goal is to determine the expected
|
| 368 |
+
time it will take for this payment channel to become unbal-
|
| 369 |
+
anced for the first time. We make the following assumptions:
|
| 370 |
+
•
|
| 371 |
+
All the payments have the same amount denoted
|
| 372 |
+
with ω (PaymentSize).
|
| 373 |
+
•
|
| 374 |
+
The payments from each node come with a Poisson
|
| 375 |
+
distribution.
|
| 376 |
+
Since the number of nodes is large and the probability
|
| 377 |
+
of sending a transaction for a given time is small, we can
|
| 378 |
+
assume that transaction arrival for each channel is a Poisson
|
| 379 |
+
process for moderate time windows [21]. Although the
|
| 380 |
+
dynamics of the network will change over time, we make
|
| 381 |
+
the assumption of having a fixed topology.
|
| 382 |
+
We model the dynamics of a payment channel with a
|
| 383 |
+
random walk problem. Each payment is simulated by a step
|
| 384 |
+
the random walk takes. To simulate a payment channel, take
|
| 385 |
+
the liquidity of node A as the distance of the random walk
|
| 386 |
+
from the endpoint on the right hand side and the liquidity
|
| 387 |
+
of node B as the distance from the endpoint on the left hand
|
| 388 |
+
side.
|
| 389 |
+
The payment direction determines the direction of that
|
| 390 |
+
step. So the payment direction probability is the probability
|
| 391 |
+
of going to the right or left for the random walk in each step.
|
| 392 |
+
Fig. 4. Distribution of expected lifespan with 10000 random walk simula-
|
| 393 |
+
tions with p = 1
|
| 394 |
+
2 and a = b = 1.2 Msat.
|
| 395 |
+
Let the random walk start at the origin of the number
|
| 396 |
+
line. The two endpoints a and −b are ⌊ FA
|
| 397 |
+
ω ⌋ and ⌊ FB
|
| 398 |
+
ω ⌋,
|
| 399 |
+
respectively.
|
| 400 |
+
Since we assume that the payments from each side are
|
| 401 |
+
made independently with a Poisson process, and the sum
|
| 402 |
+
of two independent Poisson processes is itself a Poisson
|
| 403 |
+
process, we can say that payments come to the channel with
|
| 404 |
+
a Poisson distribution having:
|
| 405 |
+
λpayment = λA,B + λB,A,
|
| 406 |
+
(1)
|
| 407 |
+
thus the relation between expected time and expected num-
|
| 408 |
+
ber of random walk steps is:
|
| 409 |
+
Etime =
|
| 410 |
+
Esteps
|
| 411 |
+
λpayment
|
| 412 |
+
,
|
| 413 |
+
(2)
|
| 414 |
+
where Etime is the expected time until unbalancing and
|
| 415 |
+
Esteps is the expected number of steps until unbalancing
|
| 416 |
+
occurs.
|
| 417 |
+
The expected number of payments until unbalancing
|
| 418 |
+
occurs, can be a better metric depending on the application;
|
| 419 |
+
when multiplied by average fee per payment, it gives the
|
| 420 |
+
expected routing income, and when divided by λ it gives
|
| 421 |
+
the expected lifespan.
|
| 422 |
+
The objective is to determine the time it takes for a
|
| 423 |
+
channel to become unbalanced. We first try to find the
|
| 424 |
+
expected number of steps needed for the random walker
|
| 425 |
+
to reach +a or −b for the first time.
|
| 426 |
+
Lemma 1. The expected number of steps to reach +a or −b
|
| 427 |
+
for the first time starting from zero considering the probability p
|
| 428 |
+
for the positive direction and q = 1 − p for the negative direction
|
| 429 |
+
is:
|
| 430 |
+
Esteps =
|
| 431 |
+
� apa(pb−qb)+bqb(qa−pa)
|
| 432 |
+
(p−q)(pa+b−qa+b)
|
| 433 |
+
p ̸= 1/2
|
| 434 |
+
ab
|
| 435 |
+
p = 1/2
|
| 436 |
+
(3)
|
| 437 |
+
.
|
| 438 |
+
We provide the proof of Lemma 1 in Appendix A.
|
| 439 |
+
We simulated a Random Walk which starts from point
|
| 440 |
+
zero with the same probability of going to each side (p = 1
|
| 441 |
+
2).
|
| 442 |
+
The simulation ran 10000 times to find the distribution of the
|
| 443 |
+
number of steps needed to reach +a or −b. Fig. 4 illustrates
|
| 444 |
+
the result of the simulation. We can observe that most of
|
| 445 |
+
the times the random walk reaches one of the bounds in
|
| 446 |
+
less than 400 steps, but there are not many situations where
|
| 447 |
+
|
| 448 |
+
98
|
| 449 |
+
96
|
| 450 |
+
Success rate
|
| 451 |
+
94
|
| 452 |
+
92
|
| 453 |
+
90
|
| 454 |
+
88
|
| 455 |
+
86
|
| 456 |
+
0
|
| 457 |
+
5000
|
| 458 |
+
10000
|
| 459 |
+
15000
|
| 460 |
+
20000
|
| 461 |
+
25000350
|
| 462 |
+
300
|
| 463 |
+
250
|
| 464 |
+
count
|
| 465 |
+
200
|
| 466 |
+
150
|
| 467 |
+
100
|
| 468 |
+
50
|
| 469 |
+
0
|
| 470 |
+
0
|
| 471 |
+
500
|
| 472 |
+
1000
|
| 473 |
+
1500
|
| 474 |
+
2000
|
| 475 |
+
2500
|
| 476 |
+
3000
|
| 477 |
+
number of steps5
|
| 478 |
+
it takes a huge number of steps to reach these bounds.
|
| 479 |
+
However, the average number of steps needed to reach these
|
| 480 |
+
bounds is 400.5 confirming 11.
|
| 481 |
+
5.2
|
| 482 |
+
Finding p
|
| 483 |
+
In Section 5.1 we modeled the payment channel dynamics
|
| 484 |
+
with a random walk and a parametric formula was con-
|
| 485 |
+
structed according to Lemma 1.
|
| 486 |
+
A payment network can be formally expressed by an
|
| 487 |
+
unweighted directed graph. V
|
| 488 |
+
represents the set of all
|
| 489 |
+
nodes, and the set of edges is denoted by E. Each channel
|
| 490 |
+
is represented using two edges from E each for one of the
|
| 491 |
+
directions.
|
| 492 |
+
We define MRates to be the matrix of payment rates
|
| 493 |
+
between each two nodes. The rate of payments (i.e., number
|
| 494 |
+
of payments per day) from node i to node j is denoted by
|
| 495 |
+
MRatesij.
|
| 496 |
+
λa,b represents the rate of payments transmitted over
|
| 497 |
+
the edge(a, b). λa,b consists of the sum of portions of the
|
| 498 |
+
payment rate between each pair of nodes that pass through
|
| 499 |
+
edge(a, b). So we have:
|
| 500 |
+
λa,b =
|
| 501 |
+
�
|
| 502 |
+
s,t∈V
|
| 503 |
+
s̸=t
|
| 504 |
+
σ(s, t|edge(a, b))
|
| 505 |
+
σ(s, t)
|
| 506 |
+
MRatesst,
|
| 507 |
+
(4)
|
| 508 |
+
where σ(s, t) is the number of shortest paths from node s
|
| 509 |
+
to node t and σ(s, t|edge(a, b)) is the number of shortest
|
| 510 |
+
paths from node s to node t passing through edge(a, b) in
|
| 511 |
+
the directed graph G.
|
| 512 |
+
Lemma 2. p
|
| 513 |
+
q = λ(a,b)
|
| 514 |
+
λ(b,a).
|
| 515 |
+
According to Lemma 2:
|
| 516 |
+
p =
|
| 517 |
+
λ(a, b)
|
| 518 |
+
λ(a, b) + λ(b, a)
|
| 519 |
+
(5)
|
| 520 |
+
Therefore we can find p based on the network topology.
|
| 521 |
+
Lemma 3. If ∀s, t ∈ V
|
| 522 |
+
: MRatesst = MRatests then
|
| 523 |
+
p = 0.5.
|
| 524 |
+
We provide the proofs of Lemmas 2 and 3 in Appendix A. If
|
| 525 |
+
we assume that MRates is a symmetric matrix, according
|
| 526 |
+
to Lemma 3, p is independent of MRates matrix and the
|
| 527 |
+
network topology.
|
| 528 |
+
5.3
|
| 529 |
+
Model Analysis
|
| 530 |
+
In this section we analyze the effect of channel parameters
|
| 531 |
+
on the channel’s expected lifespan and perform a financial
|
| 532 |
+
analysis for channel lifespan.
|
| 533 |
+
For more realistic parameter values we used a recent
|
| 534 |
+
snapshot of the Lightning Network taken on Feb2019 as
|
| 535 |
+
a reference point. The average payment size is considered
|
| 536 |
+
to be 60000 sat1 [22] and the average channel capacity is
|
| 537 |
+
considered 2.4 Msat2 according to the snapshot.
|
| 538 |
+
For simplicity we use ”lifespan” and ”expected number
|
| 539 |
+
of payments until channel is unbalanced”, interchangeably.
|
| 540 |
+
1. satoshi
|
| 541 |
+
2. million satoshi
|
| 542 |
+
Fig. 5. Effect of payment direction probability on balanced channels,
|
| 543 |
+
according to different channel capacities.
|
| 544 |
+
Fig. 6. The effect of payment direction probability on expected number
|
| 545 |
+
of payments, according to different initial balance ratios. The channel
|
| 546 |
+
capacity is considered 2.4 Msat.
|
| 547 |
+
We first answer the question of how sensitive is a
|
| 548 |
+
channel’s lifespan to the changes in p. As demonstrated in
|
| 549 |
+
Fig.
|
| 550 |
+
5; if the channel is initially balanced, the maximum
|
| 551 |
+
lifespan happens on p = 1
|
| 552 |
+
2. Also, lifespan is more sensitive
|
| 553 |
+
to changes in p when the capacity is higher. From this
|
| 554 |
+
result we can infer that it is an important consideration
|
| 555 |
+
for a node to make sure the channel is placed in a way
|
| 556 |
+
that p is close to
|
| 557 |
+
1
|
| 558 |
+
2, otherwise the channel’s lifespan is
|
| 559 |
+
affected dramatically. A reasonable proposal for nodes who
|
| 560 |
+
want to keep their channels active as long as possible is to
|
| 561 |
+
charge routing fees in a way that encourages other nodes to
|
| 562 |
+
route their payments through the node in order to achieve
|
| 563 |
+
p = 0.5. Fig. 6 shows that if a channel is initially unbalanced,
|
| 564 |
+
its maximum possible lifespan takes a hit. Although the
|
| 565 |
+
maximum lifespan does not occur at exact p = 1
|
| 566 |
+
2, it occurs at
|
| 567 |
+
a point close to this value. So even if a channel is somewhat
|
| 568 |
+
unbalanced, the nodes must try to keep p as close as possible
|
| 569 |
+
to 50%.
|
| 570 |
+
We now answer the question of how the lifespan is
|
| 571 |
+
affected by the channel capacity. As Fig. 7 suggests, the
|
| 572 |
+
channel lifespan increases with increasing its capacity. It is
|
| 573 |
+
noteworthy that the slope of this graph is increasing. So if
|
| 574 |
+
a node doubles its channel capacity, the channel’s lifespan
|
| 575 |
+
will be more than doubled. Moreover, Fig. 7 shows the effect
|
| 576 |
+
of a channel’s initial imbalance on its lifespan.
|
| 577 |
+
Usually when a node wants to create a new channel
|
| 578 |
+
|
| 579 |
+
Capacity: 1.80 Msat.
|
| 580 |
+
600
|
| 581 |
+
Capacity: 2.40 Msat.
|
| 582 |
+
Capacity: 3.00 Msat.
|
| 583 |
+
500
|
| 584 |
+
400
|
| 585 |
+
300
|
| 586 |
+
200
|
| 587 |
+
100
|
| 588 |
+
0
|
| 589 |
+
0.0
|
| 590 |
+
0.2
|
| 591 |
+
0.4
|
| 592 |
+
0.6
|
| 593 |
+
0.8
|
| 594 |
+
1.0
|
| 595 |
+
Probability (p)400
|
| 596 |
+
a/b: 1
|
| 597 |
+
a/b: 5
|
| 598 |
+
350
|
| 599 |
+
a/b: 50
|
| 600 |
+
300
|
| 601 |
+
250
|
| 602 |
+
200
|
| 603 |
+
150
|
| 604 |
+
100
|
| 605 |
+
50
|
| 606 |
+
0
|
| 607 |
+
0.0
|
| 608 |
+
0.2
|
| 609 |
+
0.4
|
| 610 |
+
0.6
|
| 611 |
+
0.8
|
| 612 |
+
1.0
|
| 613 |
+
Probability (p)6
|
| 614 |
+
Fig. 7. Effect of channel capacity on the expected number of payments,
|
| 615 |
+
according to initial balance ratios
|
| 616 |
+
Fig. 8. For a fixed a = 1.2 Msat, the effect of channel b’s capacity on the
|
| 617 |
+
maximum possible lifespan in any p.
|
| 618 |
+
with another node in the network, the only parameter it has
|
| 619 |
+
control over is the amount of funds it wants to put in the
|
| 620 |
+
channel, not the funds its partner puts in the channel. This
|
| 621 |
+
brings up the question: how will the channel’s lifespan be
|
| 622 |
+
affected with the amount the other node wants to put in the
|
| 623 |
+
channel if our fund stays at a fixed value. Figures (8) and (9)
|
| 624 |
+
illustrate this effect. Fig. 8 shows the maximum achievable
|
| 625 |
+
lifespan considering any p value and how it is affected by
|
| 626 |
+
the fund that the other node commits to the channel. The
|
| 627 |
+
maximum lifespan grows with the initial fund of the other
|
| 628 |
+
edge in a linear fashion. Fig. 9 illustrates the effect of our
|
| 629 |
+
edge capacity if the peer node’s capacity is fixed. Figure
|
| 630 |
+
(9) shows that if p is in favor of payments in the direction
|
| 631 |
+
of our edge (p ≥ 1
|
| 632 |
+
2), the lifespan increases almost linearly;
|
| 633 |
+
otherwise (p < 1
|
| 634 |
+
2), the other edge becomes the bottleneck
|
| 635 |
+
and the fund we put towards the channel will have little
|
| 636 |
+
to no effect on the expected lifespan of the channel. If the
|
| 637 |
+
funds we put towards the channel do not have an effect on
|
| 638 |
+
the channel’s lifespan, we have wasted cost opportunities.
|
| 639 |
+
6
|
| 640 |
+
IMPLEMENTATION AND EVALUATION
|
| 641 |
+
We provided a simulation proof of concept on a constructed
|
| 642 |
+
Lightning Network to show the accuracy of the model
|
| 643 |
+
discussed in Section 5. In this section we describe our
|
| 644 |
+
methodology for creating data and calculating accuracy of
|
| 645 |
+
Fig. 9. Having a fixed initial balance from peer node (b) analyzing the
|
| 646 |
+
effect of our initial balance fund (a), according to different payment
|
| 647 |
+
direction probabilities (p).
|
| 648 |
+
our model. We later analyze the results to see under which
|
| 649 |
+
conditions the model performs better.
|
| 650 |
+
6.1
|
| 651 |
+
Methodology
|
| 652 |
+
The testing pipeline shown in Fig. 10 uses the following
|
| 653 |
+
modules:
|
| 654 |
+
6.1.1
|
| 655 |
+
Network Generator
|
| 656 |
+
For each test, a random network was generated using Net-
|
| 657 |
+
workX’s [23] gnp random graph with the number of nodes
|
| 658 |
+
being 50 and the channel existence probability being 20%
|
| 659 |
+
(245 edges on average).
|
| 660 |
+
6.1.2
|
| 661 |
+
Mrates Generator
|
| 662 |
+
As discussed in previous sections the Mrates matrix holds
|
| 663 |
+
the rates in which each two nodes send payments to one
|
| 664 |
+
another. The Mrates generator takes two main parameters:
|
| 665 |
+
SC and SK. SC determines the sparseness of the Mrates
|
| 666 |
+
matrix and SK determines the matrix skewness in relation to
|
| 667 |
+
its main diagonal. Per each test, a new matrix is generated.
|
| 668 |
+
In table (1) the sparse coefficient and the skew were changed
|
| 669 |
+
to test how the model will perform in each scenario.
|
| 670 |
+
6.1.3
|
| 671 |
+
Lifespan Predictor
|
| 672 |
+
The lifespan predictor takes the network and the Mrates
|
| 673 |
+
matrix and using the model discussed in 5 gives the ex-
|
| 674 |
+
pected time for each channel to become unbalanced.
|
| 675 |
+
6.1.4
|
| 676 |
+
Payment Generator
|
| 677 |
+
Payment generator creates random payments in CLoTH
|
| 678 |
+
simulator’s input format [19]. These payments follow the
|
| 679 |
+
Mrates generator values on average.
|
| 680 |
+
6.1.5
|
| 681 |
+
Simulator
|
| 682 |
+
We used a modified version of the CLoTH simulator [19].
|
| 683 |
+
We modified CLoTH such that the simulator logs the un-
|
| 684 |
+
balancing of channels and chooses paths randomly in cases
|
| 685 |
+
where more than one shortest path exists.
|
| 686 |
+
The payment generator and simulator run 100 iterations
|
| 687 |
+
per test.
|
| 688 |
+
|
| 689 |
+
10000
|
| 690 |
+
a/b: 1
|
| 691 |
+
f Payments
|
| 692 |
+
a/b: 5
|
| 693 |
+
a/b: 50
|
| 694 |
+
8000
|
| 695 |
+
6000
|
| 696 |
+
4000
|
| 697 |
+
2000
|
| 698 |
+
0
|
| 699 |
+
0.0
|
| 700 |
+
0.2
|
| 701 |
+
0.4
|
| 702 |
+
0.6
|
| 703 |
+
0.8
|
| 704 |
+
1.0
|
| 705 |
+
1.2
|
| 706 |
+
Capacity (sat.)
|
| 707 |
+
1e7Maximum Expected Number of Payments
|
| 708 |
+
5000
|
| 709 |
+
4000
|
| 710 |
+
3000
|
| 711 |
+
2000
|
| 712 |
+
1000
|
| 713 |
+
0
|
| 714 |
+
0.0
|
| 715 |
+
0.2
|
| 716 |
+
0.4
|
| 717 |
+
0.6
|
| 718 |
+
0.8
|
| 719 |
+
1.0
|
| 720 |
+
1.2
|
| 721 |
+
Other Edge Capacity (sat.)
|
| 722 |
+
1e7800
|
| 723 |
+
p: 0.40
|
| 724 |
+
p: 0.45
|
| 725 |
+
700
|
| 726 |
+
p: 0.50
|
| 727 |
+
600
|
| 728 |
+
p: 0.55
|
| 729 |
+
p: 0.60
|
| 730 |
+
500
|
| 731 |
+
400
|
| 732 |
+
300
|
| 733 |
+
200
|
| 734 |
+
100
|
| 735 |
+
0
|
| 736 |
+
0.5
|
| 737 |
+
1.0
|
| 738 |
+
1.5
|
| 739 |
+
2.0
|
| 740 |
+
2.5
|
| 741 |
+
Edge Capacity (sat.)
|
| 742 |
+
1e67
|
| 743 |
+
Fig. 10. Model evaluation pipeline.
|
| 744 |
+
TABLE 1
|
| 745 |
+
error of prediction and real lifetime
|
| 746 |
+
SK
|
| 747 |
+
1
|
| 748 |
+
4
|
| 749 |
+
6
|
| 750 |
+
10
|
| 751 |
+
0.9
|
| 752 |
+
0.15
|
| 753 |
+
0.10
|
| 754 |
+
0.09
|
| 755 |
+
0.10
|
| 756 |
+
SC
|
| 757 |
+
0.5
|
| 758 |
+
0.11
|
| 759 |
+
0.10
|
| 760 |
+
0.08
|
| 761 |
+
0.07
|
| 762 |
+
0.3
|
| 763 |
+
0.09
|
| 764 |
+
0.07
|
| 765 |
+
0.05
|
| 766 |
+
0.06
|
| 767 |
+
0
|
| 768 |
+
0.11
|
| 769 |
+
0.07
|
| 770 |
+
0.07
|
| 771 |
+
0.07
|
| 772 |
+
6.1.6
|
| 773 |
+
Lifespan Calculator
|
| 774 |
+
This module aggregates the results of 100 iterations of the
|
| 775 |
+
previous step and calculates the average lifespan and its
|
| 776 |
+
error. This data will be used to determine the accuracy of
|
| 777 |
+
the model.
|
| 778 |
+
6.1.7
|
| 779 |
+
Model Evaluation
|
| 780 |
+
The error of each channel is calculated as |real−prediction|
|
| 781 |
+
real
|
| 782 |
+
.
|
| 783 |
+
Because some channels are positioned in a way that almost
|
| 784 |
+
no payments pass through them, only after a long while that
|
| 785 |
+
most channels are unbalanced, some payments pass through
|
| 786 |
+
them, we count these channels as abnormalities and do not
|
| 787 |
+
consider them in the error calculations. These are usually
|
| 788 |
+
the channels that are estimated to have a very long lifespan.
|
| 789 |
+
The means of calculated errors are given in Table (1)
|
| 790 |
+
considering different SC and SK values.
|
| 791 |
+
As we see, better results are obtained with smaller SCs
|
| 792 |
+
(meaning a busier Lightning Network). It is also notable that
|
| 793 |
+
SK value has little to no effect on the model performance.
|
| 794 |
+
This means that the model performs well in either case that
|
| 795 |
+
p is close to 0.5 and p is far from 0.5.
|
| 796 |
+
7
|
| 797 |
+
LIGHTNING NETWORK ANALYSIS
|
| 798 |
+
In this section we will provide an analysis on channel
|
| 799 |
+
lifespans of a recent snapshot of the Lightning Network.
|
| 800 |
+
The simulation is constituted by nodes and channels taken
|
| 801 |
+
from a snapshot of the Lightning Network Mainnet [24] on
|
| 802 |
+
Feb 2019.
|
| 803 |
+
In Section 5, we proposed a model for a payment channel
|
| 804 |
+
using a random walk and we derived a formula to predict
|
| 805 |
+
expected channel lifespans. Moreover, the expected lifespan
|
| 806 |
+
of a payment channel can be found if the rate of payments
|
| 807 |
+
are known by using 2. Lemma 3 shows that if we have the
|
| 808 |
+
same rate for every pair of nodes, the probability of going
|
| 809 |
+
to each side is equal to 0.5.
|
| 810 |
+
Because payment rates and channel balances usually are
|
| 811 |
+
not public in the Lightning Network, we have to make
|
| 812 |
+
assumptions on the distribution, the amount of payments,
|
| 813 |
+
and channel balances. We assume that all payment rates
|
| 814 |
+
have the same value r, which means that the rates matrix
|
| 815 |
+
(MRates) is symmetric. Thus according to Lemma 3, p = 1
|
| 816 |
+
2
|
| 817 |
+
for every channel in the network. According to 11 the
|
| 818 |
+
expected number of payments is equal to a × b, where
|
| 819 |
+
a = ⌊ FA
|
| 820 |
+
ω ⌋ and b = ⌊ FB
|
| 821 |
+
ω ⌋ for a bidirectional channel between
|
| 822 |
+
A and B. We assume that all channels are initially balanced,
|
| 823 |
+
meaning a = b = C
|
| 824 |
+
2ω , where C is the channel’s capacity.
|
| 825 |
+
According to previous results in Section 5 (equations (1)
|
| 826 |
+
and (4)) we have:
|
| 827 |
+
λpayment = (
|
| 828 |
+
�
|
| 829 |
+
s,t∈V
|
| 830 |
+
s̸=t
|
| 831 |
+
σ(s, t|edge(a, b))
|
| 832 |
+
σ(s, t)
|
| 833 |
+
+ σ(s, t|edge(b, a))
|
| 834 |
+
σ(s, t)
|
| 835 |
+
)r
|
| 836 |
+
(6)
|
| 837 |
+
We also know that �
|
| 838 |
+
s,t∈V
|
| 839 |
+
s̸=t
|
| 840 |
+
σ(s,t|edge(a,b))
|
| 841 |
+
σ(s,t)
|
| 842 |
+
is equal to the
|
| 843 |
+
edge betweenness centrality of edge(a, b) (EBC(a, b)) in
|
| 844 |
+
directed graph G [25].
|
| 845 |
+
Because all channels are bidirectional: ∀edge(j, i) −→
|
| 846 |
+
∃edge(i, j), thus ∀s, t ∈ V :
|
| 847 |
+
σ(s, t|edge(a, b))
|
| 848 |
+
σ(s, t)
|
| 849 |
+
= σ(t, s|edge(b, a))
|
| 850 |
+
σ(t, s)
|
| 851 |
+
.
|
| 852 |
+
(7)
|
| 853 |
+
Assuming G
|
| 854 |
+
′ as an undirected graph that is derived
|
| 855 |
+
from G we have:
|
| 856 |
+
EBCG(a, b) = EBCG′ (a, b),
|
| 857 |
+
(8)
|
| 858 |
+
thus
|
| 859 |
+
λpayment = 2 × EBCG′ (a, b) × r.
|
| 860 |
+
(9)
|
| 861 |
+
If we put all results in (2), we have:
|
| 862 |
+
Etime =
|
| 863 |
+
( C
|
| 864 |
+
ω )2
|
| 865 |
+
4 × 2 × EBCG′ (a, b) × r
|
| 866 |
+
(10)
|
| 867 |
+
In what follows, we first calculate all payment channels’
|
| 868 |
+
lifespans in the LN snapshot using equation (10). Then we
|
| 869 |
+
focus on the relation between edge betweenness centrality
|
| 870 |
+
and lifespan of the channels.
|
| 871 |
+
7.1
|
| 872 |
+
Distribution of Channels Effective Lifespan
|
| 873 |
+
Equation (10) shows that the lifespan of a channel can be
|
| 874 |
+
calculated based on its edge betweenness centrality and
|
| 875 |
+
initial fund. We assume that r = 0.0022 transactions per day
|
| 876 |
+
[26] and ω = 60000 sat [22]. The distribution of channels
|
| 877 |
+
lifespans in our snapshot is shown in Fig. 11. Much like the
|
| 878 |
+
distribution of channel capacities that resemble the Power
|
| 879 |
+
Law distribution, Fig. 11 shows that there are a lot of
|
| 880 |
+
channels with a low lifespan and very few channels with
|
| 881 |
+
a very high lifespan.
|
| 882 |
+
According to Seres et.al. [20] the most effective channels
|
| 883 |
+
are the channels with the highest betweenness centrality.
|
| 884 |
+
This paper suggests that the top 14% of the channels have
|
| 885 |
+
the most significant effect on the network’s performance.
|
| 886 |
+
Table (2) gives average, standard deviation, and median,
|
| 887 |
+
for all channels in the network and the top 14% central
|
| 888 |
+
channels.
|
| 889 |
+
|
| 890 |
+
network generation
|
| 891 |
+
MRates generation
|
| 892 |
+
payment generation
|
| 893 |
+
loop for 100 run
|
| 894 |
+
lifespan prediction
|
| 895 |
+
simulation
|
| 896 |
+
lifespan calculation
|
| 897 |
+
model evaluation8
|
| 898 |
+
Fig. 11. Histogram of expected lifespan for the LN snapshot in Feb 2019.
|
| 899 |
+
TABLE 2
|
| 900 |
+
Lifespan statistics of the LN snapshot (day).
|
| 901 |
+
All Channels
|
| 902 |
+
Central Channels
|
| 903 |
+
average
|
| 904 |
+
1833.2
|
| 905 |
+
172.3
|
| 906 |
+
STD
|
| 907 |
+
7086.9
|
| 908 |
+
587.2
|
| 909 |
+
median
|
| 910 |
+
27.0
|
| 911 |
+
1.6
|
| 912 |
+
7.2
|
| 913 |
+
Betweenness-Lifespan Correlation
|
| 914 |
+
As Seres et.al. [20] suggests, the most central channels have
|
| 915 |
+
the most impact on the network. As Fig. 12 shows, more
|
| 916 |
+
central channels have a shorter lifespan because they route
|
| 917 |
+
more payments per unit of time. In Fig. 12 we took batches
|
| 918 |
+
of the most central edges and calculated the average cen-
|
| 919 |
+
trality and the average lifespan per batch. The result shows
|
| 920 |
+
that in general the more central a channel is, the sooner it
|
| 921 |
+
will get unbalanced. We see an exception to this statement
|
| 922 |
+
in the middle of the plot, where betweenness has a positive
|
| 923 |
+
correlation with the average lifespan. This is due to the fact
|
| 924 |
+
that some very central edges have a large capacity so they
|
| 925 |
+
can route more payment considering that lifespan increases
|
| 926 |
+
with capacity quadratically.
|
| 927 |
+
In Section 7 A we showed that channels with larger
|
| 928 |
+
edge betweenness centrality values have a higher impact
|
| 929 |
+
on the performance of the network. In this section, we have
|
| 930 |
+
shown these central channels will have shorter lifespans.
|
| 931 |
+
Therefore, the network success rate will decrease quickly
|
| 932 |
+
Fig. 12. The relation between expected lifespan and betweenness cen-
|
| 933 |
+
trality of channels in the LN snapshot.
|
| 934 |
+
due to unbalancing.
|
| 935 |
+
8
|
| 936 |
+
CONCLUSION
|
| 937 |
+
In this paper we modeled payment channel liquidity with
|
| 938 |
+
a random walk to estimate how long it takes for a channel
|
| 939 |
+
to become unbalanced and the effect of being unbalanced
|
| 940 |
+
on a channel’s probability of successful routing. We also
|
| 941 |
+
analyzed how unbalanced channels degrade the network’s
|
| 942 |
+
performance, and the relation between a channel’s centrality
|
| 943 |
+
and its lifespan. We showed that the network’s success
|
| 944 |
+
probability is sensitive to the channels’ unbalancing.
|
| 945 |
+
We also introduced a method to estimate the lifespan
|
| 946 |
+
of a channel in a payment network which can be used for
|
| 947 |
+
determining a good placement in the network. We provided
|
| 948 |
+
a proof of concept for our model and showed the results are
|
| 949 |
+
95% accurate.
|
| 950 |
+
This work shows that just allocating more funds towards
|
| 951 |
+
a channel does not lead to having a more successful channel.
|
| 952 |
+
The results show the channel’s success in the network
|
| 953 |
+
depends greatly on the network topology, transaction flow,
|
| 954 |
+
and the amount of funds the peer node puts in the channel.
|
| 955 |
+
We suggested the amount a node should invest in a
|
| 956 |
+
channel to get the longest channel lifespan and maximize its
|
| 957 |
+
return on investment. These results show that a misplaced
|
| 958 |
+
channel can have a very short lifespan and lose up to 40%
|
| 959 |
+
of its efficiency, so nodes could potentially create a market
|
| 960 |
+
based on these criteria to sell each other good connections
|
| 961 |
+
in the network.
|
| 962 |
+
APPENDIX A
|
| 963 |
+
PROOFS
|
| 964 |
+
A.1
|
| 965 |
+
Lemma 1. The expected number of steps to reach
|
| 966 |
+
+a or −b for the first time starting from zero is
|
| 967 |
+
Esteps =
|
| 968 |
+
� apa(pb−qb)+bqb(qa−pa)
|
| 969 |
+
(p−q)(pa+b−qa+b)
|
| 970 |
+
p ̸= 1/2
|
| 971 |
+
ab
|
| 972 |
+
p = 1/2
|
| 973 |
+
(11)
|
| 974 |
+
Consider Sx as the expected number of steps to reach +a or
|
| 975 |
+
−b for the first time starting from x. Let p be the probability
|
| 976 |
+
of going to the positive direction and q the probability of
|
| 977 |
+
going in the negative direction (p + q = 1). Then we can say
|
| 978 |
+
that if the Random Walk starts from x, he will go to x + 1
|
| 979 |
+
with probability of p and x − 1 with probability of q. so we
|
| 980 |
+
can infer this recurrence equation: sx = 1 + qsx−1 + psx+1
|
| 981 |
+
where sx is the expected number of steps until reaching the
|
| 982 |
+
end point starting from point x. For the boundary conditions
|
| 983 |
+
we have: sa = s−b = 0 implying that the expected number
|
| 984 |
+
of steps needed to reach +a or −b starting from +a or −b is
|
| 985 |
+
zero.
|
| 986 |
+
so:
|
| 987 |
+
sx = 1
|
| 988 |
+
psx−1 − q
|
| 989 |
+
psx−2 − 1
|
| 990 |
+
p
|
| 991 |
+
(12)
|
| 992 |
+
The characteristic equation of (12) is:
|
| 993 |
+
(z2 − 1
|
| 994 |
+
pz + q
|
| 995 |
+
p)(z − 1) = 0
|
| 996 |
+
(13)
|
| 997 |
+
|
| 998 |
+
104
|
| 999 |
+
103
|
| 1000 |
+
Count
|
| 1001 |
+
102
|
| 1002 |
+
101
|
| 1003 |
+
100
|
| 1004 |
+
0
|
| 1005 |
+
25000
|
| 1006 |
+
50000
|
| 1007 |
+
75000100000125000150000175000
|
| 1008 |
+
Lifespan (day)1750
|
| 1009 |
+
1500
|
| 1010 |
+
1250
|
| 1011 |
+
1000
|
| 1012 |
+
750
|
| 1013 |
+
500
|
| 1014 |
+
250
|
| 1015 |
+
0
|
| 1016 |
+
5000
|
| 1017 |
+
10000
|
| 1018 |
+
15000
|
| 1019 |
+
20000
|
| 1020 |
+
Average Edge Betweenness Centrality of Batch9
|
| 1021 |
+
if p = q = 1/2 we have ∆ = 0 therefore z1 = z2 = z3 =
|
| 1022 |
+
1 so the expected number of steps needed to reach +a or −b
|
| 1023 |
+
starting from x is:
|
| 1024 |
+
sx = (a − x)(b − x)
|
| 1025 |
+
(14)
|
| 1026 |
+
if p ̸= 1/2 we have
|
| 1027 |
+
√
|
| 1028 |
+
∆ = | 1−2p
|
| 1029 |
+
p
|
| 1030 |
+
| therefore z1 = z2 =
|
| 1031 |
+
1, z3 = q
|
| 1032 |
+
p and for the number of steps we have:
|
| 1033 |
+
sx =
|
| 1034 |
+
apa+b + bqa+b
|
| 1035 |
+
(2p − 1)(pa+b − qa+b) +
|
| 1036 |
+
1
|
| 1037 |
+
1 − 2p x+
|
| 1038 |
+
(a + b)paqb
|
| 1039 |
+
(2p − 1)(qa+b − pa+b) ( q
|
| 1040 |
+
p )x
|
| 1041 |
+
(15)
|
| 1042 |
+
we take x = 0 as this gives the expected number of steps to
|
| 1043 |
+
reach +a or −b starting from zero. so we have:
|
| 1044 |
+
S0 =
|
| 1045 |
+
� apa(pb−qb)+bqb(qa−pa)
|
| 1046 |
+
(p−q)(pa+b−qa+b)
|
| 1047 |
+
p ̸= 1/2
|
| 1048 |
+
ab
|
| 1049 |
+
p = 1/2
|
| 1050 |
+
(16)
|
| 1051 |
+
A.2
|
| 1052 |
+
Lemma 2. p
|
| 1053 |
+
q = λ(A,B)
|
| 1054 |
+
λ(B,A)
|
| 1055 |
+
In assumptions of Section 5 it is assumed that each node
|
| 1056 |
+
sends its payments to other nodes with a Poisson distri-
|
| 1057 |
+
bution. The parameter of the distribution for edge(a, b) is
|
| 1058 |
+
λ(a, b), which is the payment rate between nodes a and b.
|
| 1059 |
+
Assume the random variable of payments from a to b as X
|
| 1060 |
+
and the random variable of payments from b to a as Y .Thus
|
| 1061 |
+
we have:
|
| 1062 |
+
P(X = n) = e−λ(A,B)(λ(A, B))n
|
| 1063 |
+
n!
|
| 1064 |
+
(17)
|
| 1065 |
+
The total payment rate in each channel is the sum of rates of
|
| 1066 |
+
its two edges. It is known that the distribution of a random
|
| 1067 |
+
variable which is the sum of two random variables with a
|
| 1068 |
+
Poisson process is a Poisson process; the rate of this process
|
| 1069 |
+
equals the sum of rates.
|
| 1070 |
+
When we have a payment from two Poisson distribu-
|
| 1071 |
+
tions sending payments to the same channel; The probabil-
|
| 1072 |
+
ity for the payment to be a payment from node a to node b
|
| 1073 |
+
(p) is:
|
| 1074 |
+
p = P(X = 1|X + Y = 1) =
|
| 1075 |
+
e−λx(λx)1
|
| 1076 |
+
1!
|
| 1077 |
+
× e−λy (λy)0
|
| 1078 |
+
0!
|
| 1079 |
+
e−(λx+λy)(λx+λy)1
|
| 1080 |
+
1!
|
| 1081 |
+
(18)
|
| 1082 |
+
Thus:
|
| 1083 |
+
p =
|
| 1084 |
+
λx
|
| 1085 |
+
λx + λy
|
| 1086 |
+
=
|
| 1087 |
+
λ(a, b)
|
| 1088 |
+
λ(a, b) + λ(b, a)
|
| 1089 |
+
(19)
|
| 1090 |
+
A.3
|
| 1091 |
+
Lemma 3. If ∀s, t ∈ V : MRatesst = MRatests then
|
| 1092 |
+
p = 0.5.
|
| 1093 |
+
We know from lemma 2 that: p
|
| 1094 |
+
q = λ(a,b)
|
| 1095 |
+
λ(b,a) so we have:
|
| 1096 |
+
p
|
| 1097 |
+
q =
|
| 1098 |
+
� σ(s,t|edge(a,b))
|
| 1099 |
+
σ(s,t)
|
| 1100 |
+
MRatesst
|
| 1101 |
+
� σ(t,s|edge(b,a))
|
| 1102 |
+
σ(t,s)
|
| 1103 |
+
MRatests
|
| 1104 |
+
(20)
|
| 1105 |
+
Because
|
| 1106 |
+
all
|
| 1107 |
+
channels
|
| 1108 |
+
are
|
| 1109 |
+
bidirectional(∀edge(a, b)
|
| 1110 |
+
:
|
| 1111 |
+
∃edge(b, a)) we have ∀s, t ∈ V :
|
| 1112 |
+
σ(s, t|edge(a, b))
|
| 1113 |
+
σ(s, t)
|
| 1114 |
+
= σ(t, s|edge(b, a))
|
| 1115 |
+
σ(t, s)
|
| 1116 |
+
(21)
|
| 1117 |
+
In the other hand if we have ∀s, t ∈ V : MRatesst =
|
| 1118 |
+
MRatests, we can say:
|
| 1119 |
+
σ(s, t|edge(a, b))
|
| 1120 |
+
σ(s, t)
|
| 1121 |
+
×MRatesst = σ(T, S|edge(b, a))
|
| 1122 |
+
σ(t, s)
|
| 1123 |
+
×MRatests (22)
|
| 1124 |
+
then finally we have:
|
| 1125 |
+
λ(a, b) = λ(b, a)
|
| 1126 |
+
(23)
|
| 1127 |
+
so
|
| 1128 |
+
p = 1
|
| 1129 |
+
2
|
| 1130 |
+
(24)
|
| 1131 |
+
REFERENCES
|
| 1132 |
+
[1]
|
| 1133 |
+
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
|
| 1134 |
+
Decentralized Business Review, p. 21260, 2008.
|
| 1135 |
+
[2]
|
| 1136 |
+
A. Chauhan, O. P. Malviya, M. Verma, and T. S. Mor, “Blockchain
|
| 1137 |
+
and scalability,” in 2018 IEEE International Conference on Software
|
| 1138 |
+
Quality, Reliability and Security Companion (QRS-C).
|
| 1139 |
+
IEEE, 2018,
|
| 1140 |
+
pp. 122–128.
|
| 1141 |
+
[3]
|
| 1142 |
+
G.
|
| 1143 |
+
Karame,
|
| 1144 |
+
“On
|
| 1145 |
+
the
|
| 1146 |
+
security
|
| 1147 |
+
and
|
| 1148 |
+
scalability
|
| 1149 |
+
of
|
| 1150 |
+
bitcoin’s
|
| 1151 |
+
blockchain,” in Proceedings of the 2016 ACM SIGSAC conference on
|
| 1152 |
+
computer and communications security, 2016, pp. 1861–1862.
|
| 1153 |
+
[4]
|
| 1154 |
+
J. Poon and T. Dryja, “The bitcoin lightning network: Scalable off-
|
| 1155 |
+
chain instant payments,” 2016.
|
| 1156 |
+
[5]
|
| 1157 |
+
Z. Avarikioti, L. Heimbach, Y. Wang, and R. Wattenhofer, “Ride the
|
| 1158 |
+
lightning: The game theory of payment channels,” in International
|
| 1159 |
+
Conference on Financial Cryptography and Data Security.
|
| 1160 |
+
Springer,
|
| 1161 |
+
2020, pp. 264–283.
|
| 1162 |
+
[6]
|
| 1163 |
+
G. O. Karame, E. Androulaki, and S. Capkun, “Double-spending
|
| 1164 |
+
fast payments in bitcoin,” in Proceedings of the 2012 ACM conference
|
| 1165 |
+
on Computer and communications security, 2012, pp. 906–917.
|
| 1166 |
+
[7]
|
| 1167 |
+
Q. Zhou, H. Huang, Z. Zheng, and J. Bian, “Solutions to scalability
|
| 1168 |
+
of blockchain: A survey,” Ieee Access, vol. 8, pp. 16 440–16 455, 2020.
|
| 1169 |
+
[8]
|
| 1170 |
+
B. David, P. Gaˇzi, A. Kiayias, and A. Russell, “Ouroboros
|
| 1171 |
+
praos: An adaptively-secure, semi-synchronous proof-of-stake
|
| 1172 |
+
blockchain,” in Annual International Conference on the Theory and
|
| 1173 |
+
Applications of Cryptographic Techniques.
|
| 1174 |
+
Springer, 2018, pp. 66–98.
|
| 1175 |
+
[9]
|
| 1176 |
+
I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “{Bitcoin-
|
| 1177 |
+
NG}: A scalable blockchain protocol,” in 13th USENIX symposium
|
| 1178 |
+
on networked systems design and implementation (NSDI 16), 2016, pp.
|
| 1179 |
+
45–59.
|
| 1180 |
+
[10] J. Poon and T. Dryja, “The bitcoin lightning network: scal-
|
| 1181 |
+
able off-chain instant payments (2016),” URl: https://lightning.
|
| 1182 |
+
network/lightningnetwork-paper. pdf (visited on 2016-04-19), 2016.
|
| 1183 |
+
[11] R. Khalil and A. Gervais, “Revive: Rebalancing off-blockchain pay-
|
| 1184 |
+
ment networks,” in Proceedings of the 2017 ACM SIGSAC Conference
|
| 1185 |
+
on Computer and Communications Security, 2017, pp. 439–453.
|
| 1186 |
+
[12] M. Conoscenti, A. Vetro, and J. C. De Martin, “Hubs, rebalancing
|
| 1187 |
+
and service providers in the lightning network,” Ieee Access, vol. 7,
|
| 1188 |
+
pp. 132 828–132 840, 2019.
|
| 1189 |
+
[13] R. Pickhardt and M. Nowostawski, “Imbalance measure and
|
| 1190 |
+
proactive channel rebalancing algorithm for the lightning net-
|
| 1191 |
+
work,” in 2020 IEEE International Conference on Blockchain and
|
| 1192 |
+
Cryptocurrency (ICBC).
|
| 1193 |
+
IEEE, 2020, pp. 1–5.
|
| 1194 |
+
[14] S. Tikhomirov, R. Pickhardt, A. Biryukov, and M. Nowostawski,
|
| 1195 |
+
“Probing channel balances in the lightning network,” arXiv
|
| 1196 |
+
preprint arXiv:2004.00333, 2020.
|
| 1197 |
+
[15] J. Herrera-Joancomart´ı, G. Navarro-Arribas, A. Ranchal-Pedrosa,
|
| 1198 |
+
C. P´erez-Sol`a, and J. Garcia-Alfaro, “On the difficulty of hiding the
|
| 1199 |
+
balance of lightning network channels,” in Proceedings of the 2019
|
| 1200 |
+
ACM Asia Conference on Computer and Communications Security,
|
| 1201 |
+
2019, pp. 602–612.
|
| 1202 |
+
[16] G. Kappos, H. Yousaf, A. Piotrowska, S. Kanjalkar, S. Delgado-
|
| 1203 |
+
Segura, A. Miller, and S. Meiklejohn, “An empirical analysis of
|
| 1204 |
+
privacy in the lightning network,” in International Conference on
|
| 1205 |
+
Financial Cryptography and Data Security.
|
| 1206 |
+
Springer, 2021, pp. 167–
|
| 1207 |
+
186.
|
| 1208 |
+
[17] S. Rahimpour and M. Khabbazian, “Hashcashed reputation with
|
| 1209 |
+
application in designing watchtowers,” in 2021 IEEE International
|
| 1210 |
+
Conference on Blockchain and Cryptocurrency (ICBC).
|
| 1211 |
+
IEEE, 2021,
|
| 1212 |
+
pp. 1–9.
|
| 1213 |
+
[18] S. Brˆanzei, E. Segal-Halevi, and A. Zohar, “How to charge light-
|
| 1214 |
+
ning,” arXiv preprint arXiv:1712.10222, 2017.
|
| 1215 |
+
[19] M. Conoscenti, A. Vetr`o, J. C. De Martin, and F. Spini, “The cloth
|
| 1216 |
+
simulator for htlc payment networks with introductory lightning
|
| 1217 |
+
network performance results,” Information, vol. 9, no. 9, p. 223,
|
| 1218 |
+
2018.
|
| 1219 |
+
|
| 1220 |
+
10
|
| 1221 |
+
[20] I. A. Seres, L. Guly´as, D. A. Nagy, and P. Burcsi, “Topological
|
| 1222 |
+
analysis of bitcoin’s lightning network,” in Mathematical Research
|
| 1223 |
+
for Blockchain Economy.
|
| 1224 |
+
Springer, 2020, pp. 1–12.
|
| 1225 |
+
[21] J. L. Hodges and L. Le Cam, “The poisson approximation to
|
| 1226 |
+
the poisson binomial distribution,” The Annals of Mathematical
|
| 1227 |
+
Statistics, vol. 31, no. 3, pp. 737–740, 1960.
|
| 1228 |
+
[22] F. B´eres, I. A. Seres, and A. A. Bencz´ur, “A cryptoeconomic
|
| 1229 |
+
traffic analysis of bitcoin’s lightning network,” arXiv preprint
|
| 1230 |
+
arXiv:1911.09432, 2019.
|
| 1231 |
+
[23] A. A. Hagberg, D. A. Schult, and P. J. Swart, “Exploring network
|
| 1232 |
+
structure, dynamics, and function using networkx,” in Proceedings
|
| 1233 |
+
of the 7th Python in Science Conference, G. Varoquaux, T. Vaught,
|
| 1234 |
+
and J. Millman, Eds., Pasadena, CA USA, 2008, pp. 11 – 15.
|
| 1235 |
+
[24] E. Rohrer, J. Malliaris, and F. Tschorsch, “Discharged pay-
|
| 1236 |
+
ment channels: Quantifying the lightning network’s resilience to
|
| 1237 |
+
topology-based attacks,” in SandB ’19: Proceedings of IEEE Security
|
| 1238 |
+
& Privacy on the Blockchain, jun 2019.
|
| 1239 |
+
[25] U. Brandes, “On variants of shortest-path betweenness centrality
|
| 1240 |
+
and their generic computation,” Social Networks, vol. 30, no. 2, pp.
|
| 1241 |
+
136–145, 2008.
|
| 1242 |
+
[26] A.
|
| 1243 |
+
Research,
|
| 1244 |
+
“The
|
| 1245 |
+
growth
|
| 1246 |
+
of
|
| 1247 |
+
the
|
| 1248 |
+
Lightning
|
| 1249 |
+
Network,”
|
| 1250 |
+
https://www.research.arcane.no/blog/
|
| 1251 |
+
the-growth-of-the-lightning-network,
|
| 1252 |
+
2021,
|
| 1253 |
+
[Online;
|
| 1254 |
+
accessed
|
| 1255 |
+
11-Nov-2021].
|
| 1256 |
+
Soheil Zibakhsh Shabgahi received his bach-
|
| 1257 |
+
elor’s degree in Computer Engineering from
|
| 1258 |
+
the Department of Electrical and Computer En-
|
| 1259 |
+
gineering, University of Tehran, Tehran, Iran.
|
| 1260 |
+
He is currently a research assistant at the
|
| 1261 |
+
Data lab under the supervision of professor
|
| 1262 |
+
Behnam Bahrak. His research interest are in
|
| 1263 |
+
blockchain systems, Theoretical Computer Sci-
|
| 1264 |
+
ence,distributed systems, and Machine Learn-
|
| 1265 |
+
ing.
|
| 1266 |
+
Seyed Mahdi Hosseini is currently an under-
|
| 1267 |
+
graduate student majoring in computer engi-
|
| 1268 |
+
neering at the School of Electrical and Computer
|
| 1269 |
+
Engineering at the College of Engineering of
|
| 1270 |
+
the University of Tehran. His research interest
|
| 1271 |
+
consists of blockchain, system networks, and
|
| 1272 |
+
distributed systems.
|
| 1273 |
+
Seyed
|
| 1274 |
+
Pooya
|
| 1275 |
+
Shariatpanahi
|
| 1276 |
+
received
|
| 1277 |
+
the
|
| 1278 |
+
B.Sc., M.Sc., and Ph.D. degrees from the De-
|
| 1279 |
+
partment of Electrical Engineering, Sharif Uni-
|
| 1280 |
+
versity of Technology, Tehran, Iran, in 2006,
|
| 1281 |
+
2008, and 2013, respectively. He is currently an
|
| 1282 |
+
Assistant Professor with the School of Electri-
|
| 1283 |
+
cal and Computer Engineering, College of En-
|
| 1284 |
+
gineering, University of Tehran. Before joining
|
| 1285 |
+
the University of Tehran, he was a Researcher
|
| 1286 |
+
with the Institute for Research in Fundamental
|
| 1287 |
+
Sciences (IPM), Tehran. His research interests
|
| 1288 |
+
include information theory, network science, wireless communications,
|
| 1289 |
+
and complex systems. He was a recipient of the Gold Medal at the
|
| 1290 |
+
National Physics Olympiad in 2001.
|
| 1291 |
+
Behnam Bahrak received his bachelor’s and
|
| 1292 |
+
master’s degrees, both in electrical engineering,
|
| 1293 |
+
from Sharif University of Technology, Tehran,
|
| 1294 |
+
Iran, in 2006 and 2008, respectively. He received
|
| 1295 |
+
the Ph.D. degree from the Bradley Department
|
| 1296 |
+
of Electrical and Computer Engineering at Vir-
|
| 1297 |
+
ginia Tech in 2013. He is currently an Assistant
|
| 1298 |
+
Professor of Electrical and Computer Engineer-
|
| 1299 |
+
ing at University of Tehran.
|
| 1300 |
+
|
-9AzT4oBgHgl3EQfS_sw/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
-NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f1eb788ed1d4a94b94ad0e52b7de3a40ec3f66db7c5a2e6513bccde277a71ecc
|
| 3 |
+
size 499623
|
-NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:86e6314c6a7645435b9a78be1c2c4313e9504687509edf988d0410800532bf15
|
| 3 |
+
size 2949165
|
-NFRT4oBgHgl3EQfrTfI/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1dcee74ca34fbcadac43c0bfddd73109bda7f467c1a69a69ca5e95ec0ae38ba0
|
| 3 |
+
size 112180
|
.gitattributes
CHANGED
|
@@ -8130,3 +8130,75 @@ jNAzT4oBgHgl3EQf4_5S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
| 8130 |
d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8131 |
ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8132 |
0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8130 |
d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8131 |
ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8132 |
0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8133 |
+
3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8134 |
+
VNFLT4oBgHgl3EQfRy9S/content/2301.12038v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8135 |
+
ZtE3T4oBgHgl3EQfcwpV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8136 |
+
itE5T4oBgHgl3EQfFw7r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8137 |
+
itE5T4oBgHgl3EQfFw7r/content/2301.05426v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8138 |
+
_tE1T4oBgHgl3EQf8wWT/content/2301.03549v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8139 |
+
jdFQT4oBgHgl3EQfljZQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8140 |
+
e9AzT4oBgHgl3EQf3v7A/content/2301.01835v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8141 |
+
19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8142 |
+
ONE1T4oBgHgl3EQfZwTX/content/2301.03155v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8143 |
+
d9E3T4oBgHgl3EQfHAlE/content/2301.04319v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8144 |
+
MNFAT4oBgHgl3EQfxB7a/content/2301.08685v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8145 |
+
INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8146 |
+
ftFKT4oBgHgl3EQfsy6o/content/2301.11884v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8147 |
+
itAyT4oBgHgl3EQfxvny/content/2301.00674v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8148 |
+
1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8149 |
+
jtE1T4oBgHgl3EQfNQOV/content/2301.03000v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8150 |
+
Q9AzT4oBgHgl3EQfW_zX/content/2301.01312v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8151 |
+
zNAzT4oBgHgl3EQfePy_/content/2301.01434v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8152 |
+
QtAyT4oBgHgl3EQf7vqM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8153 |
+
tdE_T4oBgHgl3EQf9Ryh/content/2301.08380v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8154 |
+
WtE1T4oBgHgl3EQfJAP_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8155 |
+
pdAzT4oBgHgl3EQfAfrM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8156 |
+
jdFQT4oBgHgl3EQfljZQ/content/2301.13362v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8157 |
+
d9E3T4oBgHgl3EQfHAlE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8158 |
+
VtE2T4oBgHgl3EQfXwe7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8159 |
+
xNE3T4oBgHgl3EQflgpH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8160 |
+
1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8161 |
+
lNFAT4oBgHgl3EQfbh0y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8162 |
+
l9E0T4oBgHgl3EQfZACI/content/2301.02315v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8163 |
+
jdFJT4oBgHgl3EQfXixy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8164 |
+
I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8165 |
+
jdFJT4oBgHgl3EQfXixy/content/2301.11522v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8166 |
+
-NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8167 |
+
KtE3T4oBgHgl3EQfvgte/content/2301.04694v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8168 |
+
9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8169 |
+
xNE3T4oBgHgl3EQflgpH/content/2301.04607v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8170 |
+
kdAzT4oBgHgl3EQfpv0l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8171 |
+
ZtA0T4oBgHgl3EQfF_9p/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8172 |
+
59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8173 |
+
GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8174 |
+
ZtE3T4oBgHgl3EQfcwpV/content/2301.04528v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8175 |
+
MNFAT4oBgHgl3EQfxB7a/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8176 |
+
JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8177 |
+
oNFKT4oBgHgl3EQfFy2H/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8178 |
+
vtE3T4oBgHgl3EQf-guw/content/2301.04827v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8179 |
+
etE1T4oBgHgl3EQfegQF/content/2301.03206v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8180 |
+
ddE3T4oBgHgl3EQfGwlg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8181 |
+
ltFQT4oBgHgl3EQfoDYc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8182 |
+
I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8183 |
+
YdE5T4oBgHgl3EQfdg8f/content/2301.05611v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8184 |
+
l9E0T4oBgHgl3EQfZACI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8185 |
+
jtE1T4oBgHgl3EQfNQOV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8186 |
+
tdE_T4oBgHgl3EQf9Ryh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8187 |
+
KNFOT4oBgHgl3EQfyzQ_/content/2301.12929v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8188 |
+
K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8189 |
+
K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8190 |
+
wdE4T4oBgHgl3EQfXgwy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8191 |
+
LtE0T4oBgHgl3EQfSgD7/content/2301.02225v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8192 |
+
-NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8193 |
+
Q9E3T4oBgHgl3EQfDAmJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8194 |
+
8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8195 |
+
Q9AzT4oBgHgl3EQfW_zX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8196 |
+
idE1T4oBgHgl3EQfNAMs/content/2301.02995v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8197 |
+
idE1T4oBgHgl3EQfNAMs/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8198 |
+
_NFLT4oBgHgl3EQfvy-O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8199 |
+
u9FJT4oBgHgl3EQfeiys/content/2301.11553v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8200 |
+
vtE3T4oBgHgl3EQf-guw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8201 |
+
CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8202 |
+
_NFLT4oBgHgl3EQfvy-O/content/2301.12161v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8203 |
+
adE2T4oBgHgl3EQfFAZQ/content/2301.03641v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8204 |
+
CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf filter=lfs diff=lfs merge=lfs -text
|
0NFST4oBgHgl3EQfVTgy/content/tmp_files/2301.13776v1.pdf.txt
ADDED
|
@@ -0,0 +1,1515 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.13776v1 [math.OC] 31 Jan 2023
|
| 2 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 3 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 4 |
+
Abstract. A real symmetric positive semidefinite matrix polynomial Q(x) with square determinant that
|
| 5 |
+
is not identically zero can be factored as
|
| 6 |
+
Q(x) = G(x)T G(x)
|
| 7 |
+
where G(x) is itself a real square matrix polynomial with degree half that of Q(x). We provide a constructive
|
| 8 |
+
proof of this fact, rooted in finding a skew-symmetric solution to a modified algebraic Riccati equation
|
| 9 |
+
XSX − XR + RT X + P = 0,
|
| 10 |
+
where P, R, S are real n × n matrices with P and S real symmetric.
|
| 11 |
+
Keywords Positive semidefinite matrix polynomial, Algebraic Riccati equation, Matrix factorization
|
| 12 |
+
MSCcodes 47A68 (Primary), 46C20, 15A48, 93B05
|
| 13 |
+
1. Introduction
|
| 14 |
+
The Fej´er-Riesz factorization was first shown for matrix polynomials by Rosenblatt [19] and Helson [14]. In
|
| 15 |
+
particular, given a matrix polynomial Q(x) = �2m
|
| 16 |
+
i=0 Qixi with Qi Hermitian and Q(x) positive semidefinite
|
| 17 |
+
for all x ∈ R, we can factorize it as
|
| 18 |
+
Q(x) = G(x)∗G(x)
|
| 19 |
+
where G(x) = �m
|
| 20 |
+
i=0 Gixi. In 1964, Gohberg generalized this factorization to certain operator-valued poly-
|
| 21 |
+
nomials [8].
|
| 22 |
+
Later it was further generalized to operator-valued polynomials in general form [20].
|
| 23 |
+
The
|
| 24 |
+
multivariable case has also been studied, e.g. in [17]. For an overview of the work done with the operator-
|
| 25 |
+
valued Fej´er-Riesz theorem, see [5].
|
| 26 |
+
In this paper, we provide a constructive proof of the real analog of the Fej´er-Riesz factorization of matrix-
|
| 27 |
+
valued polynomials.
|
| 28 |
+
In particular, we show that a matrix polynomial Q(x) = �2m
|
| 29 |
+
i=0 Qixi with Qi real
|
| 30 |
+
symmetric, Q(x) positive semidefinite for all x ∈ R, and det(Q(x)) equal to a nonzero square, admits the
|
| 31 |
+
factorization
|
| 32 |
+
Q(x) = G(x)T G(x)
|
| 33 |
+
where G(x) is itself a real square matrix polynomial with degree half that of Q(x). This result was first
|
| 34 |
+
shown by Hanselka and Sinn [13] using methods from projective algebraic geometry and number theory. We
|
| 35 |
+
provide an alternative, linear algebraic proof, inspired by the proof of the Fej´er-Riesz factorization presented
|
| 36 |
+
in Section 2.7 of [1]. That proof in turn, was taken from [6, 12]. For earlier work on factorizations of real
|
| 37 |
+
symmetric matrix polynomials (not necessarily positive semidefinite) see e.g. [18].
|
| 38 |
+
A key part of the Fej´er-Riesz factorization proof we follow requires finding a Hermitian solution to an
|
| 39 |
+
algebraic Riccati equation
|
| 40 |
+
(∗)
|
| 41 |
+
XDX + XA + A∗X − C = 0,
|
| 42 |
+
where D and C are Hermitian. Reducing a factorization problem to solving a Riccati equation is a technique
|
| 43 |
+
that has been used in many other papers as well (see, e.g., [2], [7], [15, Chapter 19] and references therein).
|
| 44 |
+
This technique is useful because Riccati equations have been studied extensively. Early work was done by
|
| 45 |
+
Willems [21] and Coppel [3] in analyzing properties of solutions of continuous algebraic Riccati equations.
|
| 46 |
+
Another key paper was [4] where Riccati equations were used to solve H∞-control problems. For an in depth
|
| 47 |
+
analysis of algebraic Riccati equations, please see the book by Lancaster and Rodman [15].
|
| 48 |
+
Both authors were supported by National Science Foundation grant DMS 2000037 .
|
| 49 |
+
1
|
| 50 |
+
|
| 51 |
+
2
|
| 52 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 53 |
+
For the current real factorization problem, we end up needing to find a real skew-symmetric solution to
|
| 54 |
+
an equation of the form
|
| 55 |
+
(∗∗)
|
| 56 |
+
XSX − XR + RT X + P = 0,
|
| 57 |
+
where P and S are real symmetric. This is not quite an algebraic Riccati equation of the form eq. (∗) and
|
| 58 |
+
thus we call it a modified algebraic Riccati equation. In general, to find a skew-Hermitian solution X, one
|
| 59 |
+
often considers instead iX, which is Hermitian; however, we want real solutions and thus this method is
|
| 60 |
+
not applicable here. Thus we instead follow the same steps presented in [15] for finding a real symmetric
|
| 61 |
+
solution to the real algebraic Riccati equation and amend them to our current situation. This is the topic
|
| 62 |
+
of Section 2, which culminates in giving sufficient conditions for a skew-symmetric solution of our modified
|
| 63 |
+
Riccati equation eq. (∗∗). In Section 3 we provide additional background on matrix polynomials necessary
|
| 64 |
+
for our main result, the real factorization of a symmetric positive semidefinite matrix polynomial, presented
|
| 65 |
+
in Section 4. The major advantage of our proof compared to that by Hanselka and Sinn [13] is that ours is
|
| 66 |
+
constructive. We end this paper with a couple examples illustrating the construction.
|
| 67 |
+
2. A Modified Algebraic Riccati Equation
|
| 68 |
+
The goal of this section is to provide necessary and sufficient conditions for which there is a real skew-
|
| 69 |
+
symmetric solution X to the modified algebraic Riccati equation
|
| 70 |
+
(1)
|
| 71 |
+
XSX − XR + RT X + P = 0,
|
| 72 |
+
where P, R, S are real n × n matrices with P and S real symmetric. In the book Algebraic Riccati Equations
|
| 73 |
+
[15], Lancaster and Rodman show conditions for which there is a real symmetric solution X to the CARE
|
| 74 |
+
equation
|
| 75 |
+
XDX + XA + AT X − C = 0,
|
| 76 |
+
where A, C, D are real n × n matrices with C and D real symmetric. We amend these results to the present
|
| 77 |
+
situation. Define the 2n × 2n real matrices
|
| 78 |
+
(2)
|
| 79 |
+
Mr =
|
| 80 |
+
�R
|
| 81 |
+
−S
|
| 82 |
+
P
|
| 83 |
+
RT
|
| 84 |
+
�
|
| 85 |
+
,
|
| 86 |
+
ˆHr =
|
| 87 |
+
�0
|
| 88 |
+
I
|
| 89 |
+
I
|
| 90 |
+
0
|
| 91 |
+
�
|
| 92 |
+
,
|
| 93 |
+
Hr =
|
| 94 |
+
�
|
| 95 |
+
P
|
| 96 |
+
RT
|
| 97 |
+
R
|
| 98 |
+
−S
|
| 99 |
+
�
|
| 100 |
+
.
|
| 101 |
+
Then both ˆHr and Hr are real symmetric. Also
|
| 102 |
+
ˆHrMr = M T
|
| 103 |
+
r ˆHr
|
| 104 |
+
and
|
| 105 |
+
HrMr = M T
|
| 106 |
+
r Hr.
|
| 107 |
+
Using terminology from [15], we say Mr is both Hr-symmetric and ˆHr-symmetric.
|
| 108 |
+
We can now give a
|
| 109 |
+
condition for a real solution of eq. (1) to exist.
|
| 110 |
+
Proposition 2.1. X is a real solution of eq. (1) if and only if
|
| 111 |
+
G(X) := Im
|
| 112 |
+
�
|
| 113 |
+
I
|
| 114 |
+
X
|
| 115 |
+
�
|
| 116 |
+
is Mr-invariant.
|
| 117 |
+
Proof. If G(X) is Mr-invariant, then
|
| 118 |
+
(3)
|
| 119 |
+
�R
|
| 120 |
+
−S
|
| 121 |
+
P
|
| 122 |
+
RT
|
| 123 |
+
� � I
|
| 124 |
+
X
|
| 125 |
+
�
|
| 126 |
+
=
|
| 127 |
+
� I
|
| 128 |
+
X
|
| 129 |
+
�
|
| 130 |
+
Z
|
| 131 |
+
for some n × n matrix Z. The first block row gives Z = R − SX and the second gives P + RT X = XZ.
|
| 132 |
+
Combining the two gives
|
| 133 |
+
P + RT X = X(R − SX).
|
| 134 |
+
Thus X solves eq. (1). Conversely, if X solves eq. (1), then eq. (3) holds for Z = R − SX and ths G(X) is
|
| 135 |
+
Mr-invariant.
|
| 136 |
+
□
|
| 137 |
+
More than just a real solution, though, we want a skew-symmetric solution. Thus we next strive to give a
|
| 138 |
+
condition for such a solution. For this we first need a definition (see [15]).
|
| 139 |
+
Definition 2.1. Let H be a real invertible n × n matrix. A subspace M is called
|
| 140 |
+
(1) H-nonnegative if ⟨Hx, x⟩ ≥ 0 for all x ∈ M
|
| 141 |
+
(2) H-nonpositive if ⟨Hx, x⟩ ≤ 0 for all x ∈ M
|
| 142 |
+
|
| 143 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 144 |
+
3
|
| 145 |
+
(3) H-neutral if ⟨Hx, x⟩ = 0 for all x ∈ M
|
| 146 |
+
Proposition 2.2. Let X be a real solution of eq. (1). Then,
|
| 147 |
+
(1) X is skew-symmetric if and only if G(X) is ˆHr-neutral.
|
| 148 |
+
(2) G(X) is Hr-nonpositive if and only if (XT + X)(R − SX) ≤ 0.
|
| 149 |
+
Proof.
|
| 150 |
+
(1) Assume X is skew-symmetric. Let y ∈ G(X), so y =
|
| 151 |
+
� I
|
| 152 |
+
X
|
| 153 |
+
�
|
| 154 |
+
z for some z ∈ Rn. Then
|
| 155 |
+
⟨Hry, y⟩ = zT �I
|
| 156 |
+
XT � ˆHr
|
| 157 |
+
� I
|
| 158 |
+
X
|
| 159 |
+
�
|
| 160 |
+
z = zT (X + XT )z = 0.
|
| 161 |
+
Thus G(X) is ˆHr-neutral. On the other hand, suppose G(X) is ˆHr-neutral. Then for all z ∈ Rn,
|
| 162 |
+
zT(X + XT )z = 0, so X + XT = 0. Thus X is skew-symmetric.
|
| 163 |
+
(2) G(X) is Hr-nonpositive if and only if for all z ∈ Rn,
|
| 164 |
+
�
|
| 165 |
+
Hr
|
| 166 |
+
�
|
| 167 |
+
I
|
| 168 |
+
X
|
| 169 |
+
�
|
| 170 |
+
z,
|
| 171 |
+
�
|
| 172 |
+
I
|
| 173 |
+
X
|
| 174 |
+
�
|
| 175 |
+
z
|
| 176 |
+
�
|
| 177 |
+
≤ 0
|
| 178 |
+
zT �I
|
| 179 |
+
XT � �P
|
| 180 |
+
RT
|
| 181 |
+
R
|
| 182 |
+
−S
|
| 183 |
+
� � I
|
| 184 |
+
X
|
| 185 |
+
�
|
| 186 |
+
z ≤ 0
|
| 187 |
+
zT[P + RT X + XT R − XT SX]z ≤ 0
|
| 188 |
+
zT [XR − XSX + XT R − XT SX]z ≤ 0
|
| 189 |
+
by eq. (1)
|
| 190 |
+
zT (XT + X)(R − SX)z ≤ 0
|
| 191 |
+
Thus G(X) is Hr-nonpositive if and only if (XT + X)(R − SX) ≤ 0.
|
| 192 |
+
□
|
| 193 |
+
proposition 2.2 shows that in order to get a real skew-symmetric solution X to the equation eq. (1), we need
|
| 194 |
+
an ˆHr-neutral subspace G(X) of dimension n. We consider now conditions for such a subspace to exist. For
|
| 195 |
+
this we first state a few known results (see [15]).
|
| 196 |
+
Definition 2.2. Let A be a square matrix and λi be an eigenvalue of A. We call the sizes of the Jordan
|
| 197 |
+
blocks of λi the partial multiplicities of λi.
|
| 198 |
+
Theorem 2.1. [15, Part of Theorem 2.6.3]
|
| 199 |
+
Let A be a real n × n H-symmetric matrix and the partial
|
| 200 |
+
multiplicities of A corresponding to the real eigenvalues are all even. Then there exists an A-invariant H-
|
| 201 |
+
neutral subspace of dimension k − p where k is the number of positive eigenvalues of H (counting algebraic
|
| 202 |
+
multiplicities) and p is the number of distinct pairs of non-real complex conjugate eigenvalues of A with odd
|
| 203 |
+
algebraic multiplicity.
|
| 204 |
+
Lemma 2.1. [15, p. 56] Let H be a real symmetric matrix. A real subspace M is H-neutral if and only if
|
| 205 |
+
⟨Hx, y⟩ = 0 for all x, y ∈ M.
|
| 206 |
+
Proof. This follows from the relation
|
| 207 |
+
⟨Hx, y⟩ = 1
|
| 208 |
+
2 (⟨H(x + y), x + y⟩ − ⟨Hx, x⟩ − ⟨Hy, y⟩) .
|
| 209 |
+
□
|
| 210 |
+
Now we are ready for the new result.
|
| 211 |
+
Lemma 2.2. Let eq. (2) hold with P and S real symmetric. Among the following statements, (iii) =⇒
|
| 212 |
+
(ii) =⇒ (i)
|
| 213 |
+
(i) There exists an n-dimensional Mr-invariant Hr-neutral subspace
|
| 214 |
+
(ii) There exists an n-dimensional Mr-invariant ˆHr-neutral subspace
|
| 215 |
+
(iii) All real eigenvalues of Mr have even partial multiplicities and all imaginary eigenvalues of Mr have
|
| 216 |
+
even algebraic multiplicity.
|
| 217 |
+
If in addition Mr is invertible, then we also have (i) =⇒ (ii).
|
| 218 |
+
|
| 219 |
+
4
|
| 220 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 221 |
+
Proof. By theorem 2.1, if every imaginary eigenvalue of Mr has even algebraic multiplicity (i.e. p = 0),
|
| 222 |
+
then an n-dimensional Mr-invariant ˆHr-neutral subspace exists (since ˆHr has n positive and n negative
|
| 223 |
+
eigenvalues so k = n here). Thus (iii) =⇒ (ii). Next, since Hr = ˆ
|
| 224 |
+
HrMr, it follows by lemma 2.1 that (ii)
|
| 225 |
+
implies (i). Finally, if Mr is invertible, ˆ
|
| 226 |
+
Hr = HrM −1
|
| 227 |
+
r
|
| 228 |
+
and thus (i) implies (ii).
|
| 229 |
+
□
|
| 230 |
+
We need one more result before the main theorem of this section. For this result, we first recall a definition
|
| 231 |
+
(see, e.g., [15]).
|
| 232 |
+
Definition 2.3. Let A ∈ Rn×n and B ∈ Rn×m. The pair (A, B) is said to be controllable if
|
| 233 |
+
rank
|
| 234 |
+
�B
|
| 235 |
+
AB
|
| 236 |
+
A2B
|
| 237 |
+
· · ·
|
| 238 |
+
An−1B�
|
| 239 |
+
= n.
|
| 240 |
+
Lemma 2.3. Assume that S ≥ 0 (positive semidefinite) and the pair (R, S) is controllable. Let L be an
|
| 241 |
+
n-dimensional Mr-invariant Hr-nonnegative subspace of R2n. Then L is a graph subspace, i.e.
|
| 242 |
+
L = Im
|
| 243 |
+
� I
|
| 244 |
+
X
|
| 245 |
+
�
|
| 246 |
+
for some real n × n matrix X.
|
| 247 |
+
Proof. For L as defined in the statement, write
|
| 248 |
+
L = Im
|
| 249 |
+
�
|
| 250 |
+
X1
|
| 251 |
+
X2
|
| 252 |
+
�
|
| 253 |
+
for some real n × n matrices X1 and X2. We shall show that X1 is invertible. First, since L is Mr-invariant,
|
| 254 |
+
�
|
| 255 |
+
R
|
| 256 |
+
−S
|
| 257 |
+
P
|
| 258 |
+
RT
|
| 259 |
+
� �
|
| 260 |
+
X1
|
| 261 |
+
X2
|
| 262 |
+
�
|
| 263 |
+
=
|
| 264 |
+
�
|
| 265 |
+
X1
|
| 266 |
+
X2
|
| 267 |
+
�
|
| 268 |
+
T
|
| 269 |
+
for some n × n matrix T . Thus,
|
| 270 |
+
RX1 − SX2 = X1T
|
| 271 |
+
(4)
|
| 272 |
+
PX1 + RT X2 = X2T
|
| 273 |
+
(5)
|
| 274 |
+
Next, since L is Hr-nonnegative, we know
|
| 275 |
+
(6)
|
| 276 |
+
�XT
|
| 277 |
+
1
|
| 278 |
+
XT
|
| 279 |
+
2
|
| 280 |
+
� �
|
| 281 |
+
P
|
| 282 |
+
RT
|
| 283 |
+
R
|
| 284 |
+
−S
|
| 285 |
+
� �
|
| 286 |
+
X1
|
| 287 |
+
X2
|
| 288 |
+
�
|
| 289 |
+
= XT
|
| 290 |
+
1 PX1 + XT
|
| 291 |
+
1 RT X2 + XT
|
| 292 |
+
2 RX1 − XT
|
| 293 |
+
2 SX2
|
| 294 |
+
is positive semidefinite. Let K = ker X1. Since eq. (6) is positive semidefinite, for every x ∈ K,
|
| 295 |
+
0 ≤ xT XT
|
| 296 |
+
1 PX1x + xT XT
|
| 297 |
+
1 RT X2x + xT XT
|
| 298 |
+
2 RX1x − xT XT
|
| 299 |
+
2 SX2x = −xT XT
|
| 300 |
+
2 SX2x.
|
| 301 |
+
Since S ≥ 0, X2x ∈ ker S, so
|
| 302 |
+
X2K ⊂ ker S.
|
| 303 |
+
Then, equation eq. (4) implies
|
| 304 |
+
T K ⊂ K.
|
| 305 |
+
Consequently, equation eq. (5) gives
|
| 306 |
+
RT X2K ⊂ X2K.
|
| 307 |
+
All together, we have
|
| 308 |
+
RT X2K ⊂ ker S.
|
| 309 |
+
By induction, we get
|
| 310 |
+
(RT )rX2K ⊂ ker S,
|
| 311 |
+
r = 0, 1, 2, . . .
|
| 312 |
+
Now for every x ∈ K,
|
| 313 |
+
|
| 314 |
+
|
| 315 |
+
S
|
| 316 |
+
SRT
|
| 317 |
+
...
|
| 318 |
+
S(RT )n−1
|
| 319 |
+
|
| 320 |
+
(X2x) = 0
|
| 321 |
+
|
| 322 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 323 |
+
5
|
| 324 |
+
Since (R, S) is controllable, we must have X2x = 0. The only n-dimensional vector x for which X1x =
|
| 325 |
+
X2x = 0 is the zero vector (otherwise dim L < n). Thus K = {0} and X1 is invertible. Hence
|
| 326 |
+
L = Im
|
| 327 |
+
�
|
| 328 |
+
I
|
| 329 |
+
X
|
| 330 |
+
�
|
| 331 |
+
,
|
| 332 |
+
where X = X2X−1
|
| 333 |
+
1
|
| 334 |
+
and so L is a graph subspace.
|
| 335 |
+
□
|
| 336 |
+
Now we put everything together to get sufficient conditions for a real skew-symmetric solution of eq. (1):
|
| 337 |
+
Theorem 2.2. Let eq. (2) hold with P and S real symmetric. Assume that S ≥ 0 and the pair (R, S) is
|
| 338 |
+
controllable. Then the conditions (i) - (ii) are equivalent and (iii) implies (ii)
|
| 339 |
+
(i) The equation eq. (1) has a real skew-symmetric solution.
|
| 340 |
+
(ii) There exists an n-dimensional Mr-invariant ˆ
|
| 341 |
+
Hr-neutral subspace.
|
| 342 |
+
(iii) All real eigenvalues of Mr have even partial multiplicities and all imaginary eigenvalues of Mr have
|
| 343 |
+
even algebraic multiplicity.
|
| 344 |
+
Proof. The (iii) =⇒ (ii) was part of lemma 2.2. By proposition 2.1 and proposition 2.2, we know that
|
| 345 |
+
if X is a real skew-symmetric solution to eq. (1), then G(X) is an n-dimensional Mr-invariant ˆHr-neutral
|
| 346 |
+
subspace.
|
| 347 |
+
Thus (i)
|
| 348 |
+
=⇒
|
| 349 |
+
(ii).
|
| 350 |
+
Finally, assume there exists an n-dimensional Mr-invariant ˆHr-neutral
|
| 351 |
+
subspace, say L. Since Hr = ˆHrMr, L is also an n-dimensional Mr-invariant Hr-neutral subspace. Clearly
|
| 352 |
+
L is an Hr-nonnegative subspace, so by lemma 2.3, L is a graph subspace. Since L = G(X) is Mr-invariant,
|
| 353 |
+
X is a real solution of eq. (1) by proposition 2.1. Since L = G(X) is also ˆHr-neutral, by proposition 2.2 X
|
| 354 |
+
is skew-symmetric. Thus (ii) =⇒ (i).
|
| 355 |
+
□
|
| 356 |
+
3. Matrix Polynomials
|
| 357 |
+
Building toward our goal of factorizing a real symmetric positive semidefinite matrix polynomial, we next
|
| 358 |
+
state a few relevant results on matrix polynomials (see [11]).
|
| 359 |
+
Definition 3.1. For n × n matrices Pi, we define an n × n matrix polynomial P(x) of degree m by
|
| 360 |
+
P(x) =
|
| 361 |
+
m
|
| 362 |
+
�
|
| 363 |
+
i=0
|
| 364 |
+
Pixi.
|
| 365 |
+
• The matrix polynomial is called real if all Pi are real matrices.
|
| 366 |
+
• The matrix polynomial is called monic if Pm = In.
|
| 367 |
+
• The matrix polynomial is called self-adjoint if Pi = P ∗
|
| 368 |
+
i , its conjugate transpose, for all i.
|
| 369 |
+
• The matrix polynomial is called symmetric if Pi = P T
|
| 370 |
+
i
|
| 371 |
+
for all i.
|
| 372 |
+
• The matrix polynomial is called positive semidefinite (also nonnegative) if for all x ∈ R, P(x) is
|
| 373 |
+
positive semidefinite.
|
| 374 |
+
• The matrix polynomial is called regular if det(P(x)) is not identically zero.
|
| 375 |
+
As in [16], we define the spectrum and Jordan canonical form of a matrix polynomial in the following
|
| 376 |
+
ways.1
|
| 377 |
+
Definition 3.2. Let P(x) be a regular matrix polynomial. Then the set of eigenvalues of P, i.e. the spectrum,
|
| 378 |
+
is
|
| 379 |
+
σ(P) := {λ ∈ C : det(P(λ)) = 0}.
|
| 380 |
+
Definition 3.3. Let P(x) be a monic matrix polynomial, i.e.
|
| 381 |
+
P(x) = Inxm +
|
| 382 |
+
m−1
|
| 383 |
+
�
|
| 384 |
+
i=0
|
| 385 |
+
Pixi.
|
| 386 |
+
1Note that the partial multiplicities of an eigenvalue of a matrix polynomial are often defined as powers of the elementary
|
| 387 |
+
divisors; however, these partial multiplicities are the same as the sizes of the Jordan blocks of our companion matrix. See the
|
| 388 |
+
Appendix of [10] for a more in depth understanding of matrix polynomial equivalences, linearizations, partial multiplicities and
|
| 389 |
+
elementary divisors.
|
| 390 |
+
|
| 391 |
+
6
|
| 392 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 393 |
+
The Jordan canonical form for P(x) is defined to be that of the companion matrix
|
| 394 |
+
Cp :=
|
| 395 |
+
|
| 396 |
+
|
| 397 |
+
0
|
| 398 |
+
In
|
| 399 |
+
0
|
| 400 |
+
· · ·
|
| 401 |
+
0
|
| 402 |
+
0
|
| 403 |
+
0
|
| 404 |
+
In
|
| 405 |
+
· · ·
|
| 406 |
+
0
|
| 407 |
+
...
|
| 408 |
+
...
|
| 409 |
+
...
|
| 410 |
+
...
|
| 411 |
+
...
|
| 412 |
+
0
|
| 413 |
+
0
|
| 414 |
+
· · ·
|
| 415 |
+
0
|
| 416 |
+
In
|
| 417 |
+
−P0
|
| 418 |
+
−P1
|
| 419 |
+
· · ·
|
| 420 |
+
−Pm−2
|
| 421 |
+
−Pm−1
|
| 422 |
+
|
| 423 |
+
|
| 424 |
+
Theorem 3.1. [11, part of Theorem 12.8] For a monic self-adjoint matrix polynomial P(x), the following
|
| 425 |
+
statements are equivalent:
|
| 426 |
+
(i) P(x) is nonnegative.
|
| 427 |
+
(ii) The partial multiplicities of P(x) for real points of the spectrum are all even.
|
| 428 |
+
In the previous section, we found that if all real eigenvalues of Mr have even partial multiplicities and all
|
| 429 |
+
imaginary eigenvalues of Mr have even algebraic multiplicity, then our equation eq. (1) has the desired real
|
| 430 |
+
skew-symmetric solution. Thus we now want to connect the eigenvalues of Mr and their partial multiplicities
|
| 431 |
+
with the eigenvalues of a monic nonnegative matrix polynomial P(x). For this, we begin with a few definitions
|
| 432 |
+
from [11].
|
| 433 |
+
Definition 3.4. Two matrix polynomials M1(x) and M2(x) of size n × n are called equivalent if
|
| 434 |
+
M1(x) = E(x)M2(x)F(x)
|
| 435 |
+
for some n × n matrix polynomials E(x) and F(x) with constant nonzero determinants.
|
| 436 |
+
Definition 3.5. Let P(x) be an n × n monic matrix polynomial of degree m. A linear matrix polynomial
|
| 437 |
+
λI − A is called a linearization of P(x) if
|
| 438 |
+
(7)
|
| 439 |
+
λI − A ∼
|
| 440 |
+
�
|
| 441 |
+
P(x)
|
| 442 |
+
0
|
| 443 |
+
0
|
| 444 |
+
In(m−1)
|
| 445 |
+
�
|
| 446 |
+
where ∼ means equivalence of matrix polynomials.
|
| 447 |
+
Note that Cp, the companion matrix, is a linearization of P(x). For any linearization λI − A, the partial
|
| 448 |
+
multiplicities in every eigenvalue of A and P(x) are the same. Thus to gain results about the multiplicities
|
| 449 |
+
of the eigenvalues of Mr, it suffices to show λI − Mr is a linearization of a matrix polynomial P(x).
|
| 450 |
+
Lemma 3.1. Let Q(x) = �2m
|
| 451 |
+
j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
|
| 452 |
+
Q0 = In. Then for
|
| 453 |
+
Mr =
|
| 454 |
+
|
| 455 |
+
|
| 456 |
+
− 1
|
| 457 |
+
2Q1
|
| 458 |
+
−In
|
| 459 |
+
In
|
| 460 |
+
0
|
| 461 |
+
0
|
| 462 |
+
...
|
| 463 |
+
...
|
| 464 |
+
...
|
| 465 |
+
In
|
| 466 |
+
0
|
| 467 |
+
0
|
| 468 |
+
Q2 − 1
|
| 469 |
+
4Q2
|
| 470 |
+
1
|
| 471 |
+
1
|
| 472 |
+
2Q3
|
| 473 |
+
− 1
|
| 474 |
+
2Q1
|
| 475 |
+
In
|
| 476 |
+
1
|
| 477 |
+
2Q3
|
| 478 |
+
Q4
|
| 479 |
+
...
|
| 480 |
+
0
|
| 481 |
+
...
|
| 482 |
+
...
|
| 483 |
+
...
|
| 484 |
+
1
|
| 485 |
+
2Q2m−1
|
| 486 |
+
...
|
| 487 |
+
In
|
| 488 |
+
1
|
| 489 |
+
2Q2m−1
|
| 490 |
+
Q2m
|
| 491 |
+
0
|
| 492 |
+
|
| 493 |
+
|
| 494 |
+
,
|
| 495 |
+
we have
|
| 496 |
+
λI − Mr ∼
|
| 497 |
+
�
|
| 498 |
+
rev Q(λ)
|
| 499 |
+
0
|
| 500 |
+
0
|
| 501 |
+
I
|
| 502 |
+
�
|
| 503 |
+
where
|
| 504 |
+
rev Q(x) :=
|
| 505 |
+
2m
|
| 506 |
+
�
|
| 507 |
+
i=0
|
| 508 |
+
Q2m−ixi = x2mIn +
|
| 509 |
+
2m−1
|
| 510 |
+
�
|
| 511 |
+
i=1
|
| 512 |
+
Q2m−ixi.
|
| 513 |
+
|
| 514 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 515 |
+
7
|
| 516 |
+
Proof. First permute the rows and columns as follows:
|
| 517 |
+
M1:=
|
| 518 |
+
|
| 519 |
+
|
| 520 |
+
0
|
| 521 |
+
0
|
| 522 |
+
· · ·
|
| 523 |
+
0
|
| 524 |
+
In
|
| 525 |
+
0
|
| 526 |
+
In
|
| 527 |
+
...
|
| 528 |
+
0
|
| 529 |
+
0
|
| 530 |
+
...
|
| 531 |
+
...
|
| 532 |
+
...
|
| 533 |
+
...
|
| 534 |
+
0
|
| 535 |
+
In
|
| 536 |
+
0
|
| 537 |
+
· · ·
|
| 538 |
+
0
|
| 539 |
+
In
|
| 540 |
+
0
|
| 541 |
+
· · ·
|
| 542 |
+
0
|
| 543 |
+
0
|
| 544 |
+
0
|
| 545 |
+
0
|
| 546 |
+
...
|
| 547 |
+
In
|
| 548 |
+
0
|
| 549 |
+
...
|
| 550 |
+
...
|
| 551 |
+
0
|
| 552 |
+
...
|
| 553 |
+
...
|
| 554 |
+
0
|
| 555 |
+
· · ·
|
| 556 |
+
0
|
| 557 |
+
In
|
| 558 |
+
0
|
| 559 |
+
|
| 560 |
+
|
| 561 |
+
(λI − Mr)
|
| 562 |
+
|
| 563 |
+
|
| 564 |
+
In
|
| 565 |
+
...
|
| 566 |
+
In
|
| 567 |
+
0
|
| 568 |
+
0
|
| 569 |
+
In
|
| 570 |
+
...
|
| 571 |
+
In
|
| 572 |
+
|
| 573 |
+
|
| 574 |
+
,
|
| 575 |
+
=
|
| 576 |
+
|
| 577 |
+
|
| 578 |
+
−Q2m
|
| 579 |
+
− 1
|
| 580 |
+
2Q2m−1
|
| 581 |
+
0
|
| 582 |
+
λIn
|
| 583 |
+
λIn
|
| 584 |
+
−In
|
| 585 |
+
0
|
| 586 |
+
...
|
| 587 |
+
...
|
| 588 |
+
...
|
| 589 |
+
...
|
| 590 |
+
...
|
| 591 |
+
λIn
|
| 592 |
+
−In
|
| 593 |
+
0
|
| 594 |
+
λIn + 1
|
| 595 |
+
2Q1
|
| 596 |
+
In
|
| 597 |
+
− 1
|
| 598 |
+
2Q3
|
| 599 |
+
1
|
| 600 |
+
4Q2
|
| 601 |
+
1 − Q2
|
| 602 |
+
λIn + 1
|
| 603 |
+
2Q1
|
| 604 |
+
−In
|
| 605 |
+
...
|
| 606 |
+
−Q4
|
| 607 |
+
− 1
|
| 608 |
+
2Q3
|
| 609 |
+
λIn
|
| 610 |
+
...
|
| 611 |
+
...
|
| 612 |
+
...
|
| 613 |
+
...
|
| 614 |
+
...
|
| 615 |
+
...
|
| 616 |
+
− 1
|
| 617 |
+
2Q2m−1
|
| 618 |
+
−Q2m−2
|
| 619 |
+
− 1
|
| 620 |
+
2Q2m−3
|
| 621 |
+
λIn
|
| 622 |
+
−In
|
| 623 |
+
|
| 624 |
+
|
| 625 |
+
Define V1, . . . , Vm by
|
| 626 |
+
V1 = −Q2m − 1
|
| 627 |
+
2λQ2m−1
|
| 628 |
+
V2 = −1
|
| 629 |
+
2Q2m−1 − λQ2m−2 − 1
|
| 630 |
+
2λ2Q2m−3
|
| 631 |
+
V3 = −1
|
| 632 |
+
2λQ2m−3 − λ2Q2m−4 − 1
|
| 633 |
+
2λ3Q2m−5
|
| 634 |
+
...
|
| 635 |
+
Vm−1 = −1
|
| 636 |
+
2λm−3Q5 − λm−2Q4 − 1
|
| 637 |
+
2λm−1Q3
|
| 638 |
+
Vm = −1
|
| 639 |
+
2λm−2Q3 − λm−1Q2 − λmQ1 − λm+1In
|
| 640 |
+
Then, multiply M1 on the left by
|
| 641 |
+
|
| 642 |
+
|
| 643 |
+
In
|
| 644 |
+
�m
|
| 645 |
+
i=2 λi−2Vi
|
| 646 |
+
�m
|
| 647 |
+
i=3 λi−3Vi
|
| 648 |
+
· · ·
|
| 649 |
+
Vm−1 + λVm
|
| 650 |
+
Vm
|
| 651 |
+
−λm−1(λIn + 1
|
| 652 |
+
2Q1)
|
| 653 |
+
λm−1In
|
| 654 |
+
· · ·
|
| 655 |
+
λ2In
|
| 656 |
+
λIn
|
| 657 |
+
0
|
| 658 |
+
In(m−1)
|
| 659 |
+
0
|
| 660 |
+
0
|
| 661 |
+
0
|
| 662 |
+
Inm
|
| 663 |
+
|
| 664 |
+
.
|
| 665 |
+
Noting that
|
| 666 |
+
−Q2m − 1
|
| 667 |
+
2λQ2m−1 + λ
|
| 668 |
+
m
|
| 669 |
+
�
|
| 670 |
+
i=2
|
| 671 |
+
λi−2Vi = − rev Q(λ),
|
| 672 |
+
|
| 673 |
+
8
|
| 674 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 675 |
+
we get
|
| 676 |
+
λI − Mr ∼
|
| 677 |
+
|
| 678 |
+
|
| 679 |
+
− rev Q(λ)
|
| 680 |
+
−In
|
| 681 |
+
0
|
| 682 |
+
∗
|
| 683 |
+
...
|
| 684 |
+
−In
|
| 685 |
+
0
|
| 686 |
+
∗
|
| 687 |
+
In
|
| 688 |
+
−In
|
| 689 |
+
0
|
| 690 |
+
∗
|
| 691 |
+
...
|
| 692 |
+
−In
|
| 693 |
+
|
| 694 |
+
|
| 695 |
+
Thus it is evident now that
|
| 696 |
+
λI − Mr ∼
|
| 697 |
+
�
|
| 698 |
+
rev Q(λ)
|
| 699 |
+
0
|
| 700 |
+
0
|
| 701 |
+
I
|
| 702 |
+
�
|
| 703 |
+
.
|
| 704 |
+
□
|
| 705 |
+
4. Real Factorization of Non-negative Matrix Polynomial
|
| 706 |
+
We are now ready for the main result. While the following theorem was previously proven by Hanselka
|
| 707 |
+
and Sinn [13], we provide a new constructive proof following that of the complex analogue presented in the
|
| 708 |
+
monograph by Bakonyi and Woerdeman [1].
|
| 709 |
+
Theorem 4.1. Let Q(x) = �2m
|
| 710 |
+
j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
|
| 711 |
+
Q(x) ≥ 0 for all x ∈ R and Q0 > 0. Then det(Q(x)) is a square if and only if there exists an n × n real
|
| 712 |
+
matrix polynomial G(x) = �m
|
| 713 |
+
j=0 Gjxj of degree m such that
|
| 714 |
+
Q(x) = G(x)T G(x).
|
| 715 |
+
Proof. First, assume Q(x) = G(x)T G(x). Then det(Q(x)) = det(G(x))2.
|
| 716 |
+
On the other hand, assume
|
| 717 |
+
det(Q(x)) is a square. Without loss of generality, assume Q0 = In (otherwise, take ˜Q(x) := Q−1/2
|
| 718 |
+
0
|
| 719 |
+
Q(x)Q−1/2
|
| 720 |
+
0
|
| 721 |
+
).
|
| 722 |
+
Consider the (m + 1)n × (m + 1)n real symmetric matrix
|
| 723 |
+
F0 =
|
| 724 |
+
|
| 725 |
+
|
| 726 |
+
In
|
| 727 |
+
1
|
| 728 |
+
2Q1
|
| 729 |
+
1
|
| 730 |
+
2Q1
|
| 731 |
+
Q2
|
| 732 |
+
...
|
| 733 |
+
...
|
| 734 |
+
...
|
| 735 |
+
1
|
| 736 |
+
2Q2m−1
|
| 737 |
+
1
|
| 738 |
+
2Q2m−1
|
| 739 |
+
Q2m
|
| 740 |
+
|
| 741 |
+
|
| 742 |
+
.
|
| 743 |
+
Given an nm × nm real skew-symmetric matrix
|
| 744 |
+
X =
|
| 745 |
+
|
| 746 |
+
|
| 747 |
+
X1,1
|
| 748 |
+
· · ·
|
| 749 |
+
X1,m
|
| 750 |
+
...
|
| 751 |
+
...
|
| 752 |
+
Xm,1
|
| 753 |
+
· · ·
|
| 754 |
+
Xm,m
|
| 755 |
+
|
| 756 |
+
,
|
| 757 |
+
let
|
| 758 |
+
FX = F0 +
|
| 759 |
+
� 0
|
| 760 |
+
X
|
| 761 |
+
0n
|
| 762 |
+
0
|
| 763 |
+
�
|
| 764 |
+
−
|
| 765 |
+
� 0
|
| 766 |
+
0n
|
| 767 |
+
X
|
| 768 |
+
0
|
| 769 |
+
�
|
| 770 |
+
.
|
| 771 |
+
It should be noted that in the above line, the matrix decompositions are different; e.g. the X block and the
|
| 772 |
+
−X block overlap in general. We want to solve
|
| 773 |
+
Xopt = arg min
|
| 774 |
+
rank(FX)
|
| 775 |
+
such that FX ≥ 0.
|
| 776 |
+
Let
|
| 777 |
+
A =
|
| 778 |
+
|
| 779 |
+
|
| 780 |
+
0
|
| 781 |
+
In
|
| 782 |
+
0
|
| 783 |
+
...
|
| 784 |
+
...
|
| 785 |
+
In
|
| 786 |
+
0
|
| 787 |
+
|
| 788 |
+
∈ Rnm×nm
|
| 789 |
+
and
|
| 790 |
+
B =
|
| 791 |
+
|
| 792 |
+
|
| 793 |
+
In
|
| 794 |
+
0
|
| 795 |
+
...
|
| 796 |
+
0
|
| 797 |
+
|
| 798 |
+
∈ Rnm×n.
|
| 799 |
+
|
| 800 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 801 |
+
9
|
| 802 |
+
Then (A, B) is controllable,
|
| 803 |
+
�
|
| 804 |
+
0
|
| 805 |
+
0
|
| 806 |
+
X
|
| 807 |
+
0
|
| 808 |
+
�
|
| 809 |
+
=
|
| 810 |
+
�
|
| 811 |
+
0
|
| 812 |
+
0
|
| 813 |
+
XB
|
| 814 |
+
XA
|
| 815 |
+
�
|
| 816 |
+
,
|
| 817 |
+
and
|
| 818 |
+
�
|
| 819 |
+
0
|
| 820 |
+
X
|
| 821 |
+
0
|
| 822 |
+
0
|
| 823 |
+
�
|
| 824 |
+
=
|
| 825 |
+
��
|
| 826 |
+
0
|
| 827 |
+
BT X
|
| 828 |
+
0
|
| 829 |
+
AT X
|
| 830 |
+
�
|
| 831 |
+
.
|
| 832 |
+
Split F0 into four blocks as follows,
|
| 833 |
+
F0 =
|
| 834 |
+
� In
|
| 835 |
+
Γ12
|
| 836 |
+
Γ21
|
| 837 |
+
Γ22
|
| 838 |
+
�
|
| 839 |
+
.
|
| 840 |
+
Noting ΓT
|
| 841 |
+
12 = Γ21 and Γ22 is real symmetric, we can recast the condition FX ≥ 0 as
|
| 842 |
+
�
|
| 843 |
+
In
|
| 844 |
+
Γ12 + BT X
|
| 845 |
+
ΓT
|
| 846 |
+
12 − XB
|
| 847 |
+
Γ22 + AT X − XA
|
| 848 |
+
�
|
| 849 |
+
≥ 0
|
| 850 |
+
Consider the Schur complement with respect to In,
|
| 851 |
+
Γ22 + AT X − XA − (ΓT
|
| 852 |
+
12 − XB)I−1
|
| 853 |
+
n (Γ12 + BT X).
|
| 854 |
+
Setting this equal to zero, we get the modified algebraic Riccati equation
|
| 855 |
+
(8)
|
| 856 |
+
P + RT X − XR + XSX = 0
|
| 857 |
+
where
|
| 858 |
+
P = Γ22 − ΓT
|
| 859 |
+
12Γ12
|
| 860 |
+
R = A − BΓ12
|
| 861 |
+
S = BBT .
|
| 862 |
+
Note P = P T and S = ST with S ≥ 0. In this case, the associated Mr matrix is as follows:
|
| 863 |
+
Mr =
|
| 864 |
+
� A − BΓ12
|
| 865 |
+
−BBT
|
| 866 |
+
Γ22 − ΓT
|
| 867 |
+
12Γ12
|
| 868 |
+
AT − ΓT
|
| 869 |
+
12BT
|
| 870 |
+
�
|
| 871 |
+
=
|
| 872 |
+
|
| 873 |
+
|
| 874 |
+
− 1
|
| 875 |
+
2Q1
|
| 876 |
+
−In
|
| 877 |
+
In
|
| 878 |
+
0
|
| 879 |
+
0
|
| 880 |
+
...
|
| 881 |
+
...
|
| 882 |
+
...
|
| 883 |
+
In
|
| 884 |
+
0
|
| 885 |
+
0
|
| 886 |
+
Q2 − 1
|
| 887 |
+
4Q2
|
| 888 |
+
1
|
| 889 |
+
1
|
| 890 |
+
2Q3
|
| 891 |
+
− 1
|
| 892 |
+
2Q1
|
| 893 |
+
In
|
| 894 |
+
1
|
| 895 |
+
2Q3
|
| 896 |
+
Q4
|
| 897 |
+
...
|
| 898 |
+
0
|
| 899 |
+
...
|
| 900 |
+
...
|
| 901 |
+
...
|
| 902 |
+
1
|
| 903 |
+
2Q2m−1
|
| 904 |
+
...
|
| 905 |
+
In
|
| 906 |
+
1
|
| 907 |
+
2Q2m−1
|
| 908 |
+
Q2m
|
| 909 |
+
0
|
| 910 |
+
|
| 911 |
+
|
| 912 |
+
By lemma 3.1, Mr is a linearization of rev Q(x). Since Q(x) ≥ 0 for all x ∈ R, rev Q(x) = x2mQ
|
| 913 |
+
� 1
|
| 914 |
+
x
|
| 915 |
+
�
|
| 916 |
+
≥ 0
|
| 917 |
+
for all nonzero x ∈ R. By continuity, then rev Q(x) ≥ 0 for all x ∈ R. Then by theorem 3.1, the partial
|
| 918 |
+
multiplicities of every real eigenvalue of rev Q(λ) are all even. Since Mr is a linearization of rev Q(x), all
|
| 919 |
+
the partial multiplicities of every eigenvalue of Mr and rev Q(λ) are the same, so the partial multiplicities
|
| 920 |
+
of every real eigenvalue of Mr are all even. Further, by the non-negativity of rev Q(x),
|
| 921 |
+
det(λI − Mr) = det(rev Q(x))
|
| 922 |
+
has all roots of even algebraic multiplicity. In particular, all non-real eigenvalues of Mr have even algebraic
|
| 923 |
+
multiplicity. Hence by theorem 2.2, there is a skew-symmetric solution, ˜X of eq. (8). Then since the Schur
|
| 924 |
+
complement with respect to In is zero, we know
|
| 925 |
+
F ˜
|
| 926 |
+
X =
|
| 927 |
+
�
|
| 928 |
+
In
|
| 929 |
+
Γ12 + BT ˜X
|
| 930 |
+
ΓT
|
| 931 |
+
12 − ˜XB
|
| 932 |
+
Γ22 + AT ˜X − ˜XA
|
| 933 |
+
�
|
| 934 |
+
≥ 0
|
| 935 |
+
|
| 936 |
+
10
|
| 937 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 938 |
+
and
|
| 939 |
+
rank(F ˜
|
| 940 |
+
X) = rank
|
| 941 |
+
��
|
| 942 |
+
In
|
| 943 |
+
Γ12 + BT ˜X
|
| 944 |
+
ΓT
|
| 945 |
+
12 − ˜XB
|
| 946 |
+
Γ22 + AT ˜X − ˜XA
|
| 947 |
+
��
|
| 948 |
+
= rank In = n.
|
| 949 |
+
If we factorize
|
| 950 |
+
F ˜
|
| 951 |
+
X =
|
| 952 |
+
�
|
| 953 |
+
In
|
| 954 |
+
Γ12 + BT ˜X
|
| 955 |
+
ΓT
|
| 956 |
+
12 − ˜XB
|
| 957 |
+
Γ22 + AT ˜X − ˜XA
|
| 958 |
+
�
|
| 959 |
+
=
|
| 960 |
+
|
| 961 |
+
|
| 962 |
+
GT
|
| 963 |
+
0
|
| 964 |
+
...
|
| 965 |
+
GT
|
| 966 |
+
m
|
| 967 |
+
|
| 968 |
+
|
| 969 |
+
�
|
| 970 |
+
G0
|
| 971 |
+
· · ·
|
| 972 |
+
Gm
|
| 973 |
+
�
|
| 974 |
+
with G0 = In and Gi, i = 1, 2, . . . , m, real n × n matrices, we have
|
| 975 |
+
Q(x) =
|
| 976 |
+
�In
|
| 977 |
+
xIn
|
| 978 |
+
· · ·
|
| 979 |
+
xmIn
|
| 980 |
+
�
|
| 981 |
+
F ˜
|
| 982 |
+
X
|
| 983 |
+
|
| 984 |
+
|
| 985 |
+
In
|
| 986 |
+
xIn
|
| 987 |
+
...
|
| 988 |
+
xmIn
|
| 989 |
+
|
| 990 |
+
|
| 991 |
+
=
|
| 992 |
+
�In
|
| 993 |
+
xIn
|
| 994 |
+
· · ·
|
| 995 |
+
xmIn
|
| 996 |
+
�
|
| 997 |
+
|
| 998 |
+
|
| 999 |
+
GT
|
| 1000 |
+
0
|
| 1001 |
+
...
|
| 1002 |
+
GT
|
| 1003 |
+
m
|
| 1004 |
+
|
| 1005 |
+
|
| 1006 |
+
�G0
|
| 1007 |
+
· · ·
|
| 1008 |
+
Gm
|
| 1009 |
+
�
|
| 1010 |
+
|
| 1011 |
+
|
| 1012 |
+
In
|
| 1013 |
+
xIn
|
| 1014 |
+
...
|
| 1015 |
+
xmIn
|
| 1016 |
+
|
| 1017 |
+
.
|
| 1018 |
+
Thus for G(x) = �m
|
| 1019 |
+
j=0 Gjxj, Q(x) = G(x)T G(x).
|
| 1020 |
+
□
|
| 1021 |
+
theorem 4.1 required Q0 > 0. We can relax this condition as follows.
|
| 1022 |
+
Corollary 4.1. Let Q(x) = �2m
|
| 1023 |
+
j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
|
| 1024 |
+
Q(x) ≥ 0 for all x ∈ R and Q(x0) > 0 for some x0 ∈ R. Then det(Q(x)) is a square if and only if there
|
| 1025 |
+
exists an n × n real matrix polynomial G(x) = �m
|
| 1026 |
+
j=0 Gjxj of degree m such that
|
| 1027 |
+
Q(x) = G(x)T G(x).
|
| 1028 |
+
Proof. First, assume Q(x) = G(x)T G(x). Then det(Q(x)) = det(G(x))2.
|
| 1029 |
+
On the other hand, assume
|
| 1030 |
+
det(Q(x)) = f(x)2 for some polynomial f of degree m. Consider
|
| 1031 |
+
P(x) := Q(x0 − x).
|
| 1032 |
+
Then P(x) is an n × n real symmetric matrix polynomial of degree 2m such that
|
| 1033 |
+
P(0) = Q(x0) > 0
|
| 1034 |
+
and
|
| 1035 |
+
det(P(x)) = det(Q(x0 − x)) = f(x0 − x)2.
|
| 1036 |
+
Thus by theorem 4.1, there is an n × n real matrix polynomial H(x) = �m
|
| 1037 |
+
j=0 Hjxj of degree m such that
|
| 1038 |
+
P(x) = H(x)T H(x).
|
| 1039 |
+
Define
|
| 1040 |
+
G(x) := H(x0 − x).
|
| 1041 |
+
Then G(x) = �m
|
| 1042 |
+
j=0 Gjxj is an n × n real matrix polynomial such that
|
| 1043 |
+
Q(x) = P(x0 − x) = H(x0 − x)T H(x0 − x) = G(x)T G(x).
|
| 1044 |
+
□
|
| 1045 |
+
The proof of theorem 4.1 is constructive. It hinges on finding the real skew-symmetric solution X to the
|
| 1046 |
+
modified algebraic Riccati equation. Back in Section 2, we found such a solution by constructing an mn-
|
| 1047 |
+
dimensional Mr-invariant Hr-neutral subspace. Following the proof of Theorem 2.6.2, found in [15], also to
|
| 1048 |
+
be found in Gohberg, Lancaster, and Rodman’s later book Indefinite Linear Algebra and Applications [9],
|
| 1049 |
+
we first convert Mr to its real Jordan form
|
| 1050 |
+
Mr = SJS−1,
|
| 1051 |
+
where
|
| 1052 |
+
J = Jr1(λ1) ⊕ · · · ⊕ Jrk(λk) ⊕ J2rk+1(λk+1 ± iµk+1) ⊕ · · · ⊕ J2rk+ℓ(λk+ℓ ± iµk+ℓ).
|
| 1053 |
+
|
| 1054 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 1055 |
+
11
|
| 1056 |
+
For real eigenvalues λj, where 1 ≤ j ≤ α, we take the first rj/2 columns of S corresponding to the block
|
| 1057 |
+
Jrj (note we know each rj is even). For any imaginary eigenvalues λj ± iµj with rj even, we do the same.
|
| 1058 |
+
Finally, we must consider the imaginary eigenvalues λj ± iµj with rj odd. For such an eigenvalues, there
|
| 1059 |
+
must be an even number of Jordan blocks of odd size (since we know every imaginary eigenvalue has even
|
| 1060 |
+
algebraic multiplicity). Collect the Jordan blocks together in pairs
|
| 1061 |
+
Kj = J2rj(λj ± iµj) ⊕ J2rj+1(λj+1 ± iµj+1).
|
| 1062 |
+
Then take the first rj − 1 columns of S corresponding to J2rj(λj ± iµj), the first rj+1 − 1 columns of S
|
| 1063 |
+
corresponding to J2rj+1(λj+1 ± iµj+1), along with the following two vectors
|
| 1064 |
+
(1) The rjth column of S corresponding to J2rj(λj ± iµj) plus the rj+1 + 1st column of S corresponding
|
| 1065 |
+
to J2rj+1(λj+1 ± iµj+1).
|
| 1066 |
+
(2) The rj +1st column of S corresponding to J2rj(λj ±iµj) minus the rj+1st column of S corresponding
|
| 1067 |
+
to J2rj+1(λj+1 ± iµj+1).
|
| 1068 |
+
Let us illustrate the above ideas in a few examples. The first example is the real eigenvalue case. The second
|
| 1069 |
+
example is the imaginary eigenvalue case with odd rj.
|
| 1070 |
+
Example 4.1. Take
|
| 1071 |
+
Q(x) =
|
| 1072 |
+
�2x2 + 2x + 1
|
| 1073 |
+
−4x2 − 3x
|
| 1074 |
+
−4x2 − 3x
|
| 1075 |
+
8x2 + 4x + 1
|
| 1076 |
+
�
|
| 1077 |
+
=
|
| 1078 |
+
�1
|
| 1079 |
+
0
|
| 1080 |
+
0
|
| 1081 |
+
1
|
| 1082 |
+
�
|
| 1083 |
+
+ x
|
| 1084 |
+
� 2
|
| 1085 |
+
−3
|
| 1086 |
+
−3
|
| 1087 |
+
4
|
| 1088 |
+
�
|
| 1089 |
+
+ x2
|
| 1090 |
+
� 2
|
| 1091 |
+
−4
|
| 1092 |
+
−4
|
| 1093 |
+
8
|
| 1094 |
+
�
|
| 1095 |
+
.
|
| 1096 |
+
Then Mr(x) = SJS−1 for
|
| 1097 |
+
J =
|
| 1098 |
+
|
| 1099 |
+
|
| 1100 |
+
−3
|
| 1101 |
+
1
|
| 1102 |
+
0
|
| 1103 |
+
0
|
| 1104 |
+
0
|
| 1105 |
+
−3
|
| 1106 |
+
0
|
| 1107 |
+
0
|
| 1108 |
+
0
|
| 1109 |
+
0
|
| 1110 |
+
0
|
| 1111 |
+
1
|
| 1112 |
+
0
|
| 1113 |
+
0
|
| 1114 |
+
0
|
| 1115 |
+
0
|
| 1116 |
+
|
| 1117 |
+
, S ≈
|
| 1118 |
+
|
| 1119 |
+
|
| 1120 |
+
−0.2778
|
| 1121 |
+
0.3148
|
| 1122 |
+
0.2222
|
| 1123 |
+
0.6852
|
| 1124 |
+
0.2778
|
| 1125 |
+
−0.3704
|
| 1126 |
+
0.1111
|
| 1127 |
+
0.3704
|
| 1128 |
+
−0.1389
|
| 1129 |
+
0.3519
|
| 1130 |
+
−0.0556
|
| 1131 |
+
−0.3519
|
| 1132 |
+
−0.1389
|
| 1133 |
+
−0.1759
|
| 1134 |
+
0.1111
|
| 1135 |
+
0.1759
|
| 1136 |
+
|
| 1137 |
+
.
|
| 1138 |
+
We have J = J2 (−3) ⊕ J2 (0), so r1 = r2 = 2. Thus we take the 1st column corresponding to the first block
|
| 1139 |
+
as well as the 1st column corresponding to the second block.
|
| 1140 |
+
|
| 1141 |
+
|
| 1142 |
+
−0.2778
|
| 1143 |
+
0.2222
|
| 1144 |
+
0.2778
|
| 1145 |
+
0.1111
|
| 1146 |
+
−0.1389
|
| 1147 |
+
−0.0556
|
| 1148 |
+
0.1389
|
| 1149 |
+
0.1111
|
| 1150 |
+
|
| 1151 |
+
=:
|
| 1152 |
+
�
|
| 1153 |
+
X1
|
| 1154 |
+
X2
|
| 1155 |
+
�
|
| 1156 |
+
Our invariant subspace is thus
|
| 1157 |
+
Im
|
| 1158 |
+
�
|
| 1159 |
+
X1
|
| 1160 |
+
X2
|
| 1161 |
+
�
|
| 1162 |
+
= Im
|
| 1163 |
+
�
|
| 1164 |
+
I
|
| 1165 |
+
X2X−1
|
| 1166 |
+
1
|
| 1167 |
+
�
|
| 1168 |
+
.
|
| 1169 |
+
Here we have then
|
| 1170 |
+
X = X2X−1
|
| 1171 |
+
1
|
| 1172 |
+
=
|
| 1173 |
+
�
|
| 1174 |
+
0
|
| 1175 |
+
−0.5
|
| 1176 |
+
0.5
|
| 1177 |
+
0
|
| 1178 |
+
�
|
| 1179 |
+
.
|
| 1180 |
+
Thus
|
| 1181 |
+
Fopt = F0 +
|
| 1182 |
+
�
|
| 1183 |
+
0
|
| 1184 |
+
X
|
| 1185 |
+
0
|
| 1186 |
+
0
|
| 1187 |
+
�
|
| 1188 |
+
−
|
| 1189 |
+
�
|
| 1190 |
+
0
|
| 1191 |
+
0
|
| 1192 |
+
X
|
| 1193 |
+
0
|
| 1194 |
+
�
|
| 1195 |
+
=
|
| 1196 |
+
|
| 1197 |
+
|
| 1198 |
+
1
|
| 1199 |
+
0
|
| 1200 |
+
1
|
| 1201 |
+
−2
|
| 1202 |
+
0
|
| 1203 |
+
1
|
| 1204 |
+
−1
|
| 1205 |
+
2
|
| 1206 |
+
1
|
| 1207 |
+
−1
|
| 1208 |
+
2
|
| 1209 |
+
−4
|
| 1210 |
+
−2
|
| 1211 |
+
2
|
| 1212 |
+
−4
|
| 1213 |
+
8
|
| 1214 |
+
|
| 1215 |
+
.
|
| 1216 |
+
We factorize as
|
| 1217 |
+
F =
|
| 1218 |
+
|
| 1219 |
+
|
| 1220 |
+
1
|
| 1221 |
+
0
|
| 1222 |
+
0
|
| 1223 |
+
1
|
| 1224 |
+
1
|
| 1225 |
+
−1
|
| 1226 |
+
−2
|
| 1227 |
+
2
|
| 1228 |
+
|
| 1229 |
+
|
| 1230 |
+
�1
|
| 1231 |
+
0
|
| 1232 |
+
1
|
| 1233 |
+
−2
|
| 1234 |
+
0
|
| 1235 |
+
1
|
| 1236 |
+
−1
|
| 1237 |
+
2
|
| 1238 |
+
�
|
| 1239 |
+
.
|
| 1240 |
+
Thus
|
| 1241 |
+
G0 =
|
| 1242 |
+
�1
|
| 1243 |
+
0
|
| 1244 |
+
0
|
| 1245 |
+
1
|
| 1246 |
+
�
|
| 1247 |
+
,
|
| 1248 |
+
G1 =
|
| 1249 |
+
� 1
|
| 1250 |
+
−2
|
| 1251 |
+
−1
|
| 1252 |
+
2
|
| 1253 |
+
�
|
| 1254 |
+
,
|
| 1255 |
+
G(x) = G0 + xG1.
|
| 1256 |
+
We can verify Q(x) = G(x)T G(x).
|
| 1257 |
+
|
| 1258 |
+
12
|
| 1259 |
+
SARAH GIFT AND HUGO J. WOERDEMAN
|
| 1260 |
+
Example 4.2. Take now
|
| 1261 |
+
Q(x) =
|
| 1262 |
+
�2x2 + 2x + 1
|
| 1263 |
+
x2 + 2x
|
| 1264 |
+
x2 + 2x
|
| 1265 |
+
13x2 + 4x + 1
|
| 1266 |
+
�
|
| 1267 |
+
=
|
| 1268 |
+
�1
|
| 1269 |
+
0
|
| 1270 |
+
0
|
| 1271 |
+
1
|
| 1272 |
+
�
|
| 1273 |
+
+ x
|
| 1274 |
+
�2
|
| 1275 |
+
2
|
| 1276 |
+
2
|
| 1277 |
+
4
|
| 1278 |
+
�
|
| 1279 |
+
+ x2
|
| 1280 |
+
�2
|
| 1281 |
+
1
|
| 1282 |
+
1
|
| 1283 |
+
13
|
| 1284 |
+
�
|
| 1285 |
+
.
|
| 1286 |
+
Then Mr(x) = SJS−1 for
|
| 1287 |
+
J = 1
|
| 1288 |
+
2
|
| 1289 |
+
|
| 1290 |
+
|
| 1291 |
+
−3
|
| 1292 |
+
√
|
| 1293 |
+
11
|
| 1294 |
+
0
|
| 1295 |
+
0
|
| 1296 |
+
−
|
| 1297 |
+
√
|
| 1298 |
+
11
|
| 1299 |
+
−3
|
| 1300 |
+
0
|
| 1301 |
+
0
|
| 1302 |
+
0
|
| 1303 |
+
0
|
| 1304 |
+
−3
|
| 1305 |
+
√
|
| 1306 |
+
11
|
| 1307 |
+
0
|
| 1308 |
+
0
|
| 1309 |
+
−
|
| 1310 |
+
√
|
| 1311 |
+
11
|
| 1312 |
+
−3
|
| 1313 |
+
|
| 1314 |
+
, S ≈
|
| 1315 |
+
|
| 1316 |
+
|
| 1317 |
+
0.5477
|
| 1318 |
+
0
|
| 1319 |
+
−0.5477
|
| 1320 |
+
0
|
| 1321 |
+
0.0913
|
| 1322 |
+
−0.3028
|
| 1323 |
+
−0.0913
|
| 1324 |
+
0.3028
|
| 1325 |
+
0.1826
|
| 1326 |
+
−0.6055
|
| 1327 |
+
−0.1826
|
| 1328 |
+
0.6055
|
| 1329 |
+
−1.0954
|
| 1330 |
+
0
|
| 1331 |
+
1.0954
|
| 1332 |
+
0
|
| 1333 |
+
|
| 1334 |
+
.
|
| 1335 |
+
We have J = J2
|
| 1336 |
+
�
|
| 1337 |
+
3±i
|
| 1338 |
+
√
|
| 1339 |
+
11
|
| 1340 |
+
2
|
| 1341 |
+
�
|
| 1342 |
+
⊕ J2
|
| 1343 |
+
�
|
| 1344 |
+
3±i
|
| 1345 |
+
√
|
| 1346 |
+
11
|
| 1347 |
+
2
|
| 1348 |
+
�
|
| 1349 |
+
, so r1 = r2 = 1. Thus we take the 1st column corresponding to the
|
| 1350 |
+
first block plus the 2nd column corresponding to the second block as well as the 2nd column corresponding
|
| 1351 |
+
to the first block minus the first column corresponding to the second block.
|
| 1352 |
+
|
| 1353 |
+
|
| 1354 |
+
0.5477 + 0
|
| 1355 |
+
0 − (−0.5477)
|
| 1356 |
+
0.0913 + 0.3028
|
| 1357 |
+
−0.3028 − (−0.0913)
|
| 1358 |
+
0.1826 + 0.6055
|
| 1359 |
+
−0.6055 − (−0.1826)
|
| 1360 |
+
−1.0954 + 0
|
| 1361 |
+
0 − 1.0954
|
| 1362 |
+
|
| 1363 |
+
=:
|
| 1364 |
+
�X1
|
| 1365 |
+
X2
|
| 1366 |
+
�
|
| 1367 |
+
Our invariant subspace is thus
|
| 1368 |
+
Im
|
| 1369 |
+
�
|
| 1370 |
+
X1
|
| 1371 |
+
X2
|
| 1372 |
+
�
|
| 1373 |
+
= Im
|
| 1374 |
+
�
|
| 1375 |
+
I
|
| 1376 |
+
X2X−1
|
| 1377 |
+
1
|
| 1378 |
+
�
|
| 1379 |
+
.
|
| 1380 |
+
Here we have then
|
| 1381 |
+
X = X2X−1
|
| 1382 |
+
1
|
| 1383 |
+
=
|
| 1384 |
+
� 0
|
| 1385 |
+
2
|
| 1386 |
+
−2
|
| 1387 |
+
0
|
| 1388 |
+
�
|
| 1389 |
+
.
|
| 1390 |
+
Thus
|
| 1391 |
+
Fopt = F0 +
|
| 1392 |
+
�0
|
| 1393 |
+
X
|
| 1394 |
+
0
|
| 1395 |
+
0
|
| 1396 |
+
�
|
| 1397 |
+
−
|
| 1398 |
+
� 0
|
| 1399 |
+
0
|
| 1400 |
+
X
|
| 1401 |
+
0
|
| 1402 |
+
�
|
| 1403 |
+
=
|
| 1404 |
+
|
| 1405 |
+
|
| 1406 |
+
1
|
| 1407 |
+
0
|
| 1408 |
+
1
|
| 1409 |
+
3
|
| 1410 |
+
0
|
| 1411 |
+
1
|
| 1412 |
+
−1
|
| 1413 |
+
2
|
| 1414 |
+
1
|
| 1415 |
+
−1
|
| 1416 |
+
2
|
| 1417 |
+
1
|
| 1418 |
+
3
|
| 1419 |
+
2
|
| 1420 |
+
1
|
| 1421 |
+
13
|
| 1422 |
+
|
| 1423 |
+
.
|
| 1424 |
+
We factorize as
|
| 1425 |
+
F =
|
| 1426 |
+
|
| 1427 |
+
|
| 1428 |
+
1
|
| 1429 |
+
0
|
| 1430 |
+
0
|
| 1431 |
+
1
|
| 1432 |
+
1
|
| 1433 |
+
−1
|
| 1434 |
+
3
|
| 1435 |
+
2
|
| 1436 |
+
|
| 1437 |
+
|
| 1438 |
+
�1
|
| 1439 |
+
0
|
| 1440 |
+
1
|
| 1441 |
+
3
|
| 1442 |
+
0
|
| 1443 |
+
1
|
| 1444 |
+
−1
|
| 1445 |
+
2
|
| 1446 |
+
�
|
| 1447 |
+
.
|
| 1448 |
+
Thus
|
| 1449 |
+
G0 =
|
| 1450 |
+
�1
|
| 1451 |
+
0
|
| 1452 |
+
0
|
| 1453 |
+
1
|
| 1454 |
+
�
|
| 1455 |
+
,
|
| 1456 |
+
G1 =
|
| 1457 |
+
� 1
|
| 1458 |
+
3
|
| 1459 |
+
−1
|
| 1460 |
+
2
|
| 1461 |
+
�
|
| 1462 |
+
,
|
| 1463 |
+
G(x) = G0 + xG1.
|
| 1464 |
+
We can verify Q(x) = G(x)T G(x).
|
| 1465 |
+
References
|
| 1466 |
+
[1] M. Bakonyi and H. J. Woerdeman, Matrix Completions, Moments, and Sums of Hermitian Squares, Princeton Series
|
| 1467 |
+
in Applied Mathematics, Princeton University Press, 2011, http://www.jstor.org/stable/j.ctt7rp1d.
|
| 1468 |
+
[2] T. Chen and B. A. Francis, Spectral and inner-outer factorizations of rational matrices, SIAM Journal on Matrix
|
| 1469 |
+
Analysis and Applications, 10 (1989), pp. 1–17, https://doi.org/10.1137/0610001.
|
| 1470 |
+
[3] W. A. Coppel, Matrix quadratic equations, Bulletin of the Australian Mathematical Society, 10 (1974), pp. 377 – 401,
|
| 1471 |
+
https://doi.org/10.1017/S0004972700041071.
|
| 1472 |
+
[4] J. Doyle, K. Glover, P. Khargonekar, and B. Francis, State space solution to standard H2 and H∞ control problem,
|
| 1473 |
+
IEEE Transactions on Automatic Control, 34 (1989), pp. 831 – 847, https://doi.org/10.1109/9.29425.
|
| 1474 |
+
[5] M. A. Dritschel and J. Rovnyak, The operator fej´er-riesz theorem, in A Glimpse at Hilbert Space Operators: Paul
|
| 1475 |
+
R. Halmos in Memoriam, S. Axler, P. Rosenthal, and D. Sarason, eds., Springer Basel, Basel, 2010, pp. 223–254, https:
|
| 1476 |
+
//doi.org/10.1007/978-3-0346-0347-8_14.
|
| 1477 |
+
[6] M. A. Dritschel and H. J. Woerdeman, Outer factorizations in one and several variables, Transactions of the American
|
| 1478 |
+
Mathematical Society, 357 (2005), pp. 4661–4679, http://www.jstor.org/stable/3845206.
|
| 1479 |
+
[7] B. A. Francis, A course in H∞ control theory, vol. 88 of Lecture Notes in Control and Information Sciences, Springer-
|
| 1480 |
+
Verlag, Berlin, 1987, https://doi.org/10.1007/BFb0007371.
|
| 1481 |
+
[8] I. Gohberg, The factorization problem for operator functions, Izvestiya Akademii Nauk SSSR Seriya Matematicheskaya,
|
| 1482 |
+
28 (1964), pp. 1055–1082.
|
| 1483 |
+
|
| 1484 |
+
REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
|
| 1485 |
+
13
|
| 1486 |
+
[9] I. Gohberg, P. Lancaster, and L. Rodman, Indefinite Linear Algebra and Applications, Birkh¨auser, 2005, https:
|
| 1487 |
+
//doi.org/10.1007/b137517.
|
| 1488 |
+
[10] I. Gohberg, P. Lancaster, and L. Rodman, Invariant Subspaces of Matrices with Applications, SIAM, 2006, https:
|
| 1489 |
+
//doi.org/10.1137/1.9780898719093.
|
| 1490 |
+
[11] I. Gohberg,
|
| 1491 |
+
P. Lancaster,
|
| 1492 |
+
and L. Rodman,
|
| 1493 |
+
Matrix Polynomials,
|
| 1494 |
+
SIAM, 2009,
|
| 1495 |
+
https://doi.org/10.1137/1.
|
| 1496 |
+
9780898719024.
|
| 1497 |
+
[12] Y. Hachez and H. J. Woerdeman, The fischer-frobenius transformation and outer factorization, in Operator theory,
|
| 1498 |
+
structured matrices, and dilations, vol. 10 of Theta Series in Advanced Mathematics, Theta, Bucharest, 2007, pp. 181–203.
|
| 1499 |
+
[13] C. Hanselka and R. Sinn, Positive semidefinite univariate matrix polynomials, Mathematische Zeitschrift, 292 (2019),
|
| 1500 |
+
pp. 83–101, https://doi.org/10.1007/s00209-018-2137-7.
|
| 1501 |
+
[14] H. Helson, Lectures on invariant subspaces, Academic Press, 1964, https://doi.org/10.1016/C2013-0-12454-3.
|
| 1502 |
+
[15] P. Lancaster and L. Rodman, Algebraic Riccati Equations, Oxford University Press, 1995.
|
| 1503 |
+
[16] P. Lancaster and I. Zaballa, Spectral theory for self-adjoint auadratic eigenvalue problems - a review, ILAS, 37 (2021),
|
| 1504 |
+
pp. 211–246, https://doi.org/10.13001/ela.2021.5361.
|
| 1505 |
+
[17] J. W. McLean and H. J. Woerdeman, Spectral factorizations and sums of squares representations via semidefinite
|
| 1506 |
+
programming, SIAM J. Matrix Anal. Appl., 23 (2001/02), pp. 646–655, https://doi.org/10.1137/S0895479800371177.
|
| 1507 |
+
[18] A. C. M. Ran and L. Rodman, Factorization of matrix polynomials with symmetries, SIAM Journal on Matrix Analysis
|
| 1508 |
+
and Applications, 15 (1994), pp. 845–864, https://doi.org/10.1137/S0895479892235502.
|
| 1509 |
+
[19] M. Rosenblatt, A multi-dimensional prediction problem, Arkiv f¨or Matematik, 3 (1958), pp. 407–424, https://doi.org/
|
| 1510 |
+
10.1007/BF02589495.
|
| 1511 |
+
[20] M. Rosenblum, Vectorial teoplitz operators and the fej´er-riesz theorem, Journal of Mathematical Analysis and Applica-
|
| 1512 |
+
tions, 23 (1968), pp. 139–147.
|
| 1513 |
+
[21] J. Willems, Least squares stationary optimal control and the algebraic riccati equation, IEEE Transactions on Automatic
|
| 1514 |
+
Control, 16 (1971), pp. 621–634, https://doi.org/10.1109/TAC.1971.1099831.
|
| 1515 |
+
|
0NFST4oBgHgl3EQfVTgy/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:362209212377b5af7edb7376dfe38aea87b3e2ad2c512bcc0c67576a4c11a63d
|
| 3 |
+
size 24475847
|
19FKT4oBgHgl3EQfPS1l/content/tmp_files/2301.11762v1.pdf.txt
ADDED
|
@@ -0,0 +1,788 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Electron spin secluded inside a bottom-up assembled standing metal-molecule
|
| 2 |
+
nanostructure
|
| 3 |
+
Taner Esat,1, 2, ∗ Markus Ternes,1, 2, 3 Ruslan Temirov,1, 2, 4 and F. Stefan Tautz1, 2, 5
|
| 4 |
+
1Peter Gr¨unberg Institute (PGI-3), Forschungszentrum J¨ulich, 52425 J¨ulich, Germany
|
| 5 |
+
2J¨ulich Aachen Research Alliance (JARA), Fundamentals of Future Information Technology, 52425 J¨ulich, Germany
|
| 6 |
+
3Institute of Physics II B, RWTH Aachen University, 52074 Aachen, Germany
|
| 7 |
+
4Institute of Physics II, University of Cologne, 50937 Cologne, Germany
|
| 8 |
+
5Experimental Physics IV A, RWTH Aachen University, 52074 Aachen, Germany
|
| 9 |
+
(Dated: January 30, 2023)
|
| 10 |
+
Artificial nanostructures, fabricated by placing building blocks such as atoms or molecules in well-
|
| 11 |
+
defined positions, are a powerful platform in which quantum effects can be studied and exploited on
|
| 12 |
+
the atomic scale. Here, we report a strategy to significantly reduce the electron-electron coupling
|
| 13 |
+
between a large planar aromatic molecule and the underlying metallic substrate. To this end, we
|
| 14 |
+
use the manipulation capabilities of a scanning tunneling microscope (STM) and lift the molecule
|
| 15 |
+
into a metastable upright geometry on a pedestal of two metal atoms. Measurements at millikelvin
|
| 16 |
+
temperatures and magnetic fields reveal that the bottom-up assembled standing metal-molecule
|
| 17 |
+
nanostructure has an S = 1/2 spin which is screened by the substrate electrons, resulting in a Kondo
|
| 18 |
+
temperature of only 291 ± 13 mK. We extract the Land´e g-factor of the molecule and the exchange
|
| 19 |
+
coupling Jρ to the substrate by modeling the differential conductance spectra using a third-order
|
| 20 |
+
perturbation theory in the weak coupling and high-field regimes. Furthermore, we show that the
|
| 21 |
+
interaction between the STM tip and the molecule can tune the exchange coupling to the substrate,
|
| 22 |
+
which suggests that the bond between the standing metal-molecule nanostructure and the surface
|
| 23 |
+
is mechanically soft.
|
| 24 |
+
On the way to spin qubits based on single atoms or
|
| 25 |
+
molecules, it is essential to minimize the interaction with
|
| 26 |
+
the environment, since the latter leads to decoherence
|
| 27 |
+
[1]. The scanning tunneling microscope (STM) is an ideal
|
| 28 |
+
tool to study quantum properties of nanoscale structures,
|
| 29 |
+
because it not only allows the magnetic states of individ-
|
| 30 |
+
ual atoms and molecules to be read out [2] and coher-
|
| 31 |
+
ently controlled [3–5], but also enables the environment
|
| 32 |
+
to be changed directly.
|
| 33 |
+
The ability to arrange atoms
|
| 34 |
+
and molecules on surfaces with atomic precision allows
|
| 35 |
+
for the fabrication and study of unprecedented artificial
|
| 36 |
+
nanostructures [6, 7]. Moreover, the STM can be used
|
| 37 |
+
to fabricate multiple absolutely identical qubits [8] from
|
| 38 |
+
individual atoms and molecules, which can also be ar-
|
| 39 |
+
ranged and coupled with each other as desired. Com-
|
| 40 |
+
pared to mesoscopic qubits, the structural control down
|
| 41 |
+
to the atomic level may offer advantages.
|
| 42 |
+
Magnetic atoms and molecules with degenerate ground
|
| 43 |
+
states on metallic surfaces typically show the Kondo ef-
|
| 44 |
+
fect: the spin degree of freedom is quenched at temper-
|
| 45 |
+
atures below a characteristic Kondo temperature TK by
|
| 46 |
+
the formation of a many-electron singlet state with the
|
| 47 |
+
electrons of the bath [9, 10]. Because TK depends di-
|
| 48 |
+
rectly on the coupling with the metal, the Kondo effect
|
| 49 |
+
itself can be used as a gauge of the interaction with the
|
| 50 |
+
environment. The strong hybridization of the d-orbitals
|
| 51 |
+
of magnetic atoms with states of the metal substrate
|
| 52 |
+
leads to TK of typically 40 - 300 K [11]. For magnetic
|
| 53 |
+
molecules, on the other hand, Kondo temperatures of
|
| 54 |
+
only a few Kelvin have been observed on metal surfaces
|
| 55 |
+
[12–14], which can be explained by the weaker hybridiza-
|
| 56 |
+
tion of the molecular orbitals with the substrate, or the
|
| 57 |
+
shielding of the magnetic atoms by the surrounding lig-
|
| 58 |
+
ands of the molecule. However, long relaxation times T1
|
| 59 |
+
of several hundred nanoseconds up to days [15, 16] and
|
| 60 |
+
dephasing times T2 in the nanosecond range [3–5] were so
|
| 61 |
+
far only achieved for atoms and molecules that were de-
|
| 62 |
+
coupled from the metallic surface by an atomically thin
|
| 63 |
+
insulating layer.
|
| 64 |
+
The presence of the decoupling layer
|
| 65 |
+
has also resulted in a significant reduction of TK to a few
|
| 66 |
+
Kelvin for magnetic atoms [17, 18].
|
| 67 |
+
In this work, we show that exploiting the third
|
| 68 |
+
dimension for the bottom-up assembly of standing
|
| 69 |
+
metal-molecule nanostructures offers an alternative ap-
|
| 70 |
+
proach to tune the coupling with the metallic sub-
|
| 71 |
+
strate. Specifically, we show that for a single 3,4,9,10-
|
| 72 |
+
perylenetetracarboxylic dianhydride (PTCDA) in the
|
| 73 |
+
standing configuration on a pedestal of two Ag adatoms
|
| 74 |
+
(Fig. 1a), both the interaction with the Ag(111) sub-
|
| 75 |
+
strate is drastically reduced compared to the flat-lying
|
| 76 |
+
PTCDA and the coupling with the metal substrate can
|
| 77 |
+
be tuned by stretching the bond between the molecule
|
| 78 |
+
and surface, utilizing the attraction between the STM
|
| 79 |
+
tip and the molecule. We report the fabrication of an
|
| 80 |
+
S = 1/2 spin nanostructure based on this strategy, with a
|
| 81 |
+
very weak coupling to the underlying substrate, resulting
|
| 82 |
+
in a TK of only 291 ± 13 mK — to our knowledge, the
|
| 83 |
+
smallest TK ever measured on a metallic substrate using
|
| 84 |
+
STM. Comparably low TK have so far only been found
|
| 85 |
+
in mesoscopic quantum dots [19, 20].
|
| 86 |
+
The Ag(111) surface was prepared in ultra-high vac-
|
| 87 |
+
uum (UHV) by repeated Ar+ sputtering and heating at
|
| 88 |
+
800 K. A small coverage of PTCDA molecules was evap-
|
| 89 |
+
orated onto the clean Ag(111) surface at room temper-
|
| 90 |
+
arXiv:2301.11762v1 [cond-mat.mes-hall] 27 Jan 2023
|
| 91 |
+
|
| 92 |
+
2
|
| 93 |
+
(a)
|
| 94 |
+
(b)
|
| 95 |
+
(c)
|
| 96 |
+
10 Å
|
| 97 |
+
Ag(111)
|
| 98 |
+
~17.5 Å
|
| 99 |
+
STM tip
|
| 100 |
+
−6
|
| 101 |
+
−4
|
| 102 |
+
−2
|
| 103 |
+
0
|
| 104 |
+
Current (pA)
|
| 105 |
+
+
|
| 106 |
+
−0.6
|
| 107 |
+
−0.4
|
| 108 |
+
−0.2
|
| 109 |
+
0.0
|
| 110 |
+
0.2
|
| 111 |
+
0.4
|
| 112 |
+
0.6
|
| 113 |
+
Bias voltage (mV)
|
| 114 |
+
5.5
|
| 115 |
+
6.0
|
| 116 |
+
6.5
|
| 117 |
+
7.0
|
| 118 |
+
7.5
|
| 119 |
+
dI/dV (10-4 G0)
|
| 120 |
+
FIG. 1.
|
| 121 |
+
(a) Schematic view of a standing PTCDA + 2Ag
|
| 122 |
+
nanostructure on the Ag(111) surface, including the STM
|
| 123 |
+
tip above the molecule.
|
| 124 |
+
The bar shows the tunneling cur-
|
| 125 |
+
rent IT measured above the standing nanostructure at con-
|
| 126 |
+
stant height. The white, grey and red spheres indicate hy-
|
| 127 |
+
drogen, carbon and oxygen atoms, respectively, of PTCDA.
|
| 128 |
+
(b) Constant-height STM image above a standing nanostruc-
|
| 129 |
+
ture recorded at a tip height of z ≃ 17.5 ˚A above the surface.
|
| 130 |
+
The bias voltage was V = −50 mV. The white cross marks
|
| 131 |
+
the location where the dI/dV conductance spectra were mea-
|
| 132 |
+
sured. The molecular plane is indicated by the dashed orange
|
| 133 |
+
line. (c) dI/dV conductance spectrum (blue) on a standing
|
| 134 |
+
metal-molecule nanostructure measured at T = 30 mK and
|
| 135 |
+
B = 0 T (Vmod = 50 µV). The tip was stabilized at IT = 45 pA
|
| 136 |
+
and V = −1 mV. The red curve shows the fit based on the
|
| 137 |
+
Frota function (see text for details). The spectrum is shown
|
| 138 |
+
in units of the conductance quantum G0 = 2e
|
| 139 |
+
h .
|
| 140 |
+
ature from a custom-built Knudsen cell. After evapora-
|
| 141 |
+
tion, the sample was flashed at 480 K for 2 min and then
|
| 142 |
+
cooled down to 100 K and transferred to the STM. All ex-
|
| 143 |
+
periments were performed in the J¨ulich Quantum Micro-
|
| 144 |
+
scope [21], a millikelvin scanning tunneling microscope
|
| 145 |
+
which uses the adiabatic demagnetization of electronic
|
| 146 |
+
magnetic moments in a magnetocaloric material to reach
|
| 147 |
+
temperatures in the range between 30 mK and 1 K. In
|
| 148 |
+
this instrument, B fields of up to 8 T perpendicular to the
|
| 149 |
+
sample surface can also be applied. Differential conduc-
|
| 150 |
+
tance (dI/dV ) spectra were measured using conventional
|
| 151 |
+
lock-in techniques with the STM feedback loop switched
|
| 152 |
+
off and an AC modulation amplitude Vmod = 20−100 µV
|
| 153 |
+
and frequency fmod = 187 Hz. The PtIr tip was treated
|
| 154 |
+
in-situ by applying controlled voltage pulses and indenta-
|
| 155 |
+
tions into the clean silver surface until the spectroscopic
|
| 156 |
+
signature of the Ag(111) surface state appeared.
|
| 157 |
+
The standing PTCDA + 2Ag nanostructure was fabri-
|
| 158 |
+
cated on the Ag(111) surface in three steps by controlled
|
| 159 |
+
manipulation with the tip of the STM as described in
|
| 160 |
+
Ref. [22]. First, two single Ag atoms were attached to
|
| 161 |
+
the two carboxylic oxygens on one side of the flat-lying
|
| 162 |
+
molecule by lateral manipulation with the tip.
|
| 163 |
+
Then,
|
| 164 |
+
one of the carboxylic oxygens on the opposite side was
|
| 165 |
+
contacted and the PTCDA molecule was pulled up on a
|
| 166 |
+
curved trajectory until it stood upright. The tip was then
|
| 167 |
+
moved straight up until the bond between the molecule
|
| 168 |
+
and the tip broke, leaving the molecule in the standing
|
| 169 |
+
position on the two Ag adatoms [22]. The stability of
|
| 170 |
+
the standing metal-molecule nanostructure arises from
|
| 171 |
+
the balance between local covalent interactions and non-
|
| 172 |
+
local long-range van der Waals forces [23, 24].
|
| 173 |
+
In constant-height STM images, the standing metal-
|
| 174 |
+
molecule nanostructure can be recognized by two fea-
|
| 175 |
+
tures that are distributed symmetrically around the plane
|
| 176 |
+
of the molecule (dashed orange line in Fig. 1b) and
|
| 177 |
+
separated by a nodal plane perpendicular to the latter
|
| 178 |
+
(Fig. 1b). It is interesting to note that the node of the π-
|
| 179 |
+
orbital in the plane of the molecule could not be resolved.
|
| 180 |
+
The two features coincide with the positions where the
|
| 181 |
+
interaction with the tip is most pronounced [22]. In the
|
| 182 |
+
standing configuration, there is only a weak overlap be-
|
| 183 |
+
tween the wave functions of the metallic surface and the
|
| 184 |
+
lowest unoccupied molecular orbital (LUMO) of PTCDA,
|
| 185 |
+
because the lobes of the molecular π-orbital are oriented
|
| 186 |
+
perpendicular to the plane of the molecule. This allows
|
| 187 |
+
the standing nanostructure to function as a quantum dot
|
| 188 |
+
and coherent field emitter [22].
|
| 189 |
+
At mK temperatures, a peak at zero bias is evident
|
| 190 |
+
in the dI/dV spectrum measured on a standing metal-
|
| 191 |
+
molecule nanostructure (Fig. 1c). In fact, at these low
|
| 192 |
+
temperatures we additionally observe a dip at zero bias
|
| 193 |
+
due to the dynamical Coulomb blockade (DCB) [25]. We
|
| 194 |
+
have thus corrected all dI/dV spectra on the standing
|
| 195 |
+
nanostructure for the DCB dip (see Supplementary Ma-
|
| 196 |
+
terial). Previous studies have hinted that the LUMO of
|
| 197 |
+
the standing metal-molecule nanostructure must contain
|
| 198 |
+
a single unpaired electron [22, 26]. Therefore, it is plausi-
|
| 199 |
+
ble to assume that the zero-bias peak originates from the
|
| 200 |
+
Kondo effect, in which the spin of this localized electron is
|
| 201 |
+
screened by itinerant substrate electrons. To verify this,
|
| 202 |
+
we measured dI/dV spectra at different B fields. Already
|
| 203 |
+
at B ≈ 100 − 120 mT a Zeeman splitting of the zero-bias
|
| 204 |
+
peak is discernable (Fig. 2a).
|
| 205 |
+
At higher B fields, the
|
| 206 |
+
Kondo effect is completely quenched and the spectrum is
|
| 207 |
+
dominated by the symmetric steps arising from inelastic
|
| 208 |
+
spin-flip excitations (Fig. 2b).
|
| 209 |
+
To extract the precise energy of the Zeeman splitting
|
| 210 |
+
∆, we calculated the numerical derivative of the dI/dV
|
| 211 |
+
spectra and fitted the peak positions with a Gaussian (see
|
| 212 |
+
Supplementary Material). As shown in Figs. 2c and d,
|
| 213 |
+
the energies of the spin-flip excitations scale linearly with
|
| 214 |
+
the external B field. Only close to the critical field BC,
|
| 215 |
+
which is required to initially split the Kondo resonance,
|
| 216 |
+
|
| 217 |
+
3
|
| 218 |
+
−1
|
| 219 |
+
0
|
| 220 |
+
1
|
| 221 |
+
Bias voltage (mV)
|
| 222 |
+
1
|
| 223 |
+
2
|
| 224 |
+
3
|
| 225 |
+
4
|
| 226 |
+
dI/dV (10-4 G0)
|
| 227 |
+
0
|
| 228 |
+
0.1
|
| 229 |
+
0.2
|
| 230 |
+
B field (T)
|
| 231 |
+
0.00
|
| 232 |
+
0.01
|
| 233 |
+
0.02
|
| 234 |
+
0.03
|
| 235 |
+
Δ (mV)
|
| 236 |
+
(a)
|
| 237 |
+
(b)
|
| 238 |
+
(c)
|
| 239 |
+
(d)
|
| 240 |
+
1 T
|
| 241 |
+
3 T
|
| 242 |
+
5 T
|
| 243 |
+
7 T
|
| 244 |
+
2Δ
|
| 245 |
+
−0.25
|
| 246 |
+
0
|
| 247 |
+
0.25
|
| 248 |
+
Bias voltage (mV)
|
| 249 |
+
15
|
| 250 |
+
20
|
| 251 |
+
25
|
| 252 |
+
30
|
| 253 |
+
35
|
| 254 |
+
dI/dV (10-4 G0)
|
| 255 |
+
0.08 T
|
| 256 |
+
0.20 T
|
| 257 |
+
0
|
| 258 |
+
2.5
|
| 259 |
+
5.0
|
| 260 |
+
B field (T)
|
| 261 |
+
0.0
|
| 262 |
+
0.2
|
| 263 |
+
0.4
|
| 264 |
+
0.6
|
| 265 |
+
0.8
|
| 266 |
+
Δ (mV)
|
| 267 |
+
g = 2.006 ± 0.007
|
| 268 |
+
FIG. 2. (a)-(b) dI/dV spectra (blue) on a standing metal-
|
| 269 |
+
molecule nanostructure, measured at different B fields at
|
| 270 |
+
T
|
| 271 |
+
≃ 50 mK (setpoints in panel (a) were IT
|
| 272 |
+
= 100 pA,
|
| 273 |
+
V = −10 mV, Vmod = 100 µV and IT = 100 pA, V = −1 mV,
|
| 274 |
+
Vmod = 20 µV in panel(b)).
|
| 275 |
+
In panel (a), the B field was
|
| 276 |
+
changed in steps of 20 mT. The orange curves in panel (b)
|
| 277 |
+
show the fits based on perturbation theory (see text for de-
|
| 278 |
+
tails). The spectra are vertically displaced for clarity. (c)-(d)
|
| 279 |
+
The Zeeman splitting ∆ extracted from the dI/dV spectra as
|
| 280 |
+
a function of B. The gray dashed line in panel (c) serves as a
|
| 281 |
+
guide for the eye. The red curve in panel (d) shows the linear
|
| 282 |
+
fit for the Zeeman splitting.
|
| 283 |
+
the Zeeman energy rises noticeably faster with increas-
|
| 284 |
+
ing B field. To extract the Land´e factor g, we consider
|
| 285 |
+
only the data points at B fields ≥ 1 T (Fig. 2b) since
|
| 286 |
+
the Kondo effect in the strong coupling regime leads to
|
| 287 |
+
renormalization of the g-factor. A linear fit of the form
|
| 288 |
+
∆ = gµBB for the Zeeman effect, where µB is the Bohr
|
| 289 |
+
magneton, yields a Land´e factor g = 2.006 ± 0.007. By
|
| 290 |
+
interpolating the data points at low B fields, we obtain
|
| 291 |
+
BC = 108±5 mT for the critical field. Using the relation
|
| 292 |
+
[27]
|
| 293 |
+
BC = 1
|
| 294 |
+
2
|
| 295 |
+
kBTK
|
| 296 |
+
gµB
|
| 297 |
+
,
|
| 298 |
+
(1)
|
| 299 |
+
valid for temperatures T < 0.25 TK, this gives an esti-
|
| 300 |
+
mate of 291 ± 13 mK for the Kondo temperature TK.
|
| 301 |
+
An independent estimate of the Kondo temperature
|
| 302 |
+
TK can be obtained from the width of the Kondo reso-
|
| 303 |
+
nance (Fig. 1c). However, it should be noted that this is
|
| 304 |
+
only a rough estimate, since the width of the Kondo reso-
|
| 305 |
+
nance is related to TK by a non-universal scaling constant
|
| 306 |
+
[28]. To extract its width, we fitted the Kondo resonance
|
| 307 |
+
with a Frota line shape [29]
|
| 308 |
+
ρ(E)Frota = ℜ
|
| 309 |
+
�
|
| 310 |
+
iΓK
|
| 311 |
+
E − E0 + iΓK
|
| 312 |
+
.
|
| 313 |
+
(2)
|
| 314 |
+
Additional broadening effects due to the Fermi distri-
|
| 315 |
+
bution and the modulation amplitude were taken into
|
| 316 |
+
account.
|
| 317 |
+
The best fit then yields a width of ΓK ≃
|
| 318 |
+
43 µV and thus a TK = ΓK(2π × 0.103)/kB ≃ 320 mK
|
| 319 |
+
[29], in good agreement with the above estimate from
|
| 320 |
+
the B field dependence.
|
| 321 |
+
We attribute the features in
|
| 322 |
+
the dI/dV spectrum at approximately ±0.25 mV and
|
| 323 |
+
±0.55 mV (Fig. 1c and Supplementary Material) to ei-
|
| 324 |
+
ther molecular vibrations or frustrated translations of the
|
| 325 |
+
standing metal-molecule nanostructure [23]. Note that a
|
| 326 |
+
strong electron-vibrational coupling can also lead to a
|
| 327 |
+
further decrease of TK [30].
|
| 328 |
+
The low Kondo temperature of the standing nanostruc-
|
| 329 |
+
ture in conjunction with the low base temperature and
|
| 330 |
+
high energy resolution of our mK STM enable us to quan-
|
| 331 |
+
titatively describe the interaction of the localized spin
|
| 332 |
+
with its environment, also as a function of temperature.
|
| 333 |
+
For this purpose, we employ the Anderson-Appelbaum
|
| 334 |
+
model [31–33] and calculate the tunneling conductance
|
| 335 |
+
from the Kondo Hamiltonian in a perturbative approach
|
| 336 |
+
that includes processes up to third order in the exchange
|
| 337 |
+
interaction J [34]. The model allows tunneling electrons
|
| 338 |
+
to interact with the localized spin via spin-spin (tT S ˆσt·ˆS)
|
| 339 |
+
or potential scattering (tT S U). Here tT S is the matrix
|
| 340 |
+
element for a transition from the tip to the molecule or
|
| 341 |
+
vice versa, and ˆσt and ˆS are the spin operators of the
|
| 342 |
+
tunneling and localized electrons, respectively. In addi-
|
| 343 |
+
tion, the model takes into account the spin-spin exchange
|
| 344 |
+
scattering between the electrons of the substrate and the
|
| 345 |
+
localized spin (Jρ ˆσs · ˆS), where ρ denotes the substrate’s
|
| 346 |
+
electron density at the Fermi energy and ˆσs the spin oper-
|
| 347 |
+
ator of itinerant electrons in the substrate. This approach
|
| 348 |
+
provides the correct description under the following con-
|
| 349 |
+
ditions: the magnetic impurity is predominantly coupled
|
| 350 |
+
to one of the electrodes (here the substrate), the system
|
| 351 |
+
is in equilibrium (limit of small bias voltages), and the
|
| 352 |
+
system is in the weak coupling limit (T >∼ TK) or high-
|
| 353 |
+
field regime (B >∼ kBTK).
|
| 354 |
+
We performed least-square
|
| 355 |
+
fits and extracted the dimensionless coupling strength
|
| 356 |
+
Jρ between the substrate and the localized electron and
|
| 357 |
+
its Land´e factor g.
|
| 358 |
+
Before we focus on the temperature dependence, we
|
| 359 |
+
first examine the influence of the B field on Jρ at 50 mK
|
| 360 |
+
(Fig. 2b).
|
| 361 |
+
As the B field increases, we see a decrease
|
| 362 |
+
in the height of the peak structure on top of the steps
|
| 363 |
+
originating from spin-flip excitations. Since those peak
|
| 364 |
+
heights are proportional to Jρ [34], this indicates that
|
| 365 |
+
|Jρ| decreases with increasing B field.
|
| 366 |
+
This is clearly
|
| 367 |
+
seen in Fig. 3a, where the fitted Jρ is plotted versus B
|
| 368 |
+
field. It may at first sight seem surprising that we still
|
| 369 |
+
observe a coupling between the localized and itinerant
|
| 370 |
+
spins at high B fields.
|
| 371 |
+
This behaviour is, however, in
|
| 372 |
+
|
| 373 |
+
4
|
| 374 |
+
−1
|
| 375 |
+
0
|
| 376 |
+
1
|
| 377 |
+
Bias voltage (mV)
|
| 378 |
+
1
|
| 379 |
+
2
|
| 380 |
+
3
|
| 381 |
+
4
|
| 382 |
+
5
|
| 383 |
+
dI/dV (10-4 G0)
|
| 384 |
+
(a)
|
| 385 |
+
(b)
|
| 386 |
+
(c)
|
| 387 |
+
(d)
|
| 388 |
+
1009 mK
|
| 389 |
+
751 mK
|
| 390 |
+
275 mK
|
| 391 |
+
70 mK
|
| 392 |
+
41 mK
|
| 393 |
+
0
|
| 394 |
+
2.5
|
| 395 |
+
5.0
|
| 396 |
+
B field (T)
|
| 397 |
+
−0.10
|
| 398 |
+
−0.09
|
| 399 |
+
−0.08
|
| 400 |
+
−0.07
|
| 401 |
+
−0.06
|
| 402 |
+
Jρ
|
| 403 |
+
0
|
| 404 |
+
500
|
| 405 |
+
1000
|
| 406 |
+
Temperature (mK)
|
| 407 |
+
−0.06
|
| 408 |
+
−0.05
|
| 409 |
+
−0.04
|
| 410 |
+
Jρ
|
| 411 |
+
~TK
|
| 412 |
+
0
|
| 413 |
+
500
|
| 414 |
+
1000
|
| 415 |
+
Temperature (mK)
|
| 416 |
+
1.90
|
| 417 |
+
1.95
|
| 418 |
+
2.00
|
| 419 |
+
2.05
|
| 420 |
+
g-factor
|
| 421 |
+
FIG. 3. (a) Coupling strength Jρ as extracted from the fits in
|
| 422 |
+
Fig. 2b as a function of B field. (b) dI/dV spectra (blue) on
|
| 423 |
+
a standing metal-molecule nanostructure, measured at differ-
|
| 424 |
+
ent temperatures in an external field B = 7 T (IT = 100 pA,
|
| 425 |
+
V
|
| 426 |
+
= −10 mV, Vmod = 100 µV). The orange curves show
|
| 427 |
+
the fits based on perturbation theory (see text for details).
|
| 428 |
+
The spectra are vertically displaced for clarity. (c) Coupling
|
| 429 |
+
strength Jρ as extracted from the fits as a function of tem-
|
| 430 |
+
perature. The dashed blue line indicates the Kondo energy
|
| 431 |
+
scale TK as determined from the B-field data of Fig. 2. (d)
|
| 432 |
+
Land´e g-factor estimated from the fits in panel (b) (black)
|
| 433 |
+
and the effective g-factor geff after taking into account renor-
|
| 434 |
+
malization effects due to the exchange interaction (red). The
|
| 435 |
+
red line illustrates a linear fit and the red shaded area the
|
| 436 |
+
corresponding confidence interval.
|
| 437 |
+
good agreement with numerical renormalization group
|
| 438 |
+
(NRG) calculations for an S = 1/2 Kondo impurity at
|
| 439 |
+
finite temperatures and B fields [27], in which it was
|
| 440 |
+
shown that the intensity of the split Kondo resonance
|
| 441 |
+
varies even if µBB/kBTK ≫ 1, which corresponds to the
|
| 442 |
+
present situation. In other words, we have even at high
|
| 443 |
+
B fields access to bias driven Kondo correlations whose
|
| 444 |
+
gradual emergence at decreasing temperatures drives |Jρ|
|
| 445 |
+
up. This behavior can be readily observed by looking at
|
| 446 |
+
the temperature-dependent data for constant B = 7 T
|
| 447 |
+
(Fig. 3b). The fits reveal that |Jρ| increases with decreas-
|
| 448 |
+
ing temperature (Fig. 3c). For B = 0, such an increase
|
| 449 |
+
of |Jρ| would signal the progressive breakdown of the
|
| 450 |
+
perturbation approach, yielding a divergence of Jρ and
|
| 451 |
+
the crossover into the Kondo singlet as a new ground
|
| 452 |
+
state [9, 10].
|
| 453 |
+
However, here we are in the high-field
|
| 454 |
+
regime and therefore will not reach the Kondo ground
|
| 455 |
+
state even in the limit T → 0. We note that the tem-
|
| 456 |
+
perature range in which the perturbation theory starts to
|
| 457 |
+
0.5
|
| 458 |
+
1.0
|
| 459 |
+
1.5
|
| 460 |
+
2.0
|
| 461 |
+
Setpoint conductance (10-4 G0)
|
| 462 |
+
−0.075
|
| 463 |
+
−0.070
|
| 464 |
+
−0.065
|
| 465 |
+
−0.060
|
| 466 |
+
Jρ
|
| 467 |
+
zB,eq
|
| 468 |
+
zB,st
|
| 469 |
+
FIG. 4. Coupling strength Jρ as extracted from the fits of
|
| 470 |
+
dI/dV spectra on a standing metal-molecule nanostructure
|
| 471 |
+
that were measured for different setpoint conductances at T ≃
|
| 472 |
+
45 mK and an external field of B = 7 T. The tip was initially
|
| 473 |
+
stabilized at IT = 100 pA and V = −6 mV and then moved
|
| 474 |
+
up by 1 ˚A in steps of 0.1 ˚A. The gray dashed line serves as a
|
| 475 |
+
guide for the eye. Insets show schematically how the PTCDA
|
| 476 |
+
molecule is pulled up by the tip.
|
| 477 |
+
collapse (Fig. 3b) agrees very well with the Kondo energy
|
| 478 |
+
scale of 291 ± 13 mK which was derived from the B-field
|
| 479 |
+
behaviour at low temperatures T < TK.
|
| 480 |
+
For the fitted Land´e factor g in Fig. 3d we also see a
|
| 481 |
+
strong decrease with increasing temperature. This can
|
| 482 |
+
be attributed to the energy renormalization [34]. Taking
|
| 483 |
+
this into account, we obtain an effective gyromagnetic
|
| 484 |
+
factor of geff = g(T)×(1+Jρ(T)) ≈ 1.91±0.01, which has
|
| 485 |
+
no temperature dependence. Note that the deviation of
|
| 486 |
+
the obtained g-factors from the B-field-dependent mea-
|
| 487 |
+
surements and from the perturbative approach is <∼ 6%.
|
| 488 |
+
Having demonstrated the sensitivity to changes of Jρ,
|
| 489 |
+
we now explore the possibility to tune the exchange cou-
|
| 490 |
+
pling mechanically. It was shown before that the standing
|
| 491 |
+
metal-molecule nanostructure is susceptible to attractive
|
| 492 |
+
forces from the tip, enabling controlled tilts, translations
|
| 493 |
+
and rotations [22]. If it was possible to tune the verti-
|
| 494 |
+
cal distance of the standing nanostructure from the sub-
|
| 495 |
+
strate with attractive forces from the STM tip, it might
|
| 496 |
+
also be possible to tune the exchange coupling Jρ. To
|
| 497 |
+
explore this possibility, we measured dI/dV spectra on
|
| 498 |
+
the standing metal-molecule nanostructure at B = 7 T
|
| 499 |
+
and T ≃ 45 mK for different setpoint conductances, cor-
|
| 500 |
+
responding to different distances between the tip and the
|
| 501 |
+
molecule. In Fig. 4 the fitted Jρ are plotted as a function
|
| 502 |
+
of setpoint conductances G. For G ≤ 0.6 · 10−4G0, the
|
| 503 |
+
coupling is constant at (Jρ)eq ≃ −0.075. With increasing
|
| 504 |
+
G, corresponding to decreasing tip-molecule distances,
|
| 505 |
+
|Jρ| decreases and reaches (Jρ)st ≃ −0.060 for the high-
|
| 506 |
+
est G. Measurements at even smaller distances (higher
|
| 507 |
+
setpoints) are not feasible, because the resulting larger
|
| 508 |
+
tunnel currents frequently induce sudden 30◦ rotations
|
| 509 |
+
of the standing nanostructure around its vertical axis.
|
| 510 |
+
Since we know that there are attractive forces acting be-
|
| 511 |
+
|
| 512 |
+
5
|
| 513 |
+
tween the molecule and the tip [22, 23], we interpret the
|
| 514 |
+
decreasing |Jρ| as the result of an increased distance of
|
| 515 |
+
the standing metal-molecule nanostructure from the sur-
|
| 516 |
+
face. Under the assumption that the exchange interac-
|
| 517 |
+
tion scales exponentially with the bond distance zB [35],
|
| 518 |
+
J(zB) ∝ exp(−zB/dex), the vertical relaxation ∆zB of
|
| 519 |
+
the bond between the standing molecule and substrate
|
| 520 |
+
surface can be estimated. For a typical decay length of
|
| 521 |
+
the exchange interaction, dex ≃ 0.4 ˚A [35], we obtain
|
| 522 |
+
∆zB = dex ln(Jeq/Jst) ≃ 0.09 ˚A between the smallest
|
| 523 |
+
and the largest G in Fig. 4.
|
| 524 |
+
In conclusion, we have shown that in the standing
|
| 525 |
+
configuration the exchange coupling between PTCDA
|
| 526 |
+
within the assembled nanostructure and the Ag(111) sub-
|
| 527 |
+
strate is strongly reduced, if compared to the flat-lying
|
| 528 |
+
molecule.
|
| 529 |
+
At B = 0 we observed a Kondo resonance
|
| 530 |
+
with a width of only ΓK ≃ 43 µV at an experimental
|
| 531 |
+
temperature of T = 30 mK. B-field-dependent measure-
|
| 532 |
+
ments showed that the standing metal-molecule nanos-
|
| 533 |
+
tructure is an S =
|
| 534 |
+
1/2 system with a critical field of
|
| 535 |
+
BC = 108 ± 5 mT. This corresponds to a Kondo tem-
|
| 536 |
+
perature of only TK = 291 ± 13 mK. Furthermore, we
|
| 537 |
+
demonstrated that, using attractive forces exerted by the
|
| 538 |
+
STM tip, it is possible to tune the exchange coupling be-
|
| 539 |
+
tween the localized spin in the nanostructure and the
|
| 540 |
+
substrate. The combination of the small exchange cou-
|
| 541 |
+
pling and the softness of the surface bond against verti-
|
| 542 |
+
cal distortions makes the standing metal-molecule nanos-
|
| 543 |
+
tructure an interesting candidate for STM-based electron
|
| 544 |
+
spin resonance (STM-ESR) experiments. For STM-ESR
|
| 545 |
+
experiments on individual atoms and molecules [1, 3–
|
| 546 |
+
5, 7, 16, 18, 35–40], two important requirements have to
|
| 547 |
+
be met [37, 41]: first, a sufficiently small coupling be-
|
| 548 |
+
tween the object to be investigated and the substrate,
|
| 549 |
+
in order to reach long relaxation and dephasing times,
|
| 550 |
+
and second, the possibility to drive with a high-frequency
|
| 551 |
+
electric field applied to the STM tip mechanical oscilla-
|
| 552 |
+
tions of the object in the inhomogeneous B field of the
|
| 553 |
+
tip, the latter being produced by a magnetic atom at
|
| 554 |
+
the tip apex.
|
| 555 |
+
Although a significant reduction of the
|
| 556 |
+
interaction between the atomic or molecular object of
|
| 557 |
+
interest with the metal substrate has been achieved on
|
| 558 |
+
different atomically thin insulating layers [15, 42], ESR
|
| 559 |
+
signals in the STM have been observed, somewhat sur-
|
| 560 |
+
prisingly, mainly on a bilayer of magnesium oxide (MgO)
|
| 561 |
+
film on Ag(001) surfaces [1, 3–5, 7, 16, 18, 35–40] and
|
| 562 |
+
recently for the first time on two-monolayer NaCl films
|
| 563 |
+
on Cu(100) [43]. In this situation, the standing metal-
|
| 564 |
+
molecule nanostructure may be a promising specimen: its
|
| 565 |
+
spin is more weakly coupled to the substrate than that
|
| 566 |
+
of Cu atoms on MgO/Ag(001), which are ESR active
|
| 567 |
+
[18], and the tip-induced displacement is about an order
|
| 568 |
+
of magnitude larger than the displacements required for
|
| 569 |
+
ESR-STM [37, 41]. It should be noted, however, that for
|
| 570 |
+
ESR-STM a dynamic displacement driven by the high-
|
| 571 |
+
frequency electric field is required, whereas in the present
|
| 572 |
+
experiment we so far only tested the response to static
|
| 573 |
+
forces between the molecule and the tip. But due to the
|
| 574 |
+
strong molecular polarizability of PTCDA [26], we an-
|
| 575 |
+
ticipate that the high-frequency electric field may have
|
| 576 |
+
a similar effect. In upcoming experiments we will there-
|
| 577 |
+
fore determine whether the dynamic displacement is suf-
|
| 578 |
+
ficiently large, and whether relaxation times are suffi-
|
| 579 |
+
ciently long for STM-ESR experiments. Finally, we note
|
| 580 |
+
that standing metal-molecule nanostructure can also be
|
| 581 |
+
prepared on the tip [26, 44, 45]. If it was indeed STM-
|
| 582 |
+
ESR capable, the standing nanostructure could therefore
|
| 583 |
+
be employed as a magnetic field sensor on the atomic
|
| 584 |
+
scale [13, 46], in addition to being a sensor of electric sur-
|
| 585 |
+
face potentials, as which it has already been used [44, 45].
|
| 586 |
+
We thank Frithjof B. Anders (TU Dortmund) for
|
| 587 |
+
fruitful discussions. The authors acknowledge financial
|
| 588 |
+
support from the German Federal Ministry of Educa-
|
| 589 |
+
tion and Research through the funding program ’quan-
|
| 590 |
+
tum technologies - from basic research to market’, un-
|
| 591 |
+
der Q-NL (project number 13N16032). M.T. acknowl-
|
| 592 |
+
edges funding by the Heisenberg Program (TE 833/2-
|
| 593 |
+
1) of the Deutsche Forschungsgemeinschaft (DFG).
|
| 594 |
+
F.S.T. acknowledges funding by the DFG through SFB
|
| 595 |
+
1083 ”Structure and Dynamics of Internal Interfaces”
|
| 596 |
+
(223848855-SFB 1083).
|
| 597 |
+
∗ Corresponding author: t.esat@fz-juelich.de
|
| 598 |
+
[1] P. Willke, W. Paul, F. D. Natterer, K. Yang, Y. Bae,
|
| 599 |
+
T. Choi, J. Fern´andez-Rossier, A. J. Heinrich, , and C. P.
|
| 600 |
+
Lutz, Probing quantum coherence in single-atom electron
|
| 601 |
+
spin resonance, Science Advances 4, eaaq1543 (2022).
|
| 602 |
+
[2] A. J. Heinrich, J. A. Gupta, C. P. Lutz, and D. M. Ei-
|
| 603 |
+
gler, Single-atom spin-flip spectroscopy, Science 306, 466
|
| 604 |
+
(2004).
|
| 605 |
+
[3] K. Yang, W. Paul, S.-H. Phark, P. Willke, Y. Bae,
|
| 606 |
+
T. Choi, T. Esat, A. Ardavan, A. J. Heinrich, and C. P.
|
| 607 |
+
Lutz, Coherent spin manipulation of individual atoms on
|
| 608 |
+
a surface, Science 366, 509 (2019).
|
| 609 |
+
[4] P. Willke, T. Bilgeri, X. Zhang, Y. Wang, C. Wolf,
|
| 610 |
+
H. Aubin, A. Heinrich, and T. Choi, Coherent spin con-
|
| 611 |
+
trol of single molecules on a surface, ACS Nano 15, 17959
|
| 612 |
+
(2021).
|
| 613 |
+
[5] L. M. Veldman, L. Farinacci, R. Rejali, R. Broekhoven,
|
| 614 |
+
J. Gobeil, D. Coffey, M. Ternes, and A. F. Otte, Free
|
| 615 |
+
coherent evolution of a coupled atomic spin system ini-
|
| 616 |
+
tialized by electron scattering, Science 372, 964 (2021).
|
| 617 |
+
[6] A. A. Khajetoorians, D. Wegner, A. F. Otte, and
|
| 618 |
+
I. Swart, Creating designer quantum states of matter
|
| 619 |
+
atom-by-atom, Nature Reviews Physics 1, 703 (2019).
|
| 620 |
+
[7] K. Yang, S.-H. Phark, Y. Bae, T. Esat, P. Willke, A. Ar-
|
| 621 |
+
davan, A. J. Heinrich, and C. P. Lutz, Probing resonat-
|
| 622 |
+
ing valence bond states in artificial quantum magnets,
|
| 623 |
+
Nature Communications 12, 993 (2021).
|
| 624 |
+
[8] Y. He, S. K. Gorman, D. Keith, L. Kranz, J. G. Keizer,
|
| 625 |
+
and M. Y. Simmons, A two-qubit gate between phospho-
|
| 626 |
+
rus donor electrons in silicon, Nature 571, 371 (2019).
|
| 627 |
+
[9] J. Kondo, Resistance minimum in dilute magnetic alloys,
|
| 628 |
+
|
| 629 |
+
6
|
| 630 |
+
Prog Theor Phys 32, 37 (1964).
|
| 631 |
+
[10] K. G. Wilson, The renormalization group: Critical phe-
|
| 632 |
+
nomena and the kondo problem, RMP 47, 773 (1975).
|
| 633 |
+
[11] M. Ternes, A. J. Heinrich, and W.-D. Schneider, Spec-
|
| 634 |
+
troscopic manifestations of the Kondo effect on single
|
| 635 |
+
adatoms, Journal of Physics:
|
| 636 |
+
Condensed Matter 21,
|
| 637 |
+
053001 (2008).
|
| 638 |
+
[12] Y.-H. Zhang, S. Kahle, T. Herden, C. Stroh, M. Mayor,
|
| 639 |
+
U. Schlickum, M. Ternes, P. Wahl, and K. Kern, Temper-
|
| 640 |
+
ature and magnetic field dependence of a Kondo system
|
| 641 |
+
in the weak coupling regime, Nature Communications 4,
|
| 642 |
+
2110 (2013).
|
| 643 |
+
[13] L. Garnier, B. Verlhac, P. Abufager, N. Lorente, M. Or-
|
| 644 |
+
maza, and L. Limot, The Kondo effect of a molecular tip
|
| 645 |
+
as a magnetic sensor, Nano Lett. 20, 8193 (2020).
|
| 646 |
+
[14] T. Frauhammer, H. Chen, T. Balashov, G. Deren-
|
| 647 |
+
bach, S. Klyatskaya, E. Moreno-Pineda, M. Ruben,
|
| 648 |
+
and W. Wulfhekel, Indirect spin-readout of rare-earth-
|
| 649 |
+
based single-molecule magnet with scanning tunneling
|
| 650 |
+
microscopy, PRL 127, 123201 (2021).
|
| 651 |
+
[15] W. Paul, K. Yang, S. Baumann, N. Romming, T. Choi,
|
| 652 |
+
C. Lutz, and A. Heinrich, Control of the millisecond spin
|
| 653 |
+
lifetime of an electrically probed atom, Nature Physics
|
| 654 |
+
13, 403 (2017).
|
| 655 |
+
[16] F. D. Natterer, K. Yang, W. Paul, P. Willke, T. Choi,
|
| 656 |
+
T. Greber, A. J. Heinrich, and C. P. Lutz, Reading and
|
| 657 |
+
writing single-atom magnets, Nature 543, 226 (2017).
|
| 658 |
+
[17] A. F. Otte, M. Ternes, K. von Bergmann, S. Loth,
|
| 659 |
+
H. Brune, C. P. Lutz, C. F. Hirjibehedin, and A. J. Hein-
|
| 660 |
+
rich, The role of magnetic anisotropy in the Kondo effect,
|
| 661 |
+
Nature Physics 4, 847 (2008).
|
| 662 |
+
[18] K. Yang, P. Willke, Y. Bae, A. Ferr´on, J. L. Lado, A. Ar-
|
| 663 |
+
davan, J. Fern´andez-Rossier, A. J. Heinrich, and C. P.
|
| 664 |
+
Lutz, Electrically controlled nuclear polarization of indi-
|
| 665 |
+
vidual atoms, Nature Nanotechnology 13, 1120 (2018).
|
| 666 |
+
[19] S. M. Cronenwett, T. H. Oosterkamp, and L. P. Kouwen-
|
| 667 |
+
hoven, A tunable Kondo effect in quantum dots, Science
|
| 668 |
+
281, 540 (1998).
|
| 669 |
+
[20] W. G. van der Wiel, S. D. Franceschi, T. Fujisawa,
|
| 670 |
+
J. M. Elzerman, S. Tarucha, and L. P. Kouwenhoven,
|
| 671 |
+
The Kondo effect in the unitary limit, Science 289, 2105
|
| 672 |
+
(2000).
|
| 673 |
+
[21] T. Esat, P. Borgens, X. Yang, P. Coenen, V. Cherepanov,
|
| 674 |
+
A. Raccanelli, F. S. Tautz, and R. Temirov, A millikelvin
|
| 675 |
+
scanning tunneling microscope in ultra-high vacuum with
|
| 676 |
+
adiabatic demagnetization refrigeration, Review of Scien-
|
| 677 |
+
tific Instruments 92, 063701 (2021).
|
| 678 |
+
[22] T. Esat, N. Friedrich, F. S. Tautz, and R. Temirov, A
|
| 679 |
+
standing molecule as a single-electron field emitter, Na-
|
| 680 |
+
ture 558, 573 (2018).
|
| 681 |
+
[23] M. Knol, H. H. Arefi, D. Corken, J. Gardner, F. S. Tautz,
|
| 682 |
+
R. J. Maurer, and C. Wagner, The stabilization poten-
|
| 683 |
+
tial of a standing molecule, Science Advances 7, eabj9751
|
| 684 |
+
(2022).
|
| 685 |
+
[24] H. H. Arefi, D. Corken, F. S. Tautz, R. J. Maurer, and
|
| 686 |
+
C. Wagner, Design principles for metastable standing
|
| 687 |
+
molecules, J. Phys. Chem. C 126, 6880 (2022).
|
| 688 |
+
[25] C. R. Ast, B. J¨ack, J. Senkpiel, M. Eltschka, M. Etzkorn,
|
| 689 |
+
J. Ankerhold, and K. Kern, Sensing the quantum limit
|
| 690 |
+
in scanning tunnelling spectroscopy, Nature Communica-
|
| 691 |
+
tions 7, 13009 (2016).
|
| 692 |
+
[26] R. Temirov, M. F. B. Green, N. Friedrich, P. Leinen,
|
| 693 |
+
T.
|
| 694 |
+
Esat,
|
| 695 |
+
P.
|
| 696 |
+
Chmielniak,
|
| 697 |
+
S.
|
| 698 |
+
Sarwar,
|
| 699 |
+
J.
|
| 700 |
+
Rawson,
|
| 701 |
+
P. K¨ogerler, C. Wagner, M. Rohlfing, and F. S. Tautz,
|
| 702 |
+
Molecular model of a quantum dot beyond the constant
|
| 703 |
+
interaction approximation, PRL 120, 206801 (2018).
|
| 704 |
+
[27] T. A. Costi, Kondo effect in a magnetic field and the
|
| 705 |
+
magnetoresistivity of Kondo alloys, PRL 85, 1504 (2000).
|
| 706 |
+
[28] T. Esat, T. Deilmann, B. Lechtenberg, C. Wagner,
|
| 707 |
+
P. Kr¨uger, R. Temirov, F. B. Anders, M. Rohlfing, and
|
| 708 |
+
F. S. Tautz, Transfering spin into an extended π orbital
|
| 709 |
+
of a large molecule, PRB 91, 144415 (2015).
|
| 710 |
+
[29] H. O. Frota, Shape of the Kondo resonance, PRB 45,
|
| 711 |
+
1096 (1992).
|
| 712 |
+
[30] F. Eickhoff, E. Kolodzeiski, T. Esat, N. Fournier, C. Wag-
|
| 713 |
+
ner, T. Deilmann, R. Temirov, M. Rohlfing, F. S.
|
| 714 |
+
Tautz, and F. B. Anders, Inelastic electron tunneling
|
| 715 |
+
spectroscopy for probing strongly correlated many-body
|
| 716 |
+
systems by scanning tunneling microscopy, PRB 101,
|
| 717 |
+
125405 (2020).
|
| 718 |
+
[31] J. Appelbaum, ”s − d” exchange model of zero-bias tun-
|
| 719 |
+
neling anomalies, PRL 17, 91 (1966).
|
| 720 |
+
[32] P. W. Anderson, Localized magnetic states and fermi-
|
| 721 |
+
surface anomalies in tunneling, PRL 17, 95 (1966).
|
| 722 |
+
[33] J. A. Appelbaum, Exchange model of zero-bias tunneling
|
| 723 |
+
anomalies, PR 154, 633 (1967).
|
| 724 |
+
[34] M. Ternes, Spin excitations and correlations in scan-
|
| 725 |
+
ning tunneling spectroscopy, New Journal of Physics 17,
|
| 726 |
+
063016 (2015).
|
| 727 |
+
[35] K. Yang, W. Paul, F. D. Natterer, J. L. Lado, Y. Bae,
|
| 728 |
+
P. Willke, T. Choi, A. Ferr´on, J. Fern´andez-Rossier, A. J.
|
| 729 |
+
Heinrich, and C. P. Lutz, Tuning the exchange bias on a
|
| 730 |
+
single atom from 1 mT to 10 T, PRL 122, 227203 (2019).
|
| 731 |
+
[36] S. Baumann, W. Paul, T. Choi, C. P. Lutz, A. Ardavan,
|
| 732 |
+
and H. Andreas, J., Electron paramagnetic resonance of
|
| 733 |
+
individual atoms on a surface, Science 350, 417 (2015).
|
| 734 |
+
[37] T. S. Seifert, S. Kovarik, D. M. Juraschek, N. A. Spaldin,
|
| 735 |
+
P. Gambardella, and S. Stepanow, Longitudinal and
|
| 736 |
+
transverse electron paramagnetic resonance in a scan-
|
| 737 |
+
ning tunneling microscope, Science Advances 6, eabc5511
|
| 738 |
+
(2020).
|
| 739 |
+
[38] P. Willke, A. Singha, X. Zhang, T. Esat, C. P. Lutz, A. J.
|
| 740 |
+
Heinrich, and T. Choi, Tuning single-atom electron spin
|
| 741 |
+
resonance in a vector magnetic field, Nano Lett. 19, 8201
|
| 742 |
+
(2019).
|
| 743 |
+
[39] W. M. J. van Weerdenburg, M. Steinbrecher, N. P. E.
|
| 744 |
+
van Mullekom, J. W. Gerritsen, H. von Allw¨orden, F. D.
|
| 745 |
+
Natterer, and A. A. Khajetoorians, A scanning tunnel-
|
| 746 |
+
ing microscope capable of electron spin resonance and
|
| 747 |
+
pump-probe spectroscopy at mk temperature and in vec-
|
| 748 |
+
tor magnetic field, Review of Scientific Instruments 92,
|
| 749 |
+
033906 (2021).
|
| 750 |
+
[40] T. S. Seifert, S. Kovarik, C. Nistor, L. Persichetti,
|
| 751 |
+
S. Stepanow, and P. Gambardella, Single-atom electron
|
| 752 |
+
paramagnetic resonance in a scanning tunneling micro-
|
| 753 |
+
scope driven by a radio-frequency antenna at 4 k, Phys.
|
| 754 |
+
Rev. Research 2, 013032 (2020).
|
| 755 |
+
[41] J. L. Lado, A. Ferr´on, and J. Fern´andez-Rossier, Ex-
|
| 756 |
+
change mechanism for electron paramagnetic resonance
|
| 757 |
+
of individual adatoms, PRB 96, 205420 (2017).
|
| 758 |
+
[42] S. Loth, M. Etzkorn, C. P. Lutz, D. M. Eigler, and A. J.
|
| 759 |
+
Heinrich, Measurement of fast electron spin relaxation
|
| 760 |
+
times with atomic resolution, Science 329, 1628 (2010).
|
| 761 |
+
[43] R. Kawaguchi, K. Hashimoto, T. Kakudate, K. Katoh,
|
| 762 |
+
M. Yamashita, and T. Komeda, Spatially resolving elec-
|
| 763 |
+
tron spin resonance of π-radical in single-molecule mag-
|
| 764 |
+
net, Nano Lett. 10.1021/acs.nanolett.2c04049 (2022).
|
| 765 |
+
[44] C. Wagner, M. F. B. Green, P. Leinen, T. Deilmann,
|
| 766 |
+
|
| 767 |
+
7
|
| 768 |
+
P. Kr¨uger, M. Rohlfing, R. Temirov, and F. S. Tautz,
|
| 769 |
+
Scanning quantum dot microscopy, PRL 115, 026101
|
| 770 |
+
(2015).
|
| 771 |
+
[45] C. Wagner, M. F. B. Green, M. Maiworm, P. Leinen,
|
| 772 |
+
T.
|
| 773 |
+
Esat,
|
| 774 |
+
N.
|
| 775 |
+
Ferri,
|
| 776 |
+
N.
|
| 777 |
+
Friedrich,
|
| 778 |
+
R.
|
| 779 |
+
Findeisen,
|
| 780 |
+
A. Tkatchenko, R. Temirov, and F. S. Tautz, Quanti-
|
| 781 |
+
tative imaging of electric surface potentials with single-
|
| 782 |
+
atom sensitivity, Nature Materials 18, 853 (2019).
|
| 783 |
+
[46] B. Verlhac, N. Bachellier, L. Garnier, M. Ormaza, P. Ab-
|
| 784 |
+
ufager, R. Robles, B. M.-L., M. Ternes, N. Lorente,
|
| 785 |
+
and L. Limot, Atomic-scale spin sensing with a single
|
| 786 |
+
molecule at the apex of a scanning tunneling microscope,
|
| 787 |
+
Science 366, 623 (2019).
|
| 788 |
+
|
19FKT4oBgHgl3EQfPS1l/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6edc928228b07646e11ec518d33995b24ba8a05a22e3802f9df4d2d8ba8767d5
|
| 3 |
+
size 260066
|
1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:311ab387d046180d490103b86b55132937f1daf3c1ac99edc6c401888247423d
|
| 3 |
+
size 2949165
|
1NFPT4oBgHgl3EQfUTQQ/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:77d448ebc19d885e4ef029312a83621a8ff96ec9cc3b7c25bf54a5bca7691c60
|
| 3 |
+
size 111914
|
3NE2T4oBgHgl3EQf5wjH/content/tmp_files/2301.04194v1.pdf.txt
ADDED
|
@@ -0,0 +1,2870 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.04194v1 [math.OC] 10 Jan 2023
|
| 2 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH
|
| 3 |
+
MULTIPLICATIVE REWARD
|
| 4 |
+
DAMIAN JELITO∗,† AND �LUKASZ STETTNER∗
|
| 5 |
+
Abstract. We consider a long-run impulse control problem for a generic
|
| 6 |
+
Markov process with a multiplicative reward functional. We construct a solu-
|
| 7 |
+
tion to the associated Bellman equation and provide a verification result. The
|
| 8 |
+
argument is based on the probabilistic properties of the underlying process
|
| 9 |
+
combined with the Krein-Rutman theorem applied to the specific non-linear
|
| 10 |
+
operator. Also, it utilises the approximation of the problem in the bounded
|
| 11 |
+
domain and with the help of the dyadic time-grid.
|
| 12 |
+
Keywords: impulse control, Bellman equation, risk-sensitive criterion, Markov
|
| 13 |
+
process
|
| 14 |
+
MSC2020 subject classifications: 93E20, 49J21, 49K21, 60J25
|
| 15 |
+
1. Introduction
|
| 16 |
+
Impulse control constitutes a versatile framework for controlling real-life stochas-
|
| 17 |
+
tic systems. In this type of control, a decision-maker determines intervention times
|
| 18 |
+
and instantaneous after-intervention states of the controlled process. By doing so,
|
| 19 |
+
one can affect a continuous time phenomenon in a discrete time manner. Conse-
|
| 20 |
+
quently, impulse control attracted considerable attention in the mathematical liter-
|
| 21 |
+
ature; see e.g. [4, 9, 26] for classic contributions and [3, 10, 19, 21] for more recent
|
| 22 |
+
results. In addition to generic mathematical properties, impulse control problems
|
| 23 |
+
were studied with reference to specific applications including i.a. controlling ex-
|
| 24 |
+
change rates, epidemics, and portfolios with transaction costs; see e.g. [18, 25, 27]
|
| 25 |
+
and references therein.
|
| 26 |
+
When looking for an optimal impulse control strategy, one must decide on the
|
| 27 |
+
optimality criterion.
|
| 28 |
+
Recently, considerable attention was paid to the so-called
|
| 29 |
+
risk-sensitive functional given, for any γ ∈ R, by
|
| 30 |
+
µγ(Z) :=
|
| 31 |
+
�
|
| 32 |
+
1
|
| 33 |
+
γ ln E[exp(γZ)],
|
| 34 |
+
γ ̸= 0,
|
| 35 |
+
E[Z],
|
| 36 |
+
γ = 0,
|
| 37 |
+
(1.1)
|
| 38 |
+
where Z is a (random) payoff corresponding to a chosen control strategy; see [14] for
|
| 39 |
+
a seminal contribution. This functional with γ = 0 corresponds to the usual linear
|
| 40 |
+
criterion and the case γ < 0 is associated with risk-averse preferences; see [5] for
|
| 41 |
+
a comprehensive overview. Also, the functional with γ > 0 could be linked to the
|
| 42 |
+
asymptotics of the power utility function; see [31] for details. Recent comprehensive
|
| 43 |
+
discussion on the long-run version with µγ could be found in [6]. We refer also
|
| 44 |
+
∗Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland
|
| 45 |
+
E-mail addresses: djelito@impan.pl, l.stettner@impan.pl.
|
| 46 |
+
†Corresponding author.
|
| 47 |
+
1
|
| 48 |
+
|
| 49 |
+
2
|
| 50 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 51 |
+
to [23] and references therein for a discussion on the connection between (1.1) and
|
| 52 |
+
the duality of the large deviations-based criteria.
|
| 53 |
+
In this paper we focus on the use of the functional µγ with γ > 0. More specif-
|
| 54 |
+
ically, we consider the impulse control problem for some continuous time Markov
|
| 55 |
+
process and construct a solution to the associated Bellman equation which char-
|
| 56 |
+
acterises an optimal impulse control strategy. To do this, we study the family of
|
| 57 |
+
impulse control problems in bounded domains and then extend the analysis to the
|
| 58 |
+
generic locally compact state space. This idea was used in [1], where PDEs tech-
|
| 59 |
+
niques were applied to obtain the characterisation of the controlled diffusions in the
|
| 60 |
+
risks-sensitive setting. A similar approximation for the the average cost per unit
|
| 61 |
+
time problem was considered in [32].
|
| 62 |
+
The main contribution of this paper is a construction of a solution to the Bell-
|
| 63 |
+
man equation associated with the problem, see Theorem 5.1 for details. It should
|
| 64 |
+
be noted that we get a bounded solution even though the state space could be
|
| 65 |
+
unbounded and we assume virtually no ergodicity conditions for the uncontrolled
|
| 66 |
+
process. Also, note that present results for γ > 0 complement our recent findings
|
| 67 |
+
on the impulse control with the risk-averse preferences; see [24] for the dyadic case
|
| 68 |
+
and [15] for the continuous time framework. Nevertheless, it should be noted that
|
| 69 |
+
the techniques for γ < 0 and γ > 0 are substantially different and it is not possible
|
| 70 |
+
to directly transform the results in one framework to the other; see e.g. [16, 20] for
|
| 71 |
+
further discussion.
|
| 72 |
+
The structure of this paper is as follows. In Section 2 we formally introduce
|
| 73 |
+
the problem, discuss the assumptions and, in Theorem 2.3, provide a verification
|
| 74 |
+
argument. Next, in Section 3 we consider an auxiliary dyadic problem in a bounded
|
| 75 |
+
domain and in Theorem 3.1 we construct a solution to the corresponding Bellman
|
| 76 |
+
equation. This is used in Section 4 where we extend our analysis to the unbounded
|
| 77 |
+
domain with the dyadic time-grid; see Theorem 4.2. Next, in Section 5 we finally
|
| 78 |
+
construct a solution to the Bellman equation for the original problem; see Theo-
|
| 79 |
+
rem 5.1. Finally, in Appendix A we discuss some properties of the optimal stopping
|
| 80 |
+
problems that are used in this paper.
|
| 81 |
+
2. Preliminaries
|
| 82 |
+
Let X = (Xt)t≥0 be a continuous time standard Feller–Markov process on a
|
| 83 |
+
filtered probability space (Ω, F, (Ft), P). The process X takes values in a locally
|
| 84 |
+
compact separable metric space E endowed with a metric ρ and the Borel σ-field
|
| 85 |
+
E. With any x ∈ E we associate a probability measure Px describing the evolution
|
| 86 |
+
of the process X starting in x; see Section 1.4 in [28] for details. Also, we use Ex,
|
| 87 |
+
x ∈ E, and Pt(x, A) := Px[Xt ∈ A], t ≥ 0, x ∈ E, A ∈ E, for the corresponding
|
| 88 |
+
expectation operator and the transition probability, respectively.
|
| 89 |
+
By Cb(E) we
|
| 90 |
+
denote the family of continuous bounded real-valued functions on E.
|
| 91 |
+
Also, to
|
| 92 |
+
ease the notation, by T , Tx, and Tx,b we denote the families of stopping times,
|
| 93 |
+
Px a.s. finite stopping times, and Px a.s. bounded stopping times, respectively.
|
| 94 |
+
Also, for any δ > 0, by T δ ⊂ T , T δ
|
| 95 |
+
x ⊂ Tx, and T δ
|
| 96 |
+
x,b ⊂ Tx,b, we denote the
|
| 97 |
+
respective subfamilies of dyadic stopping times, i.e.
|
| 98 |
+
those taking values in the
|
| 99 |
+
set {0, δ, 2δ, . . .} ∪ {∞}.
|
| 100 |
+
Throughout this paper we fix some compact U ⊆ E and we assume that a
|
| 101 |
+
decision-maker is allowed to shift the controlled process to U. This is done with
|
| 102 |
+
the help of an impulse control strategy, i.e. a sequence V := (τi, ξi)∞
|
| 103 |
+
i=1, where (τi)
|
| 104 |
+
|
| 105 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 106 |
+
3
|
| 107 |
+
is an increasing sequence of stopping times and (ξi) is a sequence of Fτi-measurable
|
| 108 |
+
after-impulse states with values in U. With any starting point x ∈ E and a strategy
|
| 109 |
+
V we associate a probability measure P(x,V ) for the controlled process Y . Under this
|
| 110 |
+
measure, the process starts at x and follows its usual (uncontrolled) dynamics up
|
| 111 |
+
to the time τ1. Then, it is immediately shifted to ξ1 and starts its evolution again,
|
| 112 |
+
etc. More formally, we consider a countable product of filtered spaces (Ω, F, (Ft))
|
| 113 |
+
and a coordinate process (X1
|
| 114 |
+
t , X2
|
| 115 |
+
t , . . .). Then, we define the controlled process Y
|
| 116 |
+
as Yt := Xi
|
| 117 |
+
t, t ∈ [τi−1, τi) with the convention τ0 ≡ 0. Under the measure P(x,V )
|
| 118 |
+
we get Yτi = ξi; we refer to Chapter V in [26] for the construction details; see
|
| 119 |
+
also Appendix in [8] and Section 2 in [29]. A strategy V = (τi, ξi)∞
|
| 120 |
+
i=1 is called
|
| 121 |
+
admissible if for any x ∈ E we get P(x,V )[limn→∞ τn = ∞] = 1. The family of
|
| 122 |
+
admissible impulse control strategies is denoted by V. Also, note that, to simplify
|
| 123 |
+
the notation, by Yτ −
|
| 124 |
+
i := Xi
|
| 125 |
+
τi, i ∈ N∗, we denote the state of the process right before
|
| 126 |
+
the ith impulse (yet, possibly, after the jump).
|
| 127 |
+
In this paper we study the asymptotics of the impulse control problem given by
|
| 128 |
+
sup
|
| 129 |
+
V ∈V
|
| 130 |
+
J(x, V ),
|
| 131 |
+
x ∈ E,
|
| 132 |
+
(2.1)
|
| 133 |
+
where, for any x ∈ E and V ∈ V, we set
|
| 134 |
+
J(x, V ) := lim inf
|
| 135 |
+
T →∞
|
| 136 |
+
1
|
| 137 |
+
T ln E(x,V )
|
| 138 |
+
�
|
| 139 |
+
e
|
| 140 |
+
� T
|
| 141 |
+
0 f(Ys)ds+�∞
|
| 142 |
+
i=1 1{τi≤T }c(Yτ−
|
| 143 |
+
i
|
| 144 |
+
,ξi)�
|
| 145 |
+
,
|
| 146 |
+
(2.2)
|
| 147 |
+
with f denoting the running cost function and c being the shift-cost function,
|
| 148 |
+
respectively. Note that this could be seen as a long-run standardised version of
|
| 149 |
+
the functional (1.1) with γ > 0 applied to the impulse control framework. Here,
|
| 150 |
+
the standardisation refers to the fact that we do not use directly the parameter γ
|
| 151 |
+
(apart from its sign). Also, the problem is of the long-run type, i.e. the utility is
|
| 152 |
+
averaged over time which improves the stability of the results.
|
| 153 |
+
The analysis in this paper is based on the approximation of the problem in a
|
| 154 |
+
bounded domain.
|
| 155 |
+
Thus, we fix a sequence (Bm)m∈N of compact sets satisfying
|
| 156 |
+
Bm ⊂ Bm+1 and E = �∞
|
| 157 |
+
m=0 Bm. Also, we assume that U ⊂ B0. Next, we assume
|
| 158 |
+
the following conditions.
|
| 159 |
+
(A1) (Cost functions). The map f : E �→ R− is a continuous and bounded. Also,
|
| 160 |
+
the map c : E × U �→ R− is continuous, bounded, and strictly non-positive,
|
| 161 |
+
and satisfies the triangle inequality, i.e. for some c0 < 0, we have
|
| 162 |
+
0 > c0 ≥ c(x, ξ) ≥ c(x, η) + c(η, ξ),
|
| 163 |
+
x ∈ E, ξ, η ∈ U.
|
| 164 |
+
Also, we assume that c satisfies the uniform limit at infinity condition
|
| 165 |
+
lim
|
| 166 |
+
∥x∥,∥y∥→∞ sup
|
| 167 |
+
ξ∈U
|
| 168 |
+
|c(x, ξ) − c(y, ξ)| = 0.
|
| 169 |
+
(2.3)
|
| 170 |
+
(A2) (Transition probability continuity). For any t, the transition probability Pt
|
| 171 |
+
is continuous with respect to the total variation norm, i.e. for any sequence
|
| 172 |
+
(xn) ⊂ E converging to x ∈ E, we get
|
| 173 |
+
lim
|
| 174 |
+
n→∞ sup
|
| 175 |
+
A∈E
|
| 176 |
+
|Pt(xn, A) − Pt(x, A)| = 0.
|
| 177 |
+
(A3) (Distance control). For any compact set Γ ⊂ E, t0 > 0, and r0 > 0, we
|
| 178 |
+
have
|
| 179 |
+
lim
|
| 180 |
+
r→∞ MΓ(t0, r) = 0,
|
| 181 |
+
lim
|
| 182 |
+
t→0 MΓ(t, r0) = 0,
|
| 183 |
+
(2.4)
|
| 184 |
+
|
| 185 |
+
4
|
| 186 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 187 |
+
where MΓ(t, r) := supx∈Γ Px[sups∈[0,t] ρ(Xs, x) ≥ r], t, r > 0.
|
| 188 |
+
(A4) (Process irreducibility). For any m ∈ N, x ∈ Bm, δ > 0, and any open set
|
| 189 |
+
O ⊂ Bm, we have
|
| 190 |
+
Px [∪∞
|
| 191 |
+
i=1{Xiδ ∈ O}] = 1.
|
| 192 |
+
Also, we assume that for any x ∈ E, δ > 0, and m ∈ N, we have
|
| 193 |
+
Px[τBm < ∞] = 1
|
| 194 |
+
(2.5)
|
| 195 |
+
where τBm := δ inf{k ∈ N: Xkδ /∈ Bm}.
|
| 196 |
+
Before we proceed, let us comment on these assumptions. First, note that (A1)
|
| 197 |
+
states typical cost-functions conditions. In particular, the non-positivity assump-
|
| 198 |
+
tion for f is merely a technical normalisation. Indeed, for a generic ˜f ∈ Cb(E) we
|
| 199 |
+
may set f(·) := ˜f(·) − ∥ ˜f∥ ≤ 0 to get
|
| 200 |
+
Jf(x, V ) = J
|
| 201 |
+
˜f(x, V ) − ∥ ˜f∥,
|
| 202 |
+
x ∈ E, V ∈ V,
|
| 203 |
+
where Jf denotes the version of the functional J from (2.2) corresponding to the
|
| 204 |
+
running cost function f.
|
| 205 |
+
Second, Assumption (A2) states that the transition probabilities Pt(x, ·) are
|
| 206 |
+
continuous with respect to the total variation norm. Note that this directly implies
|
| 207 |
+
that the transition semigroup associated to X is strong Feller, i.e. for any t > 0
|
| 208 |
+
and a bounded measurable map h: E �→ R, the map x �→ Ex[h(Xt)] is continuous
|
| 209 |
+
and bounded.
|
| 210 |
+
Third, Assumption (A3) quantifies distance control properties of the underlying
|
| 211 |
+
process. It states that, for a fixed time horizon, the process with a high probability
|
| 212 |
+
stays close to its starting point and, with a fixed radius, with a high probability it
|
| 213 |
+
does not leave the corresponding ball with a sufficiently short time horizon. Note
|
| 214 |
+
that these properties are automatically satisfied if the transition semigroup is C0-
|
| 215 |
+
Feller; see Proposition 2.1 in [21] and Proposition 6.4 in [2] for details.
|
| 216 |
+
Finally, Assumption (A4) states a form of the irreducibility of the process X. It
|
| 217 |
+
requires that the process visits a sufficiently rich family of sets with unit probability.
|
| 218 |
+
To solve (2.1), we show the existence of a solution to the impulse control Bellman
|
| 219 |
+
equation, i.e. a function w ∈ Cb(E) and a constant λ ∈ R satisfying
|
| 220 |
+
w(x) = sup
|
| 221 |
+
τ∈Tx,b
|
| 222 |
+
ln Ex
|
| 223 |
+
�
|
| 224 |
+
exp
|
| 225 |
+
�� τ
|
| 226 |
+
0
|
| 227 |
+
(f(Xs) − λ)ds + Mw(Xτ)
|
| 228 |
+
��
|
| 229 |
+
,
|
| 230 |
+
x ∈ E,
|
| 231 |
+
(2.6)
|
| 232 |
+
where the operator M is given by
|
| 233 |
+
Mh(x) := sup
|
| 234 |
+
ξ∈U
|
| 235 |
+
(c(x, ξ) + h(ξ)),
|
| 236 |
+
h ∈ Cb(E), x ∈ E.
|
| 237 |
+
We start with a simple observation giving a lower bound for the constant λ
|
| 238 |
+
from (2.6). To do this, we define the semi-group type by
|
| 239 |
+
r(f) := lim
|
| 240 |
+
t→∞
|
| 241 |
+
1
|
| 242 |
+
t ln sup
|
| 243 |
+
x∈E
|
| 244 |
+
Ex
|
| 245 |
+
�
|
| 246 |
+
e
|
| 247 |
+
� t
|
| 248 |
+
0 f(Xs)ds�
|
| 249 |
+
;
|
| 250 |
+
(2.7)
|
| 251 |
+
see e.g. Proposition 1 in [30] for a discussion on the properties of r(f).
|
| 252 |
+
Lemma 2.1. Let (w, λ) be a solution to (2.6). Then, we get λ ≥ r(f).
|
| 253 |
+
Proof. From (2.6), for any T ≥ 0, we get
|
| 254 |
+
w(x) ≥ ln Ex
|
| 255 |
+
�
|
| 256 |
+
e
|
| 257 |
+
� T
|
| 258 |
+
0 (f(Xs)−λ)ds+Mw(XT )�
|
| 259 |
+
.
|
| 260 |
+
|
| 261 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 262 |
+
5
|
| 263 |
+
Thus, using the boundedness of w and Mw, we get
|
| 264 |
+
∥w∥ ≥ sup
|
| 265 |
+
x∈E
|
| 266 |
+
ln Ex
|
| 267 |
+
�
|
| 268 |
+
e
|
| 269 |
+
� T
|
| 270 |
+
0 (f(Xs)−λ)ds�
|
| 271 |
+
− ∥Mw∥.
|
| 272 |
+
Consequently, dividing both hand-sides by T and letting T → ∞, we get 0 ≥
|
| 273 |
+
r(f − λ), which concludes the proof.
|
| 274 |
+
□
|
| 275 |
+
Let us now link a solution to (2.6) with the optimal value and an optimal strategy
|
| 276 |
+
for (2.1). To ease the notation, we recursively define the strategy ˆV := (ˆτi, ˆξi)∞
|
| 277 |
+
i=1
|
| 278 |
+
for i ∈ N \ {0} by
|
| 279 |
+
�
|
| 280 |
+
ˆτi
|
| 281 |
+
:= inf{t ≥ ˆτi−1 : w(Xi
|
| 282 |
+
t) = Mw(Xi
|
| 283 |
+
t)},
|
| 284 |
+
ˆξi
|
| 285 |
+
:= arg maxξ∈U
|
| 286 |
+
�
|
| 287 |
+
c(Xi
|
| 288 |
+
ˆτi, ξ) + w(ξ)
|
| 289 |
+
�
|
| 290 |
+
1{ˆτi<∞} + ξ01{ˆτi=∞},
|
| 291 |
+
(2.8)
|
| 292 |
+
where ˆτ0 := 0 and ξ0 ∈ U is some fixed point. First, we show that ˆV is a proper
|
| 293 |
+
strategy.
|
| 294 |
+
Proposition 2.2. The strategy ˆV given by (2.8) is admissible.
|
| 295 |
+
Proof. To ease the notation, we define N(0, T ) := �∞
|
| 296 |
+
i=1 1{ˆτi≤T }, T ≥ 0. We fix
|
| 297 |
+
some T > 0 and x ∈ E, and show that we get
|
| 298 |
+
P(x, ˆV )[N(0, T ) = ∞] = 0.
|
| 299 |
+
(2.9)
|
| 300 |
+
Recalling (2.8), on the event A := {limi→∞ ˆτi < +∞}, for any n ∈ N, n ≥ 1,
|
| 301 |
+
we get w(Xn
|
| 302 |
+
ˆτn) = Mw(Xn
|
| 303 |
+
ˆτn) = c(Xn
|
| 304 |
+
ˆτn, Xn+1
|
| 305 |
+
ˆτn
|
| 306 |
+
) + w(Xn+1
|
| 307 |
+
ˆτn
|
| 308 |
+
).
|
| 309 |
+
Also, recalling that
|
| 310 |
+
c(x, ξ) ≤ c0 < 0, x ∈ E, ξ ∈ U, for any n ∈ N, n ≥ 1, we have w(Xn+1
|
| 311 |
+
ˆτn
|
| 312 |
+
)−w(Xn
|
| 313 |
+
ˆτn) =
|
| 314 |
+
−c(Xn
|
| 315 |
+
ˆτn, Xn+1
|
| 316 |
+
ˆτn
|
| 317 |
+
) ≥ −c0 > 0. Using this observation and Assumption (A3), we esti-
|
| 318 |
+
mate the distance between consecutive impulses which will be used to prove (2.9).
|
| 319 |
+
More specifically, for any k, m ∈ N, k, m ≥ 1, we get
|
| 320 |
+
k+m−2
|
| 321 |
+
�
|
| 322 |
+
n=k
|
| 323 |
+
(w(Xn+1
|
| 324 |
+
ˆτn
|
| 325 |
+
) − w(Xn+1
|
| 326 |
+
ˆτn+1)) + (w(Xk+m
|
| 327 |
+
ˆτk+m−1) − w(Xk+1
|
| 328 |
+
ˆτk
|
| 329 |
+
))
|
| 330 |
+
= w(Xk+1
|
| 331 |
+
ˆτk
|
| 332 |
+
) +
|
| 333 |
+
k+m−1
|
| 334 |
+
�
|
| 335 |
+
n=k+1
|
| 336 |
+
(w(Xn+1
|
| 337 |
+
ˆτn
|
| 338 |
+
) − w(Xn
|
| 339 |
+
ˆτn)) − w(Xk+1
|
| 340 |
+
ˆτk
|
| 341 |
+
)
|
| 342 |
+
=
|
| 343 |
+
k+m−1
|
| 344 |
+
�
|
| 345 |
+
n=k+1
|
| 346 |
+
(w(Xn+1
|
| 347 |
+
ˆτn
|
| 348 |
+
) − w(Xn
|
| 349 |
+
ˆτn)) ≥ −(m − 1)c0;
|
| 350 |
+
(2.10)
|
| 351 |
+
it should be noted that the specific values for k and m will be determined later.
|
| 352 |
+
Using the continuity of w we may find K > 0 such that supx,y∈U(w(x) − w(y)) ≤
|
| 353 |
+
K.
|
| 354 |
+
Let m ∈ N be big enough to get −(m − 1) c0
|
| 355 |
+
2
|
| 356 |
+
> K.
|
| 357 |
+
Thus, noting that
|
| 358 |
+
Xk+m
|
| 359 |
+
ˆτk+m−1, Xk+1
|
| 360 |
+
ˆτk
|
| 361 |
+
∈ U, we have (w(Xk+m
|
| 362 |
+
ˆτk+m−1) − w(Xk+1
|
| 363 |
+
ˆτk
|
| 364 |
+
)) ≤ K < −(m − 1) c0
|
| 365 |
+
2 . Con-
|
| 366 |
+
sequently, recalling (2.10), on A, we get
|
| 367 |
+
k+m−2
|
| 368 |
+
�
|
| 369 |
+
n=k
|
| 370 |
+
(w(Xn+1
|
| 371 |
+
ˆτn
|
| 372 |
+
) − w(Xn+1
|
| 373 |
+
ˆτn+1)) ≥ −(m − 1)c0
|
| 374 |
+
2 .
|
| 375 |
+
(2.11)
|
| 376 |
+
Recalling the compactness of U and the continuity of w we may find r > 0 such
|
| 377 |
+
that for any x ∈ U and y ∈ E satisfying ρ(x, y) < r we get |w(x) − w(y)| < − c0
|
| 378 |
+
2 .
|
| 379 |
+
|
| 380 |
+
6
|
| 381 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 382 |
+
Let us now consider the family of events
|
| 383 |
+
Bk :=
|
| 384 |
+
k+m−2
|
| 385 |
+
�
|
| 386 |
+
n=k
|
| 387 |
+
{ρ(Xn+1
|
| 388 |
+
ˆτn
|
| 389 |
+
, Xn+1
|
| 390 |
+
ˆτn+1) < r},
|
| 391 |
+
k ∈ N, k ≥ 1,
|
| 392 |
+
(2.12)
|
| 393 |
+
and note that, for any k ∈ N, k ≥ 1, on Bk ∩ A we have �k+m−2
|
| 394 |
+
n=k
|
| 395 |
+
(w(Xn+1
|
| 396 |
+
ˆτn
|
| 397 |
+
) −
|
| 398 |
+
w(Xn+1
|
| 399 |
+
ˆτn+1)) < −(m − 1) c0
|
| 400 |
+
2 . Thus, recalling (2.11), for any k ∈ N, k ≥ 1, we get
|
| 401 |
+
P(x0, ˆV )[Bk ∩ A] = 0 and, in particular, we have
|
| 402 |
+
P(x0, ˆV )[Bk ∩ {N(0, T ) = ∞}] = 0.
|
| 403 |
+
(2.13)
|
| 404 |
+
Let us now show that lim supk→∞ P(x0, ˆV )[Bc
|
| 405 |
+
k ∩{N(0, T ) = ∞}] = 0. Noting that
|
| 406 |
+
{N(0, T ) = ∞} = {limi→∞ ˆτi ≤ T }, for any t0 > 0 and k ∈ N, k ≥ 1, we get
|
| 407 |
+
P(x0, ˆV ) [Bc
|
| 408 |
+
k ∩ {N(0, T ) = ∞}]
|
| 409 |
+
≤ P(x0, ˆV )
|
| 410 |
+
��k+m−2
|
| 411 |
+
�
|
| 412 |
+
n=k
|
| 413 |
+
{ρ(Xn+1
|
| 414 |
+
ˆτn
|
| 415 |
+
, Xn+1
|
| 416 |
+
ˆτn+1) ≥ r} ∩ {ˆτn+1 − ˆτn ≤ t0}
|
| 417 |
+
�
|
| 418 |
+
∩ { lim
|
| 419 |
+
i→∞ ˆτi ≤ T }
|
| 420 |
+
�
|
| 421 |
+
+ P(x0, ˆV )
|
| 422 |
+
��k+m−2
|
| 423 |
+
�
|
| 424 |
+
n=k
|
| 425 |
+
{ρ(Xn+1
|
| 426 |
+
ˆτn
|
| 427 |
+
, Xn+1
|
| 428 |
+
ˆτn+1) ≥ r} ∩ {ˆτn+1 − ˆτn > t0}
|
| 429 |
+
�
|
| 430 |
+
∩ { lim
|
| 431 |
+
i→∞ ˆτi ≤ T }
|
| 432 |
+
�
|
| 433 |
+
≤ P(x0, ˆV )
|
| 434 |
+
�k+m−2
|
| 435 |
+
�
|
| 436 |
+
n=k
|
| 437 |
+
{ sup
|
| 438 |
+
t∈[0,t0]
|
| 439 |
+
ρ(Xn+1
|
| 440 |
+
ˆτn
|
| 441 |
+
, Xn+1
|
| 442 |
+
ˆτn+t) ≥ r} ∩ { lim
|
| 443 |
+
i→∞ ˆτi ≤ T }
|
| 444 |
+
�
|
| 445 |
+
+ P(x0, ˆV )
|
| 446 |
+
�k+m−2
|
| 447 |
+
�
|
| 448 |
+
n=k
|
| 449 |
+
{ˆτn+1 − ˆτn > t0} ∩ { lim
|
| 450 |
+
i→∞ ˆτi ≤ T }
|
| 451 |
+
�
|
| 452 |
+
.
|
| 453 |
+
(2.14)
|
| 454 |
+
Using Assumption (A3), for any ε > 0, we may find t0 > 0, such that
|
| 455 |
+
sup
|
| 456 |
+
x∈U
|
| 457 |
+
Px
|
| 458 |
+
�
|
| 459 |
+
sup
|
| 460 |
+
t∈[0,t0]
|
| 461 |
+
ρ(X0, Xt) ≥ r
|
| 462 |
+
�
|
| 463 |
+
≤
|
| 464 |
+
ε
|
| 465 |
+
m − 1.
|
| 466 |
+
(2.15)
|
| 467 |
+
Thus, using the strong Markov property and noting that Xn+1
|
| 468 |
+
ˆτn
|
| 469 |
+
∈ U, for any k ∈ N,
|
| 470 |
+
k ≥ 1, we get
|
| 471 |
+
P(x0, ˆV )
|
| 472 |
+
�k+m−2
|
| 473 |
+
�
|
| 474 |
+
n=k
|
| 475 |
+
{ sup
|
| 476 |
+
t∈[0,t0]
|
| 477 |
+
ρ(Xn+1
|
| 478 |
+
ˆτn
|
| 479 |
+
, Xn+1
|
| 480 |
+
ˆτn+t) ≥ r} ∩ { lim
|
| 481 |
+
i→∞ ˆτi ≤ T }
|
| 482 |
+
�
|
| 483 |
+
≤
|
| 484 |
+
k+m−2
|
| 485 |
+
�
|
| 486 |
+
n=k
|
| 487 |
+
P(x0, ˆV )
|
| 488 |
+
�
|
| 489 |
+
{ sup
|
| 490 |
+
t∈[0,t0]
|
| 491 |
+
ρ(Xn+1
|
| 492 |
+
ˆτn
|
| 493 |
+
, Xn+1
|
| 494 |
+
ˆτn+t) ≥ r} ∩ {ˆτn ≤ T }
|
| 495 |
+
�
|
| 496 |
+
=
|
| 497 |
+
k+m−2
|
| 498 |
+
�
|
| 499 |
+
n=k
|
| 500 |
+
P(x0, ˆV )
|
| 501 |
+
�
|
| 502 |
+
{ˆτn ≤ T }PXn+1
|
| 503 |
+
ˆτn
|
| 504 |
+
�
|
| 505 |
+
sup
|
| 506 |
+
t∈[0,t0]
|
| 507 |
+
ρ(X0, Xt) ≥ r
|
| 508 |
+
��
|
| 509 |
+
≤ ε.
|
| 510 |
+
(2.16)
|
| 511 |
+
Recalling that ε > 0 was arbitrary, for any k ∈ N, k ≥ 1, we get
|
| 512 |
+
P(x0, ˆV )
|
| 513 |
+
�k+m−2
|
| 514 |
+
�
|
| 515 |
+
n=k
|
| 516 |
+
{ sup
|
| 517 |
+
t∈[0,t0]
|
| 518 |
+
ρ(Xn+1
|
| 519 |
+
ˆτn
|
| 520 |
+
, Xn+1
|
| 521 |
+
ˆτn+t) ≥ r} ∩ { lim
|
| 522 |
+
i→∞ ˆτi ≤ T }
|
| 523 |
+
�
|
| 524 |
+
= 0.
|
| 525 |
+
(2.17)
|
| 526 |
+
|
| 527 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 528 |
+
7
|
| 529 |
+
Now, to ease the notation, let Ck := �∞
|
| 530 |
+
n=k{ˆτn+1 − ˆτn > t0} ∩ {limi→∞ ˆτi ≤ T },
|
| 531 |
+
k ∈ N, k ≥ 1, and note that Ck+1 ⊂ Ck, k ∈ N, k ≥ 1. We show that
|
| 532 |
+
lim
|
| 533 |
+
k→∞ P(x0, ˆV ) [Ck] = 0.
|
| 534 |
+
For the contradiction, assume that limk→∞ P(x0, ˆV ) [Ck] > 0. Consequently, we get
|
| 535 |
+
P(x0, ˆV ) [�∞
|
| 536 |
+
k=1 Ck] > 0. Note that for any ω ∈ �∞
|
| 537 |
+
k=1 Ck we have limi→∞ ˆτi(ω) ≤ T .
|
| 538 |
+
In particular, we may find i0 ∈ N such that for any n ≥ i0 we get ˆτn+1(ω)− ˆτn(ω) ≤
|
| 539 |
+
t0
|
| 540 |
+
2 . This leads to the contradiction as from the fact that ω ∈ �∞
|
| 541 |
+
k=1 Ck we also get
|
| 542 |
+
ω ∈
|
| 543 |
+
∞
|
| 544 |
+
�
|
| 545 |
+
k=1
|
| 546 |
+
∞
|
| 547 |
+
�
|
| 548 |
+
n=k
|
| 549 |
+
{ˆτn+1 − ˆτn > t0} ⊂
|
| 550 |
+
∞
|
| 551 |
+
�
|
| 552 |
+
n=i0
|
| 553 |
+
{ˆτn+1 − ˆτn > t0}.
|
| 554 |
+
Consequently, we get limk→∞ P(x0, ˆV ) [Ck] = 0 and, in particular, we get
|
| 555 |
+
lim sup
|
| 556 |
+
k→∞
|
| 557 |
+
P(x0, ˆV )
|
| 558 |
+
�k+m−2
|
| 559 |
+
�
|
| 560 |
+
n=k
|
| 561 |
+
{ˆτn+1 − ˆτn > t0} ∩ { lim
|
| 562 |
+
i→∞ ˆτi ≤ T }
|
| 563 |
+
�
|
| 564 |
+
≤ lim
|
| 565 |
+
k→∞ P(x0, ˆV ) [Ck] = 0.
|
| 566 |
+
Hence, recalling (2.14) and (2.17), we get
|
| 567 |
+
lim sup
|
| 568 |
+
k→∞
|
| 569 |
+
P(x0, ˆV ) [Bc
|
| 570 |
+
k ∩ {N(0, T ) = ∞}] = 0.
|
| 571 |
+
Thus, recalling (2.13), for any k ∈ N, k ≥ 1, we obtain
|
| 572 |
+
P(x0, ˆV ) [N(0, T ) = ∞] = P(x0, ˆV ) [Bc
|
| 573 |
+
k ∩ {N(0, T ) = ∞}] ,
|
| 574 |
+
and letting k → ∞, we conclude the proof of (2.9).
|
| 575 |
+
□
|
| 576 |
+
Now, we show the verification result linking (2.6) with the optimal value and an
|
| 577 |
+
optimal strategy for (2.1).
|
| 578 |
+
Theorem 2.3. Let (w, λ) be a solution to (2.6) with λ > r(f). Then, we get
|
| 579 |
+
λ = sup
|
| 580 |
+
V ∈V
|
| 581 |
+
J(x, V ) = J(x, ˆV ),
|
| 582 |
+
x ∈ E,
|
| 583 |
+
where the strategy ˆV is given by (2.8).
|
| 584 |
+
Proof. The proof is based on the argument from Theorem 4.4 in [15] thus we show
|
| 585 |
+
only an outline. First, we show that λ = J(x, ˆV ), x ∈ E, where the strategy ˆV is
|
| 586 |
+
given by (2.8). Let us fix x ∈ E. Then, combining the argument used in Lemma
|
| 587 |
+
7.1 in [2] and Proposition A.3, we get that the process
|
| 588 |
+
e
|
| 589 |
+
� ˆτ1∧T
|
| 590 |
+
0
|
| 591 |
+
(f(X1
|
| 592 |
+
s )−λ)ds+w(X1
|
| 593 |
+
ˆτ1∧T ),
|
| 594 |
+
T ≥ 0,
|
| 595 |
+
is a P(x, ˆV )-martingale. Noting that on the event {ˆτk+1 < T } we get w(Xk+1
|
| 596 |
+
ˆτk+1) =
|
| 597 |
+
Mw(Xk+1
|
| 598 |
+
ˆτk+1) = c(Xk+1
|
| 599 |
+
ˆτk+1, ˆξk+1) + w(ˆξk+1), k ∈ N, for any n ∈ N we recursively get
|
| 600 |
+
ew(x) = E(x, ˆV )
|
| 601 |
+
�
|
| 602 |
+
e
|
| 603 |
+
� ˆτ1∧T
|
| 604 |
+
0
|
| 605 |
+
(f(Ys)−λ)ds+w(X1
|
| 606 |
+
ˆτ1∧T )�
|
| 607 |
+
= E(x, ˆV )
|
| 608 |
+
�
|
| 609 |
+
e
|
| 610 |
+
� ˆτ1∧T
|
| 611 |
+
0
|
| 612 |
+
(f(Ys)−λ)ds+1{ˆτ1<T }c(X1
|
| 613 |
+
ˆτ1 ,X2
|
| 614 |
+
ˆτ1 )+1{ˆτ1<T }w(X2
|
| 615 |
+
ˆτ1 )+1{ˆτ1≥T }w(X1
|
| 616 |
+
T )�
|
| 617 |
+
= E(x, ˆV )
|
| 618 |
+
�
|
| 619 |
+
e
|
| 620 |
+
� ˆτn∧T
|
| 621 |
+
0
|
| 622 |
+
(f(Ys)−λ)ds+�n
|
| 623 |
+
i=1 1{ˆτi<T }c(Xi
|
| 624 |
+
ˆτi ,Xi+1
|
| 625 |
+
ˆτi
|
| 626 |
+
)×
|
| 627 |
+
×e
|
| 628 |
+
�n
|
| 629 |
+
i=1 1{ˆτi−1<T ≤ˆτi}w(Xi
|
| 630 |
+
T )+1{ˆτn<T }w(Xn+1
|
| 631 |
+
ˆτn
|
| 632 |
+
)�
|
| 633 |
+
.
|
| 634 |
+
(2.18)
|
| 635 |
+
|
| 636 |
+
8
|
| 637 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 638 |
+
Recalling Proposition 2.2 we get ˆτn → ∞ as n → ∞. Thus, letting n → ∞ in (2.18)
|
| 639 |
+
and using Lebesgue’s dominated convergence theorem we get
|
| 640 |
+
ew(x) = E(x, ˆV )
|
| 641 |
+
�
|
| 642 |
+
e
|
| 643 |
+
� T
|
| 644 |
+
0 (f(Ys)−λ)ds+�∞
|
| 645 |
+
i=1 1{ˆτi<T }c(Xi
|
| 646 |
+
ˆτi ,Xi+1
|
| 647 |
+
ˆτi
|
| 648 |
+
)+�∞
|
| 649 |
+
i=1 1{ˆτi−1<T ≤ˆτi}w(Xi
|
| 650 |
+
T )�
|
| 651 |
+
.
|
| 652 |
+
Thus, recalling the boundedness of w, taking the logarithm of both sides, dividing
|
| 653 |
+
by T , and letting T → ∞ we obtain
|
| 654 |
+
λ = lim inf
|
| 655 |
+
T →∞ E(x, ˆV )
|
| 656 |
+
�
|
| 657 |
+
e
|
| 658 |
+
� T
|
| 659 |
+
0 f(Ys)ds+�∞
|
| 660 |
+
i=1 1{ˆτi<T }c(Xi
|
| 661 |
+
ˆτi ,Xi+1
|
| 662 |
+
ˆτi
|
| 663 |
+
)�
|
| 664 |
+
.
|
| 665 |
+
Second, let us fix some x ∈ E and an admissible strategy V = (ξi, τi)∞
|
| 666 |
+
i=1 ∈
|
| 667 |
+
V. We show that λ ≥ J(x, V ). Using the argument from Lemma 7.1 in [2] and
|
| 668 |
+
Proposition A.3, we get that the process
|
| 669 |
+
e
|
| 670 |
+
� τ1∧T
|
| 671 |
+
0
|
| 672 |
+
(f(X1
|
| 673 |
+
s )−λ)ds+w(X1
|
| 674 |
+
τ1∧T ),
|
| 675 |
+
T ≥ 0,
|
| 676 |
+
is a P(x,V )-supermartingale. Noting that on the event {τk+1 < T } we have
|
| 677 |
+
w(Xk+1
|
| 678 |
+
τk+1) ≥ Mw(Xk+1
|
| 679 |
+
τk+1) ≥ c(Xk+1
|
| 680 |
+
τk+1, ξk+1) + w(ξk+1),
|
| 681 |
+
k ∈ N,
|
| 682 |
+
for any n ∈ N we recursively get
|
| 683 |
+
ew(x) ≥ E(x,V )
|
| 684 |
+
�
|
| 685 |
+
e
|
| 686 |
+
� τ1∧T
|
| 687 |
+
0
|
| 688 |
+
(f(Ys)−λ)ds+w(X1
|
| 689 |
+
τ1∧T )�
|
| 690 |
+
≥ E(x,V )
|
| 691 |
+
�
|
| 692 |
+
e
|
| 693 |
+
� τ1∧T
|
| 694 |
+
0
|
| 695 |
+
(f(Ys)−λ)ds+1{τ1<T }c(X1
|
| 696 |
+
τ1 ,X2
|
| 697 |
+
τ1 )+1{τ1<T }w(X2
|
| 698 |
+
τ1 )+1{τ1≥T }w(X1
|
| 699 |
+
T )�
|
| 700 |
+
≥ E(x,V )
|
| 701 |
+
�
|
| 702 |
+
e
|
| 703 |
+
� τn∧T
|
| 704 |
+
0
|
| 705 |
+
(f(Ys)−λ)ds+�n
|
| 706 |
+
i=1 1{τi<T }c(Xi
|
| 707 |
+
τi ,Xi+1
|
| 708 |
+
τi
|
| 709 |
+
)×
|
| 710 |
+
×e
|
| 711 |
+
�n
|
| 712 |
+
i=1 1{τi−1<T ≤τi}w(Xi
|
| 713 |
+
T )+1{τn<T }w(Xn+1
|
| 714 |
+
τn
|
| 715 |
+
)�
|
| 716 |
+
.
|
| 717 |
+
(2.19)
|
| 718 |
+
Recalling the admissibility of V , we get τn → ∞ as n → ∞. Thus, letting n → ∞
|
| 719 |
+
in (2.19) and using Fatou’s lemma, we get
|
| 720 |
+
ew(x) ≥ E(x,V )
|
| 721 |
+
�
|
| 722 |
+
e
|
| 723 |
+
� T
|
| 724 |
+
0 (f(Ys)−λ)ds+�∞
|
| 725 |
+
i=1 1{τi<T }c(Xi
|
| 726 |
+
τi ,Xi+1
|
| 727 |
+
τi
|
| 728 |
+
)+�n
|
| 729 |
+
i=1 1{τi−1<T ≤τi}w(Xi
|
| 730 |
+
T )�
|
| 731 |
+
.
|
| 732 |
+
Thus, taking the logarithm of both sides, dividing by T , and letting T → ∞, we
|
| 733 |
+
get
|
| 734 |
+
λ ≥ lim inf
|
| 735 |
+
T →∞ E(x,V )
|
| 736 |
+
�
|
| 737 |
+
e
|
| 738 |
+
� T
|
| 739 |
+
0 f(Ys)ds+�∞
|
| 740 |
+
i=1 1{τi<T }c(Xi
|
| 741 |
+
τi ,Xi+1
|
| 742 |
+
τi
|
| 743 |
+
)�
|
| 744 |
+
,
|
| 745 |
+
which concludes the proof.
|
| 746 |
+
□
|
| 747 |
+
In the following sections we construct a solution to (2.6). In the construction we
|
| 748 |
+
approximate the underlying problem using the dyadic time-grid. Also, we consider
|
| 749 |
+
a version of the problem in the bounded domain.
|
| 750 |
+
3. Dyadic impulse control in a bounded set
|
| 751 |
+
In this section we consider a version of (2.1) with a dyadic-time-grid and obliga-
|
| 752 |
+
tory impulses when the process leaves some compact set. In this way, we construct
|
| 753 |
+
a solution to the bounded-domain dyadic counterpart of (2.6). More specifically,
|
| 754 |
+
let us fix some δ > 0 and m ∈ N. We show the existence of a map wm
|
| 755 |
+
δ ∈ Cb(Bm)
|
| 756 |
+
and a constant λm
|
| 757 |
+
δ ∈ R satisfying
|
| 758 |
+
wm
|
| 759 |
+
δ (x) = sup
|
| 760 |
+
τ∈T δ
|
| 761 |
+
x,b
|
| 762 |
+
ln Ex
|
| 763 |
+
�
|
| 764 |
+
e
|
| 765 |
+
� τ∧τBm
|
| 766 |
+
0
|
| 767 |
+
(f(Xs)−λm
|
| 768 |
+
δ )ds+Mwm
|
| 769 |
+
δ (Xτ∧τBm )
|
| 770 |
+
�
|
| 771 |
+
,
|
| 772 |
+
x ∈ Bm.
|
| 773 |
+
(3.1)
|
| 774 |
+
|
| 775 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 776 |
+
9
|
| 777 |
+
In fact, we start with the analysis of an associated one-step equation. More specif-
|
| 778 |
+
ically, we show the existence of a constant λm
|
| 779 |
+
δ
|
| 780 |
+
∈ R and a map wm
|
| 781 |
+
δ
|
| 782 |
+
∈ Cb(Bm)
|
| 783 |
+
satisfying
|
| 784 |
+
wm
|
| 785 |
+
δ (x) = max
|
| 786 |
+
�
|
| 787 |
+
ln Ex
|
| 788 |
+
�
|
| 789 |
+
e
|
| 790 |
+
� δ
|
| 791 |
+
0 (f(Xs)−λm
|
| 792 |
+
δ )ds+1{Xδ∈Bm}wm
|
| 793 |
+
δ (Xδ)+1{Xδ /
|
| 794 |
+
∈Bm}Mwm
|
| 795 |
+
δ (Xδ)�
|
| 796 |
+
,
|
| 797 |
+
Mwm
|
| 798 |
+
δ (x)
|
| 799 |
+
�
|
| 800 |
+
,
|
| 801 |
+
x ∈ Bm,
|
| 802 |
+
wm
|
| 803 |
+
δ (x) = Mwm
|
| 804 |
+
δ (x),
|
| 805 |
+
x /∈ Bm;
|
| 806 |
+
(3.2)
|
| 807 |
+
see Theorem 3.1 for details. Also, note that we link (3.2) with (3.1) in Theorem 3.4.
|
| 808 |
+
Theorem 3.1. There exists a constant λm
|
| 809 |
+
δ
|
| 810 |
+
> 0 and a map wm
|
| 811 |
+
δ
|
| 812 |
+
∈ Cb(Bm) such
|
| 813 |
+
that (3.2) is satisfied and we get supξ∈U wm
|
| 814 |
+
δ (ξ) = 0.
|
| 815 |
+
Proof. The idea of the proof is to use the Krein-Rutman theorem to get a pos-
|
| 816 |
+
itive eigenvalue with a non-negative eigenvector of the suitable operator.
|
| 817 |
+
More
|
| 818 |
+
specifically, we consider a cone of non-negative continuous and bounded functions
|
| 819 |
+
C+
|
| 820 |
+
b (Bm) ⊂ Cb(Bm) and, for any h ∈ C+
|
| 821 |
+
b (Bm), we define the operators
|
| 822 |
+
˜
|
| 823 |
+
Mh(x) := sup
|
| 824 |
+
ξ∈U
|
| 825 |
+
ec(x,ξ)h(ξ),
|
| 826 |
+
x ∈ E,
|
| 827 |
+
˜P m
|
| 828 |
+
δ h(x) := Ex
|
| 829 |
+
�
|
| 830 |
+
e
|
| 831 |
+
� δ
|
| 832 |
+
0 f(Xs)ds �
|
| 833 |
+
1{Xδ∈Bm}h(Xδ) + 1{Xδ /∈Bm} ˜
|
| 834 |
+
Mh(Xδ)
|
| 835 |
+
��
|
| 836 |
+
,
|
| 837 |
+
x ∈ Bm,
|
| 838 |
+
˜T m
|
| 839 |
+
δ h(x) := max
|
| 840 |
+
�
|
| 841 |
+
˜P m
|
| 842 |
+
δ h(x), ˜
|
| 843 |
+
M ˜P m
|
| 844 |
+
δ h(x)
|
| 845 |
+
�
|
| 846 |
+
,
|
| 847 |
+
x ∈ Bm.
|
| 848 |
+
Now, we use the Krein-Rutman theorem to show that ˜T m
|
| 849 |
+
δ
|
| 850 |
+
admits a positive eigen-
|
| 851 |
+
value and a non-negative eigenfunction; see Theorem 4.3 in [7] for details. We start
|
| 852 |
+
with verifying the assumptions. First, note that ˜T m
|
| 853 |
+
δ
|
| 854 |
+
is positively homogeneous,
|
| 855 |
+
monotonic increasing, and we have
|
| 856 |
+
˜T m
|
| 857 |
+
δ
|
| 858 |
+
1(x) ≥ e−δ∥f∥−∥c∥
|
| 859 |
+
1(x),
|
| 860 |
+
x ∈ Bm,
|
| 861 |
+
where
|
| 862 |
+
1 denotes the function identically equal to 1 on Bm. Also, using Assump-
|
| 863 |
+
tion (A2), we get that ˜T m
|
| 864 |
+
δ
|
| 865 |
+
transforms C+
|
| 866 |
+
b (Bm) into itself and it is continuous with
|
| 867 |
+
respect to the supremum norm. Let us now show that ˜T m
|
| 868 |
+
δ
|
| 869 |
+
is in fact completely
|
| 870 |
+
continuous. To see this, let (hn)n∈N ⊂ C+
|
| 871 |
+
b (Bm) be a bounded (by some constant
|
| 872 |
+
K > 0) sequence; using Arzel`a-Ascoli Theorem we show that it is possible to find
|
| 873 |
+
a convergent subsequence of ( ˜T m
|
| 874 |
+
δ hn)n∈N. Note that, for any n ∈ N, we get
|
| 875 |
+
∥ ˜T m
|
| 876 |
+
δ hn∥ ≤ eδ∥f∥K,
|
| 877 |
+
hence ( ˜T m
|
| 878 |
+
δ hn) is uniformly bounded. Next, let us fix some ε > 0, x ∈ Bm, and
|
| 879 |
+
(xk) ⊂ Bm such that xk → x as k → ∞. Also, to ease the notation, for any n ∈ N,
|
| 880 |
+
we set Hn(x) := 1{x∈Bm}hn(x) + 1{x/∈Bm} ˜
|
| 881 |
+
Mhn(x), x ∈ E and note that Hn are
|
| 882 |
+
measurable functions bounded by 2K uniformly in n ∈ N. Then, for any n, k ∈ N,
|
| 883 |
+
we get
|
| 884 |
+
| ˜T m
|
| 885 |
+
δ hn(x) − ˜T m
|
| 886 |
+
δ hn(xk)| ≤
|
| 887 |
+
���Ex
|
| 888 |
+
�
|
| 889 |
+
e
|
| 890 |
+
� δ
|
| 891 |
+
0 f(Xs)dsHn(Xδ)
|
| 892 |
+
�
|
| 893 |
+
− Exk
|
| 894 |
+
�
|
| 895 |
+
e
|
| 896 |
+
� δ
|
| 897 |
+
0 f(Xs)dsHn(Xδ)
|
| 898 |
+
����
|
| 899 |
+
+ | ˜
|
| 900 |
+
M ˜P m
|
| 901 |
+
δ hn(x) − ˜
|
| 902 |
+
M ˜P m
|
| 903 |
+
δ hn(xk)|.
|
| 904 |
+
(3.3)
|
| 905 |
+
Also, using Assumption (A1), we may find k ∈ N big enough such that, for any
|
| 906 |
+
n ∈ N, we obtain
|
| 907 |
+
| ˜
|
| 908 |
+
M ˜P m
|
| 909 |
+
δ hn(x) − ˜
|
| 910 |
+
M ˜P m
|
| 911 |
+
δ hn(xk)| ≤ eδ∥f∥K sup
|
| 912 |
+
ξ∈U
|
| 913 |
+
|ec(x,ξ) − ec(xk,ξ)| ≤ ε
|
| 914 |
+
2.
|
| 915 |
+
(3.4)
|
| 916 |
+
|
| 917 |
+
10 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 918 |
+
Next, note that for any u ∈ (0, δ) and n, k ∈ N, we get
|
| 919 |
+
����Ex
|
| 920 |
+
�
|
| 921 |
+
e
|
| 922 |
+
� δ
|
| 923 |
+
0 f(Xs)dsHn(Xδ)
|
| 924 |
+
�
|
| 925 |
+
− Exk
|
| 926 |
+
�
|
| 927 |
+
e
|
| 928 |
+
� δ
|
| 929 |
+
0 f(Xs)dsHn(Xδ)
|
| 930 |
+
����
|
| 931 |
+
≤
|
| 932 |
+
���Ex
|
| 933 |
+
��
|
| 934 |
+
e
|
| 935 |
+
� δ
|
| 936 |
+
0 f(Xs)ds − e
|
| 937 |
+
� δ
|
| 938 |
+
u f(Xs)ds�
|
| 939 |
+
Hn(Xδ)
|
| 940 |
+
����
|
| 941 |
+
+
|
| 942 |
+
���Exk
|
| 943 |
+
��
|
| 944 |
+
e
|
| 945 |
+
� δ
|
| 946 |
+
0 f(Xs)ds − e
|
| 947 |
+
� δ
|
| 948 |
+
u f(Xs)ds�
|
| 949 |
+
Hn(Xδ)
|
| 950 |
+
����
|
| 951 |
+
+
|
| 952 |
+
���Exk
|
| 953 |
+
�
|
| 954 |
+
e
|
| 955 |
+
� δ
|
| 956 |
+
u f(Xs)dsHn(Xδ)
|
| 957 |
+
�
|
| 958 |
+
− Ex
|
| 959 |
+
�
|
| 960 |
+
e
|
| 961 |
+
� δ
|
| 962 |
+
u f(Xs)dsHn(Xδ)
|
| 963 |
+
���� .
|
| 964 |
+
(3.5)
|
| 965 |
+
Also, using the inequality |ey − ez| ≤ emax(y,z)|y − z|, y, z ∈ R, we may find u > 0
|
| 966 |
+
small enough such that, for any n, k ∈ N, we get
|
| 967 |
+
���Exk
|
| 968 |
+
��
|
| 969 |
+
e
|
| 970 |
+
� δ
|
| 971 |
+
0 f(Xs)ds − e
|
| 972 |
+
� δ
|
| 973 |
+
u f(Xs)ds�
|
| 974 |
+
Hn(Xδ)
|
| 975 |
+
���� ≤ 2Keδ∥f∥u∥f∥ ≤ ε
|
| 976 |
+
6.
|
| 977 |
+
(3.6)
|
| 978 |
+
Next, setting F u
|
| 979 |
+
n (x) := Ex
|
| 980 |
+
�
|
| 981 |
+
e
|
| 982 |
+
� δ−u
|
| 983 |
+
0
|
| 984 |
+
f(Xs)dsHn(Xδ−u)
|
| 985 |
+
�
|
| 986 |
+
, n ∈ N, x ∈ E, and using the
|
| 987 |
+
Markov property combined with Assumption (A2), we may find k ∈ N big enough
|
| 988 |
+
such that for any n ∈ N, we get
|
| 989 |
+
���Exk
|
| 990 |
+
�
|
| 991 |
+
e
|
| 992 |
+
� δ
|
| 993 |
+
u f(Xs)dsHn(Xδ)
|
| 994 |
+
�
|
| 995 |
+
− Ex
|
| 996 |
+
�
|
| 997 |
+
e
|
| 998 |
+
� δ
|
| 999 |
+
u f(Xs)dsHn(Xδ)
|
| 1000 |
+
����
|
| 1001 |
+
= |Exk[F u
|
| 1002 |
+
n (Xu)] − Ex[F u
|
| 1003 |
+
n (Xu)]|
|
| 1004 |
+
≤ 2Keδ∥f∥ sup
|
| 1005 |
+
A∈E
|
| 1006 |
+
|Pu(xk, A) − Pu(x, A)| ≤ ε
|
| 1007 |
+
6.
|
| 1008 |
+
Thus, recalling (3.5)–(3.6), we get that for k ∈ N big enough and any n ∈ N,
|
| 1009 |
+
we get
|
| 1010 |
+
���Ex
|
| 1011 |
+
�
|
| 1012 |
+
e
|
| 1013 |
+
� δ
|
| 1014 |
+
0 f(Xs)dsHn(Xδ)
|
| 1015 |
+
�
|
| 1016 |
+
− Exk
|
| 1017 |
+
�
|
| 1018 |
+
e
|
| 1019 |
+
� δ
|
| 1020 |
+
0 f(Xs)dsHn(Xδ)
|
| 1021 |
+
���� ≤
|
| 1022 |
+
ε
|
| 1023 |
+
2. This combined
|
| 1024 |
+
with (3.3)–(3.4) shows | ˜T m
|
| 1025 |
+
δ hn(x) − ˜T m
|
| 1026 |
+
δ hn(xk)| ≤ ε for k ∈ N big enough and any
|
| 1027 |
+
n ∈ N, which proves the equicontinuity of the family ( ˜T m
|
| 1028 |
+
δ hn)n∈N. Consequently,
|
| 1029 |
+
using Arzel`a-Ascoli, we may find a uniformly (in x ∈ Bm) convergent subsequence
|
| 1030 |
+
of ( ˜T m
|
| 1031 |
+
δ hn)n∈N and the operator ˜T m
|
| 1032 |
+
δ
|
| 1033 |
+
is completely continuous.
|
| 1034 |
+
Thus, using the
|
| 1035 |
+
Krein-Rutman theorem we conclude that there exists a constant ˜λm
|
| 1036 |
+
δ
|
| 1037 |
+
> 0 and a
|
| 1038 |
+
non-zero map hm
|
| 1039 |
+
δ ∈ C+
|
| 1040 |
+
b (Bm) such that
|
| 1041 |
+
˜T m
|
| 1042 |
+
δ hm
|
| 1043 |
+
δ (x) = ˜λm
|
| 1044 |
+
δ hm
|
| 1045 |
+
δ (x),
|
| 1046 |
+
x ∈ Bm.
|
| 1047 |
+
(3.7)
|
| 1048 |
+
After a possible normalisation, we assume that supξ∈U hm
|
| 1049 |
+
δ (ξ) = 1.
|
| 1050 |
+
Let us now show that hm
|
| 1051 |
+
δ (x) > 0, x ∈ Bm. To see this, let us define D :=
|
| 1052 |
+
e−δ∥f∥ 1
|
| 1053 |
+
˜λm
|
| 1054 |
+
δ
|
| 1055 |
+
and let Oh ⊂ Bm be an open set such that
|
| 1056 |
+
inf
|
| 1057 |
+
x∈Oh hm
|
| 1058 |
+
δ (x) > 0;
|
| 1059 |
+
(3.8)
|
| 1060 |
+
note that this set exists thanks to the continuity of hm
|
| 1061 |
+
δ
|
| 1062 |
+
and the fact that hm
|
| 1063 |
+
δ
|
| 1064 |
+
is
|
| 1065 |
+
non-zero. Next, using (3.7), we have
|
| 1066 |
+
hm
|
| 1067 |
+
δ (x) ≥ DEx
|
| 1068 |
+
�
|
| 1069 |
+
1{Xδ∈Oh}hm
|
| 1070 |
+
δ (Xδ) + 1{Xδ∈Bm\Oh}hm
|
| 1071 |
+
δ (Xδ)
|
| 1072 |
+
�
|
| 1073 |
+
,
|
| 1074 |
+
x ∈ Bm.
|
| 1075 |
+
|
| 1076 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 11
|
| 1077 |
+
Then, for any n ∈ N, we inductively get
|
| 1078 |
+
hm
|
| 1079 |
+
δ (x) ≥ DEx[1{Xδ∈Oh}hm
|
| 1080 |
+
δ (Xδ)]
|
| 1081 |
+
+
|
| 1082 |
+
n
|
| 1083 |
+
�
|
| 1084 |
+
i=2
|
| 1085 |
+
DiEx
|
| 1086 |
+
�
|
| 1087 |
+
1{Xδ∈Bm\Oh,X2δ∈Bm\Oh,...,X(i−1)δ∈Bm\Oh,Xiδ∈Oh}hm
|
| 1088 |
+
δ (Xiδ)
|
| 1089 |
+
�
|
| 1090 |
+
+ DnEx
|
| 1091 |
+
�
|
| 1092 |
+
1{Xδ∈Bm\Oh,X2δ∈Bm\Oh,...,Xiδ∈Bm\Oh}hm
|
| 1093 |
+
δ (Xnδ)
|
| 1094 |
+
�
|
| 1095 |
+
, x ∈ Bm.
|
| 1096 |
+
Thus, letting n → ∞ and using Assumption (A4) combined with (3.8), we show
|
| 1097 |
+
hm
|
| 1098 |
+
δ (x) > 0 for any x ∈ Bm.
|
| 1099 |
+
Next, we define wm
|
| 1100 |
+
δ (x) := ln hm
|
| 1101 |
+
δ (x), x ∈ Bm, and λm
|
| 1102 |
+
δ
|
| 1103 |
+
:=
|
| 1104 |
+
1
|
| 1105 |
+
δ ln ˜λm
|
| 1106 |
+
δ .
|
| 1107 |
+
Thus,
|
| 1108 |
+
from (3.7), we get that the pair (wm
|
| 1109 |
+
δ , λm
|
| 1110 |
+
δ ) satisfies
|
| 1111 |
+
˜T m
|
| 1112 |
+
δ ewm
|
| 1113 |
+
δ (x) = eδλm
|
| 1114 |
+
δ ewm
|
| 1115 |
+
δ (x),
|
| 1116 |
+
x ∈ Bm,
|
| 1117 |
+
and
|
| 1118 |
+
sup
|
| 1119 |
+
ξ∈U
|
| 1120 |
+
wm
|
| 1121 |
+
δ (ξ) = 0.
|
| 1122 |
+
In fact, using Assumption (A1) and the argument from Theorem 3.1 in [15], we
|
| 1123 |
+
have
|
| 1124 |
+
wm
|
| 1125 |
+
δ (x) = max
|
| 1126 |
+
�
|
| 1127 |
+
ln Ex
|
| 1128 |
+
�
|
| 1129 |
+
e
|
| 1130 |
+
� δ
|
| 1131 |
+
0 (f(Xs)−λm
|
| 1132 |
+
δ )ds+1{Xδ∈Bm}wm
|
| 1133 |
+
δ (Xδ)+1{Xδ /
|
| 1134 |
+
∈Bm}Mwm
|
| 1135 |
+
δ (Xδ)�
|
| 1136 |
+
,
|
| 1137 |
+
Mwm
|
| 1138 |
+
δ (x)
|
| 1139 |
+
�
|
| 1140 |
+
,
|
| 1141 |
+
x ∈ Bm.
|
| 1142 |
+
Finally, we extend the definition of wm
|
| 1143 |
+
δ to the full space E by setting
|
| 1144 |
+
wm
|
| 1145 |
+
δ (x) := Mwm
|
| 1146 |
+
δ (x),
|
| 1147 |
+
x /∈ Bm;
|
| 1148 |
+
note that the definition is correct since, at the right-hand side, we need to evaluate
|
| 1149 |
+
wm
|
| 1150 |
+
δ only at the points from U ⊂ B0 ⊂ Bm and this map is already defined there.
|
| 1151 |
+
□
|
| 1152 |
+
As we show now, Equation (3.2) may be linked to a specific martingale charac-
|
| 1153 |
+
terisation.
|
| 1154 |
+
Proposition 3.2. Let (wm
|
| 1155 |
+
δ , λm
|
| 1156 |
+
δ ) be a solution to (3.2). Then, for any x ∈ Bm, we
|
| 1157 |
+
get that the process
|
| 1158 |
+
zm
|
| 1159 |
+
δ (n) := e
|
| 1160 |
+
� (nδ)∧τBm
|
| 1161 |
+
0
|
| 1162 |
+
(f(Xs)−λm
|
| 1163 |
+
δ )ds+wm
|
| 1164 |
+
δ (X(nδ)∧τBm ),
|
| 1165 |
+
n ≥ 0,
|
| 1166 |
+
is a Px-supermartingale. Also, the process
|
| 1167 |
+
zm
|
| 1168 |
+
δ (n ∧ (ˆτ m
|
| 1169 |
+
δ /δ)),
|
| 1170 |
+
n ∈ N,
|
| 1171 |
+
is a Px-martingale, where ˆτ m
|
| 1172 |
+
δ := δ inf{k ∈ N: wm
|
| 1173 |
+
δ (Xkδ) = Mwm
|
| 1174 |
+
δ (Xkδ)}.
|
| 1175 |
+
Proof. To ease the notation, we show the proof only for δ = 1; the general case
|
| 1176 |
+
follows the same logic. Let us fix m, n ∈ N and x ∈ Bm. Then, using the fact
|
| 1177 |
+
wm
|
| 1178 |
+
1 (y) = Mwm
|
| 1179 |
+
1 (y), x /∈ Bm, and the inequality
|
| 1180 |
+
ewm
|
| 1181 |
+
1 (y) ≥ Ey
|
| 1182 |
+
�
|
| 1183 |
+
e
|
| 1184 |
+
� 1
|
| 1185 |
+
0 (f(Xs)−λm
|
| 1186 |
+
1 )ds+1{X1∈Bm}wm
|
| 1187 |
+
1 (X1)+1{X1 /
|
| 1188 |
+
∈Bm}Mwm
|
| 1189 |
+
1 (X1)�
|
| 1190 |
+
,
|
| 1191 |
+
y ∈ Bm,
|
| 1192 |
+
|
| 1193 |
+
12 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 1194 |
+
we have
|
| 1195 |
+
Ex[zm
|
| 1196 |
+
1 (n + 1)|Fn]
|
| 1197 |
+
= 1{τBm≤n}e
|
| 1198 |
+
� τBm
|
| 1199 |
+
0
|
| 1200 |
+
(f(Xs)−λm
|
| 1201 |
+
1 )ds+wm
|
| 1202 |
+
1 (XτBm )
|
| 1203 |
+
+ 1{τBm>n}e
|
| 1204 |
+
� n
|
| 1205 |
+
0 (f(Xs)−λm
|
| 1206 |
+
1 )ds×
|
| 1207 |
+
× EXn[e
|
| 1208 |
+
� n+1
|
| 1209 |
+
n
|
| 1210 |
+
(f(Xs)−λm
|
| 1211 |
+
1 )ds+1{X1∈Bm}wm
|
| 1212 |
+
1 (X1)+1{X1 /
|
| 1213 |
+
∈Bm}wm
|
| 1214 |
+
1 (X1)|Fn]
|
| 1215 |
+
= 1{τBm≤n}e
|
| 1216 |
+
� n∧τBm
|
| 1217 |
+
0
|
| 1218 |
+
(f(Xs)−λm
|
| 1219 |
+
1 )ds+wm
|
| 1220 |
+
1 (Xn∧τBm )
|
| 1221 |
+
+ 1{τBm>n}e
|
| 1222 |
+
� n∧τBm
|
| 1223 |
+
0
|
| 1224 |
+
(f(Xs)−λm
|
| 1225 |
+
1 )ds×
|
| 1226 |
+
× EXn[e
|
| 1227 |
+
� n+1
|
| 1228 |
+
n
|
| 1229 |
+
(f(Xs)−λm
|
| 1230 |
+
1 )ds+1{X1∈Bm}wm
|
| 1231 |
+
1 (X1)+1{X1 /
|
| 1232 |
+
∈Bm}Mwm
|
| 1233 |
+
1 (X1)|Fn]
|
| 1234 |
+
≤ e
|
| 1235 |
+
� n∧τBm
|
| 1236 |
+
0
|
| 1237 |
+
(f(Xs)−λm
|
| 1238 |
+
1 )ds+wm
|
| 1239 |
+
1 (Xn∧τBm ) = zm
|
| 1240 |
+
1 (n),
|
| 1241 |
+
which shows the supermartingale property of (zm
|
| 1242 |
+
1 (n)). Next, note that on the set
|
| 1243 |
+
{τBm ∧ ˆτ m
|
| 1244 |
+
1 > n} we get
|
| 1245 |
+
ewm
|
| 1246 |
+
1 (Xn) = EXn
|
| 1247 |
+
�
|
| 1248 |
+
e
|
| 1249 |
+
� 1
|
| 1250 |
+
0 (f(Xs)−λm
|
| 1251 |
+
1 )ds+1{X1∈Bm}wm
|
| 1252 |
+
1 (X1)+1{X1 /
|
| 1253 |
+
∈Bm}Mwm
|
| 1254 |
+
1 (X1)�
|
| 1255 |
+
.
|
| 1256 |
+
Thus, we have
|
| 1257 |
+
Ex[zm
|
| 1258 |
+
1 ((n + 1) ∧ ˆτ m
|
| 1259 |
+
1 )|Fn]
|
| 1260 |
+
= 1{τBm∧ˆτ m
|
| 1261 |
+
1 ≤n}e
|
| 1262 |
+
� τBm ∧ˆτm
|
| 1263 |
+
1
|
| 1264 |
+
0
|
| 1265 |
+
(f(Xs)−λm
|
| 1266 |
+
1 )ds+wm
|
| 1267 |
+
1 (XτBm ∧ˆτm
|
| 1268 |
+
1 )
|
| 1269 |
+
+ 1{τBm∧ˆτ m
|
| 1270 |
+
1 >n}e
|
| 1271 |
+
� n
|
| 1272 |
+
0 (f(Xs)−λm
|
| 1273 |
+
1 )ds×
|
| 1274 |
+
× EXn[e
|
| 1275 |
+
� n+1
|
| 1276 |
+
n
|
| 1277 |
+
(f(Xs)−λm
|
| 1278 |
+
1 )ds+1{X1∈Bm}wm
|
| 1279 |
+
1 (X1)+1{X1 /
|
| 1280 |
+
∈Bm}Mwm
|
| 1281 |
+
1 (X1)|Fn]
|
| 1282 |
+
= e
|
| 1283 |
+
� n∧τBm ∧ˆτm
|
| 1284 |
+
1
|
| 1285 |
+
0
|
| 1286 |
+
(f(Xs)−λm
|
| 1287 |
+
1 )ds+wm
|
| 1288 |
+
1 (Xn∧τBm ∧ˆτm
|
| 1289 |
+
1 ) = zm
|
| 1290 |
+
1 (n ∧ ˆτ m
|
| 1291 |
+
1 ),
|
| 1292 |
+
which concludes the proof.
|
| 1293 |
+
□
|
| 1294 |
+
Let us denote by Vδ,m the family of impulse control strategies with impulse times
|
| 1295 |
+
in the time-grid {0, δ, 2δ, . . .} and obligatory impulses when the controlled process
|
| 1296 |
+
exits the set Bm at some multiple of δ. Using a martingale characterisation of (3.2),
|
| 1297 |
+
we get that λm
|
| 1298 |
+
δ is the optimal value of the impulse control problem with impulse
|
| 1299 |
+
strategies from Vδ,m. To show this result, we introduce a strategy ˆV := (ˆτi, ˆξi)∞
|
| 1300 |
+
i=1 ∈
|
| 1301 |
+
Vδ,m defined recursively, for i = 1, 2, . . ., by
|
| 1302 |
+
ˆτi := ˆσi ∧ τ i
|
| 1303 |
+
Bm,
|
| 1304 |
+
ˆσi := δ inf{n ≥ ˆτi−1/δ: n ∈ N, wm
|
| 1305 |
+
δ (Xi
|
| 1306 |
+
nδ) = Mwm
|
| 1307 |
+
δ (Xi
|
| 1308 |
+
nδ)},
|
| 1309 |
+
τ i
|
| 1310 |
+
Bm := δ inf{n ≥ ˆτi−1/δ: n ∈ N, Xi
|
| 1311 |
+
nδ /∈ Bm},
|
| 1312 |
+
ˆξi := arg max
|
| 1313 |
+
ξ∈U
|
| 1314 |
+
(c(Xi
|
| 1315 |
+
ˆτi, ξ) + wm
|
| 1316 |
+
δ (ξ))1{ˆτi<∞} + ξ01{ˆτi=∞},
|
| 1317 |
+
(3.9)
|
| 1318 |
+
where ˆτ0 := 0 and ξ0 ∈ U is some fixed point.
|
| 1319 |
+
Theorem 3.3. Let (wm
|
| 1320 |
+
δ , λm
|
| 1321 |
+
δ ) be a solution to (3.2). Then, for any x ∈ Bm, we get
|
| 1322 |
+
λm
|
| 1323 |
+
δ =
|
| 1324 |
+
sup
|
| 1325 |
+
V ∈Vδ,m
|
| 1326 |
+
lim inf
|
| 1327 |
+
n→∞
|
| 1328 |
+
1
|
| 1329 |
+
nδ ln E(x,V )
|
| 1330 |
+
�
|
| 1331 |
+
e
|
| 1332 |
+
� nδ
|
| 1333 |
+
0
|
| 1334 |
+
f(Ys)ds+�∞
|
| 1335 |
+
i=1 1{τi≤nδ}c(Yτ−
|
| 1336 |
+
i
|
| 1337 |
+
,ξi)�
|
| 1338 |
+
.
|
| 1339 |
+
Also, the strategy ˆV defined in (3.9) is optimal.
|
| 1340 |
+
|
| 1341 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 13
|
| 1342 |
+
Proof. The proof follows the lines of the proof of Theorem 2.3 and is omitted for
|
| 1343 |
+
brevity.
|
| 1344 |
+
□
|
| 1345 |
+
Next, we link (3.2) with an infinite horizon optimal stopping problem under the
|
| 1346 |
+
non-degeneracy assumption.
|
| 1347 |
+
Theorem 3.4. Let (wm
|
| 1348 |
+
δ , λm
|
| 1349 |
+
δ ) be a solution to (3.2) with λm
|
| 1350 |
+
δ > r(f). Then, we get
|
| 1351 |
+
that (wm
|
| 1352 |
+
δ , λm
|
| 1353 |
+
δ ) satisfies (3.1).
|
| 1354 |
+
Proof. As in the proof of Proposition 3.2, we consider only δ = 1; the general case
|
| 1355 |
+
follows the same logic.
|
| 1356 |
+
First, note that for any x ∈ Bm, n ∈ N, and τ ∈ T δ
|
| 1357 |
+
x , using Proposition 3.2 and
|
| 1358 |
+
Doob’s optional stopping theorem, we have
|
| 1359 |
+
ewm
|
| 1360 |
+
1 (x) ≥ Ex
|
| 1361 |
+
�
|
| 1362 |
+
e
|
| 1363 |
+
� n∧τ∧τBm
|
| 1364 |
+
0
|
| 1365 |
+
(f(Xs)−λm
|
| 1366 |
+
1 )ds+wm
|
| 1367 |
+
1 (Xn∧τ∧τBm )
|
| 1368 |
+
�
|
| 1369 |
+
.
|
| 1370 |
+
Also, recalling the boundedness of wm
|
| 1371 |
+
1 and Proposition A.2, and letting n → ∞,
|
| 1372 |
+
we get
|
| 1373 |
+
ewm
|
| 1374 |
+
1 (x) ≥ Ex
|
| 1375 |
+
�
|
| 1376 |
+
e
|
| 1377 |
+
� τ∧τBm
|
| 1378 |
+
0
|
| 1379 |
+
(f(Xs)−λm
|
| 1380 |
+
1 )ds+wm
|
| 1381 |
+
1 (Xτ∧τBm )
|
| 1382 |
+
�
|
| 1383 |
+
.
|
| 1384 |
+
Next, noting that wm
|
| 1385 |
+
1 (Xτ∧τBm) ≥ Mwm
|
| 1386 |
+
1 (Xτ∧τBm), and taking the supremum over
|
| 1387 |
+
τ ∈ T δ
|
| 1388 |
+
x , we get
|
| 1389 |
+
ewm
|
| 1390 |
+
1 (x) ≥ sup
|
| 1391 |
+
τ∈T δ
|
| 1392 |
+
x
|
| 1393 |
+
Ex
|
| 1394 |
+
�
|
| 1395 |
+
e
|
| 1396 |
+
� τ∧τBm
|
| 1397 |
+
0
|
| 1398 |
+
(f(Xs)−λm
|
| 1399 |
+
1 )ds+Mwm
|
| 1400 |
+
1 (Xτ∧τBm )
|
| 1401 |
+
�
|
| 1402 |
+
.
|
| 1403 |
+
Second, using again Proposition 3.2, for any x ∈ Bm and n ∈ N, we get
|
| 1404 |
+
wm
|
| 1405 |
+
1 (x) = ln Ex
|
| 1406 |
+
�
|
| 1407 |
+
e
|
| 1408 |
+
� n∧ˆτm
|
| 1409 |
+
δ ∧τBm
|
| 1410 |
+
0
|
| 1411 |
+
(f(Xs)−λm
|
| 1412 |
+
1 )ds+wm
|
| 1413 |
+
1 (Xn∧ˆτm
|
| 1414 |
+
δ
|
| 1415 |
+
∧τBm )
|
| 1416 |
+
�
|
| 1417 |
+
.
|
| 1418 |
+
Using again the boundedness of wm
|
| 1419 |
+
1 and Proposition A.2, and letting n → ∞, we
|
| 1420 |
+
get
|
| 1421 |
+
wm
|
| 1422 |
+
1 (x) = ln Ex
|
| 1423 |
+
�
|
| 1424 |
+
e
|
| 1425 |
+
� ˆτm
|
| 1426 |
+
δ ∧τBm
|
| 1427 |
+
0
|
| 1428 |
+
(f(Xs)−λm
|
| 1429 |
+
1 )ds+wm
|
| 1430 |
+
1 (Xˆτm
|
| 1431 |
+
δ
|
| 1432 |
+
∧τBm )
|
| 1433 |
+
�
|
| 1434 |
+
.
|
| 1435 |
+
In fact, noting that wm
|
| 1436 |
+
1 (Xˆτ m
|
| 1437 |
+
δ ∧τBm) = Mwm
|
| 1438 |
+
1 (Xˆτ m
|
| 1439 |
+
δ ∧τBm), we obtain
|
| 1440 |
+
wm
|
| 1441 |
+
1 (x) = ln Ex
|
| 1442 |
+
�
|
| 1443 |
+
e
|
| 1444 |
+
� ˆτm
|
| 1445 |
+
δ ∧τBm
|
| 1446 |
+
0
|
| 1447 |
+
(f(Xs)−λm
|
| 1448 |
+
1 )ds+Mwm
|
| 1449 |
+
1 (Xˆτm
|
| 1450 |
+
δ
|
| 1451 |
+
∧τBm )
|
| 1452 |
+
�
|
| 1453 |
+
,
|
| 1454 |
+
thus we get
|
| 1455 |
+
ewm
|
| 1456 |
+
1 (x) = sup
|
| 1457 |
+
τ∈T δ
|
| 1458 |
+
x
|
| 1459 |
+
Ex
|
| 1460 |
+
�
|
| 1461 |
+
e
|
| 1462 |
+
� τ∧τBm
|
| 1463 |
+
0
|
| 1464 |
+
(f(Xs)−λm
|
| 1465 |
+
1 )ds+Mwm
|
| 1466 |
+
1 (Xτ∧τBm )
|
| 1467 |
+
�
|
| 1468 |
+
.
|
| 1469 |
+
Finally, using Proposition A.4, we have
|
| 1470 |
+
ewm
|
| 1471 |
+
1 (x) = sup
|
| 1472 |
+
τ∈T δ
|
| 1473 |
+
x,b
|
| 1474 |
+
Ex
|
| 1475 |
+
�
|
| 1476 |
+
e
|
| 1477 |
+
� τ∧τBm
|
| 1478 |
+
0
|
| 1479 |
+
(f(Xs)−λm
|
| 1480 |
+
1 )ds+Mwm
|
| 1481 |
+
1 (Xτ∧τBm )
|
| 1482 |
+
�
|
| 1483 |
+
,
|
| 1484 |
+
which concludes the proof.
|
| 1485 |
+
□
|
| 1486 |
+
Remark 3.5. In Theorem 3.4 we showed that, if λm
|
| 1487 |
+
δ
|
| 1488 |
+
> r(f), a solution to the
|
| 1489 |
+
one-step equation (3.2) is uniquely characterised by the optimal stopping value
|
| 1490 |
+
function (3.1).
|
| 1491 |
+
If λm
|
| 1492 |
+
δ
|
| 1493 |
+
≤ r(f), the problem is degenerate and, in particular, we
|
| 1494 |
+
cannot use the uniform integrability result from Proposition A.2. In fact, in this
|
| 1495 |
+
|
| 1496 |
+
14 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 1497 |
+
case it is even possible that the one-step Bellman equation admits multiple solutions
|
| 1498 |
+
and the optimal stopping characterisation does not hold; see e.g. Theorem 1.13
|
| 1499 |
+
in [22] for details.
|
| 1500 |
+
4. Dyadic impulse control
|
| 1501 |
+
In this section we consider a dyadic full-domain version of (2.1). We construct
|
| 1502 |
+
a solution to the associated Bellman equation which will be later used to find
|
| 1503 |
+
a solution to (2.6).
|
| 1504 |
+
The argument uses a bounded domain approximation from
|
| 1505 |
+
Section 3. More specifically, throughout this section we fix some δ > 0 and show
|
| 1506 |
+
the existence of a function wδ ∈ Cb(E) and a constant λδ ∈ R, which are a solution
|
| 1507 |
+
to the dyadic Bellman equation of the form
|
| 1508 |
+
wδ(x) = sup
|
| 1509 |
+
τ∈T δ
|
| 1510 |
+
x,b
|
| 1511 |
+
ln Ex
|
| 1512 |
+
�
|
| 1513 |
+
e
|
| 1514 |
+
� τ
|
| 1515 |
+
0 (f(Xs)−λδ)ds+Mwδ(Xτ )�
|
| 1516 |
+
,
|
| 1517 |
+
x ��� E.
|
| 1518 |
+
(4.1)
|
| 1519 |
+
In fact, we set
|
| 1520 |
+
λδ := lim
|
| 1521 |
+
m→∞ λm
|
| 1522 |
+
δ ;
|
| 1523 |
+
(4.2)
|
| 1524 |
+
note that this constant is well-defined as, from Theorem 3.3, recalling that Bm ⊂
|
| 1525 |
+
Bm+1, we get λm
|
| 1526 |
+
δ ≤ λm+1
|
| 1527 |
+
δ
|
| 1528 |
+
, m ∈ N.
|
| 1529 |
+
First, we state the lower bound for λδ.
|
| 1530 |
+
Lemma 4.1. Let (wδ, λδ) be a solution to (4.1). Then, we get λδ ≥ r(f).
|
| 1531 |
+
Proof. The proof follows the lines of the proof of Lemma 2.1 and is omitted for
|
| 1532 |
+
brevity.
|
| 1533 |
+
□
|
| 1534 |
+
Next, we show the existence of a solution to (4.1) under the non-degeneracy
|
| 1535 |
+
assumption λδ > r(f).
|
| 1536 |
+
Theorem 4.2. Let λδ be given by (4.2) and assume that λδ > r(f). Then, there
|
| 1537 |
+
exists wδ ∈ Cb(E) such that (4.1) is satisfied and we get supξ∈U wδ(ξ) = 0.
|
| 1538 |
+
Proof. We start with some general comments and an outline of the argument. First,
|
| 1539 |
+
note that from Theorem 3.1, for any m ∈ N, we get a solution (wm
|
| 1540 |
+
δ , λm
|
| 1541 |
+
δ ) to (3.2)
|
| 1542 |
+
satisfying supξ∈U wm
|
| 1543 |
+
δ (ξ) = 0. Also, from the assumption λδ > r(f) we get λm
|
| 1544 |
+
δ >
|
| 1545 |
+
r(f) for m ∈ N sufficiently big (for simplicity, we assume that λ0
|
| 1546 |
+
δ > r(f)). Thus,
|
| 1547 |
+
using Theorem 3.4, we get that, for any m ∈ N, the pair (wm
|
| 1548 |
+
δ , λm
|
| 1549 |
+
δ ) satisfies (3.1).
|
| 1550 |
+
Second, to construct a function wδ, we use Arzel`a-Ascoli Theorem. More specif-
|
| 1551 |
+
ically, recalling that supξ∈U wm
|
| 1552 |
+
δ (ξ) = 0 and using the fact that −∥c∥ ≤ c(x, ξ) ≤ 0,
|
| 1553 |
+
x ∈ E, ξ ∈ U, for any m ∈ N and x ∈ E, we get
|
| 1554 |
+
−∥c∥ ≤ Mwm
|
| 1555 |
+
δ (x) ≤ 0.
|
| 1556 |
+
Also, note that, for any m ∈ N and x, y ∈ E, we have
|
| 1557 |
+
|Mwm
|
| 1558 |
+
δ (x) − Mwm
|
| 1559 |
+
δ (y)| ≤ sup
|
| 1560 |
+
ξ∈U
|
| 1561 |
+
|c(x, ξ) − c(y, ξ)|.
|
| 1562 |
+
Consequently, the sequence (Mwm
|
| 1563 |
+
δ )m∈N is uniformly bounded and equicontinuous.
|
| 1564 |
+
Thus, using Arzel`a-Ascoli Theorem combined with a diagonal argument, we may
|
| 1565 |
+
find a subsequence (for brevity still denoted by (Mwm
|
| 1566 |
+
δ )m∈N) and a map φδ ∈ Cb(E)
|
| 1567 |
+
such that Mwm
|
| 1568 |
+
δ (x) converges to φδ(x) as m → ∞ uniformly in x from any compact
|
| 1569 |
+
set. In fact, using Assumption (A1) and the argument from the first step of the
|
| 1570 |
+
|
| 1571 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 15
|
| 1572 |
+
proof of Theorem 4.1 in [15], we get that the convergence is uniform in x ∈ E.
|
| 1573 |
+
Then, we define
|
| 1574 |
+
wδ(x) := sup
|
| 1575 |
+
τ∈T δ
|
| 1576 |
+
x,b
|
| 1577 |
+
ln Ex
|
| 1578 |
+
�
|
| 1579 |
+
e
|
| 1580 |
+
� τ
|
| 1581 |
+
0 (f(Xs)−λδ)ds+φδ(Xτ )�
|
| 1582 |
+
,
|
| 1583 |
+
x ∈ E.
|
| 1584 |
+
(4.3)
|
| 1585 |
+
To complete the construction, we show that wm
|
| 1586 |
+
δ
|
| 1587 |
+
converges to wδ uniformly on
|
| 1588 |
+
compact sets. Indeed, in this case we have
|
| 1589 |
+
|Mwm
|
| 1590 |
+
δ (x) − Mwδ(x)| ≤ sup
|
| 1591 |
+
ξ∈U
|
| 1592 |
+
|wm
|
| 1593 |
+
δ (ξ) − wδ(ξ)| → 0,
|
| 1594 |
+
m → ∞,
|
| 1595 |
+
thus φδ ≡ Mwδ and from (4.3) we get that (4.1) is satisfied. Also, recalling that
|
| 1596 |
+
from Theorem 3.1 we get supξ∈U wm
|
| 1597 |
+
δ (ξ) = 0, m ∈ N, we also get supξ∈U wδ(ξ) = 0.
|
| 1598 |
+
Finally, to show the convergence, we define the auxiliary functions
|
| 1599 |
+
wm,1
|
| 1600 |
+
δ
|
| 1601 |
+
(x) := sup
|
| 1602 |
+
τ∈T δ
|
| 1603 |
+
x,b
|
| 1604 |
+
ln Ex
|
| 1605 |
+
�
|
| 1606 |
+
e
|
| 1607 |
+
� τ∧τBm
|
| 1608 |
+
0
|
| 1609 |
+
(f(Xs)−λm
|
| 1610 |
+
δ )ds+φδ(Xτ∧τBm )
|
| 1611 |
+
�
|
| 1612 |
+
,
|
| 1613 |
+
x ∈ E,
|
| 1614 |
+
(4.4)
|
| 1615 |
+
wm,2
|
| 1616 |
+
δ
|
| 1617 |
+
(x) := sup
|
| 1618 |
+
τ∈T δ
|
| 1619 |
+
x,b
|
| 1620 |
+
ln Ex
|
| 1621 |
+
�
|
| 1622 |
+
e
|
| 1623 |
+
� τ∧τBm
|
| 1624 |
+
0
|
| 1625 |
+
(f(Xs)−λδ)ds+φδ(Xτ∧τBm )
|
| 1626 |
+
�
|
| 1627 |
+
,
|
| 1628 |
+
x ∈ E.
|
| 1629 |
+
(4.5)
|
| 1630 |
+
We split the rest of the proof into three steps: (1) proof that |wm
|
| 1631 |
+
δ (x)−wm,1
|
| 1632 |
+
δ
|
| 1633 |
+
(x)| → 0
|
| 1634 |
+
as m → ∞ uniformly in x ∈ E; (2) proof that |wm,1
|
| 1635 |
+
δ
|
| 1636 |
+
(x) − wm,2
|
| 1637 |
+
δ
|
| 1638 |
+
(x)| → 0 as m → ∞
|
| 1639 |
+
uniformly in x ∈ E; (3) proof that |wm,2
|
| 1640 |
+
δ
|
| 1641 |
+
(x) − wδ(x)| → 0 as m → ∞ uniformly in
|
| 1642 |
+
x from compact sets.
|
| 1643 |
+
Step 1. We show |wm
|
| 1644 |
+
δ (x) − wm,1
|
| 1645 |
+
δ
|
| 1646 |
+
(x)| → 0 as m → ∞ uniformly in x ∈ E. Note
|
| 1647 |
+
that, for any x ∈ E and m ∈ N, we have
|
| 1648 |
+
wm,1
|
| 1649 |
+
δ
|
| 1650 |
+
(x) ≤ sup
|
| 1651 |
+
τ∈T δ
|
| 1652 |
+
x,b
|
| 1653 |
+
ln
|
| 1654 |
+
�
|
| 1655 |
+
Ex
|
| 1656 |
+
�
|
| 1657 |
+
e
|
| 1658 |
+
� τ∧τBm
|
| 1659 |
+
0
|
| 1660 |
+
(f(Xs)−λm
|
| 1661 |
+
δ )ds+Mwm
|
| 1662 |
+
δ (Xτ∧τBm )
|
| 1663 |
+
�
|
| 1664 |
+
e∥φδ−Mwm
|
| 1665 |
+
δ ∥
|
| 1666 |
+
�
|
| 1667 |
+
= wm
|
| 1668 |
+
δ (x) + ∥φδ − Mwm
|
| 1669 |
+
δ ∥.
|
| 1670 |
+
Similarly, we get wm
|
| 1671 |
+
δ (x) ≤ wm,1
|
| 1672 |
+
δ
|
| 1673 |
+
(x) + ∥φδ − Mwm
|
| 1674 |
+
δ ∥, thus
|
| 1675 |
+
sup
|
| 1676 |
+
x∈E
|
| 1677 |
+
|wm
|
| 1678 |
+
δ (x) − wm,1
|
| 1679 |
+
δ
|
| 1680 |
+
(x)| ≤ ∥φδ − Mwm
|
| 1681 |
+
δ ∥.
|
| 1682 |
+
Recalling the fact that φδ is a uniform limit of Mwm
|
| 1683 |
+
δ as m → ∞, we conclude the
|
| 1684 |
+
proof of this step.
|
| 1685 |
+
Step 2. We show that |wm,1
|
| 1686 |
+
δ
|
| 1687 |
+
(x) − wm,2
|
| 1688 |
+
δ
|
| 1689 |
+
(x)| → 0 as m → ∞ uniformly in x ∈ E.
|
| 1690 |
+
Recalling that λm
|
| 1691 |
+
δ ↑ λδ, we get wm,1
|
| 1692 |
+
δ
|
| 1693 |
+
(x) ≥ wm,2
|
| 1694 |
+
δ
|
| 1695 |
+
(x) ≥ −∥φδ∥, x ∈ E. Thus, using
|
| 1696 |
+
the inequality | ln y − ln z| ≤
|
| 1697 |
+
1
|
| 1698 |
+
min(y,z)|y − z|, y, z > 0, we get
|
| 1699 |
+
0 ≤ wm,1
|
| 1700 |
+
δ
|
| 1701 |
+
(x) − wm,2
|
| 1702 |
+
δ
|
| 1703 |
+
(x) ≤ e∥φδ∥(ewm,1
|
| 1704 |
+
δ
|
| 1705 |
+
(x) − ewm,2
|
| 1706 |
+
δ
|
| 1707 |
+
(x)),
|
| 1708 |
+
x ∈ E.
|
| 1709 |
+
(4.6)
|
| 1710 |
+
Then, noting that φδ(·) ≤ 0, for any m ∈ N and x ∈ E, we obtain
|
| 1711 |
+
0 ≤ ewm,1
|
| 1712 |
+
δ
|
| 1713 |
+
(x) − ewm,2
|
| 1714 |
+
δ
|
| 1715 |
+
(x) ≤ sup
|
| 1716 |
+
τ∈T δ
|
| 1717 |
+
x,b
|
| 1718 |
+
�
|
| 1719 |
+
Ex
|
| 1720 |
+
�
|
| 1721 |
+
e
|
| 1722 |
+
� τ∧τBm
|
| 1723 |
+
0
|
| 1724 |
+
(f(Xs)−λm
|
| 1725 |
+
δ )ds+φδ(Xτ∧τBm )
|
| 1726 |
+
�
|
| 1727 |
+
− Ex
|
| 1728 |
+
�
|
| 1729 |
+
e
|
| 1730 |
+
� τ∧τBm
|
| 1731 |
+
0
|
| 1732 |
+
(f(Xs)−λδ)ds+φδ(Xτ∧τBm )
|
| 1733 |
+
��
|
| 1734 |
+
≤ sup
|
| 1735 |
+
τ∈T δ
|
| 1736 |
+
x,b
|
| 1737 |
+
Ex
|
| 1738 |
+
�
|
| 1739 |
+
e
|
| 1740 |
+
� τ
|
| 1741 |
+
0 f(Xs)ds �
|
| 1742 |
+
e−λm
|
| 1743 |
+
δ τ − e−λδτ��
|
| 1744 |
+
.
|
| 1745 |
+
(4.7)
|
| 1746 |
+
|
| 1747 |
+
16 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 1748 |
+
Also, recalling that λ0
|
| 1749 |
+
δ ≤ λm
|
| 1750 |
+
δ ≤ λδ, m ∈ N, for any x ∈ E and T ≥ 0, we get
|
| 1751 |
+
0 ≤ sup
|
| 1752 |
+
τ∈Tx,b
|
| 1753 |
+
Ex
|
| 1754 |
+
�
|
| 1755 |
+
e
|
| 1756 |
+
� τ
|
| 1757 |
+
0 f(Xs)ds �
|
| 1758 |
+
e−λm
|
| 1759 |
+
δ τ − eλδτ��
|
| 1760 |
+
≤ sup
|
| 1761 |
+
τ∈Tx,b
|
| 1762 |
+
Ex
|
| 1763 |
+
��
|
| 1764 |
+
1{τ≤T } + 1{τ>T }
|
| 1765 |
+
�
|
| 1766 |
+
e
|
| 1767 |
+
� τ
|
| 1768 |
+
0 f(Xs)ds �
|
| 1769 |
+
e−λm
|
| 1770 |
+
δ τ − e−λδτ��
|
| 1771 |
+
≤ sup
|
| 1772 |
+
τ<T
|
| 1773 |
+
τ∈Tx,b
|
| 1774 |
+
eT ∥f∥Ex
|
| 1775 |
+
��
|
| 1776 |
+
e−λm
|
| 1777 |
+
δ τ − e−λδτ��
|
| 1778 |
+
+ sup
|
| 1779 |
+
τ≥T
|
| 1780 |
+
τ∈Tx,b
|
| 1781 |
+
Ex
|
| 1782 |
+
�
|
| 1783 |
+
e
|
| 1784 |
+
� τ
|
| 1785 |
+
0 (f(Xs)−λ0
|
| 1786 |
+
δ)ds�
|
| 1787 |
+
.
|
| 1788 |
+
(4.8)
|
| 1789 |
+
Recalling λ0
|
| 1790 |
+
δ > r(f) and using Lemma A.1, for any ε > 0, we may find T ≥ 0, such
|
| 1791 |
+
that
|
| 1792 |
+
0 ≤ sup
|
| 1793 |
+
x∈E
|
| 1794 |
+
sup
|
| 1795 |
+
τ≥T
|
| 1796 |
+
τ∈Tx,b
|
| 1797 |
+
Ex
|
| 1798 |
+
�
|
| 1799 |
+
e
|
| 1800 |
+
� τ
|
| 1801 |
+
0 (f(Xs)−λ0
|
| 1802 |
+
δ)ds�
|
| 1803 |
+
≤ ε.
|
| 1804 |
+
Also, using the inequality |ex − ey| ≤ emax(x,y)|x − y|, x, y ≥ 0, we obtain
|
| 1805 |
+
sup
|
| 1806 |
+
τ<T
|
| 1807 |
+
Ex
|
| 1808 |
+
��
|
| 1809 |
+
e−λm
|
| 1810 |
+
δ τ − e−λδτ��
|
| 1811 |
+
≤ sup
|
| 1812 |
+
τ<T
|
| 1813 |
+
Ex
|
| 1814 |
+
�
|
| 1815 |
+
emax(−λm
|
| 1816 |
+
δ τ,−λδτ)τ(λδ − λm
|
| 1817 |
+
δ )
|
| 1818 |
+
�
|
| 1819 |
+
≤ e|λm
|
| 1820 |
+
δ |T T (λδ − λm
|
| 1821 |
+
δ ).
|
| 1822 |
+
(4.9)
|
| 1823 |
+
Thus, for fixed T ≥ 0, we find m ≥ 0, such that e|λm
|
| 1824 |
+
δ |T T (λδ − λm
|
| 1825 |
+
δ ) ≤ ε. Hence,
|
| 1826 |
+
recalling (4.6)–(4.8), for any x ∈ E and T, m big enough, we get
|
| 1827 |
+
0 ≤ wm,1
|
| 1828 |
+
δ
|
| 1829 |
+
(x) − wm,2
|
| 1830 |
+
δ
|
| 1831 |
+
(x) ≤ e∥φδ∥2ε.
|
| 1832 |
+
Recalling that ε > 0 was arbitrary, we conclude the proof of this step.
|
| 1833 |
+
Step 3. We show that |wm,2
|
| 1834 |
+
δ
|
| 1835 |
+
(x) − wδ(x)| → 0 as m → ∞ uniformly in x from
|
| 1836 |
+
compact sets. First, we show that wm,2
|
| 1837 |
+
δ
|
| 1838 |
+
(x) ≤ wδ(x) for any m ∈ N and x ∈ E. Let
|
| 1839 |
+
ε > 0 and τ ε
|
| 1840 |
+
m ∈ T δ
|
| 1841 |
+
x,b be an ε-optimal stopping time for wm,2
|
| 1842 |
+
δ
|
| 1843 |
+
(x). Then, we get
|
| 1844 |
+
wδ(x) ≥ ln Ex
|
| 1845 |
+
�
|
| 1846 |
+
e
|
| 1847 |
+
� τεm∧τBm
|
| 1848 |
+
0
|
| 1849 |
+
(f(Xs)−λδ)ds+φδ(Xτεm∧τBm )
|
| 1850 |
+
�
|
| 1851 |
+
≥ wm,2
|
| 1852 |
+
δ
|
| 1853 |
+
(x) − ε.
|
| 1854 |
+
As ε > 0 was arbitrary, we get wm,2
|
| 1855 |
+
δ
|
| 1856 |
+
(x) ≤ wδ(x), m ∈ N, x ∈ E. In fact, using
|
| 1857 |
+
a similar argument, for any x ∈ E, we may show that the map m �→ wm,2
|
| 1858 |
+
δ
|
| 1859 |
+
(x) is
|
| 1860 |
+
non-decreasing.
|
| 1861 |
+
Second, let ε > 0 and τε ∈ T δ
|
| 1862 |
+
x,b be an ε-optimal stopping time for wδ(x). Then,
|
| 1863 |
+
we obtain
|
| 1864 |
+
0 ≤ wδ(x) − wm,2
|
| 1865 |
+
δ
|
| 1866 |
+
(x) ≤ ln Ex
|
| 1867 |
+
�
|
| 1868 |
+
e
|
| 1869 |
+
� τε
|
| 1870 |
+
0
|
| 1871 |
+
(f(Xs)−λδ)ds+φδ(Xτε )�
|
| 1872 |
+
+ ε
|
| 1873 |
+
− ln Ex
|
| 1874 |
+
�
|
| 1875 |
+
e
|
| 1876 |
+
� τε∧τBm
|
| 1877 |
+
0
|
| 1878 |
+
(f(Xs)−λδ)ds+φδ(Xτε∧τBm )
|
| 1879 |
+
�
|
| 1880 |
+
.
|
| 1881 |
+
(4.10)
|
| 1882 |
+
Noting that τBm ↑ +∞ as m → ∞ and using the quasi left-continuity of X combined
|
| 1883 |
+
with Lemma A.2 and the boundedness of φδ, we get
|
| 1884 |
+
lim
|
| 1885 |
+
m→∞ Ex
|
| 1886 |
+
�
|
| 1887 |
+
e
|
| 1888 |
+
� τε∧τBm
|
| 1889 |
+
0
|
| 1890 |
+
(f(Xs)−λδ)ds+φδ(Xτε∧τBm )
|
| 1891 |
+
�
|
| 1892 |
+
= Ex
|
| 1893 |
+
�
|
| 1894 |
+
e
|
| 1895 |
+
� τε
|
| 1896 |
+
0
|
| 1897 |
+
(f(Xs)−λδ)ds+φδ(Xτε )�
|
| 1898 |
+
.
|
| 1899 |
+
Thus, using (4.10) and recalling that ε > 0 was arbitrary, we get limm→∞ wm,2
|
| 1900 |
+
δ
|
| 1901 |
+
(x) =
|
| 1902 |
+
wδ(x). Also, noting that by Proposition A.3 and Proposition A.4, the maps x �→
|
| 1903 |
+
|
| 1904 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 17
|
| 1905 |
+
wδ(x) and x �→ wm,2
|
| 1906 |
+
δ
|
| 1907 |
+
(x) are continuous, and using the monotonicity of m �→
|
| 1908 |
+
wm,2
|
| 1909 |
+
δ
|
| 1910 |
+
(x), from Dini’s Theorem we get that wm,2
|
| 1911 |
+
δ
|
| 1912 |
+
(x) converges to wδ(x) uniformly
|
| 1913 |
+
in x from compact sets, which concludes the proof.
|
| 1914 |
+
□
|
| 1915 |
+
We conclude this section with a verification result related to (4.1).
|
| 1916 |
+
Theorem 4.3. Let (wδ, λδ) be a solution to (4.1) with λδ > r(f). Then, we get
|
| 1917 |
+
λδ := sup
|
| 1918 |
+
V ∈Vδ lim inf
|
| 1919 |
+
n→∞
|
| 1920 |
+
1
|
| 1921 |
+
n ln E(x,V )
|
| 1922 |
+
�
|
| 1923 |
+
e
|
| 1924 |
+
� nδ
|
| 1925 |
+
0
|
| 1926 |
+
f(Ys)ds+�∞
|
| 1927 |
+
i=1 1{τi≤nδ}c(Yτ−
|
| 1928 |
+
i
|
| 1929 |
+
,ξi)�
|
| 1930 |
+
,
|
| 1931 |
+
where Vδ is a family of impulse control strategies with impulse times on the dyadic
|
| 1932 |
+
time-grid {0, δ, 2δ, . . .}.
|
| 1933 |
+
Proof. The proof follows the lines of the proof of Theorem 2.3 and is omitted for
|
| 1934 |
+
brevity.
|
| 1935 |
+
□
|
| 1936 |
+
5. Existence of a solution to the Bellman equation
|
| 1937 |
+
In this section we construct a solution (w, λ) to (2.6), which together with The-
|
| 1938 |
+
orem 2.3 provides a solution to (2.1). The argument uses a dyadic approximation
|
| 1939 |
+
and the results from Section 4. More specifically, we consider a family of dyadic
|
| 1940 |
+
time steps δk :=
|
| 1941 |
+
1
|
| 1942 |
+
2k , k ∈ N. First, we specify the value of λ. In fact, we define
|
| 1943 |
+
λ := lim inf
|
| 1944 |
+
k→∞ λδk,
|
| 1945 |
+
(5.1)
|
| 1946 |
+
where λδk is a constant given by (4.2), corresponding to δk. Note that, if for some
|
| 1947 |
+
k0 ∈ N we get λδk0 > r(f), then using Theorem 4.3, we get that λδk ≤ λδk+1,
|
| 1948 |
+
k ≥ k0, and the limit inferior could be replaced by the usual limit.
|
| 1949 |
+
Theorem 5.1. Let λ be given by (5.1) and assume that λ > r(f). Then, there
|
| 1950 |
+
exists w ∈ Cb(E) such that (2.6) is satisfied.
|
| 1951 |
+
Proof. The argument is partially based on the one used in Theorem 4.2 thus we
|
| 1952 |
+
discuss only the main points. From the fact that λ > r(f) we get λδk > r(f) for
|
| 1953 |
+
sufficiently big k ∈ N; to simplify the notation, we assume λδ0 > r(f). Thus, using
|
| 1954 |
+
Theorem 4.2, for any k ∈ N, we get the existence of a map wδk ∈ Cb(E) satisfying
|
| 1955 |
+
wδk(x) = sup
|
| 1956 |
+
τ∈T
|
| 1957 |
+
δk
|
| 1958 |
+
x,b
|
| 1959 |
+
ln Ex
|
| 1960 |
+
�
|
| 1961 |
+
e
|
| 1962 |
+
� τ
|
| 1963 |
+
0 (f(Xs)−λδk )ds+Mwδk (Xτ )�
|
| 1964 |
+
,
|
| 1965 |
+
x ∈ E
|
| 1966 |
+
and such that supξ∈U wδk(ξ) = 0. Thus, we get
|
| 1967 |
+
−∥c∥ ≤ Mwδk(x) ≤ 0,
|
| 1968 |
+
k ∈ N, x ∈ E,
|
| 1969 |
+
and the family (Mwδk)k∈N is uniformly bounded. Also, it is equicontinuous as we
|
| 1970 |
+
have
|
| 1971 |
+
|Mwδk(x) − Mwδk(y)| ≤ sup
|
| 1972 |
+
x∈U
|
| 1973 |
+
|c(x, ξ) − c(y, ξ)|,
|
| 1974 |
+
x, y ∈ E.
|
| 1975 |
+
Thus, using Arzel`a-Ascoli theorem, we may choose a subsequence (for brevity still
|
| 1976 |
+
denoted by (Mwδk)), such that (Mwδk) converges uniformly on compact sets to
|
| 1977 |
+
some map φ. In fact, using Assumption (A1) and the argument from the first step
|
| 1978 |
+
of the proof of Theorem 4.1 from [15], we get that Mwδk(x) converges to φ(x) as
|
| 1979 |
+
k → ∞ uniformly in x ∈ E. Next, let us define
|
| 1980 |
+
w(x) := sup
|
| 1981 |
+
τ∈Tx,b
|
| 1982 |
+
ln Ex
|
| 1983 |
+
�
|
| 1984 |
+
e
|
| 1985 |
+
� τ
|
| 1986 |
+
0 (f(Xs)−λ)ds+φ(Xτ )�
|
| 1987 |
+
,
|
| 1988 |
+
x ∈ E.
|
| 1989 |
+
(5.2)
|
| 1990 |
+
|
| 1991 |
+
18 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 1992 |
+
In the following, we show that wδk converges to w uniformly in compact sets as
|
| 1993 |
+
k → ∞. Then, we get that Mwδk converges to Mw, hence Mw ≡ φ and (2.6) is
|
| 1994 |
+
satisfied.
|
| 1995 |
+
To show the convergence, we define
|
| 1996 |
+
w1
|
| 1997 |
+
δk(x) := sup
|
| 1998 |
+
τ∈T
|
| 1999 |
+
δk
|
| 2000 |
+
x,b
|
| 2001 |
+
ln Ex
|
| 2002 |
+
�
|
| 2003 |
+
e
|
| 2004 |
+
� τ
|
| 2005 |
+
0 (f(Xs)−λδk)ds+φ(Xτ )�
|
| 2006 |
+
,
|
| 2007 |
+
k ∈ N, x ∈ E.
|
| 2008 |
+
In the following, we show that |w(x) − w1
|
| 2009 |
+
δk(x)| → 0 and |w1
|
| 2010 |
+
δk(x) − wδk(x)| → 0 as
|
| 2011 |
+
k → ∞ uniformly in x from compact sets. In fact, to show the first convergence,
|
| 2012 |
+
we note that
|
| 2013 |
+
w0
|
| 2014 |
+
δk(x) ≤ w1
|
| 2015 |
+
δk(x) ≤ w2
|
| 2016 |
+
δk(x),
|
| 2017 |
+
k ∈ N, x ∈ E,
|
| 2018 |
+
where
|
| 2019 |
+
w0
|
| 2020 |
+
δk(x) := sup
|
| 2021 |
+
τ∈T
|
| 2022 |
+
δk
|
| 2023 |
+
x,b
|
| 2024 |
+
ln Ex
|
| 2025 |
+
�
|
| 2026 |
+
e
|
| 2027 |
+
� τ
|
| 2028 |
+
0 (f(Xs)−λ)ds+φ(Xτ )�
|
| 2029 |
+
,
|
| 2030 |
+
k ∈ N, x ∈ E,
|
| 2031 |
+
w2
|
| 2032 |
+
δk(x) := sup
|
| 2033 |
+
τ∈Tx,b
|
| 2034 |
+
ln Ex
|
| 2035 |
+
�
|
| 2036 |
+
e
|
| 2037 |
+
� τ
|
| 2038 |
+
0 (f(Xs)−λδk )ds+φ(Xτ )�
|
| 2039 |
+
,
|
| 2040 |
+
k ∈ N, x ∈ E.
|
| 2041 |
+
Thus, to prove |w(x) − w1
|
| 2042 |
+
δk(x)| → 0 it is enough to show |w(x) − w0
|
| 2043 |
+
δk(x)| → 0 and
|
| 2044 |
+
|w(x) − w2
|
| 2045 |
+
δk(x)| → 0 as k → ∞.
|
| 2046 |
+
For transparency, we split the rest of the proof into three parts: (1) proof that
|
| 2047 |
+
|w(x) − w0
|
| 2048 |
+
δk(x)| → 0 as k → ∞ uniformly in x from compact sets; (2) proof that
|
| 2049 |
+
|w(x) − w2
|
| 2050 |
+
δk(x)| → 0 as k → ∞ uniformly in x ∈ E; (3) proof that |w1
|
| 2051 |
+
δk(x) −
|
| 2052 |
+
wδk(x)| → 0 as k → ∞ uniformly in x ∈ E.
|
| 2053 |
+
Step 1. We show that |w(x) − w0
|
| 2054 |
+
δk(x)| → 0 as k → ∞ as k → ∞ uniformly in x
|
| 2055 |
+
from compact sets. First, note that we have w0
|
| 2056 |
+
δk(x) ≤ w(x), k ∈ N, x ∈ E. Next,
|
| 2057 |
+
for any x ∈ E and ε > 0, let τε ∈ Tx,b be an ε-optimal stopping time for w(x) and
|
| 2058 |
+
let τ k
|
| 2059 |
+
ε be its T δk
|
| 2060 |
+
x,b approximation given by
|
| 2061 |
+
τ k
|
| 2062 |
+
ε := inf
|
| 2063 |
+
�
|
| 2064 |
+
τ ∈ T δk
|
| 2065 |
+
x,b : τ ≥ τε
|
| 2066 |
+
�
|
| 2067 |
+
=
|
| 2068 |
+
∞
|
| 2069 |
+
�
|
| 2070 |
+
j=1
|
| 2071 |
+
1{ j−1
|
| 2072 |
+
2k <τε≤
|
| 2073 |
+
j
|
| 2074 |
+
2m }
|
| 2075 |
+
j
|
| 2076 |
+
2k .
|
| 2077 |
+
Then, we get
|
| 2078 |
+
0 ≤ w(x) − w0
|
| 2079 |
+
δk(x)
|
| 2080 |
+
≤ Ex
|
| 2081 |
+
�
|
| 2082 |
+
e
|
| 2083 |
+
� τε
|
| 2084 |
+
0
|
| 2085 |
+
(f(Xs)−λ)ds+φ(Xτε )�
|
| 2086 |
+
− Ex
|
| 2087 |
+
�
|
| 2088 |
+
e
|
| 2089 |
+
� τk
|
| 2090 |
+
ε
|
| 2091 |
+
0
|
| 2092 |
+
(f(Xs)−λ)ds+φ(Xτk
|
| 2093 |
+
ε )
|
| 2094 |
+
�
|
| 2095 |
+
+ ε.
|
| 2096 |
+
Also, using Proposition A.2 and letting k → ∞, we have
|
| 2097 |
+
lim
|
| 2098 |
+
k→∞ Ex
|
| 2099 |
+
�
|
| 2100 |
+
e
|
| 2101 |
+
� τk
|
| 2102 |
+
ε
|
| 2103 |
+
0
|
| 2104 |
+
(f(Xs)−λ)ds+φ(Xτk
|
| 2105 |
+
ε )
|
| 2106 |
+
�
|
| 2107 |
+
= Ex
|
| 2108 |
+
�
|
| 2109 |
+
e
|
| 2110 |
+
� τε
|
| 2111 |
+
0
|
| 2112 |
+
(f(Xs)−λ)ds+φ(Xτε )�
|
| 2113 |
+
.
|
| 2114 |
+
Consequently, recalling that ε > 0 was arbitrary, we obtain limk→∞ w0
|
| 2115 |
+
δk(x) =
|
| 2116 |
+
w(x) for any x ∈ E.
|
| 2117 |
+
In fact, using the monotonicity of the sequence (w0
|
| 2118 |
+
δk)k∈N
|
| 2119 |
+
combined with Proposition A.3, Proposition A.4, and Dini’s theorem, we get that
|
| 2120 |
+
the convergence is uniform on compact sets, which concludes the proof of this step.
|
| 2121 |
+
|
| 2122 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 19
|
| 2123 |
+
Step 2. We show that |w(x) − w2
|
| 2124 |
+
δk(x)| → 0 as k → ∞ uniformly in x ∈ E.
|
| 2125 |
+
First, note that −∥φ∥ ≤ w(x) ≤ w2
|
| 2126 |
+
δk(x), k ∈ N, x ∈ E. Thus, using the inequality
|
| 2127 |
+
| ln y − ln z| ≤
|
| 2128 |
+
1
|
| 2129 |
+
min(y,z)|y − z|, y, z > 0, we get
|
| 2130 |
+
0 ≤ w2
|
| 2131 |
+
δk(x) − w(x) ≤ e∥φ∥(ew2
|
| 2132 |
+
δk (x) − ew(x)),
|
| 2133 |
+
k ∈ N, x ∈ E.
|
| 2134 |
+
Also, recalling that φ(·) ≤ 0, for any k ∈ N and x ∈ E, we obtain
|
| 2135 |
+
0 ≤ ew2
|
| 2136 |
+
δk (x) − ew(x) ≤ sup
|
| 2137 |
+
τ∈Tx,b
|
| 2138 |
+
Ex
|
| 2139 |
+
�
|
| 2140 |
+
e
|
| 2141 |
+
� τ
|
| 2142 |
+
0 f(Xs)ds �
|
| 2143 |
+
e−λδkτ − e−λτ��
|
| 2144 |
+
.
|
| 2145 |
+
Thus, repeating the argument from the second step of the proof of Theorem 4.2,
|
| 2146 |
+
we get w2
|
| 2147 |
+
δk(x) → w(x) as k → ∞ uniformly in x ∈ E, which concludes the proof of
|
| 2148 |
+
this step.
|
| 2149 |
+
Step 3. We show that |w1
|
| 2150 |
+
δk(x) − wδk(x)| → 0 as k → ∞ uniformly in x ∈ E.
|
| 2151 |
+
In fact, recalling that ∥Mwδk − φ∥ → 0 as k → ∞, the argument follows the lines
|
| 2152 |
+
of the one used in the first step of the proof of Theorem 4.2. This concludes the
|
| 2153 |
+
proof.
|
| 2154 |
+
□
|
| 2155 |
+
Appendix A. Properties of optimal stopping problems
|
| 2156 |
+
In this section we discuss some properties of the optimal stopping problems that
|
| 2157 |
+
are used in this paper.
|
| 2158 |
+
Throughout this section we consider g, G ∈ Cb(E) and
|
| 2159 |
+
assume G(·) ≤ 0 and r(g) < 0, where r(g) is the type of the semigroup given
|
| 2160 |
+
by (2.7) corresponding to the map g. We start with a useful result related to the
|
| 2161 |
+
asymptotic behaviour of the running cost function g.
|
| 2162 |
+
Lemma A.1. Let a be such that r(g) < a < 0. Then,
|
| 2163 |
+
(1) The map x �→ U g−a
|
| 2164 |
+
0
|
| 2165 |
+
1(x) := Ex
|
| 2166 |
+
�� ∞
|
| 2167 |
+
0
|
| 2168 |
+
e
|
| 2169 |
+
� t
|
| 2170 |
+
0 (g(Xs)−a)dsdt
|
| 2171 |
+
�
|
| 2172 |
+
is continuous and
|
| 2173 |
+
bounded.
|
| 2174 |
+
(2) We get
|
| 2175 |
+
lim
|
| 2176 |
+
T →∞ sup
|
| 2177 |
+
x∈E
|
| 2178 |
+
sup
|
| 2179 |
+
τ≥T
|
| 2180 |
+
τ∈Tx
|
| 2181 |
+
Ex
|
| 2182 |
+
�
|
| 2183 |
+
e
|
| 2184 |
+
� τ
|
| 2185 |
+
0 g(Xs)ds�
|
| 2186 |
+
= 0.
|
| 2187 |
+
Proof. For transparency, we prove the claims point by point.
|
| 2188 |
+
Proof of (1). First, we show the boundedness of x �→ U g−a
|
| 2189 |
+
0
|
| 2190 |
+
1(x). Let ε <
|
| 2191 |
+
a − r(g).
|
| 2192 |
+
Using the definition of r(g − a) we may find t0 ≥ 0, such that for
|
| 2193 |
+
any t ≥ t0 we get supx∈E Ex
|
| 2194 |
+
�
|
| 2195 |
+
e
|
| 2196 |
+
� t
|
| 2197 |
+
0 (g(Xs)−a)ds�
|
| 2198 |
+
≤ et(r(g)−a+ε). Then, using Fubini’s
|
| 2199 |
+
theorem and noting that r(g) − a + ε < 0, for any x0 ∈ E, we get
|
| 2200 |
+
0 ≤ U g−a
|
| 2201 |
+
0
|
| 2202 |
+
1(x0) ≤
|
| 2203 |
+
� ∞
|
| 2204 |
+
0
|
| 2205 |
+
sup
|
| 2206 |
+
x∈E
|
| 2207 |
+
Ex
|
| 2208 |
+
�
|
| 2209 |
+
e
|
| 2210 |
+
� t
|
| 2211 |
+
0 (g(Xs)−a)ds�
|
| 2212 |
+
dt
|
| 2213 |
+
=
|
| 2214 |
+
� t0
|
| 2215 |
+
0
|
| 2216 |
+
sup
|
| 2217 |
+
x∈E
|
| 2218 |
+
Ex
|
| 2219 |
+
�
|
| 2220 |
+
e
|
| 2221 |
+
� t
|
| 2222 |
+
0 (g(Xs)−a)ds�
|
| 2223 |
+
dt +
|
| 2224 |
+
� ∞
|
| 2225 |
+
t0
|
| 2226 |
+
sup
|
| 2227 |
+
x∈E
|
| 2228 |
+
Ex
|
| 2229 |
+
�
|
| 2230 |
+
e
|
| 2231 |
+
� t
|
| 2232 |
+
0 (g(Xs)−a)ds�
|
| 2233 |
+
dt
|
| 2234 |
+
≤
|
| 2235 |
+
� t0
|
| 2236 |
+
0
|
| 2237 |
+
et(∥g∥−a)dt +
|
| 2238 |
+
� ∞
|
| 2239 |
+
t0
|
| 2240 |
+
et(r(g)−a+ε)dt < ∞,
|
| 2241 |
+
which concludes the proof of the boundedness of x �→ U g−a
|
| 2242 |
+
0
|
| 2243 |
+
1(x).
|
| 2244 |
+
|
| 2245 |
+
20 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 2246 |
+
For the continuity, note that using Assumption (A2) and repeating the argument
|
| 2247 |
+
used in Lemma 4 in Section II.5 of [13], we get that x �→ Ex
|
| 2248 |
+
�
|
| 2249 |
+
e
|
| 2250 |
+
� t
|
| 2251 |
+
0 (g(Xs)−a)dsdt
|
| 2252 |
+
�
|
| 2253 |
+
is
|
| 2254 |
+
continuous for any t ≥ 0. Also, as in the proof of the boundedness, we may show
|
| 2255 |
+
0 ≤ sup
|
| 2256 |
+
x∈E
|
| 2257 |
+
Ex
|
| 2258 |
+
�
|
| 2259 |
+
e
|
| 2260 |
+
� t
|
| 2261 |
+
0 (g(Xs)−a)ds�
|
| 2262 |
+
≤ et(∥g∥−a)1{t∈[0,t0]} + et(r(g)−a+ε)1{t>t0}
|
| 2263 |
+
and the upper bound is integrable (with respect to t).
|
| 2264 |
+
Thus, using Lebesgue’s
|
| 2265 |
+
dominated convergence theorem, we get the continuity of the map x �→ U g−a
|
| 2266 |
+
0
|
| 2267 |
+
1(x) =
|
| 2268 |
+
� ∞
|
| 2269 |
+
0
|
| 2270 |
+
Ex
|
| 2271 |
+
�
|
| 2272 |
+
e
|
| 2273 |
+
� t
|
| 2274 |
+
0 (g(Xs)−a)ds�
|
| 2275 |
+
dt, which concludes the proof of this step.
|
| 2276 |
+
Proof of (2). Noting that U g−a
|
| 2277 |
+
0
|
| 2278 |
+
1(x) ≥
|
| 2279 |
+
� 1
|
| 2280 |
+
0 e−t(∥g∥−a)dt, x ∈ E, we may find
|
| 2281 |
+
d > 0, such that U g−a
|
| 2282 |
+
0
|
| 2283 |
+
1(x) ≥ d > 0, x ∈ E. Thus, recalling that a < 0, we get
|
| 2284 |
+
0 ≤ sup
|
| 2285 |
+
τ≥T
|
| 2286 |
+
τ∈Tx
|
| 2287 |
+
Ex
|
| 2288 |
+
�
|
| 2289 |
+
e
|
| 2290 |
+
� τ
|
| 2291 |
+
0 g(Xs)ds�
|
| 2292 |
+
≤ sup
|
| 2293 |
+
τ≥T
|
| 2294 |
+
τ∈Tx
|
| 2295 |
+
Ex
|
| 2296 |
+
�
|
| 2297 |
+
e
|
| 2298 |
+
� τ
|
| 2299 |
+
0 (g(Xs)−a)dseaτU g−a
|
| 2300 |
+
0
|
| 2301 |
+
1(Xτ)1
|
| 2302 |
+
d
|
| 2303 |
+
�
|
| 2304 |
+
≤ eaT
|
| 2305 |
+
d
|
| 2306 |
+
sup
|
| 2307 |
+
τ≥T
|
| 2308 |
+
τ∈Tx
|
| 2309 |
+
Ex
|
| 2310 |
+
�
|
| 2311 |
+
e
|
| 2312 |
+
� τ
|
| 2313 |
+
0 (g(Xs)−a)dsU g−a
|
| 2314 |
+
0
|
| 2315 |
+
1(Xτ)
|
| 2316 |
+
�
|
| 2317 |
+
= eaT
|
| 2318 |
+
d
|
| 2319 |
+
sup
|
| 2320 |
+
τ≥T
|
| 2321 |
+
τ∈Tx
|
| 2322 |
+
Ex
|
| 2323 |
+
�� ∞
|
| 2324 |
+
0
|
| 2325 |
+
e
|
| 2326 |
+
� t+τ
|
| 2327 |
+
0
|
| 2328 |
+
(g(Xs)−a)dsdt
|
| 2329 |
+
�
|
| 2330 |
+
= eaT
|
| 2331 |
+
d
|
| 2332 |
+
sup
|
| 2333 |
+
τ≥T
|
| 2334 |
+
τ∈Tx
|
| 2335 |
+
Ex
|
| 2336 |
+
�� ∞
|
| 2337 |
+
τ
|
| 2338 |
+
e
|
| 2339 |
+
� t
|
| 2340 |
+
0 (g(Xs)−a)dsdt
|
| 2341 |
+
�
|
| 2342 |
+
≤ eaT
|
| 2343 |
+
d Ex
|
| 2344 |
+
�� ∞
|
| 2345 |
+
0
|
| 2346 |
+
e
|
| 2347 |
+
� t
|
| 2348 |
+
0 (g(Xs)−a)dsdt
|
| 2349 |
+
�
|
| 2350 |
+
≤ eaT
|
| 2351 |
+
d ∥U g−a
|
| 2352 |
+
0
|
| 2353 |
+
1∥ → 0,
|
| 2354 |
+
T → ∞,
|
| 2355 |
+
which concludes the proof.
|
| 2356 |
+
□
|
| 2357 |
+
Using Lemma A.1 we get the uniform integrability of a suitable family of random
|
| 2358 |
+
variables.
|
| 2359 |
+
This result is extensively used throughout the paper as it simplifies
|
| 2360 |
+
numerous limiting arguments.
|
| 2361 |
+
Proposition A.2. For any x ∈ E, the family {e
|
| 2362 |
+
� τ
|
| 2363 |
+
0 g(Xs)ds}τ∈Tx is Px-uniformly
|
| 2364 |
+
integrable.
|
| 2365 |
+
Proof. Let us fix some x ∈ E and, for any τ ∈ Tx and n ∈ N, define the event
|
| 2366 |
+
Aτ
|
| 2367 |
+
n := {� τ
|
| 2368 |
+
0 g(Xs)ds ≥ n}. Note that for any T ≥ 0, we get
|
| 2369 |
+
sup
|
| 2370 |
+
τ∈Tx
|
| 2371 |
+
Ex[1Aτne
|
| 2372 |
+
� τ
|
| 2373 |
+
0 g(Xs)ds] ≤ sup
|
| 2374 |
+
τ≤T
|
| 2375 |
+
τ∈Tx
|
| 2376 |
+
Ex[1Aτne
|
| 2377 |
+
� τ
|
| 2378 |
+
0 g(Xs)ds] + sup
|
| 2379 |
+
τ>T
|
| 2380 |
+
τ∈Tx
|
| 2381 |
+
Ex[1Aτne
|
| 2382 |
+
� τ
|
| 2383 |
+
0 g(Xs)ds]
|
| 2384 |
+
≤ sup
|
| 2385 |
+
τ≤T
|
| 2386 |
+
τ∈Tx
|
| 2387 |
+
eT ∥g∥Px[Aτ
|
| 2388 |
+
n] + sup
|
| 2389 |
+
τ>T
|
| 2390 |
+
τ∈Tx
|
| 2391 |
+
Ex[e
|
| 2392 |
+
� τ
|
| 2393 |
+
0 g(Xs)ds].
|
| 2394 |
+
Next, for any ε > 0, using Lemma A.1, we may find T > 0 big enough to get
|
| 2395 |
+
sup
|
| 2396 |
+
τ>T
|
| 2397 |
+
τ∈Tx
|
| 2398 |
+
Ex[e
|
| 2399 |
+
� τ
|
| 2400 |
+
0 g(Xs)ds] < ε.
|
| 2401 |
+
|
| 2402 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 21
|
| 2403 |
+
Also, noting that for τ ≤ T , we get Aτ
|
| 2404 |
+
n ⊂ {T ∥g∥ ≥ n}, for any n > T ∥g∥, we also
|
| 2405 |
+
get
|
| 2406 |
+
sup
|
| 2407 |
+
τ≤T
|
| 2408 |
+
τ∈Tx
|
| 2409 |
+
Px[Aτ
|
| 2410 |
+
n] = 0.
|
| 2411 |
+
Consequently, recalling that ε > 0 was arbitrary, we obtain
|
| 2412 |
+
lim
|
| 2413 |
+
n→∞ sup
|
| 2414 |
+
τ∈Tx
|
| 2415 |
+
Ex[Aτ
|
| 2416 |
+
ne
|
| 2417 |
+
� τ
|
| 2418 |
+
0 g(Xs)ds] = 0,
|
| 2419 |
+
which concludes the proof.
|
| 2420 |
+
□
|
| 2421 |
+
Next, we consider an optimal stopping problem of the form
|
| 2422 |
+
u(x) := sup
|
| 2423 |
+
τ∈Tx,b
|
| 2424 |
+
ln Ex
|
| 2425 |
+
�
|
| 2426 |
+
exp
|
| 2427 |
+
�� τ
|
| 2428 |
+
0
|
| 2429 |
+
g(Xs)ds + G(Xτ)
|
| 2430 |
+
��
|
| 2431 |
+
,
|
| 2432 |
+
x ∈ E;
|
| 2433 |
+
(A.1)
|
| 2434 |
+
note that here the non-positivity assumption for G is only a normalisation as for a
|
| 2435 |
+
generic ˜G we may set G(·) = ˜G(·) − ∥ ˜G∥ to get G(·) ≤ 0.
|
| 2436 |
+
The properties of the map (A.1) are summarised in the following proposition.
|
| 2437 |
+
Proposition A.3. Let the map u be given by (A.1). Then, x �→ u(x) is continuous
|
| 2438 |
+
and bounded. Also, we get
|
| 2439 |
+
u(x) = sup
|
| 2440 |
+
τ∈Tx
|
| 2441 |
+
ln Ex
|
| 2442 |
+
�
|
| 2443 |
+
exp
|
| 2444 |
+
�� τ
|
| 2445 |
+
0
|
| 2446 |
+
g(Xs)ds + G(Xτ)
|
| 2447 |
+
��
|
| 2448 |
+
,
|
| 2449 |
+
x ∈ E.
|
| 2450 |
+
(A.2)
|
| 2451 |
+
Moreover, the process
|
| 2452 |
+
z(t) := e
|
| 2453 |
+
� t
|
| 2454 |
+
0 g(Xs)+u(Xt),
|
| 2455 |
+
t ≥ 0,
|
| 2456 |
+
is a supermartingale and the process z(t ∧ ˆτ), t ≥ 0, is a martingale, where
|
| 2457 |
+
ˆτ := inf{t ≥ 0 : u(Xt) ≤ G(Xt)}.
|
| 2458 |
+
(A.3)
|
| 2459 |
+
Proof. For transparency, we split the proof into two steps: (1) proof of the conti-
|
| 2460 |
+
nuity of x �→ u(x) and identity (A.2); (2) proof of the martingale properties of the
|
| 2461 |
+
process z.
|
| 2462 |
+
Step 1. We show that the map x �→ u(x) is continuous and the identity (A.2)
|
| 2463 |
+
holds. For any T ≥ 0 and x ∈ E, let us define
|
| 2464 |
+
ˆu(x) := sup
|
| 2465 |
+
τ∈Tx
|
| 2466 |
+
ln Ex
|
| 2467 |
+
�
|
| 2468 |
+
exp
|
| 2469 |
+
�� τ
|
| 2470 |
+
0
|
| 2471 |
+
g(Xs)ds + G(Xτ)
|
| 2472 |
+
��
|
| 2473 |
+
;
|
| 2474 |
+
(A.4)
|
| 2475 |
+
uT (x) := sup
|
| 2476 |
+
τ≤T
|
| 2477 |
+
ln Ex
|
| 2478 |
+
�
|
| 2479 |
+
exp
|
| 2480 |
+
�� τ
|
| 2481 |
+
0
|
| 2482 |
+
g(Xs)ds + G(Xτ)
|
| 2483 |
+
��
|
| 2484 |
+
.
|
| 2485 |
+
(A.5)
|
| 2486 |
+
Using Assumption (A3) and following the proof of Proposition 10 and Proposition
|
| 2487 |
+
11 in [16], we get that the map (T, x) �→ uT (x) is jointly continuous and bounded;
|
| 2488 |
+
see also Remark 12 therein. We show that uT (x) → ˆu(x) as T → ∞ uniformly in
|
| 2489 |
+
x ∈ E. Noting that
|
| 2490 |
+
−∥G∥ ≤ uT (x) ≤ u(x),
|
| 2491 |
+
T ≥ 0, x ∈ E,
|
| 2492 |
+
and using the inequality | ln y−lnz| ≤
|
| 2493 |
+
1
|
| 2494 |
+
min(y,z)|y−z|, y, z > 0, to show uT (x) → ˆu(x)
|
| 2495 |
+
as T → ∞ uniformly in x ∈ E it is enough to show euT (x) → eˆu(x) as T → ∞
|
| 2496 |
+
|
| 2497 |
+
22 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 2498 |
+
uniformly in x ∈ E. Then, using Lemma A.1, for any ε > 0, we may find T ≥ 0
|
| 2499 |
+
such that for any x ∈ E, we obtain
|
| 2500 |
+
0 ≤ eˆu(x) − euT (x) ≤ sup
|
| 2501 |
+
τ∈Tx
|
| 2502 |
+
Ex
|
| 2503 |
+
�
|
| 2504 |
+
e
|
| 2505 |
+
� τ
|
| 2506 |
+
0 g(Xs)ds+G(Xτ ) − e
|
| 2507 |
+
� τ∧T
|
| 2508 |
+
0
|
| 2509 |
+
g(Xs)ds+G(Xτ∧T )�
|
| 2510 |
+
≤ sup
|
| 2511 |
+
τ∈Tx
|
| 2512 |
+
Ex
|
| 2513 |
+
�
|
| 2514 |
+
1{τ≥T }
|
| 2515 |
+
�
|
| 2516 |
+
e
|
| 2517 |
+
� τ
|
| 2518 |
+
0 g(Xs)ds+G(Xτ ) − e
|
| 2519 |
+
� T
|
| 2520 |
+
0 g(Xs)ds+G(XT )��
|
| 2521 |
+
≤ sup
|
| 2522 |
+
τ∈Tx
|
| 2523 |
+
Ex
|
| 2524 |
+
�
|
| 2525 |
+
1{τ≥T }e
|
| 2526 |
+
� τ
|
| 2527 |
+
0 g(Xs)ds+G(Xτ )�
|
| 2528 |
+
≤ sup
|
| 2529 |
+
τ≥T
|
| 2530 |
+
τ∈Tx
|
| 2531 |
+
Ex
|
| 2532 |
+
�
|
| 2533 |
+
e
|
| 2534 |
+
� τ
|
| 2535 |
+
0 g(Xs)ds�
|
| 2536 |
+
≤ ε.
|
| 2537 |
+
Thus, letting ε → 0, we get euT (x) → eˆu(x) as T → ∞ uniformly in x ∈ E and
|
| 2538 |
+
consequently uT (x) → ˆu(x) as T → ∞ uniformly in x ∈ E.
|
| 2539 |
+
Thus, from the
|
| 2540 |
+
continuity of x �→ uT (x), T ≥ 0, we get that the map x �→ ˆu(x) is continuous.
|
| 2541 |
+
Now, we show that u ≡ ˆu. First, we show that limT →∞ uT (x) = ˜u(x), where
|
| 2542 |
+
˜u(x) := supτ∈Tx lim infT →∞ ln Ex
|
| 2543 |
+
�
|
| 2544 |
+
e
|
| 2545 |
+
� τ∧T
|
| 2546 |
+
0
|
| 2547 |
+
g(Xs)ds+G(Xτ∧T )�
|
| 2548 |
+
, x ∈ E. For any T ≥ 0
|
| 2549 |
+
and x ∈ E, we get
|
| 2550 |
+
uT (x) = sup
|
| 2551 |
+
τ≤T
|
| 2552 |
+
lim inf
|
| 2553 |
+
S→∞ ln Ex
|
| 2554 |
+
�
|
| 2555 |
+
e
|
| 2556 |
+
� τ∧S
|
| 2557 |
+
0
|
| 2558 |
+
g(Xs)ds+G(Xτ∧S)�
|
| 2559 |
+
≤ ˜u(x),
|
| 2560 |
+
thus we get limT →∞ uT (x) ≤ ˜u(x). Also, for any x ∈ E, ˜τ ∈ Tx, and T ≥ 0, we get
|
| 2561 |
+
ln Ex
|
| 2562 |
+
�
|
| 2563 |
+
e
|
| 2564 |
+
� ˜τ∧T
|
| 2565 |
+
0
|
| 2566 |
+
g(Xs)ds+G(X˜τ∧T )�
|
| 2567 |
+
≤ uT(x).
|
| 2568 |
+
Thus, letting T → ∞ and taking supremum over ˜τ ∈ Tx we get limT →∞ uT (x) =
|
| 2569 |
+
˜u(x), x ∈ E. Also, using the argument from Lemma 2.2 from [17] we get ˜u ≡ u.
|
| 2570 |
+
Thus, we get u(x) = limT →∞ uT (x) = ˆu(x), x ∈ E, hence the map x �→ u(x) is
|
| 2571 |
+
continuous. Also, we get (A.2).
|
| 2572 |
+
Step 2. We show the martingale properties of z. First, we focus on the stopping
|
| 2573 |
+
time ˆτ. Let us define
|
| 2574 |
+
τT := inf{t ≥ 0 : uT −t(Xt) ≤ G(Xt)}.
|
| 2575 |
+
Using the argument from Proposition 11 in [16] we get that τT is an optimal stopping
|
| 2576 |
+
time for uT . Also, noting that the map T �→ uT (x), x ∈ E, is increasing, we get
|
| 2577 |
+
that T �→ τT is also increasing, thus we may define ˜τ := limT →∞ τT . We show that
|
| 2578 |
+
˜τ ≡ ˆτ.
|
| 2579 |
+
Let A := {˜τ < ∞}. First, we show that ˜τ ≡ ˆτ on A. On the event A, we get
|
| 2580 |
+
uT −τT (XτT ) = G(XτT ). Thus, letting T → ∞, we get u(X˜τ) = G(X˜τ), hence we
|
| 2581 |
+
get ˆτ ≤ ˜τ. Also, noting that uS(x) ≤ u(x), x ∈ E, S ≥ 0, on the set {ˆτ ≤ T } we
|
| 2582 |
+
get uT −ˆτ(Xˆτ) ≤ u(Xˆτ) ≤ G(Xˆτ), hence
|
| 2583 |
+
τT ≤ ˆτ.
|
| 2584 |
+
(A.6)
|
| 2585 |
+
Thus, recalling that ˆτ ≤ ˜τ < ∞ and letting T → ∞ in (A.6), we get ˜τ ≤ ˆτ, which
|
| 2586 |
+
shows ˜τ ≡ ˆτ on A.
|
| 2587 |
+
Now, we show that ˜τ ≡ ˆτ on Ac. Let ω ∈ Ac and suppose that ˆτ(ω) < ∞. Then,
|
| 2588 |
+
we may find T ≥ 0 such that ˆτ(ω) < T . Also, for any S ≥ T we get
|
| 2589 |
+
uS−ˆτ(ω)(Xˆτ(ω)(ω)) ≤ u(Xˆτ(ω)(ω)) ≤ G(Xˆτ(ω)(ω)).
|
| 2590 |
+
|
| 2591 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 23
|
| 2592 |
+
Thus, we get τS(ω) ≤ ˆτ(ω) for any S ≥ T . Consequently, letting S → ∞ we get
|
| 2593 |
+
˜τ(ω) < ∞, which contradicts the choice of ω ∈ Ac. Consequently, on Ac we have
|
| 2594 |
+
˜τ = ∞ = ˆτ.
|
| 2595 |
+
Finally, we show the martingale properties. Let us define the processes
|
| 2596 |
+
zT (t) := e
|
| 2597 |
+
� t∧T
|
| 2598 |
+
0
|
| 2599 |
+
g(Xs)ds+uT −t∧T (Xt∧T ),
|
| 2600 |
+
T, t ≥ 0,
|
| 2601 |
+
z(t) := e
|
| 2602 |
+
� t
|
| 2603 |
+
0 g(Xs)ds+u(Xt),
|
| 2604 |
+
t ≥ 0.
|
| 2605 |
+
Using standard argument we get that for any T ≥ 0, the process zT (t), t ≥ 0, is a
|
| 2606 |
+
supermartingale and zT (t ∧ τT ), t ≥ 0, is a martingale; see e.g. [11, 12] for details.
|
| 2607 |
+
Also, recalling that from the first step we get uT (x) → u(x) as T → ∞ uniformly
|
| 2608 |
+
in x ∈ E, for any t ≥ 0, we get that zT (t) → z(t) and zT (t ∧ τT ) → z(t ∧ ˆτ) as
|
| 2609 |
+
T → ∞. Consequently, using Lebesgue’s dominated convergence theorem, we get
|
| 2610 |
+
that the process z(t) is a supermartingale and z(t∧ ˆτ), t ≥ 0, is a martingale, which
|
| 2611 |
+
concludes the proof.
|
| 2612 |
+
□
|
| 2613 |
+
Next, we consider an optimal stopping problem in a compact set and dyadic
|
| 2614 |
+
time-grid. More specifically, let δ > 0, let B ⊂ E be compact and assume that
|
| 2615 |
+
Px[τB < ∞] = 1, x ∈ B, where τB := δ inf{n ∈ N: Xnδ /∈ B}.
|
| 2616 |
+
Within this
|
| 2617 |
+
framework, we consider an optimal stopping problem of the form
|
| 2618 |
+
uB(x) := sup
|
| 2619 |
+
τ∈T δ ln Ex
|
| 2620 |
+
�
|
| 2621 |
+
exp
|
| 2622 |
+
�� τ∧τB
|
| 2623 |
+
0
|
| 2624 |
+
g(Xs)ds + G(Xτ∧τB)
|
| 2625 |
+
��
|
| 2626 |
+
,
|
| 2627 |
+
x ∈ E.
|
| 2628 |
+
(A.7)
|
| 2629 |
+
The properties of (A.7) are summarised in the following proposition.
|
| 2630 |
+
Proposition A.4. Let uB be given by (A.7). Then, we get
|
| 2631 |
+
uB(x) = sup
|
| 2632 |
+
τ∈T δ
|
| 2633 |
+
x,b
|
| 2634 |
+
ln Ex
|
| 2635 |
+
�
|
| 2636 |
+
exp
|
| 2637 |
+
�� τ∧τB
|
| 2638 |
+
0
|
| 2639 |
+
g(Xs)ds + G(Xτ∧τB)
|
| 2640 |
+
��
|
| 2641 |
+
,
|
| 2642 |
+
x ∈ E.
|
| 2643 |
+
(A.8)
|
| 2644 |
+
Also, the map x �→ uB(x) is continuous and bounded. Moreover, the process
|
| 2645 |
+
zδ(n) := e
|
| 2646 |
+
� nδ
|
| 2647 |
+
0
|
| 2648 |
+
g(Xs)+u(Xnδ),
|
| 2649 |
+
n ∈ N,
|
| 2650 |
+
is a supermartingale and the process z(n ∧ ˆτ/δ), n ∈ N, is a martingale, where
|
| 2651 |
+
ˆτ := δ inf{n ∈ N: uB(Xnδ) ≤ G(Xnδ)}.
|
| 2652 |
+
(A.9)
|
| 2653 |
+
Proof. To ease the notation, let us define
|
| 2654 |
+
ˆuB(x) := sup
|
| 2655 |
+
τ∈T δ
|
| 2656 |
+
x,b
|
| 2657 |
+
ln Ex
|
| 2658 |
+
�
|
| 2659 |
+
exp
|
| 2660 |
+
�� τ∧τB
|
| 2661 |
+
0
|
| 2662 |
+
g(Xs)ds + G(Xτ∧τB)
|
| 2663 |
+
��
|
| 2664 |
+
,
|
| 2665 |
+
x ∈ E,
|
| 2666 |
+
un
|
| 2667 |
+
B(x) := sup
|
| 2668 |
+
τ∈T δ
|
| 2669 |
+
τ≤nδ
|
| 2670 |
+
ln Ex
|
| 2671 |
+
�
|
| 2672 |
+
exp
|
| 2673 |
+
�� τ∧τB
|
| 2674 |
+
0
|
| 2675 |
+
g(Xs)ds + G(Xτ∧τB)
|
| 2676 |
+
��
|
| 2677 |
+
,
|
| 2678 |
+
n ∈ N, x ∈ E,
|
| 2679 |
+
and note that we get un
|
| 2680 |
+
B(x) ≤ ˆuB(x) ≤ uB(x),
|
| 2681 |
+
x ∈ E. Next, note that using
|
| 2682 |
+
the boundedness of G and Proposition A.2, by Lebesgue’s dominated convergence
|
| 2683 |
+
theorem, we obtain
|
| 2684 |
+
uB(x) = sup
|
| 2685 |
+
τ∈T
|
| 2686 |
+
lim
|
| 2687 |
+
n→∞ ln Ex
|
| 2688 |
+
�
|
| 2689 |
+
exp
|
| 2690 |
+
�� τ∧(nδ)∧τB
|
| 2691 |
+
0
|
| 2692 |
+
g(Xs)ds + G(Xτ∧(nδ)∧τB)
|
| 2693 |
+
��
|
| 2694 |
+
,
|
| 2695 |
+
x ∈ E.
|
| 2696 |
+
|
| 2697 |
+
24 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 2698 |
+
Also, for any n ∈ N, x ∈ E, and τ ∈ T δ, we get
|
| 2699 |
+
un
|
| 2700 |
+
B(x) ≥ ln Ex
|
| 2701 |
+
�
|
| 2702 |
+
exp
|
| 2703 |
+
�� τ∧(nδ)∧τB
|
| 2704 |
+
0
|
| 2705 |
+
g(Xs)ds + G(Xτ∧(nδ)∧τB)
|
| 2706 |
+
��
|
| 2707 |
+
,
|
| 2708 |
+
x ∈ E.
|
| 2709 |
+
Thus, letting n → ∞ and taking the supremum with respect to τ ∈ T δ, we get
|
| 2710 |
+
limn→∞ un
|
| 2711 |
+
B(x) �� uB(x), x ∈ E. Consequently, we have
|
| 2712 |
+
lim
|
| 2713 |
+
n→∞ un
|
| 2714 |
+
B(x) = ˆuB(x) = uB(x),
|
| 2715 |
+
x ∈ E,
|
| 2716 |
+
which concludes the proof of (A.8).
|
| 2717 |
+
Let us now show the continuity of the map x �→ uB(x) and the martingale
|
| 2718 |
+
characterisation. To see this, note that using a standard argument one may show
|
| 2719 |
+
that, for any n ∈ N and x ∈ B, we get
|
| 2720 |
+
u0
|
| 2721 |
+
B(x) = G(x), x ∈ B,
|
| 2722 |
+
eun+1
|
| 2723 |
+
B
|
| 2724 |
+
(x) = max(eG(x), Ex
|
| 2725 |
+
�
|
| 2726 |
+
1{Xδ∈B}e
|
| 2727 |
+
� δ
|
| 2728 |
+
0 g(Xs)ds+un
|
| 2729 |
+
B(Xδ) + 1{Xδ /∈B}e
|
| 2730 |
+
� δ
|
| 2731 |
+
0 g(Xs)ds+G(Xδ)�
|
| 2732 |
+
,
|
| 2733 |
+
and, for any n ∈ N and x /∈ B, we get un
|
| 2734 |
+
B(x) = G(x); see e.g. Section 2.2 in [28]
|
| 2735 |
+
for details. Thus, letting n → ∞, for x ∈ B, we have
|
| 2736 |
+
euB(x) = max(eG(x), Ex
|
| 2737 |
+
�
|
| 2738 |
+
1{Xδ∈B}e
|
| 2739 |
+
� δ
|
| 2740 |
+
0 g(Xs)ds+uB(Xδ) + 1{Xδ /∈B}e
|
| 2741 |
+
� δ
|
| 2742 |
+
0 g(Xs)ds+G(Xδ)�
|
| 2743 |
+
,
|
| 2744 |
+
while for x /∈ B, we get uB(x) = G(x). Also, using Assumption (A2), we get that
|
| 2745 |
+
the process X is strong Feller. Thus, repeating the argument used in Lemma 4
|
| 2746 |
+
from Chapter II.5 in [13], we get that, for any bounded and measurable function
|
| 2747 |
+
h: E �→ R, the map
|
| 2748 |
+
E ∋ x �→ Ex
|
| 2749 |
+
�
|
| 2750 |
+
e
|
| 2751 |
+
� δ
|
| 2752 |
+
0 g(Xs)dsh(Xt)
|
| 2753 |
+
�
|
| 2754 |
+
is continuous and bounded. Applying this observation to h(x) := 1{x∈B}euB(x) and
|
| 2755 |
+
h(x) := 1{x/∈B}eG(x), x ∈ E, we get the continuity of x �→ uB(x). Also, using the
|
| 2756 |
+
argument from Proposition 3.2 we get that zδ(n), n ∈ N is a supermartingale and
|
| 2757 |
+
z(n ∧ ˆτ/δ), n ∈ N, is a martingale, which concludes the proof.
|
| 2758 |
+
□
|
| 2759 |
+
References
|
| 2760 |
+
[1] A. Arapostathis and A. Biswas. Infinite horizon risk-sensitive control of dif-
|
| 2761 |
+
fusions without any blanket stability assumptions. Stochastic Processes and
|
| 2762 |
+
their Applications, 128:1485–1524, 2018.
|
| 2763 |
+
[2] A. Basu and �L. Stettner. Zero-sum Markov games with impulse controls. SIAM
|
| 2764 |
+
Journal on Control and Optimization, 58(1):580–604, 2020.
|
| 2765 |
+
[3] E. Bayraktar, T. Emmerling, and J. Menaldi. On the impulse control of jump
|
| 2766 |
+
diffusions. SIAM Journal on Control and Optimization, 51(3):2612–2637, 2013.
|
| 2767 |
+
[4] A. Bensoussan and J.-L. Lions. Impulse Control And Quasi-Variational In-
|
| 2768 |
+
equalities. Gauthier-Villars, Montrouge, 1984.
|
| 2769 |
+
[5] T. R. Bielecki and S. R. Pliska.
|
| 2770 |
+
Economic properties of the risk sensitive
|
| 2771 |
+
criterion for portfolio management. Review of Accounting and Finance, 2:3–
|
| 2772 |
+
17, 2003.
|
| 2773 |
+
[6] A. Biswas and V. Borkar.
|
| 2774 |
+
Ergodic risk-sensitive control – a survey.
|
| 2775 |
+
arXiv:2301.00224, 2023.
|
| 2776 |
+
[7] F. Bonsall. Lectures On Some Fixed Point Theorems Of Functional Analysis.
|
| 2777 |
+
Tata Institute of Fundamental Research, 1962.
|
| 2778 |
+
|
| 2779 |
+
ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 25
|
| 2780 |
+
[8] S. Christensen.
|
| 2781 |
+
On the solution of general impulse control problems us-
|
| 2782 |
+
ing superharmonic functions.
|
| 2783 |
+
Stochastic Processes and their Applications,
|
| 2784 |
+
124(1):709–729, 2014.
|
| 2785 |
+
[9] M.H.A. Davis. Markov models and optimization. Chapman & Hall/CRC, 01
|
| 2786 |
+
1993.
|
| 2787 |
+
[10] F. Dufour and A. B. Piunovskiy. Impulsive control for continuous-time Markov
|
| 2788 |
+
decision processes: A linear programming approach. Applied Mathematics and
|
| 2789 |
+
Optimization, 74:129–161, 2016.
|
| 2790 |
+
[11] A. Fakeev. Optimal stopping rules for stochastic processes with continuous
|
| 2791 |
+
parameter. Theory of Probability & Its Applications, 15(2):324–331, 1970.
|
| 2792 |
+
[12] A. Fakeev. Optimal stopping of a Markov process. Theory of Probability & Its
|
| 2793 |
+
Applications, 16(4):694–696, 1971.
|
| 2794 |
+
[13] I.I. Gikhman and A.V. Skorokhod.
|
| 2795 |
+
The Theory of Stochastic Processes II.
|
| 2796 |
+
Springer, 1975.
|
| 2797 |
+
[14] R. A. Howard and J. E. Matheson. Risk-sensitive Markov decision processes.
|
| 2798 |
+
Management Science, 18(7):356–369, 1972.
|
| 2799 |
+
[15] D. Jelito, M. Pitera, and �L. Stettner. Long-run risk sensitive impulse control.
|
| 2800 |
+
SIAM Journal on Control and Optimization, 58(4):2446–2468, 2020.
|
| 2801 |
+
[16] D. Jelito, M. Pitera, and �L. Stettner. Risk sensitive optimal stopping. Sto-
|
| 2802 |
+
chastic Processes and their Applications, 136:125–144, 2021.
|
| 2803 |
+
[17] D. Jelito and �L. Stettner. Risk-sensitive optimal stopping with unbounded
|
| 2804 |
+
terminal cost function. Electronic Journal of Probability, 27:1–30, 2022.
|
| 2805 |
+
[18] R. Korn. Some applications of impulse control in mathematical finance. Math-
|
| 2806 |
+
ematical Methods of Operations Research, 50:493–518, 1999.
|
| 2807 |
+
[19] J. Menaldi and M. Robin. On some ergodic impulse control problems with con-
|
| 2808 |
+
straint. SIAM Journal on Control and Optimization, 56(4):2690–2711, 2018.
|
| 2809 |
+
[20] H. Nagai. Stopping problems of certain multiplicative functionals and optimal
|
| 2810 |
+
investment with transaction costs.
|
| 2811 |
+
Applied Mathematics and Optimization,
|
| 2812 |
+
55(3):359–384, 2007.
|
| 2813 |
+
[21] J. Palczewski and �L. Stettner.
|
| 2814 |
+
Finite horizon optimal stopping of time-
|
| 2815 |
+
discontinuous functionals with applications to impulse control with delay.
|
| 2816 |
+
SIAM Journal on Control and Optimization, 48(8):4874–4909, 2010.
|
| 2817 |
+
[22] G. Peskir and A. Shiryaev. Optimal Stopping and Free-Boundary Problems.
|
| 2818 |
+
Springer, 2006.
|
| 2819 |
+
[23] H. Pham. Long time asymptotics for optimal investment. In Peter K. Friz, Jim
|
| 2820 |
+
Gatheral, Archil Gulisashvili, Antoine Jacquier, and Josef Teichmann, editors,
|
| 2821 |
+
Large Deviations and Asymptotic Methods in Finance, pages 507–528, Cham,
|
| 2822 |
+
2015. Springer International Publishing.
|
| 2823 |
+
[24] M. Pitera and �L. Stettner.
|
| 2824 |
+
Long-run risk sensitive dyadic impulse control.
|
| 2825 |
+
Applied Mathematics & Optimization, 84(1):19–47, 2021.
|
| 2826 |
+
[25] A. Piunovskiy, A. Plakhov, and M. Tumanov. Optimal impulse control of a SIR
|
| 2827 |
+
epidemic. Optimal Control Applications and Methods, 41(2):448–468, 2020.
|
| 2828 |
+
[26] M.
|
| 2829 |
+
Robin.
|
| 2830 |
+
Contrˆole
|
| 2831 |
+
impulsionnel
|
| 2832 |
+
des
|
| 2833 |
+
processus
|
| 2834 |
+
de
|
| 2835 |
+
Markov.
|
| 2836 |
+
th`ese
|
| 2837 |
+
d’´etat,
|
| 2838 |
+
Universit´e
|
| 2839 |
+
Paris
|
| 2840 |
+
Dauphine,
|
| 2841 |
+
1978.
|
| 2842 |
+
Available
|
| 2843 |
+
at
|
| 2844 |
+
https://tel.archives-ouvertes.fr/tel-00735779.
|
| 2845 |
+
[27] W. J. Runggaldier and K. Yasuda. Classical and restricted impulse control
|
| 2846 |
+
for the exchange rate under a stochastic trend model. Journal of Economic
|
| 2847 |
+
Dynamics and Control, 91:369–390, 2018.
|
| 2848 |
+
|
| 2849 |
+
26 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
|
| 2850 |
+
[28] A. Shiryaev. Optimal Stopping Rules. Springer, 1978.
|
| 2851 |
+
[29] �L. Stettner. On impulsive control with long run average cost criterion. In
|
| 2852 |
+
Stochastic Differential Systems, pages 354–360. Springer, 1982.
|
| 2853 |
+
[30] �L. Stettner. On some stopping and implusive control problems with a general
|
| 2854 |
+
discount rate criteria.
|
| 2855 |
+
Probability and Mathematical Statistics, 10:223–245,
|
| 2856 |
+
1989.
|
| 2857 |
+
[31] �L. Stettner. Asymptotics of HARA utility from terminal wealth under pro-
|
| 2858 |
+
portional transaction costs with decision lag or execution delay and obligatory
|
| 2859 |
+
diversification. In Giulia Di Nunno and Bernt Øksendal, editors, Advanced
|
| 2860 |
+
Mathematical Methods for Finance, pages 509–536, Berlin, Heidelberg, 2011.
|
| 2861 |
+
Springer Berlin Heidelberg.
|
| 2862 |
+
[32] �L. Stettner. On an approximation of average cost per unit time impulse control
|
| 2863 |
+
of Markov processes. SIAM Journal on Control and Optimization, 60(4):2115–
|
| 2864 |
+
2131, 2022.
|
| 2865 |
+
Statements and Declarations
|
| 2866 |
+
Damian Jelito and �Lukasz Stettner acknowledge research support by Polish Na-
|
| 2867 |
+
tional Science Centre grant no. 2020/37/B/ST1/00463.
|
| 2868 |
+
The authors have no relevant financial or non-financial interests to disclose.
|
| 2869 |
+
The authors contributed equally to this work.
|
| 2870 |
+
|
3NE2T4oBgHgl3EQf5wjH/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:10a81797dc601727c1a9bb2fc9fd5a0fc6e276284ce1c81eb0eb8727d56d17ad
|
| 3 |
+
size 2293805
|
59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1a126ac50c3efb8c205a3e681cee07605b7f181d21cecbdd553525f303704628
|
| 3 |
+
size 4264662
|
59E1T4oBgHgl3EQfTAPi/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c343a369f691dd738873c698f541ce1cb2ee8b752914f339198538ccb9004774
|
| 3 |
+
size 145420
|
8dE1T4oBgHgl3EQfCAI3/content/tmp_files/2301.02858v1.pdf.txt
ADDED
|
@@ -0,0 +1,2437 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.02858v1 [eess.SP] 7 Jan 2023
|
| 2 |
+
1
|
| 3 |
+
Three Efficient Beamforming Methods for Hybrid
|
| 4 |
+
IRS-aided AF Relay Wireless Networks
|
| 5 |
+
Xuehui Wang, Feng Shu, Mengxing Huang, Fuhui Zhou, Riqing Chen, Cunhua Pan, Yongpeng Wu,
|
| 6 |
+
and Jiangzhou Wang, Fellow, IEEE
|
| 7 |
+
Abstract—Due to the “double fading” effect caused by con-
|
| 8 |
+
ventional passive intelligent reflecting surface (IRS), the signal
|
| 9 |
+
via the reflection link is weak. To enhance the received signal,
|
| 10 |
+
active elements with the ability to amplify the reflected signal
|
| 11 |
+
are introduced to the passive IRS forming hybrid IRS. In
|
| 12 |
+
this paper, a hybrid IRS-aided amplify-and-forward (AF) relay
|
| 13 |
+
wireless network is considered, where an optimization problem
|
| 14 |
+
is formulated to maximize signal-to-noise ratio (SNR) by jointly
|
| 15 |
+
optimizing the beamforming matrix at AF relay and the reflecting
|
| 16 |
+
coefficient matrices at IRS subject to the constraints of transmit
|
| 17 |
+
power budgets at the source/AF relay/hybrid IRS and that of
|
| 18 |
+
unit-modulus for passive IRS phase shifts. To achieve high rate
|
| 19 |
+
performance and extend the coverage range, a high-performance
|
| 20 |
+
method based on semidefinite relaxation and fractional program-
|
| 21 |
+
ming (HP-SDR-FP) algorithm is presented. Due to its extremely
|
| 22 |
+
high complexity, a low-complexity method based on successive
|
| 23 |
+
convex approximation and FP (LC-SCA-FP) algorithm is put
|
| 24 |
+
forward. To further reduce the complexity, a lower-complexity
|
| 25 |
+
method based on whitening filter, general power iterative and
|
| 26 |
+
generalized Rayleigh-Ritz (WF-GPI-GRR) is proposed, where
|
| 27 |
+
different from the above two methods, it is assumed that the
|
| 28 |
+
amplifying coefficient of each active IRS element is equal, and
|
| 29 |
+
the corresponding analytical solution of the amplifying coefficient
|
| 30 |
+
can be obtained according to the transmit powers at AF relay
|
| 31 |
+
and hybrid IRS. Simulation results show that the proposed three
|
| 32 |
+
methods can greatly improve the rate performance compared to
|
| 33 |
+
the existing networks, such as the passive IRS-aided AF relay and
|
| 34 |
+
only AF relay network. In particular, a 50.0% rate gain over the
|
| 35 |
+
existing networks is approximately achieved in the high power
|
| 36 |
+
budget region of hybrid IRS. Moreover, it is verified that the
|
| 37 |
+
proposed three efficient beamforming methods have an increasing
|
| 38 |
+
This work was supported in part by the National Natural Science Foundation
|
| 39 |
+
of China (Nos.U22A2002, 62071234 and 61972093), the Major Science
|
| 40 |
+
and Technology plan of Hainan Province under Grant ZDKJ2021022, and
|
| 41 |
+
the Scientific Research Fund Project of Hainan University under Grant
|
| 42 |
+
KYQD(ZR)-21008.(Corresponding authors: Feng Shu).
|
| 43 |
+
Xuehui Wang and Mengxing Huang are with the School of Information
|
| 44 |
+
and Communication Engineering, Hainan University, Haikou, 570228, China.
|
| 45 |
+
Feng Shu is with the School of Information and Communication Engi-
|
| 46 |
+
neering, Hainan University, Haikou 570228, China, and also with the School
|
| 47 |
+
of Electronic and Optical Engineering, Nanjing University of Science and
|
| 48 |
+
Technology, Nanjing 210094, China (e-mail: shufeng0101@163.com).
|
| 49 |
+
Fuhui Zhou is with the College of Electronic and Information Engineering,
|
| 50 |
+
Nanjing University of Aeronautics and Astronautics, Nanjing 210000, China,
|
| 51 |
+
also with the Key Laboratory of Dynamic Cognitive System of Electromag-
|
| 52 |
+
netic Spectrum Space, Nanjing University of Aeronautics and Astronautics,
|
| 53 |
+
Nanjing 210000, China, and also with the Ministry of Industry and Informa-
|
| 54 |
+
tion Technology, Nanjing 211106, China (e-mail: zhoufuhui@ieee.org).
|
| 55 |
+
Riqing Chen is with the Digital Fujian Institute of Big Data for Agriculture,
|
| 56 |
+
Fujian Agriculture and Forestry University, Fuzhou 350002, China (e-mail:
|
| 57 |
+
riqing.chen@fafu.edu.cn).
|
| 58 |
+
Cunhua Pan is with National Mobile Communications Research Laboratory,
|
| 59 |
+
Southeast University, Nanjing 211111, China (e-mail: cpan@seu.edu.cn).
|
| 60 |
+
Yongpeng Wu is with the Shanghai Key Laboratory of Navigation and
|
| 61 |
+
Location Based Services, Shanghai Jiao Tong University, Minhang 200240,
|
| 62 |
+
China. (e-mail: yongpeng.wu2016@gmail.com).
|
| 63 |
+
Jiangzhou Wang is with the School of Engineering, University of Kent,
|
| 64 |
+
Canterbury CT2 7NT, U.K. Email: (e-mail: j.z.wang@kent.ac.uk).
|
| 65 |
+
order in rate performance: WF-GPI-GRR, LC-SCA-FP and HP-
|
| 66 |
+
SDR-FP.
|
| 67 |
+
Index Terms—Double fading, intelligent reflecting surface,
|
| 68 |
+
active elements, hybrid IRS, AF relay.
|
| 69 |
+
I. INTRODUCTION
|
| 70 |
+
With the rapid expansion of Internet-of-Things (IoT), the
|
| 71 |
+
smart devices and data traffic explosively grows [1]–[3]. There
|
| 72 |
+
are more stringent requirements for IoT in terms of massive
|
| 73 |
+
connectivity, extended coverage, low-latency, low-power, and
|
| 74 |
+
low-cost [4]–[6]. Because of high hardware cost and energy
|
| 75 |
+
consumption, some existing technologies [7], such as mil-
|
| 76 |
+
limeter wave (mmWave), massive multiple-input multiple-out
|
| 77 |
+
(MIMO), coordinated multi-point, wireless network coding,
|
| 78 |
+
are far away from meeting the demands, e.g., autonomous,
|
| 79 |
+
ultra-large-scale, highly dynamic and fully intelligent services
|
| 80 |
+
[8]. In the existing wireless networks, adding relay nodes can
|
| 81 |
+
not only save the number of base stations, but also realize
|
| 82 |
+
the cooperation of multiple communication nodes, so as to
|
| 83 |
+
improve the throughput and reliability [9], [10]. However, the
|
| 84 |
+
relay is an active device, which needs much energy to process
|
| 85 |
+
signals. Therefore, it is imperative to develop a future wireless
|
| 86 |
+
network, which is innovative, efficient and resource saving.
|
| 87 |
+
Owing to the advantages of low circuit cost, low energy con-
|
| 88 |
+
sumption, programmability and easy deployment, intelligent
|
| 89 |
+
reflecting surface (IRS) is attractive, which has gained much
|
| 90 |
+
research attention from both academia and industry [11]–[13].
|
| 91 |
+
IRS is composed of a large number of passive electromagnetic
|
| 92 |
+
units, which are dynamically controlled to reflect incident
|
| 93 |
+
signal forming an intelligent wireless propagation environment
|
| 94 |
+
in a software-defined manner [14]–[17]. From the perspective
|
| 95 |
+
of electromagnetic theory, radiation pattern and physics nature
|
| 96 |
+
of IRS unit, the free-space path loss models for IRS-assisted
|
| 97 |
+
wireless communications were well introduced in [18]. A
|
| 98 |
+
IRS-aided dual-hop visible light communication (VLC)/radio
|
| 99 |
+
frequency (RF) system was proposed in [19] , where the
|
| 100 |
+
performance analysis related to the outage probability and bit
|
| 101 |
+
error rate (BER) were presented. Because of reconfigurability,
|
| 102 |
+
IRS has been viewed as an enabling and potential technology
|
| 103 |
+
to achieve performance enhancement, spectral and energy
|
| 104 |
+
efficiency improvement. With more and more research on IRS,
|
| 105 |
+
IRS has been widely applied to the following scenarios, physi-
|
| 106 |
+
cal layer security [20]–[22], simultaneous wireless information
|
| 107 |
+
and power transfer (SWIPT) [23], [24], multicell MIMO
|
| 108 |
+
communications [25], [26], covert communications [27], [28],
|
| 109 |
+
and wireless powered communication network (WPCN) [29]–
|
| 110 |
+
[31]. To maximize secrecy rate for IRS-assisted multi-antenna
|
| 111 |
+
|
| 112 |
+
2
|
| 113 |
+
systems in [22], where an efficient alternating algorithm was
|
| 114 |
+
developed to jointly optimize the transmit covariance of the
|
| 115 |
+
source and the phase shift matrix of the IRS. For multicell
|
| 116 |
+
communication systems [25], IRS was deployed at the cell
|
| 117 |
+
boundary. While a method of jointly optimizing the active
|
| 118 |
+
precoding matrices at the base stations (BSs) and the phase
|
| 119 |
+
shifts at the IRS was proposed to maximize the weighted sum
|
| 120 |
+
rate of all users. A IRS-aided secure MIMO WPCN is consid-
|
| 121 |
+
ered in [31], by jointly optimizing the downlink (DL)/uplink
|
| 122 |
+
(UL) time allocation, the energy transmit covariance matrix
|
| 123 |
+
of hybrid access point (AP), the transmit beamforming matrix
|
| 124 |
+
of users and the phase shifts of IRS, the maximum secrecy
|
| 125 |
+
throughput of all users was achieved.
|
| 126 |
+
Combining the advantages of IRS and relay is interesting,
|
| 127 |
+
which can strike a good balance among cost, energy and per-
|
| 128 |
+
formance. Recently, there were some related research works on
|
| 129 |
+
the combination of IRS and relay appeared, which proved the
|
| 130 |
+
combination could well serve for the wireless communication
|
| 131 |
+
network in terms of coverage extension [32], [33], energy
|
| 132 |
+
efficiency [34], spectral efficiency [35] and rate performance
|
| 133 |
+
[36], [37]. The authors proposed an IRS-assisted dual-hop free
|
| 134 |
+
space optical and radio frequency (FSO-RF) communication
|
| 135 |
+
system with a decode-and-forward (DF) relaying protocol,
|
| 136 |
+
and derived the exact closed-form expressions for the outage
|
| 137 |
+
probability and bit error rate (BER) [32]. The simulation
|
| 138 |
+
results verified that the combination can improve the coverage.
|
| 139 |
+
An IRS-aided multi-antenna DF relay network was proposed
|
| 140 |
+
in [36], where three methods, an alternately iterative structure,
|
| 141 |
+
null-space projection plus maximum ratio combining (MRC)
|
| 142 |
+
and IRS element selection plus MRC, were put forward to
|
| 143 |
+
improve the rate performance. Obviously, the rate performance
|
| 144 |
+
was improved by optimizing beamforming at relay and phase
|
| 145 |
+
shifts at IRS. Moreover, compared with only IRS network, the
|
| 146 |
+
hybrid network consisting of an IRS and a single-antenna DF
|
| 147 |
+
relay can achieve the same rate performance with less IRS
|
| 148 |
+
elements [37].
|
| 149 |
+
However, the above existing research work focused on
|
| 150 |
+
conventional passive IRS. Since the received signal via the
|
| 151 |
+
reflecting channel link experiences large-scale fading twice
|
| 152 |
+
(i.e., “double fading” effect), the received signal is weak in
|
| 153 |
+
fact. Aiming at eliminating the “double fading” effect, the
|
| 154 |
+
active IRS with extra power supply emerges, which can reflect
|
| 155 |
+
and amplify the incident signals for obvious performance ad-
|
| 156 |
+
vancement. In [38], the authors proposed the concept of active
|
| 157 |
+
IRS and came up with a joint transmit and reflect precoding al-
|
| 158 |
+
gorithm to solve the problem of capacity maximization, which
|
| 159 |
+
existed in a signal model for active IRS. It was verified that the
|
| 160 |
+
proposed active IRS could achieve a noticeable capacity gain
|
| 161 |
+
compared to the existing passive IRS, which showed that the
|
| 162 |
+
“double fading” effect could be broken by active IRS. With
|
| 163 |
+
the same overall power budget, a fair performance comparison
|
| 164 |
+
between active IRS and passive IRS was made theoretically
|
| 165 |
+
in [39], where it proved that the active IRS surpassed passive
|
| 166 |
+
IRS in the case of a small or medium number of IRS elements
|
| 167 |
+
or sufficient power budget. Accordingly, a novel active IRS-
|
| 168 |
+
assisted secure wireless transmission was proposed in [40],
|
| 169 |
+
where the non-convex secrecy rate optimization problem was
|
| 170 |
+
solved by jointly optimizing the beamformer at transmitter
|
| 171 |
+
and reflecting coefficient matrix at IRS. It was demonstrated
|
| 172 |
+
that with the aid of active IRS, a significantly higher secrecy
|
| 173 |
+
performance gain could be obtained compared with existing
|
| 174 |
+
solutions with passive IRS and without IRS design.
|
| 175 |
+
Considering that active IRS has the ability to amplify signal,
|
| 176 |
+
and in order to achieve higher rate performance or save more
|
| 177 |
+
passive IRS elements of the combination network of IRS and
|
| 178 |
+
relay, we propose that adding active IRS elements to passive
|
| 179 |
+
IRS, thereby a combination network of hybrid IRS and relay is
|
| 180 |
+
generated, which makes full use of the advantages of passive
|
| 181 |
+
IRS, active IRS and relay to strike a good balance among
|
| 182 |
+
circuit cost, energy efficiency and rate performance. To our
|
| 183 |
+
best knowledge, it is lack of little research work on the hybrid
|
| 184 |
+
IRS-aided amplify-and-forward (AF) relay network.
|
| 185 |
+
In this case, using the criterion of Max SNR, three efficient
|
| 186 |
+
beamforming methods are proposed to improve the rate perfor-
|
| 187 |
+
mance of the proposed hybrid IRS-aided AF relay network or
|
| 188 |
+
dramatically extend its coverage range. The main contributions
|
| 189 |
+
of the paper are summarized as follows:
|
| 190 |
+
1) To achieve a high rate, a high-performance method based
|
| 191 |
+
on semidefinite relaxation and fractional programming
|
| 192 |
+
(HP-SDR-FP) algorithm is presented to jointly optimize
|
| 193 |
+
the beamforming matrix at AF relay and the reflecting
|
| 194 |
+
coefficient matrices at IRS by optimizing one and fixing
|
| 195 |
+
the other two. However, it is difficult to directly solve
|
| 196 |
+
the non-convex optimization problem with fractional and
|
| 197 |
+
non-concave objective function and non-convex con-
|
| 198 |
+
straints. To address this issue, some operations such as
|
| 199 |
+
vectorization, Kronecker product and Hadamard product
|
| 200 |
+
are applied to simplify the non-convex optimization
|
| 201 |
+
problem, then SDR algorithm, Charnes-Cooper trans-
|
| 202 |
+
formation of FP algorithm and Gaussian randomization
|
| 203 |
+
method are adopted to obtain the optimization variable.
|
| 204 |
+
The proposed HP-SDR-FP method can harvest up to
|
| 205 |
+
80% rate gain over the passive IRS-aided AF relay
|
| 206 |
+
network as the number of active IRS elements tends to
|
| 207 |
+
large. Additionally, its convergence rate is fast, and its
|
| 208 |
+
highest order of computational complexity is M 13 and
|
| 209 |
+
N 6.5 FLOPs.
|
| 210 |
+
2) To reduce the extremely high computational complexity
|
| 211 |
+
of the proposed HP-SDR-FP method, a low-complexity
|
| 212 |
+
method based on successive convex approximation and
|
| 213 |
+
FP (LC-SCA-FP) algorithm is presented. For the non-
|
| 214 |
+
convex optimization problem, Dinkelbach’s transforma-
|
| 215 |
+
tion of FP algorithm is firstly performed to simplify the
|
| 216 |
+
objective function. Then by utilizing the first-order Tay-
|
| 217 |
+
lor approximation of the simplified objective function
|
| 218 |
+
and relaxing the unit-modulus constraint for passive IRS
|
| 219 |
+
phase shifts, the non-convex optimization problem is
|
| 220 |
+
transformed to convex, and can be solved. The proposed
|
| 221 |
+
LC-SCA-FP method performs much better than passive
|
| 222 |
+
IRS-aided AF relay network, passive IRS-aided AF
|
| 223 |
+
relay network with random phase and only AF relay
|
| 224 |
+
network in terms of rate. Its rate is 60% higher than
|
| 225 |
+
that of passive IRS-aided AF relay system. Furthermore,
|
| 226 |
+
it is convergent, and its highest order of computational
|
| 227 |
+
complexity is M 6 and N 3 FLOPs, which is much lower
|
| 228 |
+
than that of HP-SDR-FP method.
|
| 229 |
+
|
| 230 |
+
3
|
| 231 |
+
3) To further reduce the computational complexity of the
|
| 232 |
+
above two methods, a lower-complexity method based
|
| 233 |
+
on whitening filter, general power iterative algorithm
|
| 234 |
+
and generalized Rayleigh-Ritz theorem (WF-GPI-GRR)
|
| 235 |
+
is put forward, where it is assumed that the amplifying
|
| 236 |
+
coefficient of each active IRS element is equal in the first
|
| 237 |
+
time slot or the second time slot. To exploit the colored
|
| 238 |
+
property of noise, whitening filter operation is performed
|
| 239 |
+
to the received signal. In line with the transmit power at
|
| 240 |
+
AF relay and hybrid IRS, the analytical solution of the
|
| 241 |
+
amplifying coefficient can be obtained. Moreover, the
|
| 242 |
+
closed-form expression of beamforming matrix at AF
|
| 243 |
+
relay is derived by utilizing maximum-ratio combining
|
| 244 |
+
and maximum-ratio transmission (MRC-MRT) scheme,
|
| 245 |
+
GPI and GRR are respectively applied to obtain the
|
| 246 |
+
phase shift matrices at IRS for the first time slot and
|
| 247 |
+
the second time slot. Compared with passive IRS-aided
|
| 248 |
+
AF relay network, its rate can be improved by 49%. Its
|
| 249 |
+
highest order of computational complexity is M 3 and
|
| 250 |
+
N 3 FLOPs, which is lower than the above two methods.
|
| 251 |
+
The remainder of this paper is organized as follows. In
|
| 252 |
+
Section II, a hybrid IRS-aided AF relay network is described.
|
| 253 |
+
In Section III, we propose a high-performance method. Section
|
| 254 |
+
IV describes a a low-complexity method. A lower-complexity
|
| 255 |
+
method is presented in Section V. We present our simulation
|
| 256 |
+
results in Section VI, and draw conclusions in Section VII.
|
| 257 |
+
Notation: Scalars, vectors and matrices are respectively
|
| 258 |
+
represented by letters of lower case, bold lower case, and bold
|
| 259 |
+
upper case. (·)∗, (·)T , (·)H, and (·)−1 stand for matrix conju-
|
| 260 |
+
gate, transpose, conjugate transpose, and inverse, respectively.
|
| 261 |
+
E{·}, | · |, ∥ · ∥, tr(·), and arg(·) denote expectation operation,
|
| 262 |
+
the modulus of a scalar, 2-norm, the trace of a matrix, and the
|
| 263 |
+
phase of a complex number, respectively. ⊗ and ⊙ respectively
|
| 264 |
+
denote Kronecker product and Hadamard product. The sign IN
|
| 265 |
+
is the N × N identity matrix.
|
| 266 |
+
II. SYSTEM MODEL
|
| 267 |
+
A. Signal Model
|
| 268 |
+
Fig. 1. System model for a hybrid IRS-aided AF relay wireless network.
|
| 269 |
+
Fig. 1 sketches a hybrid IRS-aided AF relay network
|
| 270 |
+
operated in a time division half-duplex scenario, where source
|
| 271 |
+
(S) and destination (D) are respectively equipped with a single
|
| 272 |
+
antenna, a AF relay is with M antennas, and an IRS includes
|
| 273 |
+
N elements consisting of K active elements and L passive
|
| 274 |
+
elements, i.e., N = K + L. The active elements reflect the
|
| 275 |
+
incident signal by adjusting the amplitude and phase, while the
|
| 276 |
+
passive elements reflect the incident signal only by shifting the
|
| 277 |
+
phase. Let us define EN , EK and EL as the sets of N elements,
|
| 278 |
+
K active elements and L passive elements, respectively. Fur-
|
| 279 |
+
thermore, EN = EK ∪ EL and EK ∩ EL = ∅. The reflecting
|
| 280 |
+
coefficient matrices of EN , EK and EL are respectively denoted
|
| 281 |
+
by Θ, Φ and Ψ, where Θ = diag(α1, · · · , αN), and the
|
| 282 |
+
reflecting coefficients of ith element in Θ is expressed by
|
| 283 |
+
αi =
|
| 284 |
+
� |βi|ejθi
|
| 285 |
+
i ∈ EK,
|
| 286 |
+
(1a)
|
| 287 |
+
ejθi
|
| 288 |
+
i ∈ EL,
|
| 289 |
+
(1b)
|
| 290 |
+
where |βi| and θi ∈ (0, 2π] are amplifying coefficient and
|
| 291 |
+
phase shift of the ith element. For convenience of derivation
|
| 292 |
+
below, we have the following definitions
|
| 293 |
+
Θ = Φ + Ψ,
|
| 294 |
+
Φ = EKΘ,
|
| 295 |
+
Ψ = EKΘ,
|
| 296 |
+
(2)
|
| 297 |
+
where EK + EK = IN and EKEK = 0N. Φ, Ψ, EK and EK
|
| 298 |
+
are sparse diagonal matrices. EK ∈ RN×N and EK ∈ RN×N
|
| 299 |
+
are respectively depended on the location distribution of K
|
| 300 |
+
active and L passive elements in the IRS. In other words, the
|
| 301 |
+
kth non-zero value of the diagonal corresponding to the kth
|
| 302 |
+
active element is 1, thus there are K values being 1 and the
|
| 303 |
+
rest L values being 0 on the diagonal of EK. Additionally, EK
|
| 304 |
+
is similar to EK. It is assumed that the direct channel between
|
| 305 |
+
S and D is blocked, and the power of signals reflected by the
|
| 306 |
+
IRS twice or more are such weak that they can be ignored. In
|
| 307 |
+
the first time slot, the received signal at IRS can be denoted
|
| 308 |
+
as
|
| 309 |
+
yr
|
| 310 |
+
1i =
|
| 311 |
+
�
|
| 312 |
+
Pshsix + n1i,
|
| 313 |
+
(3)
|
| 314 |
+
where x and Ps are the transmit signal and power from
|
| 315 |
+
S, E{xHx} = 1. We assume all channels follow Rayleigh
|
| 316 |
+
fading, hsi ∈ CN×1 is the channel from S to IRS. n1i
|
| 317 |
+
represents the additive white Gaussian noise (AWGN) at IRS
|
| 318 |
+
with distribution n1i ∼ CN(0, σ2
|
| 319 |
+
1iEKIN), which is caused by
|
| 320 |
+
K active elements. The received signal at AF relay is given
|
| 321 |
+
by
|
| 322 |
+
yr =
|
| 323 |
+
�
|
| 324 |
+
Ps(hsr + HirΘ1hsi)x + HirEKΘ1n1i + nr,
|
| 325 |
+
(4)
|
| 326 |
+
where hsr ∈ CM×1 and Hir ∈ CM×N are the channels from
|
| 327 |
+
S to AF relay and IRS to AF relay. Θ1 = diag(α11, · · · , α1N)
|
| 328 |
+
and Φ1
|
| 329 |
+
=
|
| 330 |
+
diag(φ11, · · · , φ1N) are the reflecting coeffi-
|
| 331 |
+
cient matrices of EN and EK in the first time slot. nr ∼
|
| 332 |
+
CN(0, σ2
|
| 333 |
+
rIM) is the AWGN at AF relay. After performing
|
| 334 |
+
receive and transmit beamforming, the transmit signal at AF
|
| 335 |
+
relay can be expressed as
|
| 336 |
+
yt = Ayr,
|
| 337 |
+
(5)
|
| 338 |
+
where A ∈ CM×M is the beamforming matrix. In the second
|
| 339 |
+
time slot, the received signal at IRS is written by
|
| 340 |
+
yr
|
| 341 |
+
2i = HH
|
| 342 |
+
iryt + n2i,
|
| 343 |
+
(6)
|
| 344 |
+
|
| 345 |
+
Hybrid IRS
|
| 346 |
+
First time slot
|
| 347 |
+
Active element
|
| 348 |
+
-> Second time slot
|
| 349 |
+
Passive element
|
| 350 |
+
H
|
| 351 |
+
nid
|
| 352 |
+
H
|
| 353 |
+
:Hir
|
| 354 |
+
Hir
|
| 355 |
+
Destination
|
| 356 |
+
(S)
|
| 357 |
+
(D)
|
| 358 |
+
H
|
| 359 |
+
nrd
|
| 360 |
+
AF relay4
|
| 361 |
+
SNR =
|
| 362 |
+
γs|(hH
|
| 363 |
+
rd + hH
|
| 364 |
+
idΘ2HH
|
| 365 |
+
ir)A(hsr + HirΘ1hsi)|2
|
| 366 |
+
∥(hH
|
| 367 |
+
rd + hH
|
| 368 |
+
idΘ2HH
|
| 369 |
+
ir)AHirEKΘ1∥2 + ∥(hH
|
| 370 |
+
rd + hH
|
| 371 |
+
idΘ2HH
|
| 372 |
+
ir)A∥2 + ∥hH
|
| 373 |
+
idEKΘ2∥2 + 1.
|
| 374 |
+
(10)
|
| 375 |
+
where HH
|
| 376 |
+
ir ∈ CN×M is the channel from AF relay to IRS.
|
| 377 |
+
n2i ∼ CN(0, σ2
|
| 378 |
+
2iEKIN) is the noise. The received signal at
|
| 379 |
+
D is as follows
|
| 380 |
+
yd = (hH
|
| 381 |
+
rd + hH
|
| 382 |
+
idΘ2HH
|
| 383 |
+
ir)yt + hH
|
| 384 |
+
idEKΘ2n2i + nd,
|
| 385 |
+
(7)
|
| 386 |
+
where hH
|
| 387 |
+
rd ∈ C1×M and hH
|
| 388 |
+
id ∈ C1×N are the channels from
|
| 389 |
+
AF relay to D and IRS to D. Θ2 = diag(α21, · · · , α2N) and
|
| 390 |
+
Φ2 = diag(φ21, · · · , φ2N) are the reflecting coefficient matri-
|
| 391 |
+
ces of EN and EK in the second time slot. nd ∼ CN(0, σ2
|
| 392 |
+
d) is
|
| 393 |
+
the AWGN at D. Substituting (4) and (5) into (7) yields
|
| 394 |
+
yd =
|
| 395 |
+
�
|
| 396 |
+
Ps(hH
|
| 397 |
+
rd + hH
|
| 398 |
+
idΘ2HH
|
| 399 |
+
ir)A(hsr + HirΘ1hsi)x
|
| 400 |
+
+ (hH
|
| 401 |
+
rd + hH
|
| 402 |
+
idΘ2HH
|
| 403 |
+
ir)A(HirEKΘ1n1i + nr)
|
| 404 |
+
+ hH
|
| 405 |
+
idEKΘ2n2i + nd.
|
| 406 |
+
(8)
|
| 407 |
+
It is assumed that σ2
|
| 408 |
+
1i = σ2
|
| 409 |
+
2i = σ2
|
| 410 |
+
r = σ2
|
| 411 |
+
d = σ2 and γs = Ps
|
| 412 |
+
σ2 ,
|
| 413 |
+
the achievable system rate can be defined as
|
| 414 |
+
R = 1
|
| 415 |
+
2 log2(1 + SNR),
|
| 416 |
+
(9)
|
| 417 |
+
where SNR can be formulated as (10), as shown at the top of
|
| 418 |
+
next page.
|
| 419 |
+
B. Problem Formulation
|
| 420 |
+
To enhance the system rate performance, it is necessary
|
| 421 |
+
to maximize system rate. Maximizing rate is equivalent to
|
| 422 |
+
maximize SNR due to the fact that the log function is
|
| 423 |
+
a monotone increasing function of SNR. The optimization
|
| 424 |
+
problem is casted as
|
| 425 |
+
max
|
| 426 |
+
Θ1,Θ2,A SNR
|
| 427 |
+
(11a)
|
| 428 |
+
s.t. |Θ1(i, i)| = 1, |Θ2(i, i)| = 1, for i ∈ EL,
|
| 429 |
+
(11b)
|
| 430 |
+
γs∥EKΘ1hsi∥2 + ∥EKΘ1∥2
|
| 431 |
+
F ≤ γi,
|
| 432 |
+
(11c)
|
| 433 |
+
γs∥A(hsr + HirΘ1hsi)∥2
|
| 434 |
+
+ ∥AHirEKΘ1∥2
|
| 435 |
+
F + ∥A∥2
|
| 436 |
+
F ≤ γr,
|
| 437 |
+
(11d)
|
| 438 |
+
γs∥EKΘ2HH
|
| 439 |
+
irA(hsr + HirΘ1hsi)∥2
|
| 440 |
+
+ ∥EKΘ2HH
|
| 441 |
+
irAHirEKΘ1∥2
|
| 442 |
+
F
|
| 443 |
+
+ ∥EKΘ2HH
|
| 444 |
+
irA∥2
|
| 445 |
+
F + ∥EKΘ2∥2
|
| 446 |
+
F ≤ γi, (11e)
|
| 447 |
+
where γi = Pi
|
| 448 |
+
σ2 and γr = Pr
|
| 449 |
+
σ2 , Pi and Pr respectively denote
|
| 450 |
+
the transmit power budgets at IRS and AF relay. Since the
|
| 451 |
+
IRS is hybrid consisting of active and passive elements, it
|
| 452 |
+
is difficult to solve the optimization problem. To enhance the
|
| 453 |
+
rate performance, three efficient beamforming methods: 1) HP-
|
| 454 |
+
SDR-FP; 2) LC-SCA-FP; and 3) WF-GPI-GRR, are proposed
|
| 455 |
+
to optimize AF relay beamforming matrix A, IRS reflecting
|
| 456 |
+
coefficient matrices Θ1 and Θ2.
|
| 457 |
+
III. PROPOSED A HIGH-PERFORMANCE SDR-FP-BASED
|
| 458 |
+
MAX-SNR METHOD
|
| 459 |
+
In this section, a HP-SDR-FP method is proposed to solve
|
| 460 |
+
problem (11). To facilitate processing, problem (11) is de-
|
| 461 |
+
coupled into three subproblems by optimizing one and fixing
|
| 462 |
+
the other two. For each subproblem, we relax it as an SDR
|
| 463 |
+
problem, and combine Charnes-Cooper transformation of FP
|
| 464 |
+
algorithm to transform the SDR problem into an semidefinite
|
| 465 |
+
programming (SDP) problem. Furthermore, Gaussian random-
|
| 466 |
+
ization method is applied to recover the rank-1 solution.
|
| 467 |
+
A. Optimization of A Given Θ1 and Θ2
|
| 468 |
+
Given Θ1 and Θ2, the optimization problem is reduced to
|
| 469 |
+
max
|
| 470 |
+
A
|
| 471 |
+
SNR
|
| 472 |
+
s.t.
|
| 473 |
+
(11d),
|
| 474 |
+
(11e).
|
| 475 |
+
(12)
|
| 476 |
+
Let us define a = vec(A) ∈ CM2×1, SNR can be translated
|
| 477 |
+
to
|
| 478 |
+
SNR =
|
| 479 |
+
γsaHB1a
|
| 480 |
+
aH(B2 + B3)a + ∥hH
|
| 481 |
+
idEKΘ2∥2 + 1,
|
| 482 |
+
(13)
|
| 483 |
+
where
|
| 484 |
+
B1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ]
|
| 485 |
+
⊗ [(hH
|
| 486 |
+
rd + hH
|
| 487 |
+
idΘ2HH
|
| 488 |
+
ir)H(hH
|
| 489 |
+
rd + hH
|
| 490 |
+
idΘ2HH
|
| 491 |
+
ir)], (14a)
|
| 492 |
+
B2 = [(HirEKΘ1)∗(HirEKΘ1)T ]
|
| 493 |
+
⊗ [(hH
|
| 494 |
+
rd + hH
|
| 495 |
+
idΘ2HH
|
| 496 |
+
ir)H(hH
|
| 497 |
+
rd + hH
|
| 498 |
+
idΘ2HH
|
| 499 |
+
ir)], (14b)
|
| 500 |
+
B3 = IM ⊗ [(hH
|
| 501 |
+
rd + hH
|
| 502 |
+
idΘ2HH
|
| 503 |
+
ir)H(hH
|
| 504 |
+
rd + hH
|
| 505 |
+
idΘ2HH
|
| 506 |
+
ir)]. (14c)
|
| 507 |
+
In the same manner, the constraints (11d) and (11e) can be
|
| 508 |
+
respectively converted to
|
| 509 |
+
aH(γsC1 + C2 + IM2)a ≤ γr,
|
| 510 |
+
(15a)
|
| 511 |
+
aH(γsD1 + D2 + D3)a + ∥EKΘ2∥2
|
| 512 |
+
F ≤ γi,
|
| 513 |
+
(15b)
|
| 514 |
+
where
|
| 515 |
+
C1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ] ⊗ IM, (16a)
|
| 516 |
+
C2 = [(HirEKΘ1)∗(HirEKΘ1)T ] ⊗ IM,
|
| 517 |
+
(16b)
|
| 518 |
+
D1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ]
|
| 519 |
+
⊗ [(EKΘ2HH
|
| 520 |
+
ir)H(EKΘ2HH
|
| 521 |
+
ir)],
|
| 522 |
+
(16c)
|
| 523 |
+
D2 = [(HirEKΘ1)∗(HirEKΘ1)T ]
|
| 524 |
+
⊗ [(EKΘ2HH
|
| 525 |
+
ir)H(EKΘ2HH
|
| 526 |
+
ir)],
|
| 527 |
+
(16d)
|
| 528 |
+
D3 = IM ⊗ [(EKΘ2HH
|
| 529 |
+
ir)H(EKΘ2HH
|
| 530 |
+
ir)].
|
| 531 |
+
(16e)
|
| 532 |
+
Let us define �A = aaH ∈ CM2×M2, in accordance with the
|
| 533 |
+
rank inequality: rank P ≤ min{m, n}, where P ∈ Cm×n, we
|
| 534 |
+
|
| 535 |
+
5
|
| 536 |
+
can get rank(�A) ≤ rank(a) = 1. The optimization problem
|
| 537 |
+
can be recast as
|
| 538 |
+
max
|
| 539 |
+
�A
|
| 540 |
+
γstr(B1�A)
|
| 541 |
+
tr{(B2 + B3)�A} + ∥hH
|
| 542 |
+
idEKΘ2∥2 + 1
|
| 543 |
+
(17a)
|
| 544 |
+
s.t.
|
| 545 |
+
tr{(γsC1 + C2 + IM2)�A} ≤ γr,
|
| 546 |
+
(17b)
|
| 547 |
+
tr{(γsD1 + D2 + D3)�A} + ∥EKΘ2∥2
|
| 548 |
+
F ≤ γi,
|
| 549 |
+
(17c)
|
| 550 |
+
�A ⪰ 0,
|
| 551 |
+
rank(�A) = 1,
|
| 552 |
+
(17d)
|
| 553 |
+
which is a non-convex problem because of rank-one constraint.
|
| 554 |
+
After removing rank(�A) = 1 constraint, we have the SDR
|
| 555 |
+
problem of (17) as follows
|
| 556 |
+
max
|
| 557 |
+
�A
|
| 558 |
+
γstr(B1�A)
|
| 559 |
+
tr{(B2 + B3)�A} + ∥hH
|
| 560 |
+
idEKΘ2∥2 + 1
|
| 561 |
+
(18a)
|
| 562 |
+
s.t.
|
| 563 |
+
(17b),
|
| 564 |
+
(17c),
|
| 565 |
+
�A ⪰ 0.
|
| 566 |
+
(18b)
|
| 567 |
+
The objective function (18a) is a linear fractional function with
|
| 568 |
+
respect to �A, which is a quasi-convex function with the denom-
|
| 569 |
+
inator > 0, so problem (18) is a quasi-convex problem with
|
| 570 |
+
convex constraints. It is necessary to apply Charnes-Cooper
|
| 571 |
+
transformation, which helps convert the optimization problem
|
| 572 |
+
from quasi-convex to convex. Introducing a slack variable m
|
| 573 |
+
and defining m = (tr{(B2 + B3)�A} + ∥hH
|
| 574 |
+
idEKΘ2∥2 + 1)−1,
|
| 575 |
+
the above problem (18) is further rewritten as follows
|
| 576 |
+
max
|
| 577 |
+
�A,m
|
| 578 |
+
γstr{B1�A}
|
| 579 |
+
(19a)
|
| 580 |
+
s.t. tr{(γsC1 + C2 + IM2)�A} ≤ mγr,
|
| 581 |
+
(19b)
|
| 582 |
+
tr{(γsD1 + D2 + D3)�A} + m∥EKΘ2∥2
|
| 583 |
+
F ≤ mγi, (19c)
|
| 584 |
+
tr{(B2 + B3)�A} + m∥hH
|
| 585 |
+
idEKΘ2∥2 + m = 1,
|
| 586 |
+
(19d)
|
| 587 |
+
�A ⪰ 0, m > 0,
|
| 588 |
+
(19e)
|
| 589 |
+
where �A = m�A. Clearly, the above optimization problem has
|
| 590 |
+
become a SDP problem, which is directly solved by CVX.
|
| 591 |
+
The solution to problem (18) is �A = �A/m. However, the
|
| 592 |
+
rank-one constraint rank(�A) = 1 is not considered in the SDR
|
| 593 |
+
problem. Since the obtained solution �A is not generally rank-
|
| 594 |
+
one matrix, the Gaussian randomization method is applied to
|
| 595 |
+
achieve a rank-one solution �A, thereby, AF relay beamforming
|
| 596 |
+
matrix A is achieved.
|
| 597 |
+
B. Optimization of Θ1 Given A and Θ2
|
| 598 |
+
Given that A and Θ2 are fixed, the optimization problem
|
| 599 |
+
can be represented by as follows
|
| 600 |
+
max
|
| 601 |
+
Θ1
|
| 602 |
+
γs|hH
|
| 603 |
+
rid(hsr + HirΘ1hsi)|2
|
| 604 |
+
∥hH
|
| 605 |
+
ridHirEKΘ1∥2 + ∥hH
|
| 606 |
+
rid∥2 + ∥hH
|
| 607 |
+
idEKΘ2∥2 + 1
|
| 608 |
+
(20a)
|
| 609 |
+
s.t.
|
| 610 |
+
|Θ1(i, i)| = 1,
|
| 611 |
+
for i ∈ EL,
|
| 612 |
+
(20b)
|
| 613 |
+
(11c),
|
| 614 |
+
(11d),
|
| 615 |
+
(11e),
|
| 616 |
+
(20c)
|
| 617 |
+
where
|
| 618 |
+
hrid
|
| 619 |
+
=
|
| 620 |
+
[(hH
|
| 621 |
+
rd + hH
|
| 622 |
+
idΘ2HH
|
| 623 |
+
ir)A]H.
|
| 624 |
+
In
|
| 625 |
+
order
|
| 626 |
+
to
|
| 627 |
+
further
|
| 628 |
+
simplify
|
| 629 |
+
the
|
| 630 |
+
objective
|
| 631 |
+
function
|
| 632 |
+
and
|
| 633 |
+
constraints
|
| 634 |
+
of
|
| 635 |
+
the
|
| 636 |
+
optimization
|
| 637 |
+
problem,
|
| 638 |
+
let
|
| 639 |
+
us
|
| 640 |
+
define
|
| 641 |
+
u1
|
| 642 |
+
=
|
| 643 |
+
[α11, · · · , α1N]T , we have hsr + HirΘ1hsi = Hsirv1 and
|
| 644 |
+
hH
|
| 645 |
+
ridHirEKΘ1 = uT
|
| 646 |
+
1 diag{hH
|
| 647 |
+
ridHirEK}, where v1 = [u1; 1]
|
| 648 |
+
and Hsir
|
| 649 |
+
=
|
| 650 |
+
[Hirdiag{hsi}, hsr]. Substituting these for-
|
| 651 |
+
mulas into (20a), and due to ∥uT
|
| 652 |
+
1 diag{hH
|
| 653 |
+
ridHirEK}∥2
|
| 654 |
+
=
|
| 655 |
+
∥diag{hH
|
| 656 |
+
ridHirEK}u1∥2, the object function can be further
|
| 657 |
+
rewritten as
|
| 658 |
+
vH
|
| 659 |
+
1 F1v1
|
| 660 |
+
vH
|
| 661 |
+
1 F2v1
|
| 662 |
+
,
|
| 663 |
+
(21)
|
| 664 |
+
where F1 = γsHH
|
| 665 |
+
sirhridhH
|
| 666 |
+
ridHsir and F2 is written as (22) at
|
| 667 |
+
the top of next page. The constraint (20b) for passive elements
|
| 668 |
+
EL can be rewritten as
|
| 669 |
+
|v1(i)|2 = 1,
|
| 670 |
+
for i ∈ EL.
|
| 671 |
+
(23)
|
| 672 |
+
Obviously, ∥EKΘ1∥2
|
| 673 |
+
F = ∥EKu1∥2, and the constraint (11c)
|
| 674 |
+
can be translated to
|
| 675 |
+
vH
|
| 676 |
+
1 G1v1 ≤ γi,
|
| 677 |
+
(24)
|
| 678 |
+
where
|
| 679 |
+
G1 =
|
| 680 |
+
�
|
| 681 |
+
γsdiag{hH
|
| 682 |
+
si}EKdiag{hsi} + EK
|
| 683 |
+
0N×1
|
| 684 |
+
01×N
|
| 685 |
+
0
|
| 686 |
+
�
|
| 687 |
+
.
|
| 688 |
+
(25)
|
| 689 |
+
Then for constraint (11d), according to the property of
|
| 690 |
+
Hadamard product: tr(X(Y ⊙ Z)) = tr((X ⊙ YT )Z), where
|
| 691 |
+
X ∈ Cm×n, Y ∈ Cn×m and Z ∈ Cn×m, we have
|
| 692 |
+
∥AHirEKΘ1∥2
|
| 693 |
+
F = ∥AHirEKdiag{u1}∥2
|
| 694 |
+
F
|
| 695 |
+
= tr{EKHH
|
| 696 |
+
irAHAHirEKdiag{u1}diag{uH
|
| 697 |
+
1 }}
|
| 698 |
+
= tr{EKHH
|
| 699 |
+
irAHAHir[EK ⊙ (u1uH
|
| 700 |
+
1 )]}
|
| 701 |
+
= uH
|
| 702 |
+
1 [(EKHH
|
| 703 |
+
irAHAHir) ⊙ EK]u1
|
| 704 |
+
= uH
|
| 705 |
+
1 [(HH
|
| 706 |
+
irAHAHir) ⊙ EK]u1
|
| 707 |
+
(26)
|
| 708 |
+
Inserting hsr + HirΘ1hsi = Hsirv1 and (26) back into the
|
| 709 |
+
constraint (11d), which can be rewritten as
|
| 710 |
+
vH
|
| 711 |
+
1 G2v1 ≤ γr,
|
| 712 |
+
(27)
|
| 713 |
+
where
|
| 714 |
+
G2 =γsHH
|
| 715 |
+
sirAHAHsir +
|
| 716 |
+
�
|
| 717 |
+
(HH
|
| 718 |
+
irAHAHir) ⊙ EK
|
| 719 |
+
0N×1
|
| 720 |
+
01×N
|
| 721 |
+
∥A∥2
|
| 722 |
+
F
|
| 723 |
+
�
|
| 724 |
+
.
|
| 725 |
+
(28)
|
| 726 |
+
Similarly, (11e) can be written in the following form
|
| 727 |
+
vH
|
| 728 |
+
1 G3v1 ≤ γi,
|
| 729 |
+
(29)
|
| 730 |
+
where G3 is written as (30), as shown at the top of the page.
|
| 731 |
+
Substituting the simplified objective function and constraints
|
| 732 |
+
into (20), the optimization problem can be equivalently trans-
|
| 733 |
+
formed into
|
| 734 |
+
max
|
| 735 |
+
v1
|
| 736 |
+
(21)
|
| 737 |
+
(31a)
|
| 738 |
+
s.t.
|
| 739 |
+
(23), (24), (27), (29), v1(N + 1) = 1.
|
| 740 |
+
(31b)
|
| 741 |
+
Aiming at further transforming the optimization problem, and
|
| 742 |
+
defining V1 = v1vH
|
| 743 |
+
1 , problem (31) can be equivalently given
|
| 744 |
+
by
|
| 745 |
+
max
|
| 746 |
+
V1
|
| 747 |
+
tr(F1V1)
|
| 748 |
+
tr(F2V1)
|
| 749 |
+
(32a)
|
| 750 |
+
s.t.
|
| 751 |
+
V1(i, i) = 1,
|
| 752 |
+
for i ∈ EL,
|
| 753 |
+
(32b)
|
| 754 |
+
V1(N + 1, N + 1) = 1,
|
| 755 |
+
(32c)
|
| 756 |
+
tr(G1V1) ≤ γi, tr(G2V1) ≤ γr,
|
| 757 |
+
(32d)
|
| 758 |
+
tr(G3V1) ≤ γi, rank(V1) = 1, V1 ⪰ 0.
|
| 759 |
+
(32e)
|
| 760 |
+
|
| 761 |
+
6
|
| 762 |
+
F2 =
|
| 763 |
+
� diag{EKHH
|
| 764 |
+
irhrid}diag{hH
|
| 765 |
+
ridHirEK}
|
| 766 |
+
0N×1
|
| 767 |
+
01×N
|
| 768 |
+
∥hH
|
| 769 |
+
rid∥2 + ∥hH
|
| 770 |
+
idEKΘ2∥2 + 1
|
| 771 |
+
�
|
| 772 |
+
,
|
| 773 |
+
(22)
|
| 774 |
+
G3 =γsHH
|
| 775 |
+
sirAHHirΘH
|
| 776 |
+
2 EKΘ2HH
|
| 777 |
+
irAHsir
|
| 778 |
+
+
|
| 779 |
+
�
|
| 780 |
+
(HH
|
| 781 |
+
irAHHirΘH
|
| 782 |
+
2 EKΘ2HH
|
| 783 |
+
irAHir) ⊙ EK
|
| 784 |
+
0N×1
|
| 785 |
+
01×N
|
| 786 |
+
∥EKΘ2HH
|
| 787 |
+
irA∥2
|
| 788 |
+
F + ∥EKΘ2∥2
|
| 789 |
+
F
|
| 790 |
+
�
|
| 791 |
+
.
|
| 792 |
+
(30)
|
| 793 |
+
Due to the fact that the object function is quasi-convex
|
| 794 |
+
and constraint rank(V1) = 1 is non-convex, (32) is still
|
| 795 |
+
a non-convex problem. Relaxing the rank-1 constraint, the
|
| 796 |
+
problem is transformed into a SDR problem, which can also be
|
| 797 |
+
solved by applying Charnes-Cooper transformation. Moreover,
|
| 798 |
+
introducing a slack variable τ, then defining τ = tr(F2V1)−1
|
| 799 |
+
and �V1 = τV1, the SDR problem of (32) can be translated to
|
| 800 |
+
a SDP problem, i.e.,
|
| 801 |
+
max
|
| 802 |
+
�V1,τ
|
| 803 |
+
tr(F1�V1)
|
| 804 |
+
(33a)
|
| 805 |
+
s.t.
|
| 806 |
+
�V1(i, i) = τ,
|
| 807 |
+
for i ∈ EL,
|
| 808 |
+
(33b)
|
| 809 |
+
�V1(N + 1, N + 1) = τ, τ > 0,
|
| 810 |
+
(33c)
|
| 811 |
+
tr(G1�V1) ≤ τγi, tr(G2�V1) ≤ τγr,
|
| 812 |
+
(33d)
|
| 813 |
+
tr(G3�V1) ≤ τγi, tr(F2�V1) = 1, �V1 ⪰ 0,
|
| 814 |
+
(33e)
|
| 815 |
+
which can be directly solved by CVX, thereby the solution V1
|
| 816 |
+
of SDR problem of (32) is achieved, and Gaussian randomiza-
|
| 817 |
+
tion method is used to recover a rank-one solution V1. Then
|
| 818 |
+
the solution v1 is extracted from the eigenvalue decomposition
|
| 819 |
+
of V1, subsequently, IRS reflecting coefficient matrix Θ1 can
|
| 820 |
+
be obtained.
|
| 821 |
+
C. Optimization of Θ2 Given A and Θ1
|
| 822 |
+
In the subsection, defining u2 = [α21, · · · , α2N]H, we have
|
| 823 |
+
hH
|
| 824 |
+
rd +hH
|
| 825 |
+
idΘ2HH
|
| 826 |
+
ir = vH
|
| 827 |
+
2 Hrid and Θ2HH
|
| 828 |
+
irA(hsr +HirΘ1hsi) =
|
| 829 |
+
diag{HH
|
| 830 |
+
irA(hsr + HirΘ1hsi)}u∗
|
| 831 |
+
2, where v2 = [u2; 1] and
|
| 832 |
+
Hrid = [diag{hH
|
| 833 |
+
id}HH
|
| 834 |
+
ir; hH
|
| 835 |
+
rd]. Similarly, when A and Θ1 are
|
| 836 |
+
fixed, the SDP problem to optimize �V2 can be expressed as
|
| 837 |
+
max
|
| 838 |
+
�V2,ρ
|
| 839 |
+
tr(H1�V2)
|
| 840 |
+
(34a)
|
| 841 |
+
s.t.
|
| 842 |
+
�V2(i, i) = ρ,
|
| 843 |
+
for i ∈ EL,
|
| 844 |
+
(34b)
|
| 845 |
+
�V2(N + 1, N + 1) = ρ, ρ > 0,
|
| 846 |
+
(34c)
|
| 847 |
+
tr(J�V2) ≤ ργi, tr(H2�V2) = 1, �V2 ⪰ 0,
|
| 848 |
+
(34d)
|
| 849 |
+
where ρ = tr(H2v2vH
|
| 850 |
+
2 )−1 is a slack variable, �V2 = ρv2vH
|
| 851 |
+
2 ,
|
| 852 |
+
H1 = γsHridA(hsr + HirΘ1hsi)[HridA(hsr + HirΘ1hsi)]H,
|
| 853 |
+
H2 =HridA(HirEKΘ1ΘH
|
| 854 |
+
1 EKHH
|
| 855 |
+
ir + IM)AHHH
|
| 856 |
+
rid
|
| 857 |
+
+
|
| 858 |
+
�
|
| 859 |
+
diag{hH
|
| 860 |
+
idEK}diag{EKhid}
|
| 861 |
+
0N×1
|
| 862 |
+
01×N
|
| 863 |
+
1
|
| 864 |
+
�
|
| 865 |
+
,
|
| 866 |
+
(35)
|
| 867 |
+
and J is written as (36) at the top of next page, where
|
| 868 |
+
H3
|
| 869 |
+
=
|
| 870 |
+
EKdiag{HT
|
| 871 |
+
irA∗(hsr + HirΘ1hsi)∗} and H4
|
| 872 |
+
=
|
| 873 |
+
HH
|
| 874 |
+
irAHirEKΘ1. It is observed that (34) is similar to (33),
|
| 875 |
+
thus (34) can be solved in the same way as (33). Finally the
|
| 876 |
+
solutions v2 and Θ2 are obtained, and the details are omitted
|
| 877 |
+
here for brevity.
|
| 878 |
+
D. Overall Algorithm and Complexity Analysis
|
| 879 |
+
Since the objective function of problem (11) is non-
|
| 880 |
+
decreasing and the transmit powers of S, AF relay and IRS
|
| 881 |
+
active elements are limited, the objective function has an
|
| 882 |
+
upper bound. Therefore, the convergence of the proposed HP-
|
| 883 |
+
SDR-FP algorithm can be guaranteed. Our idea is alternative
|
| 884 |
+
iteration, that is, the alternative iteration process are performed
|
| 885 |
+
among A, Θ1 and Θ2 until the convergence criterion is
|
| 886 |
+
satisfied, while the system rate is maximum. The proposed
|
| 887 |
+
HP-SDR-FP method is summarized in Algorithm 1.
|
| 888 |
+
Algorithm 1 Proposed HP-SDR-FP Method
|
| 889 |
+
1. Initialize A0, Θ0
|
| 890 |
+
1 and Θ0
|
| 891 |
+
2. According to (9), R0 can be
|
| 892 |
+
obtained.
|
| 893 |
+
2.
|
| 894 |
+
set the convergence error δ and the iteration number
|
| 895 |
+
t = 0.
|
| 896 |
+
3. repeat
|
| 897 |
+
4. Given Θt
|
| 898 |
+
1 and Θt
|
| 899 |
+
2, solve problem (19) for �A
|
| 900 |
+
t+1, recover
|
| 901 |
+
rank-1 solution �A
|
| 902 |
+
t+1 via Gaussian randomization, obtain
|
| 903 |
+
At+1.
|
| 904 |
+
5. Given At+1 and Θt
|
| 905 |
+
2, solve problem (33) for �V
|
| 906 |
+
t+1
|
| 907 |
+
1
|
| 908 |
+
,
|
| 909 |
+
recover rank-1 solution Vt+1
|
| 910 |
+
1
|
| 911 |
+
via Gaussian randomization,
|
| 912 |
+
obtain Θt+1
|
| 913 |
+
1
|
| 914 |
+
.
|
| 915 |
+
6. Given At+1 and Θt+1
|
| 916 |
+
1
|
| 917 |
+
, solve problem (34) for �V
|
| 918 |
+
t+1
|
| 919 |
+
2
|
| 920 |
+
,
|
| 921 |
+
recover rank-1 solution Vt+1
|
| 922 |
+
2
|
| 923 |
+
via Gaussian randomization,
|
| 924 |
+
obtain Θt+1
|
| 925 |
+
2
|
| 926 |
+
.
|
| 927 |
+
7. Calculate Rt+1 by using At+1, Θt+1
|
| 928 |
+
1
|
| 929 |
+
and Θt+1
|
| 930 |
+
2
|
| 931 |
+
.
|
| 932 |
+
8. Update t = t + 1.
|
| 933 |
+
9. until
|
| 934 |
+
��Rt+1 − Rt�� ≤ δ.
|
| 935 |
+
After that, the complexity of Algorithm 1 is calculated
|
| 936 |
+
and analyzed according to problems (19), (33) and (34).
|
| 937 |
+
Problem (19) has 4 linear constraints with dimension 1, one
|
| 938 |
+
linear matrix inequality (LMI) constraint of size M 2 and
|
| 939 |
+
M 4+1 decision variables. Hence, the computational complex-
|
| 940 |
+
ity of problem (19) is denoted as O{nA
|
| 941 |
+
√
|
| 942 |
+
M 2 + 4(M 6 + 4 +
|
| 943 |
+
nA(M 4 + 4) + n2
|
| 944 |
+
A)ln(1/ε)} float-point operations (FLOPs),
|
| 945 |
+
where nA = M 4 + 1 and ε represents the computation
|
| 946 |
+
accuracy. For problem (33), there exit L + 6 linear constraints
|
| 947 |
+
with dimension 1, one LMI constraint of size N + 1 and
|
| 948 |
+
(N +1)2+1 decision variables, so the computational complex-
|
| 949 |
+
ity of problem (33) is written as O{nV1
|
| 950 |
+
√
|
| 951 |
+
N + L + 7((N +
|
| 952 |
+
|
| 953 |
+
7
|
| 954 |
+
J =
|
| 955 |
+
�
|
| 956 |
+
γsHH
|
| 957 |
+
3 H3 + (H4HH
|
| 958 |
+
4 + HH
|
| 959 |
+
irAAHHir + IN) ⊙ EK
|
| 960 |
+
0N×1
|
| 961 |
+
01×N
|
| 962 |
+
0
|
| 963 |
+
�
|
| 964 |
+
.
|
| 965 |
+
(36)
|
| 966 |
+
1)3 + L + 6 + nV1((N + 1)2 + L + 6) + n2
|
| 967 |
+
V1)ln(1/ε)} FLOPs,
|
| 968 |
+
where nV1 = (N + 1)2 + 1. For problem (34), there are L + 4
|
| 969 |
+
linear constraints with dimension 1, one LMI constraint of
|
| 970 |
+
size N + 1 and (N + 1)2 + 1 decision variables. Thus, the
|
| 971 |
+
computational complexity of problem (34) is expressed as
|
| 972 |
+
O{nV2
|
| 973 |
+
√
|
| 974 |
+
N + L + 5((N + 1)3 + L + 4 + nV2((N + 1)2 +
|
| 975 |
+
L + 4) + n2
|
| 976 |
+
V2)ln(1/ε)} FLOPs, where nV2 = (N + 1)2 + 1.
|
| 977 |
+
Therefore, the total computational complexity of Algorithm 1
|
| 978 |
+
is written by
|
| 979 |
+
O{D1[nA
|
| 980 |
+
�
|
| 981 |
+
M 2 + 4(M 6 + 4 + nA(M 4 + 4) + n2
|
| 982 |
+
A)
|
| 983 |
+
+ nV1
|
| 984 |
+
√
|
| 985 |
+
N + L + 7((N + 1)3 + L + 6 + nV1((N + 1)2
|
| 986 |
+
+ L + 6) + n2
|
| 987 |
+
V1) + nV2
|
| 988 |
+
√
|
| 989 |
+
N + L + 5((N + 1)3 + L + 4
|
| 990 |
+
+ nV2((N + 1)2 + L + 4) + n2
|
| 991 |
+
V2)]ln(1/ε)}
|
| 992 |
+
(37)
|
| 993 |
+
FLOPs, where D1 is the maximum number of alternating
|
| 994 |
+
iterations needed for convergence in Algorithm 1. It is obvious
|
| 995 |
+
that the highest order of computational complexity is M 13 and
|
| 996 |
+
N 6.5 FLOPs.
|
| 997 |
+
IV. PROPOSED A LOW-COMPLEXITY SCA-FP-BASED
|
| 998 |
+
MAX-SNR METHOD
|
| 999 |
+
In the previous section, HP-SDR-FP method is proposed
|
| 1000 |
+
to obtain AF relay beamforming matrix A, IRS reflecting
|
| 1001 |
+
coefficient matrices Θ1 and Θ2. However, its computational
|
| 1002 |
+
complexity is very high because of SDR algorithm with lots of
|
| 1003 |
+
FLOPs. To reduce the high computational complexity of HP-
|
| 1004 |
+
SDR-FP method, a low-complexity SCA-FP-based Max-SNR
|
| 1005 |
+
method is proposed in this section.
|
| 1006 |
+
A. Optimize A With Fixed Θ1 and Θ2
|
| 1007 |
+
For given Θ1 and Θ2, the optimization problem based on
|
| 1008 |
+
(13) is given by
|
| 1009 |
+
max
|
| 1010 |
+
a
|
| 1011 |
+
γsaHB1a
|
| 1012 |
+
aH(B2 + B3)a + ∥hH
|
| 1013 |
+
idEKΘ2∥2 + 1
|
| 1014 |
+
(38a)
|
| 1015 |
+
s.t.
|
| 1016 |
+
(15a), (15b).
|
| 1017 |
+
(38b)
|
| 1018 |
+
Observing the above objective function, it is seen that (38)
|
| 1019 |
+
is also a fractional optimization problem. In the subsection,
|
| 1020 |
+
Dinkelbachs transformation is introduced to solve problem
|
| 1021 |
+
(38). Here, introducing a slack variables µ, the problem (38)
|
| 1022 |
+
is reformulated as
|
| 1023 |
+
max
|
| 1024 |
+
a,µ
|
| 1025 |
+
γsaHB1a − µ[aH(B2 + B3)a + ∥hH
|
| 1026 |
+
idEKΘ2∥2 + 1]
|
| 1027 |
+
(39a)
|
| 1028 |
+
s.t.
|
| 1029 |
+
(15a), (15b),
|
| 1030 |
+
(39b)
|
| 1031 |
+
where µ is iteratively updated by
|
| 1032 |
+
µ(t + 1) =
|
| 1033 |
+
γsaH(t)B1a(t)
|
| 1034 |
+
aH(t)(B2 + B3)a(t) + ∥hH
|
| 1035 |
+
idEKΘ2∥2 + 1, (40)
|
| 1036 |
+
where t is the iteration number. µ is nondecreasing after each
|
| 1037 |
+
iteration, which guarantees the convergence of the objective
|
| 1038 |
+
function (39a). Note that the above problem is still non-
|
| 1039 |
+
convex due to the first term of the objective function is non-
|
| 1040 |
+
concave, which can be solved by using SCA method. We
|
| 1041 |
+
approximate the first term by using a linear function, i.e.,
|
| 1042 |
+
its first-order Taylor expansion at feasible vector �a, which
|
| 1043 |
+
is γsaHB1a ≥ 2γsℜ{aHB1�a} − γs�aHB1�a, where �a is the
|
| 1044 |
+
solution of previous iteration. Inserting the low bound of
|
| 1045 |
+
γsaHB1a back into problem (39) yields
|
| 1046 |
+
max
|
| 1047 |
+
a
|
| 1048 |
+
2γsℜ{aHB1�a} − γs�aHB1�a
|
| 1049 |
+
− µ[aH(B2 + B3)a + ∥hH
|
| 1050 |
+
idEKΘ2∥2 + 1]
|
| 1051 |
+
(41a)
|
| 1052 |
+
s.t.
|
| 1053 |
+
(15a), (15b).
|
| 1054 |
+
(41b)
|
| 1055 |
+
It is known that the above optimization problem consists of
|
| 1056 |
+
a concave objective function and several convex constraints.
|
| 1057 |
+
Therefore, problem (41) is a convex optimization problem.
|
| 1058 |
+
When �a and µ are fixed, a can be directly achieved by CVX.
|
| 1059 |
+
Correspondingly, A can be obtained.
|
| 1060 |
+
B. Optimize Θ1 With Fixed A and Θ2
|
| 1061 |
+
It is assumed that AF relay beamforming matrix A and Θ2
|
| 1062 |
+
are given. The constraint (11b) can be re-expressed as
|
| 1063 |
+
|u1(i)|2 = 1,
|
| 1064 |
+
for i ∈ EL,
|
| 1065 |
+
(42)
|
| 1066 |
+
which can be relaxed as
|
| 1067 |
+
uH
|
| 1068 |
+
1 (i)u1(i) ≤ 1,
|
| 1069 |
+
for i ∈ EL.
|
| 1070 |
+
(43)
|
| 1071 |
+
Problem (11) with respect to u1 can be rearranged as
|
| 1072 |
+
max
|
| 1073 |
+
u1
|
| 1074 |
+
γs|hH
|
| 1075 |
+
1 u1 + a|2
|
| 1076 |
+
∥diag{hH
|
| 1077 |
+
ridHirEK}u1∥2 + b
|
| 1078 |
+
(44a)
|
| 1079 |
+
s.t.
|
| 1080 |
+
uH
|
| 1081 |
+
1 (i)u1(i) ≤ 1,
|
| 1082 |
+
for i ∈ EL,
|
| 1083 |
+
(44b)
|
| 1084 |
+
γs∥EKdiag{hsi}u1∥2 + ∥EKu1∥2 ≤ γi,
|
| 1085 |
+
(44c)
|
| 1086 |
+
γs∥Ahsr + P1u1∥2 + ∥AHirEKdiag{u1}∥2
|
| 1087 |
+
F
|
| 1088 |
+
+ ∥A∥2
|
| 1089 |
+
F ≤ γr,
|
| 1090 |
+
(44d)
|
| 1091 |
+
γs∥h2 + P2u1∥2 + ∥P3EKdiag{u1}∥2
|
| 1092 |
+
F ≤ �γi,
|
| 1093 |
+
(44e)
|
| 1094 |
+
where
|
| 1095 |
+
h1 = [(hH
|
| 1096 |
+
rd + hH
|
| 1097 |
+
idΘ2HH
|
| 1098 |
+
ir)AHirdiag{hsi}]H,
|
| 1099 |
+
(45a)
|
| 1100 |
+
h2 = EKΘ2HH
|
| 1101 |
+
irAhsr, P1 = AHirdiag{hsi},
|
| 1102 |
+
(45b)
|
| 1103 |
+
P2 = EKΘ2HH
|
| 1104 |
+
irAHirdiag{hsi},
|
| 1105 |
+
(45c)
|
| 1106 |
+
P3 = EKΘ2HH
|
| 1107 |
+
irAHir, a = (hH
|
| 1108 |
+
rd + hH
|
| 1109 |
+
idΘ2HH
|
| 1110 |
+
ir)Ahsr, (45d)
|
| 1111 |
+
b = ∥(hH
|
| 1112 |
+
rd + hH
|
| 1113 |
+
idΘ2HH
|
| 1114 |
+
ir)A∥2 + ∥hH
|
| 1115 |
+
idEKΘ2∥2 + 1,
|
| 1116 |
+
(45e)
|
| 1117 |
+
�γi = γi − ∥EKΘ2HH
|
| 1118 |
+
irA∥2
|
| 1119 |
+
F − ∥EKΘ2∥2
|
| 1120 |
+
F .
|
| 1121 |
+
(45f)
|
| 1122 |
+
|
| 1123 |
+
8
|
| 1124 |
+
Problem (44) can be further converted to
|
| 1125 |
+
max
|
| 1126 |
+
u1
|
| 1127 |
+
γs|hH
|
| 1128 |
+
1 u1 + a|2
|
| 1129 |
+
∥diag{hH
|
| 1130 |
+
ridHirEK}u1∥2 + b
|
| 1131 |
+
(46a)
|
| 1132 |
+
s.t.
|
| 1133 |
+
uH
|
| 1134 |
+
1 (i)u1(i) ≤ 1,
|
| 1135 |
+
for i ∈ EL,
|
| 1136 |
+
(46b)
|
| 1137 |
+
uH
|
| 1138 |
+
1 (γsdiag{hH
|
| 1139 |
+
si}EKdiag{hsi} + EK)u1 ≤ γi,
|
| 1140 |
+
(46c)
|
| 1141 |
+
uH
|
| 1142 |
+
1 [γsPH
|
| 1143 |
+
1 P1 + (HH
|
| 1144 |
+
irAHAHir) ⊙ EK]u1 + ∥A∥2
|
| 1145 |
+
F
|
| 1146 |
+
+ 2γsℜ{uH
|
| 1147 |
+
1 PH
|
| 1148 |
+
1 Ahsr} + γshH
|
| 1149 |
+
srAHAhsr ≤ γr,
|
| 1150 |
+
(46d)
|
| 1151 |
+
uH
|
| 1152 |
+
1 [γsPH
|
| 1153 |
+
2 P2 + (PH
|
| 1154 |
+
3 P3) ⊙ EK]u1
|
| 1155 |
+
+ 2γsℜ{uH
|
| 1156 |
+
1 PH
|
| 1157 |
+
2 h2} + γshH
|
| 1158 |
+
2 h2 ≤ �γi.
|
| 1159 |
+
(46e)
|
| 1160 |
+
In the same manner, Dinkelbach’s transformation is also
|
| 1161 |
+
introduced to problem (46). Problem (46) can be rewritten
|
| 1162 |
+
as
|
| 1163 |
+
max
|
| 1164 |
+
u1
|
| 1165 |
+
γs|hH
|
| 1166 |
+
1 u1 + a|2 − ωb
|
| 1167 |
+
− ωuH
|
| 1168 |
+
1 diag{EKHH
|
| 1169 |
+
irhrid}diag{hH
|
| 1170 |
+
ridHirEK}u1 (47a)
|
| 1171 |
+
s.t.
|
| 1172 |
+
(46b), (46c), (46d), (46e),
|
| 1173 |
+
(47b)
|
| 1174 |
+
where ω is a variable scalar, which is defined as
|
| 1175 |
+
ω(t + 1) =
|
| 1176 |
+
γs|hH
|
| 1177 |
+
1 u1(t) + a|2
|
| 1178 |
+
∥diag{hH
|
| 1179 |
+
ridHirEK}u1(t)∥2 + b.
|
| 1180 |
+
(48)
|
| 1181 |
+
Similarly, aiming at converting the objective function (47a)
|
| 1182 |
+
to convex, the first-order Taylor expansion at the point �u1 is
|
| 1183 |
+
employed to γs|hH
|
| 1184 |
+
1 u1 + a|2 and transform it into the linear
|
| 1185 |
+
function, i.e., |hH
|
| 1186 |
+
1 u1 + a|2 ≥ 2ℜ{uH
|
| 1187 |
+
1 h1(hH
|
| 1188 |
+
1 �u1 + a)} + a∗a −
|
| 1189 |
+
�uH
|
| 1190 |
+
1 h1hH
|
| 1191 |
+
1 �u1. Inserting the low bound of
|
| 1192 |
+
��hH
|
| 1193 |
+
1 u1 + a
|
| 1194 |
+
��2 back into
|
| 1195 |
+
problem (47) yields the following optimization problem
|
| 1196 |
+
max
|
| 1197 |
+
u1
|
| 1198 |
+
2γsℜ{uH
|
| 1199 |
+
1 h1(hH
|
| 1200 |
+
1 �u1 + a)} + γsa∗a − γs�uH
|
| 1201 |
+
1 h1hH
|
| 1202 |
+
1 �u1−
|
| 1203 |
+
ω(b + uH
|
| 1204 |
+
1 diag{EKHH
|
| 1205 |
+
irhrid}diag{hH
|
| 1206 |
+
ridHirEK}u1) (49a)
|
| 1207 |
+
s.t.
|
| 1208 |
+
(46b), (46c), (46d), (46e),
|
| 1209 |
+
(49b)
|
| 1210 |
+
where the object function is concave and the constraints are
|
| 1211 |
+
convex, thus problem (49) is convex. For a given feasible
|
| 1212 |
+
vector �u1 and ω, problem (49) can be solved by CVX directly,
|
| 1213 |
+
thereby u1 is achieved.
|
| 1214 |
+
C. Optimize Θ2 With Fixed A and Θ1
|
| 1215 |
+
Similarly, given AF relay beamforming matrix A and Θ1,
|
| 1216 |
+
the optimization problem with respect to u2 is modeled as
|
| 1217 |
+
max
|
| 1218 |
+
u2
|
| 1219 |
+
2γsℜ{uH
|
| 1220 |
+
2 h3(hH
|
| 1221 |
+
3 �u2 + c∗)} + γscc∗ − γs�uH
|
| 1222 |
+
2 h3hH
|
| 1223 |
+
3 �u2
|
| 1224 |
+
− λ(uH
|
| 1225 |
+
2 Q1QH
|
| 1226 |
+
1 u2 + 2ℜ{uH
|
| 1227 |
+
2 Q1h4} + hH
|
| 1228 |
+
4 h4)
|
| 1229 |
+
− λ(uH
|
| 1230 |
+
2 Q2QH
|
| 1231 |
+
2 u2 + 2ℜ{uH
|
| 1232 |
+
2 Q2AHhrd})
|
| 1233 |
+
− λhH
|
| 1234 |
+
rdAAHhrd − λuH
|
| 1235 |
+
2 Q3QH
|
| 1236 |
+
3 u2 − λ
|
| 1237 |
+
(50a)
|
| 1238 |
+
s.t.
|
| 1239 |
+
uH
|
| 1240 |
+
2 (i)u2(i) ≤ 1, for i ∈ EL,
|
| 1241 |
+
(50b)
|
| 1242 |
+
uH
|
| 1243 |
+
2 [γsHH
|
| 1244 |
+
3 H3 + (H4HH
|
| 1245 |
+
4 + HH
|
| 1246 |
+
irAAHHir + IN) ⊙ EK]u2
|
| 1247 |
+
≤ γi,
|
| 1248 |
+
(50c)
|
| 1249 |
+
where λ is a variable, �u2 is a feasible vector, and
|
| 1250 |
+
h3 = diag{hH
|
| 1251 |
+
id}HH
|
| 1252 |
+
irA(hsr + HirΘ1hsi),
|
| 1253 |
+
(51a)
|
| 1254 |
+
h4 = (hH
|
| 1255 |
+
rdAHirEKΘ1)H,
|
| 1256 |
+
(51b)
|
| 1257 |
+
Q1 = diag{hH
|
| 1258 |
+
id}HH
|
| 1259 |
+
irAHirEKΘ1,
|
| 1260 |
+
(51c)
|
| 1261 |
+
Q2 = diag{hH
|
| 1262 |
+
id}HH
|
| 1263 |
+
irA, Q3 = diag{hH
|
| 1264 |
+
idEK},
|
| 1265 |
+
(51d)
|
| 1266 |
+
c = hH
|
| 1267 |
+
rdA(hsr + HirΘ1hsi),
|
| 1268 |
+
(51e)
|
| 1269 |
+
λ(t + 1) =
|
| 1270 |
+
γs|uH
|
| 1271 |
+
2 (t)h3 + c|2
|
| 1272 |
+
∥uH
|
| 1273 |
+
2 (t)Q1 + hH
|
| 1274 |
+
4 ∥2 + ∥uH
|
| 1275 |
+
2 (t)Q2 + hH
|
| 1276 |
+
rdA∥2 + ∥uH
|
| 1277 |
+
2 (t)Q3∥2 + 1.
|
| 1278 |
+
(51f)
|
| 1279 |
+
It is clear that problem (50) is a convex optimization problem
|
| 1280 |
+
with concave objective function and convex constraints. Given
|
| 1281 |
+
�u2 and λ, u2 can be effectively obtained by CVX.
|
| 1282 |
+
D. Overall Algorithm and Complexity Analysis
|
| 1283 |
+
In the same manner, the proposed LC-SCA-FP method
|
| 1284 |
+
is convergent with an upper bound. The alternate iteration
|
| 1285 |
+
idea is roughly as follows: for given Θ1 and Θ2, first-
|
| 1286 |
+
order Taylor expansion is applied in problem (39), AF relay
|
| 1287 |
+
beamforming vector a can be calculated by solving problem
|
| 1288 |
+
(41) iteratively; similarly, for given A and Θ2, reflecting
|
| 1289 |
+
coefficient vector u1 can be obtained by solving problem (49)
|
| 1290 |
+
iteratively; for given A and Θ1, reflecting coefficient vector
|
| 1291 |
+
u2 can be achieved by solving problem (50) iteratively. Then
|
| 1292 |
+
the alternative iteration process are operated among A, Θ1
|
| 1293 |
+
and Θ2 until the convergence criterion is satisfied, while the
|
| 1294 |
+
system rate is maximum. The proposed LC-SCA-FP method
|
| 1295 |
+
is summarized in Algorithm 2.
|
| 1296 |
+
Furthermore, we calculate and analyze the complexity of
|
| 1297 |
+
Algorithm 2 in accordance with problems (41), (49) and (50).
|
| 1298 |
+
It is observed that problem (41) consists of one SOC constraint
|
| 1299 |
+
of dimension M 2 and one SOC constraint of dimension
|
| 1300 |
+
M 2 + 1. The number of decision variables na = M 2. The
|
| 1301 |
+
computational complexity corresponding to problem (41) is
|
| 1302 |
+
represented as O{2na(M 4+(M 2+1)2+n2
|
| 1303 |
+
a)ln(1/ε)} FLOPs.
|
| 1304 |
+
Problem (49) includes L SOC constraints of dimension 1,
|
| 1305 |
+
one SOC constraint of dimension N, one SOC constraint of
|
| 1306 |
+
dimension N +1 and one SOC constraint of dimension N +2.
|
| 1307 |
+
The number of decision variables nu1 = N. The computa-
|
| 1308 |
+
tional complexity corresponding to problem (49) is written as
|
| 1309 |
+
O{nu1
|
| 1310 |
+
√
|
| 1311 |
+
2L + 6(L+N 2+(N +1)2+(N +2)2+n2
|
| 1312 |
+
u1)ln(1/ε)}
|
| 1313 |
+
FLOPs. Problem (50) is composed of L SOC constraints of
|
| 1314 |
+
dimension 1 and one SOC constraint of dimension N. The
|
| 1315 |
+
number of decision variables nu2 = N. The computational
|
| 1316 |
+
complexity corresponding to problem (50) is expressed as
|
| 1317 |
+
O{nu2
|
| 1318 |
+
√2L + 2(L+N 2+n2
|
| 1319 |
+
u2)ln(1/ε)} FLOPs. Consequently,
|
| 1320 |
+
the total computational complexity of Algorithm 2 is denoted
|
| 1321 |
+
as
|
| 1322 |
+
O{D2[2na(M 4 + (M 2 + 1)2 + n2
|
| 1323 |
+
a) + nu1
|
| 1324 |
+
√
|
| 1325 |
+
2L + 6
|
| 1326 |
+
· (L + N 2 + (N + 1)2 + (N + 2)2 + n2
|
| 1327 |
+
u1)
|
| 1328 |
+
+ nu2
|
| 1329 |
+
√
|
| 1330 |
+
2L + 2(L + N 2 + n2
|
| 1331 |
+
u2)]ln(1/ε)}
|
| 1332 |
+
(52)
|
| 1333 |
+
FLOPs, where D2 is the maximum number of alternating
|
| 1334 |
+
iterations to obtain a, u1 and u2. For Algorithm 2, its highest
|
| 1335 |
+
|
| 1336 |
+
9
|
| 1337 |
+
Algorithm 2 Proposed LC-SCA-FP Method
|
| 1338 |
+
1. Initialize A0, Θ0
|
| 1339 |
+
1 and Θ0
|
| 1340 |
+
2. According to (9), R0 can be
|
| 1341 |
+
obtained.
|
| 1342 |
+
2. set the convergence error δ and the iteration number
|
| 1343 |
+
t = 0.
|
| 1344 |
+
3. repeat
|
| 1345 |
+
4. Fix Θt
|
| 1346 |
+
1 and Θt
|
| 1347 |
+
2, initialize �a0, set δ and t1 = 0.
|
| 1348 |
+
5.
|
| 1349 |
+
repeat
|
| 1350 |
+
6.
|
| 1351 |
+
Update solution at1+1 with (�at1, µt1) by solving
|
| 1352 |
+
problem (41), t1 = t1 + 1.
|
| 1353 |
+
7.
|
| 1354 |
+
Set �at1+1 = at1+1 and update µt1+1.
|
| 1355 |
+
8.
|
| 1356 |
+
until (41a) converges, update at+1 = at1+1 and
|
| 1357 |
+
obtain At+1.
|
| 1358 |
+
9. Fix At+1 and Θt
|
| 1359 |
+
2, initialize �u0
|
| 1360 |
+
1, set δ and t2 = 0.
|
| 1361 |
+
10.
|
| 1362 |
+
repeat
|
| 1363 |
+
11.
|
| 1364 |
+
Update solution ut2+1
|
| 1365 |
+
1
|
| 1366 |
+
with (�ut2
|
| 1367 |
+
1 , wt2) by solving
|
| 1368 |
+
problem (49), t2 = t2 + 1.
|
| 1369 |
+
12.
|
| 1370 |
+
Set �ut2+1
|
| 1371 |
+
1
|
| 1372 |
+
= ut2+1
|
| 1373 |
+
1
|
| 1374 |
+
and update wt2+1.
|
| 1375 |
+
13.
|
| 1376 |
+
until (49a) converges, update ut+1
|
| 1377 |
+
1
|
| 1378 |
+
= ut2+1
|
| 1379 |
+
1
|
| 1380 |
+
and
|
| 1381 |
+
obtain Θt+1
|
| 1382 |
+
1
|
| 1383 |
+
.
|
| 1384 |
+
14. Fix At+1 and Θt+1
|
| 1385 |
+
1
|
| 1386 |
+
, initialize �u0
|
| 1387 |
+
2, set δ and t3 = 0.
|
| 1388 |
+
15.
|
| 1389 |
+
repeat
|
| 1390 |
+
16.
|
| 1391 |
+
Update solution ut3+1
|
| 1392 |
+
2
|
| 1393 |
+
with (�ut3
|
| 1394 |
+
2 , λt3) by solving
|
| 1395 |
+
problem (50), t3 = t3 + 1.
|
| 1396 |
+
17.
|
| 1397 |
+
Set �ut3+1
|
| 1398 |
+
2
|
| 1399 |
+
= ut3+1
|
| 1400 |
+
2
|
| 1401 |
+
and update λt3+1.
|
| 1402 |
+
18.
|
| 1403 |
+
until (50a) converges, update ut+1
|
| 1404 |
+
2
|
| 1405 |
+
= ut3+1
|
| 1406 |
+
2
|
| 1407 |
+
and
|
| 1408 |
+
obtain Θt+1
|
| 1409 |
+
2
|
| 1410 |
+
.
|
| 1411 |
+
19. Calculate R by using At+1, Θt+1
|
| 1412 |
+
1
|
| 1413 |
+
and Θt+1
|
| 1414 |
+
2
|
| 1415 |
+
, t = t+1.
|
| 1416 |
+
20. until
|
| 1417 |
+
��Rt+1 − Rt�� ≤ δ.
|
| 1418 |
+
order of computational complexity is M 6 and N 3 FLOPS,
|
| 1419 |
+
which is greatly reduced compared to the complexity of HP-
|
| 1420 |
+
SDR-FP method.
|
| 1421 |
+
V. PROPOSED A LOWER-COMPLEXITY
|
| 1422 |
+
WF-GPI-GRR-BASED MAX-SNR METHOD
|
| 1423 |
+
In what follows, to further reduce the computational com-
|
| 1424 |
+
plexity, a lower-complexity WF-GPI-GRR-based Max-SNR
|
| 1425 |
+
method is put forward. For gaining rate enhancement, we ap-
|
| 1426 |
+
ply WF operation to exploit the colored property of noise and
|
| 1427 |
+
present the related system model. Here, active IRS reflecting
|
| 1428 |
+
coefficient matrix is split into amplifying coefficient and IRS
|
| 1429 |
+
phase-shift matrix. The details of derivation on the amplifying
|
| 1430 |
+
coefficients, AF relay beamforming matrix and IRS phase-shift
|
| 1431 |
+
matrices are described as below.
|
| 1432 |
+
A. System Model
|
| 1433 |
+
For brevity, it is assumed that the amplifying coefficients of
|
| 1434 |
+
each IRS active element in the first time slot and the second
|
| 1435 |
+
time slot are |β1| and |β2|, respectively. Let us define
|
| 1436 |
+
Ψ1 = EK �Θ1, Φ1 = |β1|EK �Θ1,
|
| 1437 |
+
(53a)
|
| 1438 |
+
Ψ2 = EK �Θ2, Φ2 = |β2|EK �Θ2,
|
| 1439 |
+
(53b)
|
| 1440 |
+
where the phase-shift matrix �Θ1 = diag(ejθ1i, · · · , ejθ1N ),
|
| 1441 |
+
�Θ2 = diag(ejθ2i, · · · , ejθ2N), | �Θ1(i, i)| = 1 and | �Θ2(i, i)| =
|
| 1442 |
+
1. Thus we have
|
| 1443 |
+
Θ1 = (EK + |β1|EK) �Θ1, Θ2 = (EK + |β2|EK) �Θ2. (54)
|
| 1444 |
+
In the first time slot, the received signal at AF relay can be
|
| 1445 |
+
redescribed as
|
| 1446 |
+
yr =
|
| 1447 |
+
�
|
| 1448 |
+
Ps[hsr + Hir(EK + |β1|EK) �Θ1hsi]x
|
| 1449 |
+
+ (|β1|HirEK �Θ1n1i + nr)
|
| 1450 |
+
�
|
| 1451 |
+
��
|
| 1452 |
+
�
|
| 1453 |
+
n1r
|
| 1454 |
+
.
|
| 1455 |
+
(55)
|
| 1456 |
+
As matter of fact, n1r is color, not white. It is necessary for
|
| 1457 |
+
us to whiten the color noise n1r by using covariance matrix
|
| 1458 |
+
Cn. The covariance W1r of n1r is given by
|
| 1459 |
+
W1r = β2
|
| 1460 |
+
1∥HirEK �Θ1∥2
|
| 1461 |
+
F σ2 + σ2.
|
| 1462 |
+
(56)
|
| 1463 |
+
While n1i and nr are the independent and identically dis-
|
| 1464 |
+
tributed random vectors, n1r has a mean vector of all-zeros
|
| 1465 |
+
and covariance matrix
|
| 1466 |
+
C1r = β2
|
| 1467 |
+
1σ2HirEK �Θ1 �ΘH
|
| 1468 |
+
1 EKHH
|
| 1469 |
+
ir + σ2IM,
|
| 1470 |
+
(57)
|
| 1471 |
+
where obviously C1r is a positive definite matrix. Defining the
|
| 1472 |
+
WF matrix W1r with W1rWH
|
| 1473 |
+
1r = C−1
|
| 1474 |
+
1r , which yields
|
| 1475 |
+
W1r = C
|
| 1476 |
+
− 1
|
| 1477 |
+
2
|
| 1478 |
+
1r = (Q1rΛ1rQH
|
| 1479 |
+
1r)− 1
|
| 1480 |
+
2 = Q1rΛ
|
| 1481 |
+
− 1
|
| 1482 |
+
2
|
| 1483 |
+
1r QH
|
| 1484 |
+
1r,
|
| 1485 |
+
(58)
|
| 1486 |
+
where Q1r is an unitary matrix, and Λ1r is a diagonal matrix
|
| 1487 |
+
consisting of eigenvalues. Performing the WF operation to (55)
|
| 1488 |
+
yields
|
| 1489 |
+
yr =
|
| 1490 |
+
�
|
| 1491 |
+
PsW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]x
|
| 1492 |
+
+ W1r(|β1|HirEK �Θ1n1i + nr)
|
| 1493 |
+
�
|
| 1494 |
+
��
|
| 1495 |
+
�
|
| 1496 |
+
n1r
|
| 1497 |
+
,
|
| 1498 |
+
(59)
|
| 1499 |
+
where n1r is the standard white noise with covariance matrix
|
| 1500 |
+
IM. The transmit signal at AF relay is yt = Ayr. In the second
|
| 1501 |
+
time slot, the received signal at D is denoted as
|
| 1502 |
+
yd =
|
| 1503 |
+
�
|
| 1504 |
+
Ps[hH
|
| 1505 |
+
rd + hH
|
| 1506 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1507 |
+
ir]AW1r
|
| 1508 |
+
· [hsr + Hir(EK + |β1|EK) �Θ1hsi]x
|
| 1509 |
+
+ [hH
|
| 1510 |
+
rd + hH
|
| 1511 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1512 |
+
ir]An1r
|
| 1513 |
+
+ |β2|hH
|
| 1514 |
+
idEK �Θ2n2i + nd.
|
| 1515 |
+
(60)
|
| 1516 |
+
The corresponding SNR can be represented as (61), as shown
|
| 1517 |
+
at the top of next page. It is assumed that the power budgets
|
| 1518 |
+
Ps, Pr and Pi are respectively fully used to transmit signals
|
| 1519 |
+
at S, AF relay and IRS. Therefore, the optimization problem
|
| 1520 |
+
can be converted to
|
| 1521 |
+
max
|
| 1522 |
+
|β1|,|β2|, �
|
| 1523 |
+
Θ1, �
|
| 1524 |
+
Θ2,A
|
| 1525 |
+
(61)
|
| 1526 |
+
(62a)
|
| 1527 |
+
s.t.
|
| 1528 |
+
| �Θ1(i, i)| = 1,
|
| 1529 |
+
| �Θ2(i, i)| = 1.
|
| 1530 |
+
(62b)
|
| 1531 |
+
It is necessary to solve the above problem for optimal |β1|,
|
| 1532 |
+
|β2|, �Θ1, �Θ2 and A.
|
| 1533 |
+
|
| 1534 |
+
10
|
| 1535 |
+
SNR =
|
| 1536 |
+
γs|[hH
|
| 1537 |
+
rd + hH
|
| 1538 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1539 |
+
ir]AW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]|2
|
| 1540 |
+
β2
|
| 1541 |
+
1∥[hH
|
| 1542 |
+
rd + hH
|
| 1543 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1544 |
+
ir]AW1rHirEK �Θ1∥2 + ∥[hH
|
| 1545 |
+
rd + hH
|
| 1546 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1547 |
+
ir]AW1r∥2 + β2
|
| 1548 |
+
2∥hH
|
| 1549 |
+
idEK �Θ2∥2 + 1
|
| 1550 |
+
.
|
| 1551 |
+
(61)
|
| 1552 |
+
B. Solve |β1| and |β2|
|
| 1553 |
+
In the first time slot, the reflected signal at IRS is written
|
| 1554 |
+
by
|
| 1555 |
+
yt
|
| 1556 |
+
1i =
|
| 1557 |
+
�
|
| 1558 |
+
PsΘ1hsix + Φ1n1i,
|
| 1559 |
+
=
|
| 1560 |
+
�
|
| 1561 |
+
PsEK �Θ1hsix
|
| 1562 |
+
�
|
| 1563 |
+
��
|
| 1564 |
+
�
|
| 1565 |
+
ypt
|
| 1566 |
+
1i
|
| 1567 |
+
+
|
| 1568 |
+
�
|
| 1569 |
+
Ps|β1|EK �Θ1hsix + |β1|EK �Θ1n1i
|
| 1570 |
+
�
|
| 1571 |
+
��
|
| 1572 |
+
�
|
| 1573 |
+
yat
|
| 1574 |
+
1i
|
| 1575 |
+
,
|
| 1576 |
+
(63)
|
| 1577 |
+
where ypt
|
| 1578 |
+
1i and yat
|
| 1579 |
+
1i are respectively the signals reflected by
|
| 1580 |
+
passive elements EL and active elements EK. Additionally, the
|
| 1581 |
+
power consumed by the active elements is Pi. We have
|
| 1582 |
+
Pi = Psβ2
|
| 1583 |
+
1∥EK �Θ1hsi∥2 + β2
|
| 1584 |
+
1∥EK �Θ1∥2
|
| 1585 |
+
F σ2
|
| 1586 |
+
1i
|
| 1587 |
+
= β2
|
| 1588 |
+
1Ps
|
| 1589 |
+
K
|
| 1590 |
+
�
|
| 1591 |
+
k=1
|
| 1592 |
+
|ejθ1khk
|
| 1593 |
+
si|2 + β2
|
| 1594 |
+
1
|
| 1595 |
+
K
|
| 1596 |
+
�
|
| 1597 |
+
k=1
|
| 1598 |
+
|ejθ1k|2σ2
|
| 1599 |
+
1i
|
| 1600 |
+
= β2
|
| 1601 |
+
1Ps
|
| 1602 |
+
K
|
| 1603 |
+
�
|
| 1604 |
+
k=1
|
| 1605 |
+
|hk
|
| 1606 |
+
si|2 + Kβ2
|
| 1607 |
+
1σ2,
|
| 1608 |
+
(64)
|
| 1609 |
+
where θ1k is the phase shift of the kth IRS active element
|
| 1610 |
+
in the first time slot, hk
|
| 1611 |
+
si is the channel between S and the
|
| 1612 |
+
kth IRS active element and follows Rayleigh distribution with
|
| 1613 |
+
the expression hk
|
| 1614 |
+
si =
|
| 1615 |
+
�
|
| 1616 |
+
PLk
|
| 1617 |
+
sigk
|
| 1618 |
+
sie−jϕsk, where PLk
|
| 1619 |
+
si, gk
|
| 1620 |
+
si and
|
| 1621 |
+
ϕsk denote the path loss, the channel gain and the channel
|
| 1622 |
+
phase from S to the kth IRS active element, respectively. |gk
|
| 1623 |
+
si|2
|
| 1624 |
+
follows Exponential distribution [41], and the corresponding
|
| 1625 |
+
probability density function is given by
|
| 1626 |
+
f|gk
|
| 1627 |
+
si|2(x) =
|
| 1628 |
+
|
| 1629 |
+
|
| 1630 |
+
|
| 1631 |
+
1
|
| 1632 |
+
λsi
|
| 1633 |
+
e−
|
| 1634 |
+
x
|
| 1635 |
+
λsi
|
| 1636 |
+
x ∈ [0, +∞),
|
| 1637 |
+
(65a)
|
| 1638 |
+
0
|
| 1639 |
+
otherwise,
|
| 1640 |
+
(65b)
|
| 1641 |
+
where λsi is the Exponential distribution parameter. Let us
|
| 1642 |
+
define PLk
|
| 1643 |
+
si is equal to the path loss from S to IRS (i.e.,
|
| 1644 |
+
PLsi). Using the weak law of large numbers, (64) can be
|
| 1645 |
+
further written as
|
| 1646 |
+
Pi = β2
|
| 1647 |
+
1Ps
|
| 1648 |
+
K
|
| 1649 |
+
�
|
| 1650 |
+
k=1
|
| 1651 |
+
|
|
| 1652 |
+
�
|
| 1653 |
+
PLsigk
|
| 1654 |
+
sie−jϕsk|2 + Kβ2
|
| 1655 |
+
1σ2
|
| 1656 |
+
= β2
|
| 1657 |
+
1PsPLsi
|
| 1658 |
+
K
|
| 1659 |
+
�
|
| 1660 |
+
k=1
|
| 1661 |
+
|gk
|
| 1662 |
+
si|2 + Kβ2
|
| 1663 |
+
1σ2
|
| 1664 |
+
≈ Kβ2
|
| 1665 |
+
1PsPLsi · E(|gk
|
| 1666 |
+
si|2) + Kβ2
|
| 1667 |
+
1σ2
|
| 1668 |
+
= Kβ2
|
| 1669 |
+
1PsPLsiλsi + Kβ2
|
| 1670 |
+
1σ2,
|
| 1671 |
+
(66)
|
| 1672 |
+
β1 can be achieved as
|
| 1673 |
+
|β1| =
|
| 1674 |
+
�
|
| 1675 |
+
Pi
|
| 1676 |
+
KPsPLsiλsi + Kσ2 .
|
| 1677 |
+
(67)
|
| 1678 |
+
Similarly, the received signal of the kth active IRS element in
|
| 1679 |
+
the second time slot is
|
| 1680 |
+
yrk
|
| 1681 |
+
2i = hH
|
| 1682 |
+
rkAyr + n2i,k = hH
|
| 1683 |
+
rkyt + n2i,k,
|
| 1684 |
+
(68)
|
| 1685 |
+
where hH
|
| 1686 |
+
rk ∈ C1×M represents the channel between AF relay
|
| 1687 |
+
and the kth active IRS element,
|
| 1688 |
+
hH
|
| 1689 |
+
rk = [
|
| 1690 |
+
�
|
| 1691 |
+
PL1k
|
| 1692 |
+
ri g1k
|
| 1693 |
+
ri e−jϕ1k, · · · ,
|
| 1694 |
+
�
|
| 1695 |
+
PLMk
|
| 1696 |
+
ri gMk
|
| 1697 |
+
ri e−jϕMk], (69)
|
| 1698 |
+
where PLmk
|
| 1699 |
+
ri , gmk
|
| 1700 |
+
ri
|
| 1701 |
+
and ϕmk are the path loss, the channel gain
|
| 1702 |
+
and the channel phase between the mth antenna at AF relay
|
| 1703 |
+
and the kth active IRS element. Defining PLmk
|
| 1704 |
+
ri
|
| 1705 |
+
= PLri,
|
| 1706 |
+
PLri is the path loss from AF relay to IRS. The reflected
|
| 1707 |
+
signal of the kth active IRS element is
|
| 1708 |
+
ytk
|
| 1709 |
+
2i = |β2|ejθ2khH
|
| 1710 |
+
rkyt + |β2|ejθ2kn2i,k
|
| 1711 |
+
= |β2||hH
|
| 1712 |
+
rk||yt|ej(θ2k+ϕrkt) + |β2|ejθ2kn2i,k,
|
| 1713 |
+
(70)
|
| 1714 |
+
where θ2k is the phase shift of the kth IRS active element in
|
| 1715 |
+
the second time slot, ϕrkt is the phase of hH
|
| 1716 |
+
rkyt. It is assumed
|
| 1717 |
+
that the transmit power of AF relay is Pr, the corresponding
|
| 1718 |
+
power of the reflected signal of the kth active IRS element is
|
| 1719 |
+
P tk
|
| 1720 |
+
2i = β2
|
| 1721 |
+
2|hH
|
| 1722 |
+
rk|2|yt|2 + β2
|
| 1723 |
+
2σ2
|
| 1724 |
+
2i,k
|
| 1725 |
+
= β2
|
| 1726 |
+
2PrPLri
|
| 1727 |
+
M
|
| 1728 |
+
�
|
| 1729 |
+
m=1
|
| 1730 |
+
|gmk
|
| 1731 |
+
ri |2 + β2
|
| 1732 |
+
2σ2
|
| 1733 |
+
K
|
| 1734 |
+
= Mβ2
|
| 1735 |
+
2PrPLriλri + β2
|
| 1736 |
+
2σ2
|
| 1737 |
+
K ,
|
| 1738 |
+
(71)
|
| 1739 |
+
where σ2
|
| 1740 |
+
2i,k = σ2
|
| 1741 |
+
2i/K = σ2/K, λri is the Exponential
|
| 1742 |
+
distribution parameter of channel from AF relay to IRS. Thus
|
| 1743 |
+
the power of the reflected signal of K active IRS elements is
|
| 1744 |
+
Pi =
|
| 1745 |
+
K
|
| 1746 |
+
�
|
| 1747 |
+
k=1
|
| 1748 |
+
P tk
|
| 1749 |
+
2i = KMβ2
|
| 1750 |
+
2PrPLriλri + β2
|
| 1751 |
+
2σ2,
|
| 1752 |
+
(72)
|
| 1753 |
+
which yields
|
| 1754 |
+
|β2| =
|
| 1755 |
+
�
|
| 1756 |
+
Pi
|
| 1757 |
+
KMPrPLriλri + σ2 .
|
| 1758 |
+
(73)
|
| 1759 |
+
C. Optimize A Given �Θ1 and �Θ2
|
| 1760 |
+
Aiming at maximizing the received signal power, MRC-
|
| 1761 |
+
MRT method are applied to solve A as follows
|
| 1762 |
+
A = A [hrd + Hir �ΘH
|
| 1763 |
+
2 (EK + |β2|EK)hid]
|
| 1764 |
+
∥hH
|
| 1765 |
+
rd + hH
|
| 1766 |
+
id(EK + |β2|EK) �Θ2HH
|
| 1767 |
+
ir∥
|
| 1768 |
+
· [hsr + Hir(EK + |β1|EK) �Θ1hsi]HWH
|
| 1769 |
+
1r
|
| 1770 |
+
∥W1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]∥
|
| 1771 |
+
= AΥ,
|
| 1772 |
+
(74)
|
| 1773 |
+
where A is the amplify factor of AF relay. Since the transmit
|
| 1774 |
+
power of AF relay is Pr, we have A as shown in (75) at the top
|
| 1775 |
+
of next page. Inserting A back into (74), A can be obtained.
|
| 1776 |
+
|
| 1777 |
+
11
|
| 1778 |
+
A =
|
| 1779 |
+
�
|
| 1780 |
+
γr
|
| 1781 |
+
γs∥ΥW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]∥2 + β2
|
| 1782 |
+
1∥ΥW1rHirEK �Θ1∥2
|
| 1783 |
+
F + ∥ΥW1r∥2
|
| 1784 |
+
F
|
| 1785 |
+
,
|
| 1786 |
+
(75)
|
| 1787 |
+
�F2 =
|
| 1788 |
+
�
|
| 1789 |
+
β2
|
| 1790 |
+
1diag{EKHH
|
| 1791 |
+
ir�hrid}diag{�h
|
| 1792 |
+
H
|
| 1793 |
+
ridHirEK}
|
| 1794 |
+
0N×1
|
| 1795 |
+
01×N
|
| 1796 |
+
∥�h
|
| 1797 |
+
H
|
| 1798 |
+
rid∥2 + β2
|
| 1799 |
+
2∥hH
|
| 1800 |
+
idEK �Θ2∥2 + 1
|
| 1801 |
+
�
|
| 1802 |
+
.
|
| 1803 |
+
(77)
|
| 1804 |
+
D. Optimize �Θ1 Given A and �Θ2
|
| 1805 |
+
By defining �u1 = [ejθ1i, · · · , ejθ1N ]T , �v1 = [�u1; 1] and
|
| 1806 |
+
�Hsir = [Hir(EK + |β1|EK)diag{hsi}, hsr]. Given A and �Θ2,
|
| 1807 |
+
the optimization problem is equivalent to
|
| 1808 |
+
max
|
| 1809 |
+
�v1
|
| 1810 |
+
�vH
|
| 1811 |
+
1 �F1�v1
|
| 1812 |
+
�vH
|
| 1813 |
+
1 �F2�v1
|
| 1814 |
+
(76a)
|
| 1815 |
+
s.t.
|
| 1816 |
+
|�v1(i)| = 1, ∀i = 1, 2, · · · , N,
|
| 1817 |
+
(76b)
|
| 1818 |
+
�v1(N + 1) = 1,
|
| 1819 |
+
(76c)
|
| 1820 |
+
where �F1 and �F2 are Hermitian matrices, and �F2 is positive
|
| 1821 |
+
semi-definite. �F1 = γs �H
|
| 1822 |
+
H
|
| 1823 |
+
sir�hrid�h
|
| 1824 |
+
H
|
| 1825 |
+
rid �Hsir, �hrid = [(hH
|
| 1826 |
+
rd +
|
| 1827 |
+
hH
|
| 1828 |
+
id(EK +|β2|EK) �Θ2HH
|
| 1829 |
+
ir)AW1r]H, and �F2 is denoted as (77)
|
| 1830 |
+
at the top of next page. The above problem can be relaxed to
|
| 1831 |
+
max
|
| 1832 |
+
�v1
|
| 1833 |
+
�vH
|
| 1834 |
+
1 �F1�v1
|
| 1835 |
+
�vH
|
| 1836 |
+
1 �F2�v1
|
| 1837 |
+
s.t.
|
| 1838 |
+
∥�v1∥2 = N + 1,
|
| 1839 |
+
(78)
|
| 1840 |
+
which can be constructed as
|
| 1841 |
+
max
|
| 1842 |
+
�v1
|
| 1843 |
+
�vH
|
| 1844 |
+
1 �F1�v1
|
| 1845 |
+
�vH
|
| 1846 |
+
1 �F2�v1
|
| 1847 |
+
· �vH
|
| 1848 |
+
1 IN+1�v1
|
| 1849 |
+
�vH
|
| 1850 |
+
1 IN+1�v1
|
| 1851 |
+
s.t.
|
| 1852 |
+
∥�v1∥2 = N + 1. (79)
|
| 1853 |
+
�v1 can be solved by using GPI algorithm, the details of
|
| 1854 |
+
GPI procedure is presented in Algorithm 3, where we define
|
| 1855 |
+
Ω(�vt
|
| 1856 |
+
1) = (�vH
|
| 1857 |
+
1 �F1�v1)IN+1 + (�vH
|
| 1858 |
+
1 IN+1�v1)�F1 and Ξ1(�vt
|
| 1859 |
+
1) =
|
| 1860 |
+
(�vH
|
| 1861 |
+
1 �F2�v1)IN+1 + (�vH
|
| 1862 |
+
1 IN+1�v1)�F2.
|
| 1863 |
+
Algorithm 3 GPI Algorithm to Compute Phase-Shift
|
| 1864 |
+
Vector �v1 with Given A and �Θ2
|
| 1865 |
+
1. Given A and �Θ2, and initialize �v0
|
| 1866 |
+
1.
|
| 1867 |
+
2. Set the tolerance factor ξ and the iteration number t = 0.
|
| 1868 |
+
3. repeat
|
| 1869 |
+
4.
|
| 1870 |
+
Compute the function matrix Ω(�vt
|
| 1871 |
+
1) and Ξ1(�vt
|
| 1872 |
+
1).
|
| 1873 |
+
5.
|
| 1874 |
+
Calculate yt = Ξ1(�vt
|
| 1875 |
+
1)†Ω(�vt
|
| 1876 |
+
1)�vt
|
| 1877 |
+
1.
|
| 1878 |
+
6.
|
| 1879 |
+
Update �vt+1
|
| 1880 |
+
1
|
| 1881 |
+
=
|
| 1882 |
+
yt
|
| 1883 |
+
∥yt∥.
|
| 1884 |
+
7.
|
| 1885 |
+
Update t = t + 1.
|
| 1886 |
+
8. until
|
| 1887 |
+
∥�vt+1
|
| 1888 |
+
1
|
| 1889 |
+
− �vt
|
| 1890 |
+
1∥ ≤ ξ.
|
| 1891 |
+
E. Optimize �Θ2 Given A and �Θ1
|
| 1892 |
+
If
|
| 1893 |
+
A
|
| 1894 |
+
and
|
| 1895 |
+
�Θ1
|
| 1896 |
+
are
|
| 1897 |
+
fixed,
|
| 1898 |
+
let
|
| 1899 |
+
us
|
| 1900 |
+
define
|
| 1901 |
+
�u2
|
| 1902 |
+
=
|
| 1903 |
+
[ejθ2i, · · · , ejθ2N ]H, �v2 = [�u2; 1], �Hrid = [diag{hH
|
| 1904 |
+
id(EK +
|
| 1905 |
+
|β2|EK)}HH
|
| 1906 |
+
ir; hH
|
| 1907 |
+
rd]. Accordingly, the optimization problem is
|
| 1908 |
+
reduced to
|
| 1909 |
+
max
|
| 1910 |
+
�v2
|
| 1911 |
+
�vH
|
| 1912 |
+
2 �H1�v2
|
| 1913 |
+
�vH
|
| 1914 |
+
2 �H2�v2
|
| 1915 |
+
(80a)
|
| 1916 |
+
s.t.
|
| 1917 |
+
|�v2(i)| = 1, ∀i = 1, 2, · · · , N,
|
| 1918 |
+
(80b)
|
| 1919 |
+
�v2(N + 1) = 1,
|
| 1920 |
+
(80c)
|
| 1921 |
+
where �H1 and �H2 are Hermitian matrices, and �H2 is positive
|
| 1922 |
+
definite. �H1 = γs �HridAW1r[hsr +Hir(EK +|β1|EK) �Θ1hsi]·
|
| 1923 |
+
{�HridAW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]}H, and
|
| 1924 |
+
�H2 = �HridAW1r(β2
|
| 1925 |
+
1HirEK �Θ1 �ΘH
|
| 1926 |
+
1 EKHH
|
| 1927 |
+
ir + IM)WH
|
| 1928 |
+
1rAH·
|
| 1929 |
+
�H
|
| 1930 |
+
H
|
| 1931 |
+
rid +
|
| 1932 |
+
�
|
| 1933 |
+
β2
|
| 1934 |
+
2diag{hH
|
| 1935 |
+
idEK}diag{EKhid}
|
| 1936 |
+
0N×1
|
| 1937 |
+
01×N
|
| 1938 |
+
1
|
| 1939 |
+
�
|
| 1940 |
+
.
|
| 1941 |
+
(81)
|
| 1942 |
+
We have the following relaxed transformation
|
| 1943 |
+
max
|
| 1944 |
+
�v2
|
| 1945 |
+
�vH
|
| 1946 |
+
2 �H1�v2
|
| 1947 |
+
�vH
|
| 1948 |
+
2 �H2�v2
|
| 1949 |
+
s.t.
|
| 1950 |
+
�vH
|
| 1951 |
+
2 �v2 = 1
|
| 1952 |
+
(82)
|
| 1953 |
+
where �v2 =
|
| 1954 |
+
�v2
|
| 1955 |
+
√N+1. Moreover, in line with the GRR theorem,
|
| 1956 |
+
the optimal �v2 is obtained as the eigenvector corresponding
|
| 1957 |
+
to the largest eigenvalue of �H
|
| 1958 |
+
−1
|
| 1959 |
+
2 �H1. Thereby �v2 and �Θ2 is
|
| 1960 |
+
achieved.
|
| 1961 |
+
F. Overall Algorithm and Complexity Analysis
|
| 1962 |
+
The proposed lower-complexity WF-GPI-GRR method is
|
| 1963 |
+
summarized in Algorithm 4. The main idea consists of two
|
| 1964 |
+
parts: the amplifying coefficient of active element and the
|
| 1965 |
+
iterative idea. The analytic solutions of amplifying coefficients
|
| 1966 |
+
of IRS active elements in the first time slot and the second time
|
| 1967 |
+
slot, i.e., β1 and β2, are determined by the transmit power
|
| 1968 |
+
of S, AF relay, IRS. Furthermore, β1 and β2 are denoted as
|
| 1969 |
+
(67) and (73). The iterative idea can be described as follows:
|
| 1970 |
+
for given �Θ1 and �Θ2, the closed-form expression of A are
|
| 1971 |
+
represented as (74) by utilizing MRC-MRT; for given A and
|
| 1972 |
+
�Θ2, GPI is applied to achieve �Θ1; for given A and �Θ1, �Θ2 is
|
| 1973 |
+
obtained in a closed-form expression by using GRR theorem.
|
| 1974 |
+
The alternative iteration process are performed among A, �Θ1
|
| 1975 |
+
and �Θ2 until the stop criterion is satisfied, while the system
|
| 1976 |
+
rate is maximum.
|
| 1977 |
+
In the following, the total computational complexity of
|
| 1978 |
+
Algorithm 4 is calculated as
|
| 1979 |
+
O{D3(N 3 + 4M 3 + 4M 2N + 2MN 2 + 2M 2K+
|
| 1980 |
+
8M 2 + 6N 2 + 9MN + 5MK + 5M + 11N+
|
| 1981 |
+
3 + D4(7N 3 + 27N 2 + 43N + 18))}
|
| 1982 |
+
(83)
|
| 1983 |
+
|
| 1984 |
+
12
|
| 1985 |
+
Algorithm 4 Proposed WF-GPI-GRR Method
|
| 1986 |
+
1.
|
| 1987 |
+
Calculate β1 and β2 through (67) and (73).
|
| 1988 |
+
2.
|
| 1989 |
+
Initialize A0, �Θ0
|
| 1990 |
+
1 and �Θ0
|
| 1991 |
+
2. According to (9) and (61),
|
| 1992 |
+
R0 can be obtained.
|
| 1993 |
+
3.
|
| 1994 |
+
set the convergence error δ and the iteration number
|
| 1995 |
+
t = 0.
|
| 1996 |
+
4. repeat
|
| 1997 |
+
5.
|
| 1998 |
+
Fix �Θt
|
| 1999 |
+
1 and �Θt
|
| 2000 |
+
2, compute At+1 through (74).
|
| 2001 |
+
6.
|
| 2002 |
+
Fix At+1 and �Θt
|
| 2003 |
+
2, solve problem (79) to achieve
|
| 2004 |
+
�vt+1
|
| 2005 |
+
1
|
| 2006 |
+
based on GPI presented in Algorithm 3, �Θt+1
|
| 2007 |
+
1
|
| 2008 |
+
=
|
| 2009 |
+
diag{�vt+1
|
| 2010 |
+
1
|
| 2011 |
+
(1 : N)}.
|
| 2012 |
+
7.
|
| 2013 |
+
Fix At+1 and �Θt+1
|
| 2014 |
+
1
|
| 2015 |
+
, solve problem (82) to achieve
|
| 2016 |
+
�vt+1
|
| 2017 |
+
2
|
| 2018 |
+
based on GRR theorem, �Θt+1
|
| 2019 |
+
2
|
| 2020 |
+
= diag{�vt+1
|
| 2021 |
+
2
|
| 2022 |
+
(1 : N)}.
|
| 2023 |
+
8.
|
| 2024 |
+
Update Rt+1 by using β1, β2, At+1, �Θt+1
|
| 2025 |
+
1
|
| 2026 |
+
and �Θt+1
|
| 2027 |
+
2
|
| 2028 |
+
.
|
| 2029 |
+
9.
|
| 2030 |
+
Update t = t + 1.
|
| 2031 |
+
10. until
|
| 2032 |
+
��Rt+1 − Rt�� ≤ δ.
|
| 2033 |
+
FLOPs, where D3 is the maximum number of alternating
|
| 2034 |
+
iterations for Algorithm 4 and D4 is the number of iteration in
|
| 2035 |
+
GPI algorithm. Its highest order of computational complexity
|
| 2036 |
+
is M 3 and N 3 FLOPs, which is lower than the complexity of
|
| 2037 |
+
Algorithm 1 and Algorithm 2.
|
| 2038 |
+
VI. SIMULATION AND NUMERICAL RESULTS
|
| 2039 |
+
In this section, in order to evaluate the rate performance
|
| 2040 |
+
among the proposed three methods, numerical simulations are
|
| 2041 |
+
performed. Moreover, it is assumed that S, D, hybrid IRS
|
| 2042 |
+
and AF relay are located in three-dimensional (3D) space, the
|
| 2043 |
+
related coordinate simulation setup is shown in Fig. 2, where
|
| 2044 |
+
S, D, hybrid IRS and AF relay are located at (0, 0, 0), (0, 100,
|
| 2045 |
+
0), (−10, 50, 20) and (10, 50, 10) in meter (m), respectively.
|
| 2046 |
+
The path loss is modeled as PL(d) = PL0 − 10αlog10( d
|
| 2047 |
+
d0 ),
|
| 2048 |
+
where PL0 = −30dB is the path loss at the reference distance
|
| 2049 |
+
d0 = 1m, d is the distance between transmitter and receiver,
|
| 2050 |
+
and α is the path loss exponent, respectively. Here, the path
|
| 2051 |
+
loss exponents of each channel link associated with IRS, i.e.,
|
| 2052 |
+
S-IRS, IRS-AF relay and IRS-D, are set as 2.0, and those of
|
| 2053 |
+
S-AF relay and AF relay-D links are considered as 3.0. The
|
| 2054 |
+
remaining system parameters are set as follow: σ2 = −80dBm
|
| 2055 |
+
and EK is randomly generated.
|
| 2056 |
+
Fig. 2. Simulation setup.
|
| 2057 |
+
Additionally, to demonstrate the proposed three methods,
|
| 2058 |
+
the following three benchmark schemes are taken into account.
|
| 2059 |
+
1) AF relay+passive IRS: A passive IRS-aided AF relay
|
| 2060 |
+
network is considered, where IRS only reflects the signal
|
| 2061 |
+
without amplifying the reflected signal, and the reflecting
|
| 2062 |
+
coefficient of each IRS element is set as 1;
|
| 2063 |
+
2) AF relay+passive IRS with random phase: With ran-
|
| 2064 |
+
dom phase of each reflection element uniformly and indepen-
|
| 2065 |
+
dently generated from the interval (0, 2π], the beamforming
|
| 2066 |
+
matrix A at AF relay is optimized.
|
| 2067 |
+
3) Only AF relay: A AF relay network without IRS
|
| 2068 |
+
is considered, while the AF relay beamforming matrix A
|
| 2069 |
+
can be achieved by MRC-MRT, which is given by A =
|
| 2070 |
+
�
|
| 2071 |
+
Pr
|
| 2072 |
+
Ps∥Γhsr∥2+σ2∥Γ∥2
|
| 2073 |
+
F Γ, where Γ =
|
| 2074 |
+
hrdhH
|
| 2075 |
+
sr
|
| 2076 |
+
∥hH
|
| 2077 |
+
rd∥∥hsr∥.
|
| 2078 |
+
Towards a fair comparison between a hybrid IRS-aided
|
| 2079 |
+
AF relay wireless network and the above three benchmark
|
| 2080 |
+
schemes, let us define that the total transmit power budgets
|
| 2081 |
+
of S and AF relay in the three benchmark schemes are the
|
| 2082 |
+
same as that of S, AF relay and IRS in the hybrid IRS-aided
|
| 2083 |
+
AF relay network. For instance, the AF relay transmit power
|
| 2084 |
+
budget PR in the three benchmark schemes is equal to Pi+Pr.
|
| 2085 |
+
4
|
| 2086 |
+
5
|
| 2087 |
+
6
|
| 2088 |
+
7
|
| 2089 |
+
8
|
| 2090 |
+
9
|
| 2091 |
+
10
|
| 2092 |
+
11
|
| 2093 |
+
12
|
| 2094 |
+
log2N
|
| 2095 |
+
105
|
| 2096 |
+
1010
|
| 2097 |
+
1015
|
| 2098 |
+
1020
|
| 2099 |
+
1025
|
| 2100 |
+
1030
|
| 2101 |
+
Computational Complexity (FLOPs)
|
| 2102 |
+
Proposed HP-SDR-FP
|
| 2103 |
+
Proposed LC-SCA-FP
|
| 2104 |
+
Proposed WF-GPI-GRR
|
| 2105 |
+
Fig. 3. Computational complexity versus N with (M, K, D1, D2, D3, D4) =
|
| 2106 |
+
(2, 4, 6, 10, 5, 2).
|
| 2107 |
+
Fig. 3 plots the computational complexity of the proposed
|
| 2108 |
+
three methods. By suppressing ln(1/ε) [42], the computational
|
| 2109 |
+
complexities of the proposed three methods, 1) HP-SDR-
|
| 2110 |
+
FP; 2) LC-SCA-FP; and 3) WF-GPI-GRR, increase as N
|
| 2111 |
+
increases. It is clear that the first method has the highest
|
| 2112 |
+
computational complexity, which is much higher than those
|
| 2113 |
+
of the other two methods. In addition, the third method has
|
| 2114 |
+
the lowest computational complexity.
|
| 2115 |
+
Fig. 4 demonstrates the proposed three methods are con-
|
| 2116 |
+
vergent under different Ps, respectively. Obviously, for Ps =
|
| 2117 |
+
10dBm, the proposed HP-SDR-FP, LC-SCA-FP and WF-GPI-
|
| 2118 |
+
GRR methods require about only four iterations to achieve the
|
| 2119 |
+
rate ceil. While for Ps = 30dBm, it takes ten iterations for the
|
| 2120 |
+
proposed three methods to converge to the rate ceil. From the
|
| 2121 |
+
above two cases, we conclude that the proposed three methods
|
| 2122 |
+
are feasible.
|
| 2123 |
+
Fig. 5 shows the achievable rate versus Ps with (M, N, K)
|
| 2124 |
+
= (2, 32, 4). It can be seen that the proposed HP-SDR-
|
| 2125 |
+
FP, LC-SCA-FP and WF-GPI-GRR methods with (Pi, Pr) =
|
| 2126 |
+
(30dBm, 30dBm) perform better than AF relay+passive IRS,
|
| 2127 |
+
|
| 2128 |
+
Hybrid IRS (-10, 50, 20)
|
| 2129 |
+
y
|
| 2130 |
+
AF relay (10, 50, 10)
|
| 2131 |
+
S
|
| 2132 |
+
(0, 0, 0)
|
| 2133 |
+
(0, 100, 0)
|
| 2134 |
+
X13
|
| 2135 |
+
0
|
| 2136 |
+
3
|
| 2137 |
+
6
|
| 2138 |
+
9
|
| 2139 |
+
12
|
| 2140 |
+
15
|
| 2141 |
+
18
|
| 2142 |
+
Number of iterations
|
| 2143 |
+
4
|
| 2144 |
+
5
|
| 2145 |
+
6
|
| 2146 |
+
7
|
| 2147 |
+
8
|
| 2148 |
+
9
|
| 2149 |
+
10
|
| 2150 |
+
Achivable Rate(bits/s/Hz)
|
| 2151 |
+
Proposed HP-SDR-FP
|
| 2152 |
+
Proposed LC-SCA-FP
|
| 2153 |
+
Proposed WF-GPI-GRR
|
| 2154 |
+
30dBm
|
| 2155 |
+
10dBm
|
| 2156 |
+
Fig. 4. Convergence of proposed methods with (M, N, K, Pi, Pr) = (2, 32,
|
| 2157 |
+
4, 30dBm, 30dBm).
|
| 2158 |
+
0
|
| 2159 |
+
5
|
| 2160 |
+
10
|
| 2161 |
+
15
|
| 2162 |
+
20
|
| 2163 |
+
25
|
| 2164 |
+
30
|
| 2165 |
+
Ps (dBm)
|
| 2166 |
+
0
|
| 2167 |
+
1
|
| 2168 |
+
2
|
| 2169 |
+
3
|
| 2170 |
+
4
|
| 2171 |
+
5
|
| 2172 |
+
6
|
| 2173 |
+
7
|
| 2174 |
+
8
|
| 2175 |
+
9
|
| 2176 |
+
Achivable Rate (bits/s/Hz)
|
| 2177 |
+
Proposed HP-SDR-FP
|
| 2178 |
+
Proposed LC-SCA-FP
|
| 2179 |
+
Proposed WF-GPI-GRR
|
| 2180 |
+
AF relay+passive IRS
|
| 2181 |
+
AF relay+passive IRS with random phase
|
| 2182 |
+
Only AF relay
|
| 2183 |
+
Fig. 5. Achievable rate versus Ps with (M, N, K) = (2, 32, 4).
|
| 2184 |
+
AF relay+passive IRS with random phase and only AF relay
|
| 2185 |
+
with PR = 33dBm. Furthermore, the rate performance of LC-
|
| 2186 |
+
SCA-FP method is the most closest to that of HP-SDR-FP
|
| 2187 |
+
method in the low and medium power Ps region. For instance,
|
| 2188 |
+
when power Ps is equal to 15dBm, the rate performance gaps
|
| 2189 |
+
between the method LC-SCA-FP, the worst method WF-GPI-
|
| 2190 |
+
GRR and the best method HP-SDR-FP method are respectively
|
| 2191 |
+
0.037bits/s/Hz and 0.245bits/s/Hz.
|
| 2192 |
+
Fig. 6 illustrates the achievable rate versus Pi
|
| 2193 |
+
with
|
| 2194 |
+
(M, N, K, Ps) = (2, 32, 4, 30dBm). It is particularly noted
|
| 2195 |
+
that the proposed three methods with Pr = 30dBm make
|
| 2196 |
+
a better rate performance improvement than that of AF re-
|
| 2197 |
+
lay+passive IRS, AF relay+passive IRS with random phase
|
| 2198 |
+
and only AF relay with PR = Pi + Pr. For example, when
|
| 2199 |
+
Pi equals 40dBm, the proposed worst method, WF-GPI-GRR
|
| 2200 |
+
method, can harvest up to 49.8% rate gain over AF re-
|
| 2201 |
+
lay+passive IRS. The best method HP-SDR-FP approximately
|
| 2202 |
+
has a 53.3% rate gain over AF relay+passive IRS. This shows
|
| 2203 |
+
that as Pi increases, significant rate gains are achieved for
|
| 2204 |
+
the proposed hybrid IRS-aided AF relay wireless network.
|
| 2205 |
+
Moreover, the rate performance of LC-SCA-FP is getting
|
| 2206 |
+
closer to that of HP-SDR-FP, and the gap between LC-SCA-
|
| 2207 |
+
FP and WF-GPI-GRR becomes smaller.
|
| 2208 |
+
10
|
| 2209 |
+
15
|
| 2210 |
+
20
|
| 2211 |
+
25
|
| 2212 |
+
30
|
| 2213 |
+
35
|
| 2214 |
+
40
|
| 2215 |
+
Pi (dBm)
|
| 2216 |
+
3
|
| 2217 |
+
4
|
| 2218 |
+
5
|
| 2219 |
+
6
|
| 2220 |
+
7
|
| 2221 |
+
8
|
| 2222 |
+
9
|
| 2223 |
+
Achivable Rate (bits/s/Hz)
|
| 2224 |
+
Proposed HP-SDR-FP
|
| 2225 |
+
Proposed LC-SCA-FP
|
| 2226 |
+
Proposed WF-GPI-GRR
|
| 2227 |
+
AF relay+passive IRS
|
| 2228 |
+
AF relay+passive IRS with random phase
|
| 2229 |
+
Only AF relay
|
| 2230 |
+
Fig. 6. Achievable rate versus P i with (M, N, K, Ps) = (2, 32, 4, 30dBm).
|
| 2231 |
+
0
|
| 2232 |
+
1
|
| 2233 |
+
2
|
| 2234 |
+
3
|
| 2235 |
+
4
|
| 2236 |
+
5
|
| 2237 |
+
log2K
|
| 2238 |
+
4
|
| 2239 |
+
5
|
| 2240 |
+
6
|
| 2241 |
+
7
|
| 2242 |
+
8
|
| 2243 |
+
9
|
| 2244 |
+
10
|
| 2245 |
+
Achivable Rate(bits/s/Hz)
|
| 2246 |
+
Proposed HP-SDR-FP
|
| 2247 |
+
Proposed LC-SCA-FP
|
| 2248 |
+
Proposed WF-GPI-GRR
|
| 2249 |
+
AF relay+passive IRS
|
| 2250 |
+
AF relay+passive IRS with random phase
|
| 2251 |
+
Only AF relay
|
| 2252 |
+
Fig. 7. Achievable rate versus K with (M, N, Ps) = (2, 32, 30dBm).
|
| 2253 |
+
Fig. 7 presents the achievable rate versus the number of
|
| 2254 |
+
active IRS elements K with (M, N, Ps) = (2, 32, 30dBm)
|
| 2255 |
+
for the proposed three methods with (Pi, Pr) = (30dBm,
|
| 2256 |
+
30dBm) and the three benchmark schemes with PR = 33dBm.
|
| 2257 |
+
From Fig. 7, it can be observed that as the number of active
|
| 2258 |
+
IRS elements K increases, the rate gains of the proposed
|
| 2259 |
+
three methods over AF relay+passive IRS, AF relay+passive
|
| 2260 |
+
IRS with random phase and only AF relay increase gradually
|
| 2261 |
+
and become more significant. Meanwhile, the proposed three
|
| 2262 |
+
methods have the following increasing order on rate: HP-
|
| 2263 |
+
SDR-FP, LC-SCA-FP and WF-GPI-GRR. Compared with the
|
| 2264 |
+
benchmark scheme of AF relay+passive IRS, our proposed
|
| 2265 |
+
three methods perform much better, which shows that the
|
| 2266 |
+
optimization of beamforming is important and efficient.
|
| 2267 |
+
VII. CONCLUSIONS
|
| 2268 |
+
In this paper, we have made an investigation of beamform-
|
| 2269 |
+
ing methods of optimizing the beamforming matrix at AF
|
| 2270 |
+
relay and reflecting coefficient matrices at IRS in a hybrid
|
| 2271 |
+
IRS-aided AF relay network, where the hybrid IRS includes
|
| 2272 |
+
few active elements amplifying and reflecting the incident
|
| 2273 |
+
signal. By using the criterion of Max SNR, three schemes,
|
| 2274 |
+
namely HP-SDR-FP, LC-SCA-FP and WF-GPI-GRR, have
|
| 2275 |
+
|
| 2276 |
+
14
|
| 2277 |
+
been proposed to improve the rate performance. Simulation
|
| 2278 |
+
results show that the proposed three methods can make a
|
| 2279 |
+
dramatic rate enhancement compared to AF relay+passive
|
| 2280 |
+
IRS, AF relay+passive IRS with random phase and only
|
| 2281 |
+
AF relay, which verifies the active IRS elements can break
|
| 2282 |
+
the “double fading” effect caused by conventional passive
|
| 2283 |
+
IRS. For instance, an approximate 50.0% rate gain over the
|
| 2284 |
+
three benchmark schemes can be achieved in the high power
|
| 2285 |
+
budget region of hybrid IRS. Therefore, a hybrid IRS-aided
|
| 2286 |
+
AF relay network can provide an enhancement in accordance
|
| 2287 |
+
with rate performance and extended coverage for the mobile
|
| 2288 |
+
communications.
|
| 2289 |
+
REFERENCES
|
| 2290 |
+
[1] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato,
|
| 2291 |
+
O. Dobre, and H. V. Poor, “6G internet of things: A comprehensive
|
| 2292 |
+
survey,” IEEE Internet Things J., vol. 9, no. 1, pp. 359–383, Jan. 2022.
|
| 2293 |
+
[2] L. Chettri and R. Bera, “A comprehensive survey on internet of things
|
| 2294 |
+
(IoT) toward 5G wireless systems,” IEEE Internet Things J., vol. 7,
|
| 2295 |
+
no. 1, pp. 16–32, Jan. 2020.
|
| 2296 |
+
[3] B. M. Lee, “Adaptive switching scheme for rs overhead reduction in
|
| 2297 |
+
massive MIMO with industrial internet of things,” IEEE Internet Things
|
| 2298 |
+
J., vol. 8, no. 4, pp. 2585–2602, Feb. 2021.
|
| 2299 |
+
[4] G. Yu, X. Chen, C. Zhong, D. W. Kwan Ng, and Z. Zhang, “Design,
|
| 2300 |
+
analysis, and optimization of a large intelligent reflecting surface-aided
|
| 2301 |
+
B5G cellular Internet of Things,” IEEE Internet Things J., vol. 7, no. 9,
|
| 2302 |
+
pp. 8902–8916, Sep. 2020.
|
| 2303 |
+
[5] R. Zi, J. Liu, L. Gu, and X. Ge, “Enabling security and high energy
|
| 2304 |
+
efficiency in the internet of things with massive mimo hybrid precoding,”
|
| 2305 |
+
IEEE Internet Things J., vol. 6, no. 5, pp. 8615–8625, Oct. 2019.
|
| 2306 |
+
[6] X. Zhang, H. Qi, X. Zhang, and L. Han, “Energy-efficient resource
|
| 2307 |
+
allocation and data transmission of cell-free internet of things,” IEEE
|
| 2308 |
+
Internet Things J., vol. 8, no. 20, pp. 15 107–15 116, Oct. 2021.
|
| 2309 |
+
[7] J. Chen, S. Li, J. Xing, J. Wang, and S. Fu, “Multiple nodes access
|
| 2310 |
+
of wireless beam modulation for 6g-enabled internet of things,” IEEE
|
| 2311 |
+
Internet Things J., vol. 8, no. 20, pp. 15 191–15 204, Oct. 2021.
|
| 2312 |
+
[8] V. W. S. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key
|
| 2313 |
+
Technologies for 5G Wireless Systems, Cambridge U.K.: Cambridge
|
| 2314 |
+
Univ. Press, 2017.
|
| 2315 |
+
[9] S. Poursajadi, M. H. Madani, and H. K. Bizaki, “Power allocation
|
| 2316 |
+
and outage probability analysis of AF relaying systems with multiple
|
| 2317 |
+
antennas at terminal nodes,” IEEE Trans. Veh. Technol., vol. 66, no. 1,
|
| 2318 |
+
pp. 377–384, Jan. 2017.
|
| 2319 |
+
[10] B. Rankov and A. Wittneben, “Spectral efficient protocols for half-
|
| 2320 |
+
duplex fading relay channels,” IEEE J. Sel. Areas Commun., vol. 25,
|
| 2321 |
+
no. 2, pp. 379–389, Feb. 2007.
|
| 2322 |
+
[11] E. Bjornson, O. Ozdogan, and E. G. Larsson, “Intelligent reflecting
|
| 2323 |
+
surface versus decode-and-forward: How large surfaces are needed to
|
| 2324 |
+
beat relaying?” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 244–
|
| 2325 |
+
248, Feb. 2020.
|
| 2326 |
+
[12] Q. Wu and R. Zhang, “Beamforming optimization for wireless network
|
| 2327 |
+
aided by intelligent reflecting surface with discrete phase shifts,” IEEE
|
| 2328 |
+
Trans. Commun., vol. 68, no. 3, pp. 1838–1851, Mar. 2020.
|
| 2329 |
+
[13] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and
|
| 2330 |
+
R. Zhang, “Wireless communications through reconfigurable intelligent
|
| 2331 |
+
surfaces,” IEEE Access, vol. 7, pp. 116 753–116 773, Sep. 2019.
|
| 2332 |
+
[14] R. Li, B. Guo, M. Tao, Y.-F. Liu, and W. Yu, “Joint design of hybrid
|
| 2333 |
+
beamforming and reflection coefficients in RIS-aided mmWave MIMO
|
| 2334 |
+
systems,” IEEE Trans. Commun., vol. 70, no. 4, pp. 2404–2416, April
|
| 2335 |
+
2022.
|
| 2336 |
+
[15] W. Zhang, J. Xu, W. Xu, D. W. K. Ng, and H. Sun, “Cascaded chan-
|
| 2337 |
+
nel estimation for IRS-assisted mmwave multi-antenna with quantized
|
| 2338 |
+
beamforming,” IEEE Commun. Lett., vol. 25, no. 2, pp. 593–597, Feb.
|
| 2339 |
+
2021.
|
| 2340 |
+
[16] S. Gong, C. Xing, P. Yue, L. Zhao, and T. Q. S. Quek, “Hybrid analog
|
| 2341 |
+
and digital beamforming for RIS-assisted mmWave communications,”
|
| 2342 |
+
IEEE Trans. Wireless Commun., pp. 1–17, 2022.
|
| 2343 |
+
[17] Y. Liang, J. Chen, R. Long, Z. He, X. Lin, C. Huang, S. Liu, X. Shen,
|
| 2344 |
+
and M. D. Renzo, “Reconfigurable intelligent surfaces for smart wireless
|
| 2345 |
+
environments: channel estimation, system design and applications in 6G
|
| 2346 |
+
networks,” Sci. China Inf. Sci., vol. 64, no. 10, pp. 1–21, Jul. 2021.
|
| 2347 |
+
[18] W. Tang, M. Z. Chen, X. Chen, J. Y. Dai, Y. Han, M. Di Renzo,
|
| 2348 |
+
Y. Zeng, S. Jin, Q. Cheng, and T. J. Cui, “Wireless communications with
|
| 2349 |
+
reconfigurable intelligent surface: Path loss modeling and experimental
|
| 2350 |
+
measurement,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 421–
|
| 2351 |
+
439, Jan. 2021.
|
| 2352 |
+
[19] L. Yang, X. Yan, D. B. da Costa, T. A. Tsiftsis, H.-C. Yang, and M.-
|
| 2353 |
+
S. Alouini, “Indoor mixed dual-hop VLC/RF systems through reconfig-
|
| 2354 |
+
urable intelligent surfaces,” IEEE Wireless Commun. Lett., vol. 9, no. 11,
|
| 2355 |
+
pp. 1995–1999, Nov. 2020.
|
| 2356 |
+
[20] F. Shu, L. Yang, X. Jiang, W. Cai, W. Shi, M. Huang, J. Wang,
|
| 2357 |
+
and X. You, “Beamforming and transmit power design for intelligent
|
| 2358 |
+
reconfigurable surface-aided secure spatial modulation,” IEEE J. Sel.
|
| 2359 |
+
Topics Signal Process., vol. 16, no. 5, pp. 933–949, Aug. 2022.
|
| 2360 |
+
[21] F. Shu, Y. Teng, J. Li, M. Huang, W. Shi, J. Li, Y. Wu, and J. Wang,
|
| 2361 |
+
“Enhanced secrecy rate maximization for directional modulation net-
|
| 2362 |
+
works via IRS,” IEEE Trans. Commun., vol. 69, no. 12, pp. 8388–8401,
|
| 2363 |
+
Dec. 2021.
|
| 2364 |
+
[22] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy rate
|
| 2365 |
+
maximization for intelligent reflecting surface assisted multi-antenna
|
| 2366 |
+
communications,” IEEE Commun. Lett., vol. 23, no. 9, pp. 1488–1492,
|
| 2367 |
+
Sep. 2019.
|
| 2368 |
+
[23] Q. Wu and R. Zhang, “Weighted sum power maximization for intelligent
|
| 2369 |
+
reflecting surface aided SWIPT,” IEEE Wireless Commun. Lett., vol. 9,
|
| 2370 |
+
no. 5, pp. 586–590, May 2020.
|
| 2371 |
+
[24] W. Shi, X. Zhou, L. Jia, Y. Wu, F. Shu, and J. Wang, “Enhanced
|
| 2372 |
+
secure wireless information and power transfer via intelligent reflecting
|
| 2373 |
+
surface,” IEEE Commun. Lett., vol. 25, no. 4, pp. 1084–1088, Apr. 2021.
|
| 2374 |
+
[25] C. Pan, H. Ren, K. Wang, W. Xu, M. Elkashlan, A. Nallanathan,
|
| 2375 |
+
and L. Hanzo, “Multicell MIMO communications relying on intelligent
|
| 2376 |
+
reflecting surfaces,” IEEE Trans. Wireless Commun., vol. 19, no. 8, pp.
|
| 2377 |
+
5218–5233, Aug. 2020.
|
| 2378 |
+
[26] A. Rezaei, A. Khalili, J. Jalali, H. Shafiei, and Q. Wu, “Energy-efficient
|
| 2379 |
+
resource allocation and antenna selection for IRS-assisted multicell
|
| 2380 |
+
downlink networks,” IEEE Wireless Commun. Lett., vol. 11, no. 6, pp.
|
| 2381 |
+
1229–1233, June 2022.
|
| 2382 |
+
[27] X. Zhou, S. Yan, Q. Wu, F. Shu, and D. Ng, “Intelligent reflecting surface
|
| 2383 |
+
(IRS)-aided covert wireless communications with delay constraint,”
|
| 2384 |
+
IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, Jan. 2022.
|
| 2385 |
+
[28] X. Chen, T.-X. Zheng, L. Dong, M. Lin, and J. Yuan, “Enhancing MIMO
|
| 2386 |
+
covert communications via intelligent reflecting surface,” IEEE Wireless
|
| 2387 |
+
Commun. Lett., vol. 11, no. 1, pp. 33–37, Jan. 2022.
|
| 2388 |
+
[29] Q. Wu, X. Zhou, W. Chen, J. Li, and X. Zhang, “IRS-aided WPCNs:
|
| 2389 |
+
A new optimization framework for dynamic IRS beamforming,” IEEE
|
| 2390 |
+
Trans. Wireless Commun., vol. 21, no. 7, pp. 4725–4739, July 2022.
|
| 2391 |
+
[30] H. Cao, Z. Li, and W. Chen, “Resource allocation for IRS-assisted
|
| 2392 |
+
wireless powered communication networks,” IEEE Wireless Commun.
|
| 2393 |
+
Lett., vol. 10, no. 11, pp. 2450–2454, Nov. 2021.
|
| 2394 |
+
[31] W. Shi, Q. Wu, F. Xiao, F. Shu, and J. Wang, “Secrecy throughput
|
| 2395 |
+
maximization for IRS-aided MIMO wireless powered communication
|
| 2396 |
+
networks,” IEEE Trans. Commun., vol. 70, no. 11, pp. 7520–7535, Nov.
|
| 2397 |
+
2022.
|
| 2398 |
+
[32] L. Yang, W. Guo, and S. I. Ansari, “Mixed dual-hop fso-rf communica-
|
| 2399 |
+
tion systems through reconfigurable intelligent surface,” IEEE Commun.
|
| 2400 |
+
Lett., vol. 24, no. 7, pp. 1558–1562, July 2020.
|
| 2401 |
+
[33] I. Yildirim, F. Kilinc, E. Basar, and G. C. Alexandropoulos, “Hybrid RIS-
|
| 2402 |
+
empowered reflection and decode-and-forward relaying for coverage
|
| 2403 |
+
extension,” IEEE Commun. Lett., vol. 25, no. 5, pp. 1692–1696, May
|
| 2404 |
+
2021.
|
| 2405 |
+
[34] M. Obeed and A. Chaaban, “Relay-reconfigurable intelligent surface
|
| 2406 |
+
cooperation for energy-efficient multiuser systems,” in 2021 IEEE Int.
|
| 2407 |
+
Conf. Commun. Workshops (ICC Workshops), pp. 1–6.
|
| 2408 |
+
[35] N. T. Nguyen, Q.-D. Vu, K. Lee, and M. Juntti, “Spectral efficiency
|
| 2409 |
+
optimization for hybrid relay-reflecting intelligent surface,” in 2021
|
| 2410 |
+
IEEE Int. Conf. Commun. Workshops (ICC Workshops), Jul. 2021, pp.
|
| 2411 |
+
1–6.
|
| 2412 |
+
[36] X. Wang, F. Shu, W. Shi, X. Liang, R. Dong, J. Li, and J. Wang,
|
| 2413 |
+
“Beamforming design for IRS-aided decode-and-forward relay wireless
|
| 2414 |
+
network,” IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 198–
|
| 2415 |
+
207, Mar. 2022.
|
| 2416 |
+
[37] Z. Abdullah, G. Chen, S. Lambotharan, and J. A. Chambers, “A
|
| 2417 |
+
hybrid relay and intelligent reflecting surface network and its ergodic
|
| 2418 |
+
performance analysis,” IEEE Wireless Commun. Lett., vol. 9, no. 10, pp.
|
| 2419 |
+
1653–1657, Oct. 2020.
|
| 2420 |
+
[38] Z. Zhang, L. Dai, X. Chen, C. Liu, F. Yang, R. Schober, and H. Vin-
|
| 2421 |
+
cent Poor, “Active RIS vs. passive RIS: Which will prevail in 6G?”
|
| 2422 |
+
IEEE Trans. Commun., pp. 1–9, 2022.
|
| 2423 |
+
|
| 2424 |
+
15
|
| 2425 |
+
[39] K. Zhi, C. Pan, H. Ren, K. K. Chai, and M. Elkashlan, “Active RIS
|
| 2426 |
+
versus passive RIS: Which is superior with the same power budget?”
|
| 2427 |
+
IEEE Commun. Lett., vol. 26, no. 5, pp. 1150–1154, May 2022.
|
| 2428 |
+
[40] L. Dong, H.-M. Wang, and J. Bai, “Active reconfigurable intelligent
|
| 2429 |
+
surface aided secure transmission,” IEEE Trans. Veh. Technol., vol. 71,
|
| 2430 |
+
no. 2, pp. 2181–2186, Feb. 2022.
|
| 2431 |
+
[41] N. Mensi and D. B. Rawat, “Reconfigurable intelligent surface selection
|
| 2432 |
+
for wireless vehicular communications,” IEEE Wireless Commun. Lett.,
|
| 2433 |
+
vol. 11, no. 8, pp. 1743–1747, Aug. 2022.
|
| 2434 |
+
[42] X. Zhou, J. Li, F. Shu, Q. Wu, Y. Wu, W. Chen, and L. Hanzo, “Secure
|
| 2435 |
+
SWIPT for directional modulation-aided AF relaying networks,” IEEE
|
| 2436 |
+
J. Sel. Areas Commun., vol. 37, no. 2, pp. 253–268, Feb. 2019.
|
| 2437 |
+
|
8dE1T4oBgHgl3EQfCAI3/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:dc0b93494ae63e0ad3a9d1838d6cd463fe86642853ae819b5d133b62ff3026c7
|
| 3 |
+
size 33292333
|
9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:91e1eda4326eee9edf40249d9f06da76a64cc97047e70c9dc62ab4ee8afd45f4
|
| 3 |
+
size 2818093
|
9tE0T4oBgHgl3EQffwDm/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:94183404fbdb10e46aafb533268a1005642cde156e43fc99ec2d9dc98cae49a9
|
| 3 |
+
size 121291
|
C9E2T4oBgHgl3EQfoAjs/content/tmp_files/2301.04015v1.pdf.txt
ADDED
|
@@ -0,0 +1,1048 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Science
|
| 2 |
+
Education
|
| 3 |
+
Do Inquiring Minds Have Positive
|
| 4 |
+
Attitudes? The Science Education
|
| 5 |
+
of Preservice Elementary Teachers
|
| 6 |
+
CATHERINE RIEGLE-CRUMB,1 KARISMA MORTON,1 CHELSEA MOORE,2
|
| 7 |
+
ANTONIA CHIMONIDOU,3 CYNTHIA LABRAKE,4 SACHA KOPP5
|
| 8 |
+
1Department of Curriculum and Instruction, STEM Education, University of Texas at
|
| 9 |
+
Austin; 2Department of Psychology, University of Massachusetts, Amherst; 3UTeach
|
| 10 |
+
Primary, College of Natural Sciences, University of Texas at Austin; 4Department of
|
| 11 |
+
Chemistry, University of Texas at Austin; and 5College of Arts and Sciences, SUNY
|
| 12 |
+
Stonybrook
|
| 13 |
+
Received 26 June 2014; revised 27 February 2015; accepted 30 March 2015
|
| 14 |
+
DOI 10.1002/sce.21177
|
| 15 |
+
Published online 14 July 2015 in Wiley Online Library (wileyonlinelibrary.com).
|
| 16 |
+
ABSTRACT: Owing to their potential impact on students’ cognitive and noncognitive
|
| 17 |
+
outcomes, the negative attitudes toward science held by many elementary teachers are a
|
| 18 |
+
critical issue that needs to be addressed. This study focuses on the science education of
|
| 19 |
+
preservice elementary teachers with the goal of improving their attitudes before they begin
|
| 20 |
+
their professional lives as classroom teachers. Specifically, this study builds on a small
|
| 21 |
+
body of research to examine whether exposure to inquiry-based science content courses
|
| 22 |
+
that actively involve students in the collaborative process of learning and discovery can
|
| 23 |
+
promote a positive change in attitudes toward science across several different dimensions.
|
| 24 |
+
To examine this issue, surveys and administrative data were collected from over 200 students
|
| 25 |
+
enrolled in the Hands on Science (HoS) program for preservice teachers at the University
|
| 26 |
+
of Texas at Austin, as well as more than 200 students in a comparison group enrolled
|
| 27 |
+
in traditional lecture-style classes. Quantitative analyses reveal that after participating in
|
| 28 |
+
HoS courses, preservice teachers significantly increased their scores on scales measuring
|
| 29 |
+
confidence, enjoyment, anxiety, and perceptions of relevance, while those in the comparison
|
| 30 |
+
group experienced a decline in favorable attitudes to science. These patterns offer empirical
|
| 31 |
+
support for the attitudinal benefits of inquiry-based instruction and have implications for
|
| 32 |
+
the future learning opportunities available to students at all education levels.
|
| 33 |
+
C⃝ 2015
|
| 34 |
+
Wiley Periodicals, Inc. Sci Ed 99:819–836, 2015
|
| 35 |
+
Correspondence to: Dr. Catherine Riegle-Crumb; e-mail: riegle@austin.utexas.edu
|
| 36 |
+
C⃝ 2015 Wiley Periodicals, Inc.
|
| 37 |
+
|
| 38 |
+
820
|
| 39 |
+
RIEGLE-CRUMB ET AL.
|
| 40 |
+
INTRODUCTION
|
| 41 |
+
While the metaphor of science, technology, engineering, and mathematics (STEM) as a
|
| 42 |
+
pipeline has been rightly criticized as too simplistic, it is nevertheless clear that students’
|
| 43 |
+
early experiences in science classrooms shape their future achievement and interests (Xie &
|
| 44 |
+
Shauman, 2003). With the goal of better understanding and ultimately improving elemen-
|
| 45 |
+
tary science education in the United States, researchers and policymakers have increased
|
| 46 |
+
their attention toward teachers. A growing body of research now focuses on the science
|
| 47 |
+
content knowledge of elementary science teachers, as the subject matter expertise that
|
| 48 |
+
they possess has clear implications for what students learn (Diamond, Maerten-Rivera,
|
| 49 |
+
Rohrer, & Lee, 2014; Heller, Daehler, Wong, Shinohara, & Miratrix, 2012; Kanter & Kon-
|
| 50 |
+
stantopoulus, 2010; Sadler, Sonnert, Coyle, Cook-Smith, & Miller, 2013). Compared to
|
| 51 |
+
secondary teachers, elementary teachers are much more likely to be trained as generalists
|
| 52 |
+
and consequently less likely to have extensive content knowledge, and this pattern appears
|
| 53 |
+
particularly pronounced for science (Haefner & Zembal-Saul, 2004). Clearly there are con-
|
| 54 |
+
tinued concerns about the need for teacher training programs and professional development
|
| 55 |
+
to focus on increasing subject matter expertise.
|
| 56 |
+
Yet content knowledge is a necessary but insufficient characteristic of a successful teacher.
|
| 57 |
+
Teachers’ attitudes about the content they teach is another critical factor that has implications
|
| 58 |
+
for classroom learning, and importantly, negative attitudes can exist independent of content-
|
| 59 |
+
area expertise (Beilock, Gunderson, Ramirez, & Levine, 2010; Tosun, 2000). While there
|
| 60 |
+
is comparatively less research on elementary teachers’ attitudes toward science than math
|
| 61 |
+
(Bursal & Paznokas, 2006), there is nevertheless evidence that many elementary teachers
|
| 62 |
+
are not favorably inclined toward science. Such negative attitudes on the part of teachers can
|
| 63 |
+
impact their students’ attitudes toward science and can inhibit students’ learning (Beilock
|
| 64 |
+
et al., 2010; Jarrett, 1999; Ramey-Gassert, Shroyer, & Staver, 1996), creating a vicious
|
| 65 |
+
cycle that must be interrupted. However, effectively changing how teachers view science is
|
| 66 |
+
a challenging task (Mulholland & Wallace, 1996; Palmer, 2002).
|
| 67 |
+
The goal of this study is to examine whether inquiry-based science content classes might
|
| 68 |
+
function to help break this cycle by improving preservice teachers’ attitudes at a critical
|
| 69 |
+
juncture before they begin their professional lives as classroom teachers. While there is
|
| 70 |
+
much research on the positive impact of inquiry on outcomes for K–12 students (Borman,
|
| 71 |
+
Gamoran, & Bowdon, 2008; Diamond et al., 2014; National Research Council, 2012b), we
|
| 72 |
+
build on a smaller body of qualitative research regarding the benefits of inquiry instruction
|
| 73 |
+
in college for preservice elementary teachers (Mulholland & Wallace, 1996; Palmer, 2002).
|
| 74 |
+
Specifically, we suggest that students can become empowered and enthusiastic about the
|
| 75 |
+
domain of science through active involvement in the process of inquiry, defined as engaging
|
| 76 |
+
in the pursuit of scientific questions via data collection, experimentation, exploration, and
|
| 77 |
+
discussion (National Research Council, 2000).
|
| 78 |
+
To examine this issue, we collected data from the hands-on science (HoS) undergraduate
|
| 79 |
+
program at the University of Texas at Austin (Ludwig et al., 2013) to determine whether
|
| 80 |
+
exposure to these inquiry-based science content courses promoted a change in the science
|
| 81 |
+
attitudes of a sample of over 200 preservice elementary teachers. In exploring preservice
|
| 82 |
+
teachers’ attitudes, we go beyond the typical singular focus of much research on self-
|
| 83 |
+
efficacy to instead consider personal attitudes toward science across several dimensions
|
| 84 |
+
(van Aalderen-Smeets, Walma van der Molen, & Asma, 2012). Additionally, to ensure
|
| 85 |
+
the robustness of our results, our design utilizes a comparison group of noneducation and
|
| 86 |
+
nonscience majors enrolled in more traditional lecture-based science courses; our analyses
|
| 87 |
+
also account for students’ social and academic background. Our study offers promising
|
| 88 |
+
evidence that science content classes in college can be a positive vehicle for changing the
|
| 89 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 90 |
+
|
| 91 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 92 |
+
821
|
| 93 |
+
attitudes of future elementary teachers, and subsequently has potential implications for
|
| 94 |
+
the opportunities to learn both cognitive and noncognitive skills that are offered to future
|
| 95 |
+
generations of elementary science students.
|
| 96 |
+
LITERATURE REVIEW
|
| 97 |
+
Framework: Considering Attitudes Across Multiple Dimensions
|
| 98 |
+
When exploring attitudes toward science, it is critical to recognize multiple relevant
|
| 99 |
+
dimensions. Based on a comprehensive review of prior research on teacher attitudes, and
|
| 100 |
+
motivated by the lack of substantive clarity and empirical transparency of most prior
|
| 101 |
+
research, van Aalderen-Smeets et al. (2012) recently advanced a new theoretical framework
|
| 102 |
+
to provide a cohesive model that captures primary teachers’ attitudes toward science.
|
| 103 |
+
Specifically, they developed a tripartite model of primary teachers’ attitudes toward science
|
| 104 |
+
that distinguishes between three overarching dimensions, each of which is composed of
|
| 105 |
+
different elements: (1) perceived control (which includes elements such as self-efficacy), (2)
|
| 106 |
+
affective states (which includes enjoyment and anxiety), and (3) cognitive beliefs (such as
|
| 107 |
+
perceived relevance). This framework is informed by earlier theoretical models of attitudes
|
| 108 |
+
(Eagly & Chaiken, 1993), but departs from prior models by considering perceived control
|
| 109 |
+
(e.g., self-efficacy) as a core dimension, and furthermore defining behavioral intentions
|
| 110 |
+
as a consequence rather than a component of science attitudes. Their model also calls for
|
| 111 |
+
researchers to make a clear distinction regarding whether the focus is on teachers’ personal
|
| 112 |
+
attitudes toward science or their professional attitudes toward teaching science, as studies
|
| 113 |
+
that combine teachers’ views of science as a domain with their views on science instruction
|
| 114 |
+
in their own classroom into one empirical scale blur the object of teachers’ attitudes, making
|
| 115 |
+
substantive interpretation difficult.
|
| 116 |
+
The three dimensions of attitudes (whether personal or professional) advanced by van
|
| 117 |
+
Aalderen-Smeets et al. (2012) are logically related to one another. For example, Bursal and
|
| 118 |
+
Paznokas(2006) found that teachers with higher levels of self-efficacy had lower anxiety,
|
| 119 |
+
a finding supported by several other studies (Bleicher, 2007; Palmer, 2002). Yet while
|
| 120 |
+
related, they nevertheless capture somewhat distinct thoughts and beliefs. For instance, an
|
| 121 |
+
individual might expect to master an activity or believe that it is useful, but nevertheless
|
| 122 |
+
find it is unappealing (e.g., flossing their teeth) or even anxietyproducing (e.g., running 10
|
| 123 |
+
miles). Therefore, considering elements of all three dimensions is critical to developing a
|
| 124 |
+
comprehensive picture of teachers’ attitudes toward science.
|
| 125 |
+
Yet most of the literature about the attitudes of elementary science teachers (either
|
| 126 |
+
preservice or in-service) focuses on their perceived control in the form of self-efficacy,
|
| 127 |
+
as there is relatively scant research on either the cognitive beliefs or affective attitudes
|
| 128 |
+
of teachers (van Aalderen-Smeets et al., 2012). Thus, a key contribution of our study is
|
| 129 |
+
our consideration of elements of all three dimensions of attitude to more fully capture the
|
| 130 |
+
complexity of preservice teachers’ attitudes toward science.1 Below we discuss the prior
|
| 131 |
+
literature on the science attitudes of preservice elementary teachers in more detail, including
|
| 132 |
+
how such attitudes may influence the outcomes of future students. Because our research
|
| 133 |
+
questions and subsequent empirical analyses focus on preservice teachers well before they
|
| 134 |
+
1In this paper, we address all three dimensions of van Aalderen-Smeets et al.’s (2012) theoretical model,
|
| 135 |
+
but do not discuss (or model) every element within each dimension. For example, while the authors include
|
| 136 |
+
context dependency as an element that falls under the dimension of perceived control, we do not address this
|
| 137 |
+
here as it refers to the support that practicing teachers receive from their administrators and therefore is not
|
| 138 |
+
particularly relevant for a study concerning the personal (rather than professional) attitudes of preservice
|
| 139 |
+
teachers.
|
| 140 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 141 |
+
|
| 142 |
+
822
|
| 143 |
+
RIEGLE-CRUMB ET AL.
|
| 144 |
+
actually enter the elementary classroom, we concentrate on literature on personal attitudes
|
| 145 |
+
toward science. We then turn to a discussion of why inquiry-based science content classes
|
| 146 |
+
for preservice teachers have the potential to increase individuals’ attitudes across all three
|
| 147 |
+
dimensions.
|
| 148 |
+
Perceived Control: Considering Self-Efficacy.
|
| 149 |
+
A key element of the attitudinal dimen-
|
| 150 |
+
sion of perceived control is self-efficacy, which according to Bandura’s (1977, 1982)
|
| 151 |
+
foundational work is defined as an individual’s belief that she can successfully master a
|
| 152 |
+
situation or deal with an obstacle that arises. An individual’s self-efficacy has logical im-
|
| 153 |
+
plications for her subsequent behaviors and choices, as she is likely to attempt to avoid
|
| 154 |
+
those situations or activities where she does not feel she can be efficacious, and persist
|
| 155 |
+
where she feels confident that she can be successful. While research has demonstrated
|
| 156 |
+
that in-service elementary teachers exhibit low levels of efficacy in their science teaching
|
| 157 |
+
(see, for example,Atwater, Gardner, & Kight, 1991; Harlen, 1997; Ramey-Gassert et al.,
|
| 158 |
+
1996), not surprisingly this pattern is also evident among preservice teachers, who feel less
|
| 159 |
+
efficacious about their own ability to learn science. For example, Skamp (1991) determined
|
| 160 |
+
that less than half of the preservice elementary teachers in his study reported having even
|
| 161 |
+
a fair amount of confidence in their science ability. Similarly, Bleicher’s (2007) study of
|
| 162 |
+
preservice elementary teachers found that participants in a science methods class exhibited
|
| 163 |
+
low scores on science self-efficacy scales. Low efficacy is often attributed to prior negative
|
| 164 |
+
educational experiences in science. For example, in a study of five preservice teachers,
|
| 165 |
+
Mulholland and Wallace (1996) found that their respondents reported very little confidence
|
| 166 |
+
in their own science abilities and attributed this to negative experiences in their own science
|
| 167 |
+
schooling as children.
|
| 168 |
+
Affective States: Considering Enjoyment and Anxiety.
|
| 169 |
+
Individuals’ affect toward a
|
| 170 |
+
domain represents another attitudinal dimension. As articulated by van Aalderen-Smeets
|
| 171 |
+
et al. (2012), the dimension of affect can be further categorized into the positive element
|
| 172 |
+
of enjoyment and the negative element of anxiety. Beginning with the former, Liang and
|
| 173 |
+
Gabel (2005) found that most preservice elementary teachers in their study reported that
|
| 174 |
+
science had never been enjoyable for them. These teachers also indicated that they took
|
| 175 |
+
science courses only because it was required for their degree program. Smith (2000) and
|
| 176 |
+
Howes (2002) found similar results. Additionally, the preservice participants in all of these
|
| 177 |
+
studies attributed their low levels of enjoyment to negative experiences in either (or both)
|
| 178 |
+
their high school and college science courses, a point to which we will return to later.
|
| 179 |
+
Anxiety captures the negative aspect of the affective dimension. Early research by Mallow
|
| 180 |
+
(1981; also Mallow & Greenburg, 1983) as well as Westerback (1984) define science anxiety
|
| 181 |
+
as the fear, worry, or apprehension that some individuals experience when presented with
|
| 182 |
+
the task of learning science. While research on the math anxiety of preservice teachers is
|
| 183 |
+
extensive (Udo, Ramsey, & Mallow, 2004), and research considering both math anxiety and
|
| 184 |
+
science anxiety find a strong association between the two (Cady & Rearden, 2007), there is
|
| 185 |
+
comparatively little research focusing specifically on science anxiety (Bursal & Paznokas,
|
| 186 |
+
2006). Yet several studies do provide evidence that preservice elementary teachers report
|
| 187 |
+
relatively high levels of science anxiety about teaching science, as well as more generalized
|
| 188 |
+
anxiety about learning science themselves (Cady & Rearden, 2007; Udo et al., 2004;
|
| 189 |
+
Westerback & Long, 1990).
|
| 190 |
+
Cognitive Beliefs: Considering the Relevance of Science.
|
| 191 |
+
Finally, we discuss research
|
| 192 |
+
on preservice elementary teachers’ beliefs in the relevance of science, a critical element
|
| 193 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 194 |
+
|
| 195 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 196 |
+
823
|
| 197 |
+
of the attitudinal dimension of cognitive beliefs. The limited extant research on this topic
|
| 198 |
+
focuses on perceptions of science as useful or relevant for society and for them personally,
|
| 199 |
+
and finds that preservice elementary teachers report generally favorable views. Specifically,
|
| 200 |
+
in a study of 200 preservice teachers, Coulson (1992) used a survey instrument that in-
|
| 201 |
+
cluded a personal usefulness science scale and found that on average, respondents indicated
|
| 202 |
+
moderate levels of agreement. Cobern and Loving’s (2002) study at a large Midwestern
|
| 203 |
+
university also found that on Likert scales measuring the perceived importance of science
|
| 204 |
+
to all citizens, preservice elementary teachers on average agreed with this sentiment. These
|
| 205 |
+
findings echo the sentiments of the general population, which generally regard science and
|
| 206 |
+
technology as useful for making their lives better (Evans & Durant, 1995; Kohut, Keeter,
|
| 207 |
+
Doherty, & Dimock, 2009). Therefore among the three attitudinal dimensions discussed,
|
| 208 |
+
promoting preservice teachers’ views of the relevance of science is perhaps somewhat less
|
| 209 |
+
of a pressing problem than promoting both their perceived control in the form of science
|
| 210 |
+
efficacy and their affective attitudes of enjoyment and anxiety.
|
| 211 |
+
Examining the Impact of Teacher Attitudes
|
| 212 |
+
There is a logical connection between teachers’ attitudes toward a subject and student
|
| 213 |
+
outcomes, both in terms of impacting students’ opportunities to learn science and their own
|
| 214 |
+
developing attitudes. First, research indicates that the negative attitudes toward science held
|
| 215 |
+
by many elementary teachers are likely to result in less coverage of science content and
|
| 216 |
+
less engaging and effective instruction. Teachers who are not confident in their own science
|
| 217 |
+
knowledge are likely to worry that they cannot effectively answer students’ questions nor
|
| 218 |
+
keep them engaged with interesting activities (Jarrett, 1999). Consequently, elementary
|
| 219 |
+
teachers who feel less efficacious and more anxious are likely to try to avoid teaching
|
| 220 |
+
science and spend less time teaching when they cannot avoid it altogether (Brownlow,
|
| 221 |
+
Jacobi, & Rogers, 2000; Pine et al., 2006; Ramey-Gassert et al., 1996). Appleton and Kindt
|
| 222 |
+
(1999) also found evidence that avoidance occurred when teachers did not find science to
|
| 223 |
+
be as relevant as other subjects such as English or math. One such teacher reported that “If
|
| 224 |
+
you’re running out of time in the week, you think ‘Oh I just won’t worry about that science
|
| 225 |
+
activity’” (p. 162).
|
| 226 |
+
When teachers do teach science, their negative attitudes can impact their pedagogical
|
| 227 |
+
practices and subsequently their capacity to reach and engage students. Appleton and
|
| 228 |
+
Kindt’s (1999) study of in-service elementary teachers found that those exhibiting low
|
| 229 |
+
confidence were less likely to engage their students in hands-on learning. Ramey-Gassert
|
| 230 |
+
et al. (1996) found that elementary teachers with low science self-efficacy had a minimal
|
| 231 |
+
desire to engage in professional development activities that could improve their teaching of
|
| 232 |
+
science. Lack of belief in the usefulness or relevance of science could also logically result
|
| 233 |
+
in a reduced effort to provide engaging instruction to students.
|
| 234 |
+
Additionally, the negative attitudes toward science held by many elementary teachers can
|
| 235 |
+
result in the socialization of students toward a negative stance toward science. As students
|
| 236 |
+
look to their teachers as role models and authorities, they begin to mimic and potentially
|
| 237 |
+
internalize such attitudes as their own (Jussim & Eccles, 1992; McKown & Weinstein,
|
| 238 |
+
2002). This can lead to a vicious cycle where negative attitudes such as anxiety and low
|
| 239 |
+
efficacy are passed from teachers to their students, and therefore from one generation
|
| 240 |
+
to the next. For example, Beilock et al. (2010) found that elementary teachers’ math
|
| 241 |
+
anxiety influenced students’ own attitudes toward math, with girls in particular more likely
|
| 242 |
+
to evidence declining math attitudes and increasingly gender-stereotyped views of math
|
| 243 |
+
over the course of the year. This particular study highlights additional concerns regarding
|
| 244 |
+
gender rolemodeling; as most elementary teachers are female, and a substantial number
|
| 245 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 246 |
+
|
| 247 |
+
824
|
| 248 |
+
RIEGLE-CRUMB ET AL.
|
| 249 |
+
of them exhibit negative attitudes toward science (as well as math), this could be a strong
|
| 250 |
+
conduit through which young girls begin to believe that these subjects are less interesting,
|
| 251 |
+
less important, and overall less-suited for them. Furthermore, as students’ own attitudes
|
| 252 |
+
decline, so does their engagement and motivation to learn, which further impacts their
|
| 253 |
+
achievement (Eccles, 1994).
|
| 254 |
+
In sum, the research literature provides compelling evidence that teachers’ negative
|
| 255 |
+
attitudes can impact students’ learning and attitudinal outcomes, and as such are a critical
|
| 256 |
+
issue that needs to be addressed. To effectively break this cycle, necessitates intervening
|
| 257 |
+
to change teachers’ attitudes before they enter the classroom. In short, the education of
|
| 258 |
+
preservice teachers is an ideal place to focus.
|
| 259 |
+
Educating Preservice Teachers: Inquiry as a Tool for Improving
|
| 260 |
+
Attitudes
|
| 261 |
+
As mentioned earlier, the negative attitudes of preservice elementary teachers can at
|
| 262 |
+
least in part be traced back to their own negative experiences with science classes in high
|
| 263 |
+
school and in college. For example, Liang and Gabel (2005) found that preservice teachers
|
| 264 |
+
attributed their lack of enjoyment of science to their prior experiences in classes dominated
|
| 265 |
+
by lectures that necessitated copious amounts of note-taking and memorization. Similarly,
|
| 266 |
+
Smith (2000) reports that preservice elementary teachers in his study often complained
|
| 267 |
+
about the boredom of their procedure-based high school and college science courses.
|
| 268 |
+
Simply put, many preservice teachers have had little exposure to inquiry-based science
|
| 269 |
+
instruction in their lives as students. We posit that exposure while in college to pedagogy
|
| 270 |
+
that actively involves them in the process of scientific discovery can ultimately help them to
|
| 271 |
+
see that science is meaningful, interesting, and accessible, thereby changing their attitudes
|
| 272 |
+
toward science.
|
| 273 |
+
Several studies support the supposition that inquiry classes can promote such changes,
|
| 274 |
+
in spite of the possibility of some initial student frustration with an approach that deviates
|
| 275 |
+
from teachers’ didactic presentations of the “right” answer (Volkmann, Abell, & Zgagacz,
|
| 276 |
+
2005). For example, in a qualitative study of preservice teachers at a large university in
|
| 277 |
+
the southwest, Kelly (2000) found that after completing an active, inquiry-based science
|
| 278 |
+
methods course, most participants reported that their interest in science had increased.
|
| 279 |
+
Kelly (2000) attributes this shift to the use of hands-on explorations and discussions where
|
| 280 |
+
students came to embody the process of scientific inquiry by formulating and exploring
|
| 281 |
+
ideas. Similarly, in a study of preservice elementary teachers, Palmer (2002) interviewed
|
| 282 |
+
four participants who reported that their attitudes toward science had changed from negative
|
| 283 |
+
to positive due to the excitement of inquiry-based lessons. A study of five teachers by
|
| 284 |
+
Mulholland and Wallace (1996) reported similar results. Finally, in a quantitative study
|
| 285 |
+
of 112 preservice elementary teachers, Jarrett (1999) found that an inquiry-based science
|
| 286 |
+
methods class increased the participants’ personal interest in science. The author attributed
|
| 287 |
+
this change to preservice teachers becoming active agents in the classroom and learning to
|
| 288 |
+
view science as a process of discovery. Thus, a small body of research finds that inquiry-
|
| 289 |
+
based pedagogy in science educational methods courses can have a positive impact on
|
| 290 |
+
preservice elementary teachers’ attitudes.
|
| 291 |
+
CURRENT STUDY
|
| 292 |
+
Building on the insights of this prior research, we posit that required science content
|
| 293 |
+
courses could also represent a powerful venue for change for college students at the
|
| 294 |
+
beginning stages of preparing for their careers as future teachers. Specifically, the purpose
|
| 295 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 296 |
+
|
| 297 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 298 |
+
825
|
| 299 |
+
of this study is to examine whether inquiry-based science content courses promote a change
|
| 300 |
+
in attitudes toward science among preservice elementary teachers. The courses are part of
|
| 301 |
+
the HoS undergraduate program, developed at The University of Texas at Austin in the
|
| 302 |
+
College of Natural Sciences, with cooperation from the College of Education. HoS is
|
| 303 |
+
required of all students in the elementary education program and covers four semesters of
|
| 304 |
+
science courses with a curriculum that is composed heavily of the topics that preservice
|
| 305 |
+
teachers will be expected to teach their students once they become teachers (Ludwig et al.,
|
| 306 |
+
2013). The design of the HoS program is based on the Physics and Everyday Thinking
|
| 307 |
+
(Goldberg, 2008) framework that centers around the development of students’ physical
|
| 308 |
+
science understandings through experimentation and follows the example of work from
|
| 309 |
+
Western Washington University extending this framework to other disciplines (Nelson,
|
| 310 |
+
2008). The curriculum is based upon big ideas in science, with specific emphasis on the
|
| 311 |
+
themes of Matter and Energy, which are integrated across different science disciplines. The
|
| 312 |
+
course sequence focuses on physics in Semester 1, chemistry and geology in Semester 2,
|
| 313 |
+
biological systems in Semester 3, and astronomy and earth science in Semester 4.
|
| 314 |
+
HoS classes were designed to utilize the essential elements of inquiry-based learning
|
| 315 |
+
as defined by the influential National Research Council report on inquiry (Forbes, 2011;
|
| 316 |
+
National Research Council, 2000); specifically, students engage in scientifically oriented
|
| 317 |
+
questions by collecting, organizing, and analyzing data. From that data they formulate
|
| 318 |
+
explanations, connect them to scientific knowledge, and subsequently evaluate their expla-
|
| 319 |
+
nations in contrast to alternative explanations. Additionally, students share and justify those
|
| 320 |
+
explanations with others.
|
| 321 |
+
The HoS program is best categorized as teacher-directed or guided inquiry (Cuevas, Lee,
|
| 322 |
+
Hart, & Deaktor, 2005; National Research Council, 2000; Volkmann et al., 2005). Initial
|
| 323 |
+
questions are posed by the instructor and all activities are carefully designed to present
|
| 324 |
+
opportunities for students to confront misconceptions, with both topics and skills developed
|
| 325 |
+
in a structured progression. The instructor does not lecture but probes student knowledge and
|
| 326 |
+
offers helpful nudges in the right direction, working with students both in small groups and
|
| 327 |
+
via whole class discussions to construct knowledge and develop explanations (Volkmann
|
| 328 |
+
et al., 2005). Finally, consistent with inquiry approaches to learning, the course emphasizes
|
| 329 |
+
big ideas in science while engaging students in hands-on learning and constant exploration
|
| 330 |
+
and discussion while in groups with their peers (National Research Council, 2000, 2012b).
|
| 331 |
+
An example of a typical 2-hour class session is a lesson on sound that begins with the
|
| 332 |
+
following teacher-generated questions: How does sound travel through a room? How does
|
| 333 |
+
sound travel from your classmate to you? Students then work in groups of three or four to
|
| 334 |
+
answer these questions and discuss their initial ideas or preconceptions; they subsequently
|
| 335 |
+
share their ideas with the entire class, so that there is a collective knowledge of alternative
|
| 336 |
+
ways of thinking about how sound travels. Working in their small groups, students then
|
| 337 |
+
engage in a series of experiments, using an “airzooka” and candles, a string telephone, and
|
| 338 |
+
a loudspeaker, that require that they gather data and then generate models based on these
|
| 339 |
+
data. They are regularly prompted by the instructor to make predictions and connect trends
|
| 340 |
+
to other previously seen concepts. Finally, students reflect and summarize key ideas and
|
| 341 |
+
connect them to other contexts by using evidence-based reasoning from the data collected
|
| 342 |
+
in their experiments. These questions are the basis for whole-class discussions, where
|
| 343 |
+
students present and justify their ideas to their peers. Students typically end lessons by
|
| 344 |
+
writing a scientific narrative summarizing how their thinking was revised from their initial
|
| 345 |
+
ideas, drawing on evidence gained through the experiments and whole class sharing and
|
| 346 |
+
discussion. For example, a student might share how her initial idea that “sound travels as a
|
| 347 |
+
wave” has become more sophisticated, discussing the role of vibrations and the transfer of
|
| 348 |
+
mechanical energy from the source to the receiver.
|
| 349 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 350 |
+
|
| 351 |
+
826
|
| 352 |
+
RIEGLE-CRUMB ET AL.
|
| 353 |
+
Our examination of whether the inquiry-based science content courses of the HoS pro-
|
| 354 |
+
gram promote a change in attitudes toward science among preservice elementary teachers is
|
| 355 |
+
described in detail below. Here, we briefly note that our study contributes to the literature a
|
| 356 |
+
rigorous quantitative examination of change in attitudes across multiple dimensions among
|
| 357 |
+
preservice elementary teachers, utilizing a comparison group of students in more traditional
|
| 358 |
+
science content courses, as well as accounting for differences among students in academic
|
| 359 |
+
and social background characteristics that may have implications for their attitudes.
|
| 360 |
+
Data and Method
|
| 361 |
+
Analytic Sample.
|
| 362 |
+
Our analytic sample includes 238 preservice elementary teachers who
|
| 363 |
+
enrolled in the HoS program between Fall 2010 and Spring 2012. Students completed
|
| 364 |
+
presurveys prior to the start of the first course and postsurveys at the end of the second
|
| 365 |
+
course in the sequence.2 Surveys were done online, and were administered during class
|
| 366 |
+
by members of the research team. Additionally, our sample includes a comparison group
|
| 367 |
+
composed of 263 nonscience and noneducation majors enrolled in traditional lecture-style
|
| 368 |
+
undergraduate science courses in Spring 2012. While our design falls shorts of a pure
|
| 369 |
+
treatment versus control comparison, we chose courses that represent what our sample of
|
| 370 |
+
preservice elementary teachers would have been required to take in the absence of the
|
| 371 |
+
HoS program. Therefore, our comparison group includes students who were enrolled in
|
| 372 |
+
either an introductory-level chemistry or biology class. These students were surveyed at
|
| 373 |
+
the beginning and end of the semester. As the time period between pre- and postsurveys
|
| 374 |
+
is longer for HoS students than for non-HoS students, we discuss the implications and
|
| 375 |
+
limitations of this comparison later.
|
| 376 |
+
Administrative records were linked to student surveys, allowing us to examine the demo-
|
| 377 |
+
graphic and academic background information of students in our sample and to consider
|
| 378 |
+
how HoS students differed from those in the comparison group. Not surprisingly given the
|
| 379 |
+
gender composition of the elementary teacher population nationwide, HoS students were
|
| 380 |
+
overwhelmingly female (95%), compared to 65% of our comparison sample of nonedu-
|
| 381 |
+
cation and nonscience majors. There were no statistically significant differences between
|
| 382 |
+
the two groups of students by mother’s education; for race/ethnicity, there were signifi-
|
| 383 |
+
cantly fewer students who identified as American Indian among HoS students compared
|
| 384 |
+
to non-HoS students. Regarding academic background prior to college entry, HoS students
|
| 385 |
+
had lower SAT math scores than their fellow students taking typical science classes by
|
| 386 |
+
more than one-third of a standard deviation (see Table 1). To ensure that any differences
|
| 387 |
+
observed between the two groups in their changes in attitudes over time are not confounded
|
| 388 |
+
by differences in their background characteristics, our subsequent multivariate models will
|
| 389 |
+
control for all of these factors.3
|
| 390 |
+
Student Attitude Surveys.
|
| 391 |
+
The pre- and postsurveys administered to both groups con-
|
| 392 |
+
sisted of 21 items geared toward assessing student attitudes toward science. To examine
|
| 393 |
+
multiple dimensions of attitudes, we selected items from preexisting surveys to measure
|
| 394 |
+
2At the time of this study, students were only required to take the first two semesters of the total four
|
| 395 |
+
semester sequence.
|
| 396 |
+
3Mother’s education level is an ordinal variable with the following categories: (1) did not attend high
|
| 397 |
+
school, (2) attended high school but did not graduate, (3) high school diploma or GED, (4) some college, (5)
|
| 398 |
+
earned associate’s degree, (6) bachelor’s degree, (7) graduate or professional degree. Math SAT score and
|
| 399 |
+
mother’s education level were imputed for those students who had missing values. We utilized information
|
| 400 |
+
on gender, race, high school rank, family income, and father’s education to conduct single imputation using
|
| 401 |
+
Stata. Analyses using list-wise deletion produced similar results.
|
| 402 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 403 |
+
|
| 404 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 405 |
+
827
|
| 406 |
+
TABLE 1
|
| 407 |
+
Descriptive Statistics
|
| 408 |
+
Hands-on Science
|
| 409 |
+
(HoS) Students
|
| 410 |
+
Non-HoS Students
|
| 411 |
+
N = 238
|
| 412 |
+
N = 263
|
| 413 |
+
Gender
|
| 414 |
+
Female***
|
| 415 |
+
94.5%
|
| 416 |
+
65.4%
|
| 417 |
+
Race/ethnicity
|
| 418 |
+
White (non-Hispanic)
|
| 419 |
+
63.4%
|
| 420 |
+
60.1%
|
| 421 |
+
Black
|
| 422 |
+
2.9%
|
| 423 |
+
3.4%
|
| 424 |
+
Hispanic
|
| 425 |
+
21%
|
| 426 |
+
19%
|
| 427 |
+
Asian
|
| 428 |
+
11.3%
|
| 429 |
+
14.4%
|
| 430 |
+
American Indian**
|
| 431 |
+
0.4%
|
| 432 |
+
2.7%
|
| 433 |
+
Native Hawaiian/Pacific Islander
|
| 434 |
+
0.8%
|
| 435 |
+
0.4%
|
| 436 |
+
Other background characteristics
|
| 437 |
+
Mean
|
| 438 |
+
SD
|
| 439 |
+
Mean
|
| 440 |
+
SD
|
| 441 |
+
SAT math score***
|
| 442 |
+
574.87
|
| 443 |
+
75.60
|
| 444 |
+
607.62
|
| 445 |
+
73.39
|
| 446 |
+
Mother’s educational level
|
| 447 |
+
5.10
|
| 448 |
+
1.60
|
| 449 |
+
5.07
|
| 450 |
+
1.69
|
| 451 |
+
***p < .001, **p < .01, *p < .05, p < .10.
|
| 452 |
+
confidence (an element of perceived control)4, enjoyment and anxiety (positive and neg-
|
| 453 |
+
ative elements of affective states), and relevance (a key element of cognitive beliefs). To
|
| 454 |
+
measure anxiety, we used the Math Anxiety Rating Scale (Hopko, 2003) and substituted
|
| 455 |
+
the word science for all references to math. To measure all other attitudes, we selected
|
| 456 |
+
items developed by the National Center for Education Statistics (www.nces.ed.gov), and
|
| 457 |
+
used in national surveys, including the Educational Longitudinal Study, the High School
|
| 458 |
+
Longitudinal Study, and the U.S. component of the Trends in International Mathematics
|
| 459 |
+
and Science Study. Principal component analyses with promax rotation using the complete
|
| 460 |
+
set of 21 survey items revealed four factors with Eigenvalues greater than one. We sub-
|
| 461 |
+
sequently created separate scales (described below) composed of the individual items that
|
| 462 |
+
loaded onto each of the four factors. The scales clearly corresponded to the elements of
|
| 463 |
+
confidence, enjoyment, anxiety, and relevance; using the full sample, the Cronbach’s alpha
|
| 464 |
+
for each scale was .8 or higher.5
|
| 465 |
+
The confidence scale is composed of four items that gauge students’ level of confidence
|
| 466 |
+
when engaging in scientific activities. The items were as follows: “I have always done well
|
| 467 |
+
in science,” “Science is not one of my strengths” (reverse coded), “I am confident that I can
|
| 468 |
+
understand the most difficult material presented in my science textbooks,” and “Science
|
| 469 |
+
4Because the questions ask students to reflect more on their assessment of their current success in science,
|
| 470 |
+
we refer to this scale as measuring confidence rather than self-efficacy for future success. However, prior
|
| 471 |
+
research has consistently noted a very strong correspondence between indicators of self-confidence and
|
| 472 |
+
self-efficacy (Wigfield & Eccles, 2000).
|
| 473 |
+
5To further test the reliability of the four scales, we calculated Cronbach’s alphas separately for (a)
|
| 474 |
+
treatment and reference groups; (b) first year cohort and second year cohorts (for treatment group), and
|
| 475 |
+
(c) survey responses at time 1 and time 2 (for different cohorts and for different treatment groups). In all,
|
| 476 |
+
we calculated alpha reliabilities for each of our four scales for 15 different subsamples with remarkably
|
| 477 |
+
consistent results ranging from a low of .77 to a high of .88. (exploratory factor analyses using each of
|
| 478 |
+
these groups also yielded the same four factor model).
|
| 479 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 480 |
+
|
| 481 |
+
828
|
| 482 |
+
RIEGLE-CRUMB ET AL.
|
| 483 |
+
has always been one of my best subjects.” The five items in the enjoyment scale capture
|
| 484 |
+
students’ level of positive affect for science and included “I enjoy learning science,” “I look
|
| 485 |
+
forward to going to science courses,” “Science is fun,” “I like science,” and “Science is
|
| 486 |
+
boring” (reversecoded for inclusion in the scale). Categories of response were the same as
|
| 487 |
+
those for the confidence scale.
|
| 488 |
+
For each of the eight items in the anxiety scale, students were asked to indicate how
|
| 489 |
+
much the situation made them feel anxious or worried. Similar to the other measures, the
|
| 490 |
+
responses ranged from (1) not at all anxious to (5) very much anxious or worried. The items
|
| 491 |
+
included “Looking through the pages in a science text,” “Thinking about an upcoming
|
| 492 |
+
science test one day before the test,” “Reading and interpreting a scientific graph, chart, or
|
| 493 |
+
illustration,” “Taking an exam in a science course,” “Watching and listening to a teacher
|
| 494 |
+
explaining a scientific concept or phenomena,” “Waiting to get a science test returned in
|
| 495 |
+
which you expected to do well,” “Walking on campus and thinking about a science course,”
|
| 496 |
+
and “Being given a ‘pop’ quiz in science class.”
|
| 497 |
+
Finally, the four items making up the relevance scale include questions that focused
|
| 498 |
+
on students’ perception of the meaning or usefulness of science in their daily lives. The
|
| 499 |
+
items are as follows: “The subject of science is not very relevant to most people,” “It is not
|
| 500 |
+
important for most people to understand science,” “I think learning science will help me in
|
| 501 |
+
my daily life,” and “Science is important to me personally.” Students indicated the extent to
|
| 502 |
+
which they agreed or disagreed with the statements with possible responses ranging from
|
| 503 |
+
strongly agree (1) to strongly disagree (5).
|
| 504 |
+
ANALYSES AND RESULTS
|
| 505 |
+
To examine whether inquiry-based science content courses promote a positive change
|
| 506 |
+
in attitudes toward science for preservice elementary teachers, we begin by comparing the
|
| 507 |
+
means on the pre- and postmeasures of our four attitudinal scales for HoS students. Results
|
| 508 |
+
of paired t-tests indicate a statistically significant improvement over time for each scale.
|
| 509 |
+
Specifically, for confidence, the mean increased from 2.61 to 2.98 (p < .001), reflecting
|
| 510 |
+
a 0.37 point increase or almost half of a standard deviation change from pre to post. HoS
|
| 511 |
+
students’ science enjoyment increased by about a fourth of point (and about a third of a
|
| 512 |
+
standard deviation), from the presurvey mean of 3.24 to a postsurvey mean of 3.51 (p <
|
| 513 |
+
.001). The largest change was observed for the anxiety scale, where the average decreased
|
| 514 |
+
(meaning that students became less anxious over time) from a presurvey mean of 3.11 to a
|
| 515 |
+
postsurvey mean of 2.63 (p < .001), a difference of almost half of a point and approximately
|
| 516 |
+
two-thirds of a standard deviation. Finally, as discussed earlier, students view science as a
|
| 517 |
+
relevant domain, as evidenced by a relatively high presurvey mean of 3.66 on the utility
|
| 518 |
+
scale. Nevertheless, they slightly increased their views of the relevance of science after
|
| 519 |
+
taking HoS courses (p < .05) to a postsurvey mean of 3.74, a change of about a tenth of a
|
| 520 |
+
standard deviation.
|
| 521 |
+
Subsequently, we turn to an examination of how the changes we observe for HoS students
|
| 522 |
+
compare to changes in attitudes toward science among students taking more traditional
|
| 523 |
+
lecture-based science content courses. Here, we utilize multilevel mixed-effects models,
|
| 524 |
+
an extension of regression analysis that is similar to a mixed-design analysis of variance
|
| 525 |
+
and appropriate when data are nested. For this study, repeated measures of attitudes are
|
| 526 |
+
nested within individuals with time treated as a random effect (Rabe-Hesketh & Skrondal,
|
| 527 |
+
2008).The goal of this analysis was to determine whether the change in different dimensions
|
| 528 |
+
of science attitudes observed for HoS students was similar or different than that observed
|
| 529 |
+
for non-HoS students while controlling for students’ background characteristics (which
|
| 530 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 531 |
+
|
| 532 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 533 |
+
829
|
| 534 |
+
TABLE 2
|
| 535 |
+
Regression Analyses Predicting Attitudes to Sciencea
|
| 536 |
+
Model 1
|
| 537 |
+
Model 2
|
| 538 |
+
Model 3
|
| 539 |
+
Model 4
|
| 540 |
+
Confidence
|
| 541 |
+
Enjoyment
|
| 542 |
+
Anxiety
|
| 543 |
+
Relevance
|
| 544 |
+
Hands-on science (HoS) students
|
| 545 |
+
(ref = non-HoS students)
|
| 546 |
+
–0.391***
|
| 547 |
+
–0.163*
|
| 548 |
+
0.106
|
| 549 |
+
–0.051
|
| 550 |
+
(0.071)
|
| 551 |
+
(0.072)
|
| 552 |
+
(0.066)
|
| 553 |
+
(0.059)
|
| 554 |
+
Time (change from pre- to postsurvey)
|
| 555 |
+
–0.127**
|
| 556 |
+
–0.131***
|
| 557 |
+
0.074�
|
| 558 |
+
–0.116**
|
| 559 |
+
(0.039)
|
| 560 |
+
(0.039)
|
| 561 |
+
(0.041)
|
| 562 |
+
(0.036)
|
| 563 |
+
Time ×HoS
|
| 564 |
+
0.500***
|
| 565 |
+
0.391***
|
| 566 |
+
–0.553***
|
| 567 |
+
0.200***
|
| 568 |
+
(0.056)
|
| 569 |
+
(0.056)
|
| 570 |
+
(0.060)
|
| 571 |
+
(0.052)
|
| 572 |
+
Female
|
| 573 |
+
–0.402***
|
| 574 |
+
–0.395***
|
| 575 |
+
0.311***
|
| 576 |
+
0.046
|
| 577 |
+
(0.085)
|
| 578 |
+
(0.084)
|
| 579 |
+
(0.076)
|
| 580 |
+
(0.069)
|
| 581 |
+
Race/ethnicity (ref = white)
|
| 582 |
+
Black
|
| 583 |
+
0.078
|
| 584 |
+
–0.069
|
| 585 |
+
0.018
|
| 586 |
+
–0.159
|
| 587 |
+
(0.188)
|
| 588 |
+
(0.185)
|
| 589 |
+
(0.168)
|
| 590 |
+
(0.149)
|
| 591 |
+
Hispanic
|
| 592 |
+
–0.136
|
| 593 |
+
0.054
|
| 594 |
+
0.055
|
| 595 |
+
–0.023
|
| 596 |
+
(0.093)
|
| 597 |
+
(0.091)
|
| 598 |
+
(0.083)
|
| 599 |
+
(0.073)
|
| 600 |
+
Asian
|
| 601 |
+
–0.314**
|
| 602 |
+
–0.110
|
| 603 |
+
0.232**
|
| 604 |
+
–0.002
|
| 605 |
+
(0.098)
|
| 606 |
+
(0.097)
|
| 607 |
+
(0.088)
|
| 608 |
+
(0.078)
|
| 609 |
+
American Indian/Alaska native
|
| 610 |
+
–0.591*
|
| 611 |
+
–0.181
|
| 612 |
+
0.287
|
| 613 |
+
0.112
|
| 614 |
+
(0.251)
|
| 615 |
+
(0.249)
|
| 616 |
+
(0.224)
|
| 617 |
+
(0.204)
|
| 618 |
+
Native Hawaiian/other Pacific
|
| 619 |
+
Islander
|
| 620 |
+
0.635
|
| 621 |
+
0.380
|
| 622 |
+
–0.524
|
| 623 |
+
0.537�
|
| 624 |
+
(0.418)
|
| 625 |
+
(0.407)
|
| 626 |
+
(0.374)
|
| 627 |
+
(0.322)
|
| 628 |
+
SAT math score
|
| 629 |
+
0.002***
|
| 630 |
+
–0.000
|
| 631 |
+
–0.002***
|
| 632 |
+
0.000
|
| 633 |
+
(0.000)
|
| 634 |
+
(0.000)
|
| 635 |
+
(0.000)
|
| 636 |
+
(0.000)
|
| 637 |
+
Mother’s education level
|
| 638 |
+
–0.038�
|
| 639 |
+
–0.013
|
| 640 |
+
0.029
|
| 641 |
+
–0.003
|
| 642 |
+
(0.022)
|
| 643 |
+
(0.022)
|
| 644 |
+
(0.020)
|
| 645 |
+
(0.017)
|
| 646 |
+
Constant
|
| 647 |
+
2.680***
|
| 648 |
+
4.179***
|
| 649 |
+
3.748***
|
| 650 |
+
3.762***
|
| 651 |
+
(0.320)
|
| 652 |
+
(0.315)
|
| 653 |
+
(0.288)
|
| 654 |
+
(0.255)
|
| 655 |
+
aCoefficients calculated from a multilevel regression model in Stata where observations of
|
| 656 |
+
attitudes are nested within individuals.
|
| 657 |
+
***p < .001, **p < .01, *p < .05, �p < .1; standard errors in parentheses; n = 501.
|
| 658 |
+
is particularly important as our two groups of students differed by gender and math SAT
|
| 659 |
+
scores, both factors which likely predict attitudes).
|
| 660 |
+
Table 2 displays the results of separate analyses for each dependent variable. The first
|
| 661 |
+
row displays the coefficient comparing HoS and non-HoS students on the presurvey (or
|
| 662 |
+
time 1) for each attitudinal dimension. The second row displays the average change over
|
| 663 |
+
time between the pre- and postsurvey, while the third row displays the interaction between
|
| 664 |
+
student group (HoS or non-HoS) and time. The change in attitudes from pre- to postsurvey
|
| 665 |
+
for HoS students is calculated as the sum of the main effect of time and the interaction term,
|
| 666 |
+
while change for non-HoS students is captured by the main effect of time only. To simplify
|
| 667 |
+
the presentation of results, we include figures for each attitudinal outcome (Figures 1–4)
|
| 668 |
+
that display the changes over time for each group, adjusted for the social and academic
|
| 669 |
+
characteristics discussed above.6
|
| 670 |
+
6Figures 1–4 display the adjusted pre and post means for each group. These are calculated using a
|
| 671 |
+
postestimation command in Stata where all other variables in the model(other than student group, time, and
|
| 672 |
+
the interaction) are set to the mean (or alternatively to the mode for categorical variables).
|
| 673 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 674 |
+
|
| 675 |
+
830
|
| 676 |
+
RIEGLE-CRUMB ET AL.
|
| 677 |
+
Figure 1. Confidence.
|
| 678 |
+
Figure 2. Enjoyment.
|
| 679 |
+
Figure 3. Anxiety.
|
| 680 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 681 |
+
|
| 682 |
+
3.8
|
| 683 |
+
3.6
|
| 684 |
+
3.4
|
| 685 |
+
score
|
| 686 |
+
3.2
|
| 687 |
+
Adjusted
|
| 688 |
+
HoSstudents
|
| 689 |
+
3
|
| 690 |
+
...Non-Hosstudents
|
| 691 |
+
2.8
|
| 692 |
+
2.6
|
| 693 |
+
2.4
|
| 694 |
+
Pre
|
| 695 |
+
Post3.8
|
| 696 |
+
3.6
|
| 697 |
+
3.4
|
| 698 |
+
score
|
| 699 |
+
3.2
|
| 700 |
+
Adjusted :
|
| 701 |
+
HoSstudents
|
| 702 |
+
3
|
| 703 |
+
...Non-Hos students
|
| 704 |
+
2.8
|
| 705 |
+
2.6
|
| 706 |
+
2.4
|
| 707 |
+
Pre
|
| 708 |
+
Post3.8
|
| 709 |
+
3.6
|
| 710 |
+
3.4
|
| 711 |
+
Adjusted score
|
| 712 |
+
3.2
|
| 713 |
+
HoSstudents
|
| 714 |
+
3
|
| 715 |
+
.Non-HoSstudents
|
| 716 |
+
2.8
|
| 717 |
+
2.6
|
| 718 |
+
2.4
|
| 719 |
+
Pre
|
| 720 |
+
PostDO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 721 |
+
831
|
| 722 |
+
Figure 4. Relevance.
|
| 723 |
+
Beginning with the first column predicting confidence, the results reveal that compared to
|
| 724 |
+
their peers in traditional science classes, HoS students reported significantly lower science
|
| 725 |
+
confidence on the presurvey (–.391***). The coefficient for time is negative and significant,
|
| 726 |
+
yet the interaction between time and student group is positive and significant, indicating
|
| 727 |
+
that HoS students increased their confidence over time relative to non-HoS students. To help
|
| 728 |
+
clarify the patterns for the two groups, Figure 1 displays the trends for each group. Here, we
|
| 729 |
+
see clearly that changes in attitudes occurred for both groups in opposite directions. While
|
| 730 |
+
HoS students initially had lower confidence than their non-HoS peers, they significantly
|
| 731 |
+
increased their confidence over time. In contrast, non-HoS students significantly decreased
|
| 732 |
+
their science confidence (–.127***), such that their confidence was slightly lower than
|
| 733 |
+
non-HoS students on the postsurvey.
|
| 734 |
+
Returning to Table 2, we see a similar pattern when predicting change in science en-
|
| 735 |
+
joyment. HoS students initially reported significantly lower levels of enjoyment than their
|
| 736 |
+
peers in more traditional classes (–.163**). However, once again we see a negative main
|
| 737 |
+
effect of time but a positive and significant interaction between student group and time, in-
|
| 738 |
+
dicating opposite directions of change for each group. As displayed graphically in Figure 2,
|
| 739 |
+
HoS students significantly increase their enjoyment over time, while on average non-HoS
|
| 740 |
+
students report a decrease in their affect toward science (–.131***), and end their course
|
| 741 |
+
reporting lower enjoyment than HoS students.
|
| 742 |
+
Regarding changes in anxiety, we note that HoS and non-HoS students do not differ
|
| 743 |
+
significantly on the presurvey. The main effect of time is positive and borderline significant,
|
| 744 |
+
yet the interaction term reveals a statistically significant difference between the two groups’
|
| 745 |
+
average change in anxiety. Figure 3 clearly shows the marked decrease in anxiety from the
|
| 746 |
+
pre- to the postsurvey for HoS students. For their non-HoS peers, however, the figure shows
|
| 747 |
+
a slight increase in anxiety (�.074).
|
| 748 |
+
Finally, Table 2 displays the results for models predicting changes in attitudes toward
|
| 749 |
+
the relevance of science. HoS and non-HoS students do not differ significantly on the
|
| 750 |
+
presurvey. But once again the interaction term reveals a statistically significant difference
|
| 751 |
+
between groups in change over time, and the sign of the coefficient is positive in contrast
|
| 752 |
+
to negative main effect of time. Figure 4 displays the disordinal patterns for the groups.
|
| 753 |
+
HoS students’ views of relevance increase a small amount from the pre- to the postsurvey,
|
| 754 |
+
whereas their peers’ perceptions of the relevance of science decreases (–.116**).
|
| 755 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 756 |
+
|
| 757 |
+
3.8
|
| 758 |
+
3.6
|
| 759 |
+
3.4
|
| 760 |
+
score
|
| 761 |
+
3.2
|
| 762 |
+
Adjusted
|
| 763 |
+
HoSstudents
|
| 764 |
+
3
|
| 765 |
+
... Non-HoS students
|
| 766 |
+
2.8
|
| 767 |
+
2.6
|
| 768 |
+
2.4
|
| 769 |
+
Pre
|
| 770 |
+
Post832
|
| 771 |
+
RIEGLE-CRUMB ET AL.
|
| 772 |
+
Finally, while the main focus of our analyses was to assess differences between HoS and
|
| 773 |
+
non-HoS students regarding changes in their science attitudes, our multivariate analyses
|
| 774 |
+
revealed patterns consistent with prior research, namely that females are significantly less
|
| 775 |
+
confident in their science ability and report significantly less enjoyment and more science
|
| 776 |
+
anxiety than their male peers (Correll, 2001; Eccles, 1994). Our models also indicate some
|
| 777 |
+
evidence of racial/ethnic differences in attitudes (see the models predicting confidence and
|
| 778 |
+
anxiety), as well as differences by prior math achievement, as those with higher scores on
|
| 779 |
+
the math portion of the SAT report significantly higher levels of confidence in their science
|
| 780 |
+
ability and less anxiety. Given the differential distribution of HoS and non-HoS students on
|
| 781 |
+
several of these covariates (see Table 1), including them in our models generally decreased
|
| 782 |
+
the size of the difference between groups on the presurvey (e.g., the more male composition
|
| 783 |
+
of the non-HoS group helped to account for their initially stronger math confidence), and
|
| 784 |
+
also revealed larger differences between the groups on the postsurvey than could be detected
|
| 785 |
+
in simpler models that did not account for these factors.
|
| 786 |
+
DISCUSSION AND CONCLUSION
|
| 787 |
+
The goal of this study was to focus on future elementary teachers’ views toward science
|
| 788 |
+
at a point when they are still explicitly occupying the role of a learner, before they are tasked
|
| 789 |
+
with assuming the role of a science teacher. Specifically, we investigated whether enrollment
|
| 790 |
+
in HoS, a program of inquiry-based science content courses, promoted a favorable change
|
| 791 |
+
in the science attitudes of a sample of over 200 preservice elementary teachers. Building
|
| 792 |
+
on the theoretical framework advanced by van Aalderen-Smeets and colleagues (2012), our
|
| 793 |
+
study examined changes in attitudes on multiple dimensions, and also utilized a comparison
|
| 794 |
+
group of noneducation/nonscience majors to help contextualize the changes observed for
|
| 795 |
+
our focal sample of elementary preservice teachers.
|
| 796 |
+
Data analyses reveal a remarkably consistent and positive story for HoS students; students
|
| 797 |
+
significantly changed their views toward science from the pre- to the postsurvey, such that
|
| 798 |
+
after participating in inquiry-based content courses they reported more confidence in their
|
| 799 |
+
skills as science learners, more enjoyment and less anxiety toward science, and perceived it
|
| 800 |
+
as more relevant. Conversely, patterns for those in the comparison group revealed a decline
|
| 801 |
+
in favorable attitudes toward science after enrolling in a traditional, lecture-based content
|
| 802 |
+
course. Importantly, these results are independent of differences between HoS and non-HoS
|
| 803 |
+
students (e.g., gender and SAT math score) that are associated with attitudes; therefore,
|
| 804 |
+
our analyses indicates that it was differences in the courses that the two groups of students
|
| 805 |
+
enrolled in, rather than characteristics of the individual students themselves, that led to
|
| 806 |
+
changes in attitudes.
|
| 807 |
+
Our study has several likely implications for the future classrooms of preservice teach-
|
| 808 |
+
ers, as prior research suggests that teachers with negative views toward science may both
|
| 809 |
+
socialize their young students to develop similar views, as well as offer less science instruc-
|
| 810 |
+
tion in class due to a desire to avoid the subject (Bursal & Paznokas, 2006; Jarrett, 1999).
|
| 811 |
+
Thus, to the extent that HoS students have more positive attitudes toward science as a result
|
| 812 |
+
of inquiry-based instruction, we have positively intervened to disrupt the vicious cycle of
|
| 813 |
+
elementary school teachers passing their negative views of science onto the next generation.
|
| 814 |
+
Instead, future elementary students could ultimately be the beneficiaries, having teachers
|
| 815 |
+
who are favorably inclined and excited about teaching science and therefore spend more
|
| 816 |
+
time and focus on it.
|
| 817 |
+
Additionally, we suggest that our results have potential implications for gender equity in
|
| 818 |
+
the classroom, particularly because, while all observed changes for HoS students were in
|
| 819 |
+
a favorable direction, the largest changes were for decreasing anxiety. Recent research by
|
| 820 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 821 |
+
|
| 822 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 823 |
+
833
|
| 824 |
+
Beilock et al. (2010) offered evidence that the math anxiety of female elementary teachers
|
| 825 |
+
had a negative impact on their female students in particular. The authors argue that due
|
| 826 |
+
to the inclination for children to more strongly connect to adults of the same gender as
|
| 827 |
+
role models, young girls in the classroom were more susceptible to teachers’ math anxiety,
|
| 828 |
+
and consequently exhibited more negative attitudes of their own as well as lower math
|
| 829 |
+
achievement. Their study provides powerful evidence that teacher role-modeling can be a
|
| 830 |
+
key factor that leads to the development of the gender gap in math as early as elementary
|
| 831 |
+
school (Beilock et al., 2010). Such a pattern can be logically extended to science anxiety;
|
| 832 |
+
thus by intervening to decrease the anxiety of (predominantly female) preservice elementary
|
| 833 |
+
teachers, more young girls could have the opportunity to interact with a positive female role
|
| 834 |
+
model, thereby thwarting emerging gender disparities in children’s views and performance
|
| 835 |
+
(Eccles, 1994).
|
| 836 |
+
Our study also has potential ramifications for the type of instruction and classrooms
|
| 837 |
+
experienced by future elementary students. As research suggests that preservice teachers
|
| 838 |
+
tend to teach their students in ways similar to how they were taught (Gess-Newsome &
|
| 839 |
+
Lederman, 1999), programs such as HoS can serve as a powerful model for implement-
|
| 840 |
+
ing inquiry in their own classrooms, and thus ultimately contribute to greater uptake of
|
| 841 |
+
recommended science reform. The Next Generation Science Standards call for elementary
|
| 842 |
+
teachers to engage their students in inquiry-based practices, as well as emphasize disci-
|
| 843 |
+
plinary core ideas in the classroom (National Research Council, 2012b). The HoS classes
|
| 844 |
+
offer preservice teachers the critical opportunity to develop an understanding of and real
|
| 845 |
+
experience with inquiry-based teaching and learning that is consistent with these standards.
|
| 846 |
+
We concur with Volkmann et al. (2005), who argue that “if learning through inquiry is to
|
| 847 |
+
become a reality in today’s schools, then university science courses must model inquiry so
|
| 848 |
+
that pre-service teachers may experience it” (p. 867). Programs such as HoS have the power
|
| 849 |
+
to do exactly this, and thereby help break the cycle of teacher-centered didactic instruction.
|
| 850 |
+
While the primary focus of this study is the educational experiences of preservice teachers
|
| 851 |
+
during college and the subsequent implications for future elementary classrooms, our study
|
| 852 |
+
also speaks to the need to improve undergraduate science education more broadly. A recent
|
| 853 |
+
meta-analysis of student academic performance in STEM undergraduate courses provides
|
| 854 |
+
evidence that traditional lecture formats lead to higher failure rates and lower achievement
|
| 855 |
+
when compared to classes that are more constructivist based (Freeman et al., 2014 ). Our
|
| 856 |
+
study focuses on attitudinal rather than performance outcomes, and in doing so heeds recent
|
| 857 |
+
calls by the National Research Council to examine a more comprehensive range of student
|
| 858 |
+
outcomes at the postsecondary level (National Research Council, 2012). Specifically, we
|
| 859 |
+
find that, even after adjusting for differences in social and academic background between
|
| 860 |
+
our two groups (preservice education students and noneducation/nonscience students),
|
| 861 |
+
enrollment in traditional lecture classes has the opposite effect of enrolling in inquiry-
|
| 862 |
+
based content classes. We suggest that the decline in confidence, affect, and utility, as well
|
| 863 |
+
as a slight increase in anxiety that we observed for students in traditional lecture-based
|
| 864 |
+
science content classes, are important consequences of their relatively low engagement in
|
| 865 |
+
the classroom, and perhaps linked to patterns of lower performance documented elsewhere
|
| 866 |
+
(Freeman et al., 2014; Seymour & Hewitt, 1997).
|
| 867 |
+
As with any study, ours has limitations. First, we note a lack of parallel time frames for
|
| 868 |
+
our focal HoS students (two semesters between pre- and postsurveys) and our comparison
|
| 869 |
+
group (one semester between pre- and postsurveys). Therefore, it is possible that part of the
|
| 870 |
+
positive change in attitudes observed for HoS students is due to the longer exposure period;
|
| 871 |
+
while we cannot dismiss this possibility entirely we are nevertheless skeptical that a shorter
|
| 872 |
+
survey window for HoS students would have substantively changed our findings regarding
|
| 873 |
+
opposite directions of change for the two groups. Indeed, we did collect postsurveys for a
|
| 874 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 875 |
+
|
| 876 |
+
834
|
| 877 |
+
RIEGLE-CRUMB ET AL.
|
| 878 |
+
small subsample of HoS students at the end of the first semester, and the results, although
|
| 879 |
+
slightly weaker in magnitude, were statistically significant and in the same positive direction
|
| 880 |
+
as the full sample of HoS students included here.
|
| 881 |
+
Additionally, we did not collect data to assess what features of these inquiry-based
|
| 882 |
+
classes students found most favorable; for instance, it could be that the significant amount
|
| 883 |
+
of time spent on group work was a particularly influential factor leading to their change
|
| 884 |
+
in attitudes (Park Rogers & Abell, 2008). We think this is an important area for future
|
| 885 |
+
research to address, to better ascertain which aspects of inquiry-based classrooms are most
|
| 886 |
+
effective at promoting favorable shifts on different dimensions of science attitudes. More
|
| 887 |
+
long-term studies are also needed to assess whether and how the potential implications we
|
| 888 |
+
discuss above come to fruition and make a difference for elementary students in the science
|
| 889 |
+
classroom.
|
| 890 |
+
Finally, it is important to point out that designing and implementing inquiry-based science
|
| 891 |
+
content courses that depart from the typical lecture-based format of most postsecondary
|
| 892 |
+
instruction is certainly not without its challenges and difficulties (Allen & Tanner, 2005;
|
| 893 |
+
Armbruster, Johnson, & Weiss, 2009). One such obstacle is convincing science instructors
|
| 894 |
+
and university administrators of the benefits of inquiry-based instruction for their students.
|
| 895 |
+
Our study contributes to the small number of studies that offer robust empirical evidence
|
| 896 |
+
on this topic (Seymour, 2002), and in doing so offers additional support to the call to
|
| 897 |
+
implement inquiry-based science instruction at all levels and for all students.
|
| 898 |
+
This research was supported by a grant from the National Science Foundation (NSF DUE 0942943,
|
| 899 |
+
PI: Sacha Kopp), and a grant from the Eunice Kennedy Shriver National Institute of Health and Child
|
| 900 |
+
Development (5 R24 HD042849) awarded to the Population Research Center at The University of
|
| 901 |
+
Texas at Austin. Opinions reflect those of the authors and do not necessarily reflect those of the
|
| 902 |
+
granting agencies.
|
| 903 |
+
REFERENCES
|
| 904 |
+
Allen, D., & Tanner, K. (2005). Infusing active learning into the large-enrollment biology class: Seven strategies,
|
| 905 |
+
from the simple to complex. Cell Biology Education, 4(4), 262–268.
|
| 906 |
+
Appleton, K., & Kindt, I. (1999). Why teach primary science? Influences on beginning teachers’ practices.
|
| 907 |
+
International Journal of Science Education, 21(2), 155–168.
|
| 908 |
+
Armbruster, P. P. M., Johnson, E., & Weiss, M. (2009). Active learning and student-centered pedagogy improve
|
| 909 |
+
student attitudes and performance in introductory biology. CBE-Life Sciences Education, 8(3), 203–213.
|
| 910 |
+
Atwater, M. M., Gardner, C., & Kight, C. R. (1991). Beliefs and attitudes of urban primary teaachers toward
|
| 911 |
+
physical science and teaching physical science. Journal of Elementary Science Education, 3(1), 3–12.
|
| 912 |
+
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2),
|
| 913 |
+
191–215.
|
| 914 |
+
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122.
|
| 915 |
+
Beilock, S. L., Gunderson, E. A., Ramirez, G., & Levine, S. C. (2010). Female teachers’ math anxiety affects
|
| 916 |
+
girls’ math achievement. Proceedings of the National Academy of Sciences, 107(5), 1860–1863.
|
| 917 |
+
Bleicher, R. E. (2007). Nurturing confidence in preservice elementary science teachers. Journal of Science Teacher
|
| 918 |
+
Education, 18(6), 841–860.
|
| 919 |
+
Borman, G. D., Gamoran, A., & Bowdon, J. (2008). A randomized trial of teacher development in elementary
|
| 920 |
+
science: First-year achievement effects. Journal of Research on Educational Effectiveness, 1(4), 237–264.
|
| 921 |
+
Brownlow, S., Jacobi, T., & Rogers, M. (2000). Science anxiety as a function of gender and experience. Sex
|
| 922 |
+
Roles, 42(1–2), 119–131.
|
| 923 |
+
Bursal, M., & Paznokas, L. (2006). Mathematics anxiety and preservice elementary teachers’ confidence to teach
|
| 924 |
+
mathematics and science. School Science and Mathematics, 106(4), 173–180.
|
| 925 |
+
Cady, J. A., & Rearden, K. (2007). Pre-service teacher’s beliefs about knowledge, mathematics, and science.
|
| 926 |
+
School Science and Mathematics, 107(6), 237–245.
|
| 927 |
+
Cobern, W. W., & Loving, C. C. (2002). Investigation of preservice elementary teachers’ thinking about science.
|
| 928 |
+
Journal of Research in Science Teaching, 39(10), 1016–1031.
|
| 929 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 930 |
+
|
| 931 |
+
DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
|
| 932 |
+
835
|
| 933 |
+
Correll, S. J. (2001). Gender and the career choice process: The role of biased self-assessments. American Journal
|
| 934 |
+
of Sociology 106, 1691–1730.
|
| 935 |
+
Coulson, M. R. (1992). Development of an instrument for measuring attitudes of early childhood educators
|
| 936 |
+
towards science. Research in Science Education, 22(1), 101–105.
|
| 937 |
+
Cuevas, P., Lee, O., Hart, J., & Deaktor, R. (2005). Improving science inquiry with elementary students of diverse
|
| 938 |
+
backgrounds. Journal of Research in Science Teaching, 42(3), 337–357.
|
| 939 |
+
Diamond, B. S., Maerten-Rivera, J., Rohrer, R. E., & Lee, O. (2014). Effectiveness of a curricular and profes-
|
| 940 |
+
sional development intervention at improving elementary teachers’ science content knowledge and student
|
| 941 |
+
achievement outcomes: Year 1 results. Journal of Research in Science Teaching, 51(5), 635–658.
|
| 942 |
+
Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, Florida: Harcourt Brace Jovanovich
|
| 943 |
+
College.
|
| 944 |
+
Eccles, J. S. (1994). Understanding women’s educational and occupational choices. Psychology of Women
|
| 945 |
+
Quarterly, 18, 585–609.
|
| 946 |
+
Evans, G., & Durant, J. (1995). The relationship between knowledge and attitudes in the public understanding of
|
| 947 |
+
science in Britain. Public Understanding of Science, 4(1), 57–74.
|
| 948 |
+
Forbes, C. T. (2011). Preservice elementary teachers’ adaptation of science curriculum materials for inquiry-based
|
| 949 |
+
elementary science. Science Education, 95(5), 927–955.
|
| 950 |
+
Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H. et al. (2014). Active learning
|
| 951 |
+
increases student performance in science, engineering, and mathematics. Paper presented at the Proceedings
|
| 952 |
+
of the National Academy of Sciences, 2013, 19030.
|
| 953 |
+
Gess-Newsome, J., & Lederman, N. G. (1999). Examining pedagogical content knowledge. Dordrect, The Nether-
|
| 954 |
+
lands: Kluwer.
|
| 955 |
+
Goldberg, F., Robinson, S., Otero, V., Kruse, R., & Thompson, N. (2008). Physical Science and Everyday Thinking,
|
| 956 |
+
2nd edition. Armonk, New York: It’s About Time, Herff Jones Educational Division.
|
| 957 |
+
Haefner, L. A., & Zembal-Saul, C. (2004). Learning by doing? Prospective elementary teachers’ developing un-
|
| 958 |
+
derstandings of scientific inquiry and science teaching and learning. International Journal of Science Education,
|
| 959 |
+
26(13), 1653–1674.
|
| 960 |
+
Harlen, W. (1997). Primary teachers’ understanding in science and its impact in the classroom. Research in
|
| 961 |
+
Science Education, 27(3), 323–337.
|
| 962 |
+
Heller, J. I., Daehler, K. R., Wong, N., Shinohara, M., & Miratrix, L. W. (2012). Differential effects of three
|
| 963 |
+
professional development models on teacher knowledge and student achievement in elementary science. Journal
|
| 964 |
+
of Research in Science Teaching, 49(3), 333–362.
|
| 965 |
+
Hopko, D. (2003). Confirmatory factor analysis of the math anxiety rating scale-revised. Educational and Psy-
|
| 966 |
+
chological Measurement, 63, 336.
|
| 967 |
+
Howes, E. (2002). Learning to teach science for all in the elementary grades: What do preservice teachers bring?
|
| 968 |
+
Journal of Research in Science Teaching, 39(9), 845–869.
|
| 969 |
+
Jarrett, O. S. (1999). Science interest and confidence among preservice elementary teachers. Journal of Elementary
|
| 970 |
+
Science Education, 11(1), 49–59.
|
| 971 |
+
Jussim, L., & Eccles, J. S. (1992). Teacher expectations II: Construction and reflection of student achievement.
|
| 972 |
+
Journal of Personality and Social Psychology, 63, 947.
|
| 973 |
+
Kanter, D. E., & Konstantopoulus, S. (2010). The impact of a project based science curriculum on minority
|
| 974 |
+
student achievement, attitudes, and careers: The effects of teacher content and pedagogical content knowledge
|
| 975 |
+
and inquiry based practices. Science Education, 94(5), 855–887.
|
| 976 |
+
Kelly, J. (2000). Rethinking the elementary science methods course: A case for content, pedagogy, and informal
|
| 977 |
+
science education. International Journal of Science Education, 22(7), 755–777.
|
| 978 |
+
Kohut, A., Keeter, S., Doherty, C., & Dimock, M. (2009). Scientific achievements less prominent than a decade
|
| 979 |
+
ago: Public praises science; scientists fault public, media. Washington, DC: The Pew Research Center for the
|
| 980 |
+
People and the Press.
|
| 981 |
+
Liang, L. L., & Gabel, D. L. (2005). Effectiveness of a constructivist approach to science instruction for prospective
|
| 982 |
+
elementary teachers. International Journal of Science Education, 27(10), 1143–1162.
|
| 983 |
+
Ludwig, R., Chimonidou, A., Barr, A., Baumann, M., Dunn, D., English, P., et al. (2013). Hands-on-science:
|
| 984 |
+
Hands-on, integrated natural sciences for pre-service elementary teachers. Paper presented at the National
|
| 985 |
+
Association for Research in Science Teaching, Rio Grande, PR.
|
| 986 |
+
Mallow, J. V. (1981). Science anxiety: Fear of science and how to overcome it. New York: Van Nostrand Reinhold.
|
| 987 |
+
Mallow, J. V., & Greenburg, S. L. (1983). Science anxiety and science learning. Physics Teacher, 21(2),
|
| 988 |
+
95–99.
|
| 989 |
+
McKown, C., & Weinstein, R. S. (2002). Modeling the role of child ethnicity and gender in. children’s differential
|
| 990 |
+
response to teacher expectations. Journal of Applied Social Psychology, 32, 159–184.
|
| 991 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 992 |
+
|
| 993 |
+
836
|
| 994 |
+
RIEGLE-CRUMB ET AL.
|
| 995 |
+
Mulholland, J., & Wallace, J. (1996). Breaking the cycle: Preparing elementary teachers to teach science. Journal
|
| 996 |
+
of Elementary Science Education, 8(1), 17–38.
|
| 997 |
+
National Research Council. (2000). Inquiry and the national science education standards: A guide for teaching
|
| 998 |
+
and learning. Washington, DC: National Academies Press.
|
| 999 |
+
National Research Council. (2012). Discipline-Based Education Research: Understanding and Improving Learning
|
| 1000 |
+
in Undergraduate Science and Engineering. In S. R. Singer, N. R. Nielsen, & H. A. Schweingruber (Eds.),
|
| 1001 |
+
Committee on the Status, Contributions, and Future Directions of Discipline-Based Education Research. Board
|
| 1002 |
+
on Science Education, Division of Behavioral and Social Sciences and Education. Washington, DC: The
|
| 1003 |
+
National Academies Press.
|
| 1004 |
+
National Research Council. (2012b). A framework for K–12 science education: Practices, crosscutting concepts,
|
| 1005 |
+
and core ideas. Washi ngton, DC: National Academies Press.
|
| 1006 |
+
Nelson, G. (2008). Physics and everyday thinking as a model for introductory biology and geology courses. Paper
|
| 1007 |
+
presented at the PTEC-Northwest Regional Conference, Seattle, WA.
|
| 1008 |
+
Palmer, D. (2002). Factors contributing to attitude exchange amongst preservice elementary teachers. Science
|
| 1009 |
+
Education, 86(1), 122–138.
|
| 1010 |
+
Park Rogers, M. A., & Abell, S. K. (2008). The design, enactment, and experience of inquiry-based instructon in
|
| 1011 |
+
undergraduate science education: A case study. Science Education, 92(4), 591–607.
|
| 1012 |
+
Pine, J., Aschbacher, P., Roth, E., Jones, M., McPhee, C., Martin, C. et al. (2006). Fifth graders’ science inquiry
|
| 1013 |
+
abilities: A comparative study of students in hands-on and textbook curricula. Journal of Research in Science
|
| 1014 |
+
Teaching, 43(5), 467–484.
|
| 1015 |
+
Rabe-Hesketh, S., & Skrondal, A. (2008). Multilevel and longitudinal modeling using Stata. College Station,
|
| 1016 |
+
Texas: STATA Press.
|
| 1017 |
+
Ramey-Gassert, L., Shroyer, M. G., & Staver, J. R. (1996). A qualitative study of factors influencing science
|
| 1018 |
+
teaching self-efficacy of elementary level teachers. Science Teacher Education, 80(3), 283–315.
|
| 1019 |
+
Sadler, P. M., Sonnert, G., Coyle, H. P., Cook-Smith, N., & Miller, J. L. (2013). The influence of teachers’
|
| 1020 |
+
knowledge on student learning in middle school physical science classrooms. American Educational Research
|
| 1021 |
+
Journal, 50(5), 1020–1049.
|
| 1022 |
+
Seymour, E. (2002). Tracking the processes of change in US undergraduate education in science, mathematics,
|
| 1023 |
+
engineering, and technology. Science Education, 86(1), 79–105.
|
| 1024 |
+
Seymour, E., & Hewitt, N. M. (1997). Talking about leaving: Why undergraduates leave the sciences (Vol. 12).
|
| 1025 |
+
Bo ulder, CO: Westview Press.
|
| 1026 |
+
Skamp, K. (1991). Primary science and technology: How confident are teachers? Research in Science Education,
|
| 1027 |
+
21(1), 290–299.
|
| 1028 |
+
Smith, D. (2000). Content and pedagogical content knowledge for elementary science teacher educators: Knowing
|
| 1029 |
+
our students. Journal of Science Teacher Education, 11(1), 27–46.
|
| 1030 |
+
Tosun, T. (2000). The beliefs of preservice elementary teachers toward science and science teaching. School
|
| 1031 |
+
Science and Mathematics, 100(7), 374–379.
|
| 1032 |
+
Udo, M. K., Ramsey, G. P., & Mallow, J. V. (2004). Science anxiety and gender in students taking general
|
| 1033 |
+
education science courses. Journal of Science Education and Technology, 13(4), 435–446.
|
| 1034 |
+
vanAalderen-Smeets, S. I., Walma van der Molen, J. H., & Asma, L. J. F. (2012). Primary teachers’ attitudes
|
| 1035 |
+
toward science: A new theoretical framework. Science Education, 96(1), 158–182.
|
| 1036 |
+
Volkmann, M. J., Abell, S. K., & Zgagacz, M. (2005). The challenges of teaching physics to preservice elementary
|
| 1037 |
+
teachers: Orientations of the professor, teaching assistant, and students. Science Education, 89(5), 847–869.
|
| 1038 |
+
Westerback, M. E. (1984). Studies on anxiety about teaching science in preservice elementary teachers. Journal
|
| 1039 |
+
of Research in Science Teaching, 21(9), 937–950.
|
| 1040 |
+
Westerback, M. E., & Long, M. J. (1990). Science knowledge and the reduction of anxiety about teaching Earth
|
| 1041 |
+
science in exemplary teachers as measured by the science teaching state-trait anxiety inventory. School Science
|
| 1042 |
+
and Mathematics, 90(5), 361–374.
|
| 1043 |
+
Wigfield, A., & Eccles, J. S. (2000). Expectancy–Value Theory of Achievement Motivation. Contemporary
|
| 1044 |
+
Educational Psychology, 25(1), 68–81.
|
| 1045 |
+
Xie, Y., & Shauman, K. A. (2003). Women in science: Career processes and outcomes (Vol. 26, No. 73.4).
|
| 1046 |
+
Cambridge, MA: Harvard University Press.
|
| 1047 |
+
Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
|
| 1048 |
+
|
C9E2T4oBgHgl3EQfoAjs/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d4f10cdec983d7843ab5d72dd082584f6c12cef46f8864b0c0c10c9e1c388705
|
| 3 |
+
size 4023863
|
CdE0T4oBgHgl3EQfyQI7/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8b8b6842cc9cb3591e7a18a355c361d241fb8b33add32064fe8506876d86013a
|
| 3 |
+
size 307741
|
CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:a039110eea74b7c264a86be303f99807b816614ca8bebfb7d1d4ce760c99de75
|
| 3 |
+
size 2687021
|
EdAzT4oBgHgl3EQfiv0h/content/tmp_files/2301.01503v1.pdf.txt
ADDED
|
@@ -0,0 +1,1378 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Addressing Cosmological Tensions by Non-Local Gravity
|
| 2 |
+
Filippo Bouchè,1, a Salvatore Capozziello,1, 2, 3, b and V. Salzano4, c
|
| 3 |
+
1Dipartimento di Fisica “E. Pancini”, Università di Napoli “Federico II", Via Cinthia 21, I-80126, Napoli, Italy
|
| 4 |
+
2DipaScuola Superiore Meridionale, Largo S. Marcellino 10, I-80138, Napoli, Italy
|
| 5 |
+
3Istituto Nazionale di Fisica Nucleare, Sez. di Napoli, Via Cinthia 21, I-80126, Napoli, Italy
|
| 6 |
+
4Institute of Physics, University of Szczecin, Wielkopolska 15, 70-451 Szczecin, Poland
|
| 7 |
+
(Dated: January 5, 2023)
|
| 8 |
+
Alternative cosmological models have been under deep scrutiny in recent years, aiming to address
|
| 9 |
+
the main shortcomings of the ΛCDM model. Moreover, as the accuracy of cosmological surveys
|
| 10 |
+
improved, new tensions have risen between the model-dependent analysis of the Cosmic Microwave
|
| 11 |
+
Background and lower redshift probes. Within this framework, we review two quantum-inspired
|
| 12 |
+
non-locally extended theories of gravity, whose main cosmological feature is a geometrically driven
|
| 13 |
+
accelerated expansion. The models are especially investigated in light of the Hubble and growth
|
| 14 |
+
tension, and promising features emerge for the Deser–Woodard one. On the one hand, the cosmolog-
|
| 15 |
+
ical analysis of the phenomenological formulation of the model shows a lowered growth of structures
|
| 16 |
+
but an equivalent background with respect to ΛCDM. On the other hand, the study of the lensing
|
| 17 |
+
features at the galaxy cluster scale of a new formulation of non-local cosmology, based on Noether
|
| 18 |
+
symmetries, makes room for the possibility of alleviating both the H0 and σ8 tension. However, the
|
| 19 |
+
urgent need for a screening mechanism arises for this non-local theory of gravity.
|
| 20 |
+
I.
|
| 21 |
+
INTRODUCTION
|
| 22 |
+
Recent astrophysical and cosmological surveys, both from ground-based and space experiments, have provided
|
| 23 |
+
extremely high-quality data. The observations point towards a Universe in which the cosmological principle holds
|
| 24 |
+
on large scales, namely the Universe appears homogeneous and isotropic if averaged over scales of ∼100 h−1Mpc or
|
| 25 |
+
more [1, 2]. Moreover, the Universe is undergoing an accelerated expansion phase [3, 4], subsequent to a decelerated
|
| 26 |
+
era in which the structure formation occurred. All these features, together with the nuclei abundances produced in
|
| 27 |
+
the Big Bang Nucleosynthesis (BBN), the Baryon Acoustic Oscillations (BAO) and many others, are well predicted
|
| 28 |
+
by the Lambda Cold Dark Matter (ΛCDM) model, which has been adopted as the standard cosmological model
|
| 29 |
+
accordingly. Such a model provides an effective description of the Universe, which relies on the assumption that
|
| 30 |
+
General Relativity (GR) is the final theory of gravitation that governs the cosmic dynamics. As a consequence, two
|
| 31 |
+
more fluids other than baryonic matter and radiation must be inserted in the matter–energy content of the Universe
|
| 32 |
+
in order to adjust GR predictions to data: the Dark Energy (DE), responsible for the late time cosmic acceleration,
|
| 33 |
+
and the Dark Matter (DM), which accounts for the structure formation. Together, they should represent ∼95% of
|
| 34 |
+
the matter–energy budget of the Universe [5–7], thus dominating the cosmic dynamics at all scales.
|
| 35 |
+
Building on its capability to fit the whole cosmological and astrophysical dataset with a relatively small number of
|
| 36 |
+
parameters, the ΛCDM model stands as the pillar of our comprehension of the Universe. However, several shortcomings
|
| 37 |
+
[8] and recently risen tensions [9–11] affect its reliability. On the one hand, we have a huge assortment of candidates
|
| 38 |
+
but no final solution for DM [12, 13] and DE [14–16]. On the other hand, the presence of singularities, as well as the
|
| 39 |
+
inconsistency at quantum level, undermine the credibility of GR as the final theory of gravity. Even more puzzling
|
| 40 |
+
are the cosmological tensions, which have emerged in recent years as the result of the growing availability of a wide
|
| 41 |
+
range of extremely precise data. A multitude of independent observations appears indeed to be in a ≳2σ tension
|
| 42 |
+
with the reference ΛCDM estimates by the Planck collaboration [5]. Even though systematic experimental errors may
|
| 43 |
+
account for part of these tensions, their statistical significance and their persistence after several check analyses have
|
| 44 |
+
thrown up some serious red flags. Since the Planck constraints for the cosmological parameters relies on a strongly
|
| 45 |
+
ΛCDM-model-dependent analysis of the Cosmic Microwave Background (CMB), such tensions may be the signature
|
| 46 |
+
of the brakedown of the concordance model, hence of new physics. In this paper, we pay particular attention to the
|
| 47 |
+
two most well-known tensions: the H0 tension [10], which emerges from the comparison between early-time [5] and
|
| 48 |
+
late-time measurements [17] of the Hubble constant, and the growth tension [11] between the CMB value [5] of the
|
| 49 |
+
aElectronic address: filippo.bouche-ssm@unina.it
|
| 50 |
+
bElectronic address: capozziello@na.infn.it
|
| 51 |
+
cElectronic address: vincenzo.salzano@usz.edu.pl
|
| 52 |
+
arXiv:2301.01503v1 [astro-ph.CO] 4 Jan 2023
|
| 53 |
+
|
| 54 |
+
2
|
| 55 |
+
cosmological parameters ΩM and σ8 and those from lower redshift probes, such as Weak Lensing (WL) [18], Cluster
|
| 56 |
+
Counts (CC) [19] and Redshift Space Distortion (RSD) [20].
|
| 57 |
+
In order to meet the challenges posed by ΛCDM theoretical shortcomings, as well as by its observational tensions, a
|
| 58 |
+
zoo of alternative cosmological models has been formulated in recent years. The common feature of any proposed model
|
| 59 |
+
is the introduction of additional degrees of freedom, whether in the gravitational or the matter–energy Lagrangian.
|
| 60 |
+
Several approaches have been adopted: from the simple generalization of the Hilbert–Einstein action to functions
|
| 61 |
+
of the curvature scalar, namely f(R) theories [21–27], to the addition of further geometric invariants such as the
|
| 62 |
+
torsion scalar T [27–32] or the Gauss–Bonnet scalar G [33–36]. The introduction of scalar/vector fields minimally or
|
| 63 |
+
non-minimally coupled to gravity [37–41], as well as the emergence of non-trivial dynamics in the dark sector [42–46],
|
| 64 |
+
also represent intriguing possibilities in the extremely wide framework of the alternatives to GR/ΛCDM (see [47, 48]
|
| 65 |
+
for the state of the art). In this paper, we want to inquire into a specific class of alternative cosmological models
|
| 66 |
+
ruled by non-local gravitational interactions [49]. Among others, we investigate the cosmological implications of two
|
| 67 |
+
non-locally extended theories of gravity: the Deser–Woodard (DW) model [50] and the Ricci-Transverse (RT) model
|
| 68 |
+
[51]. These theories have drawn increasing attention in recent years due to their capability to account for late-time
|
| 69 |
+
cosmic acceleration, thus avoiding the introduction of any form of unknown dark energy. Moreover, the non-local
|
| 70 |
+
corrections may provide a viable mechanism to alleviate some of the main cosmological tensions.
|
| 71 |
+
The paper is organized as follow: in Section II, we outline the main motives for formulating non-local theories
|
| 72 |
+
of gravity, and we present the two ways in which dynamical non-locality can be implemented. Then, we introduce
|
| 73 |
+
the two chosen models and their theoretical features. In Section III, we investigate the mechanisms through which
|
| 74 |
+
the DW and the RT model account for the accelerated expansion of the Universe. In Section IV, we present the
|
| 75 |
+
non-locally driven evolution of cosmological perturbations for the two models and the resulting impact on the σ8
|
| 76 |
+
tension. Moreover, in Section V, we assess the H0 tension in light of the non-local theories. Finally, in Section VI,
|
| 77 |
+
we present the main astrophysical tests of the non-local gravity models. The conclusions are drawn in Section VII.
|
| 78 |
+
II.
|
| 79 |
+
NON-LOCAL GRAVITY
|
| 80 |
+
Non-locality naturally emerges in Quantum Physics, both as a kinematical and a dynamical feature. On the other
|
| 81 |
+
hand, locality is a key property of classical field theories, and thus represents one of the main obstacles to overcome
|
| 82 |
+
in order to merge gravitational interaction formalism with that of Quantum Field Theory (QFT). As a consequence,
|
| 83 |
+
the introduction of non-locality in our theory of gravitation seems to be an unavoidable step towards the unification
|
| 84 |
+
of the fundamental interactions.
|
| 85 |
+
There exist at least two ways to achieve non-locality: at fundamental level, in
|
| 86 |
+
which kinematical non-locality can be implemented by discretizing spacetime and introducing a minimal length scale
|
| 87 |
+
(usually the Planck length); as an effective approach, in which non-local geometrical operators can be added to the
|
| 88 |
+
gravitational Lagrangian to obtain a non-local dynamics in a continuum background spacetime [52]. Here, we want
|
| 89 |
+
to focus on the latter scenario, which is of great interest for cosmological applications.
|
| 90 |
+
Two main classes of non-locally extended theories of gravity have been developed in recent years [49]: Infinite
|
| 91 |
+
Derivative theories of Gravity (IDGs), involving entire analytic transcendental functions of a differential operator,
|
| 92 |
+
and Integral Kernel theories of Gravity (IKGs) based on integral kernels of differential operators, such as
|
| 93 |
+
□−1R(x) =
|
| 94 |
+
�
|
| 95 |
+
d4x′G(x, x′)R(x′) ,
|
| 96 |
+
(2.1)
|
| 97 |
+
where G(x′x′) is the Green function associated to the inverse d’Alembertian. IDGs usually address the ultraviolet (UV)
|
| 98 |
+
problems of the ΛCDM model by ensuring classical asymptotic freedom. The gravitational interaction is weakened
|
| 99 |
+
on small scales and the singularities disappear accordingly. Non-singular black holes [53], as well as inflationary [54]
|
| 100 |
+
and bouncing cosmologies [55], are indeed forecast in the IDG framework. On the other hand, IKGs are introduced
|
| 101 |
+
to account for the infrared (IR) shortcomings of the concordance model of cosmology. The phenomenology of both
|
| 102 |
+
dark fluids can be actually reproduced by non-local corrections that switch on at large scales [50, 56, 57].
|
| 103 |
+
In this paper, we focus on two specific curvature-based IKGs [50, 51] and their cosmological features. IKGs indeed
|
| 104 |
+
have special relevance due to the fact that they combine suitable cosmological behavior with well-justified Lagrangians
|
| 105 |
+
at the fundamental level. GR is actually plagued by quantum IR divergences that already appear for pure gravity in
|
| 106 |
+
flat space [58]. This pathological behavior implies that the long-range dynamics of the gravitational interaction may
|
| 107 |
+
be non-trivial, and non-perturbative techniques are thus required. Applying such non-perturbative methods to the
|
| 108 |
+
renormalization of the quantum effective action of the gravity theory, non-local terms emerge both associated [59, 60]
|
| 109 |
+
or not associated [61, 62] to a dynamical mass scale. Analogous results can be recovered through the trace anomaly
|
| 110 |
+
[63].
|
| 111 |
+
|
| 112 |
+
3
|
| 113 |
+
A.
|
| 114 |
+
The Deser–Woodard Model
|
| 115 |
+
The first model that we want to highlight is an IKG initially proposed in [50]. The non-locally extended gravitational
|
| 116 |
+
action of the Deser–Woodard model reads
|
| 117 |
+
S =
|
| 118 |
+
1
|
| 119 |
+
16πG
|
| 120 |
+
�
|
| 121 |
+
d4x√−g
|
| 122 |
+
�
|
| 123 |
+
R
|
| 124 |
+
�
|
| 125 |
+
1 + f(□−1R)
|
| 126 |
+
��
|
| 127 |
+
,
|
| 128 |
+
(2.2)
|
| 129 |
+
where the non-local correction is given by the so-called distortion function, namely a general function of the inverse
|
| 130 |
+
box of the Ricci scalar, as in Equation (2.1).It is worth noticing that the non-local theory reduces to GR as soon as
|
| 131 |
+
f(□−1R) vanishes. The modified field equations descending from Equation (2.2) are
|
| 132 |
+
Gµν + ∆Gµν = κT (m)
|
| 133 |
+
µν
|
| 134 |
+
,
|
| 135 |
+
(2.3)
|
| 136 |
+
where the non-local correction reads
|
| 137 |
+
∆Gµν =
|
| 138 |
+
�
|
| 139 |
+
Gµν + gµν□ − ∇µ∇ν
|
| 140 |
+
��
|
| 141 |
+
f
|
| 142 |
+
�
|
| 143 |
+
□−1R
|
| 144 |
+
�
|
| 145 |
+
+ □−1�
|
| 146 |
+
Rf ′�
|
| 147 |
+
□−1R
|
| 148 |
+
���
|
| 149 |
+
+
|
| 150 |
+
�
|
| 151 |
+
1
|
| 152 |
+
2
|
| 153 |
+
�
|
| 154 |
+
δα
|
| 155 |
+
µδβ
|
| 156 |
+
ν + δβ
|
| 157 |
+
µδα
|
| 158 |
+
ν
|
| 159 |
+
�
|
| 160 |
+
− 1
|
| 161 |
+
2gµνgαβ
|
| 162 |
+
�
|
| 163 |
+
∂α
|
| 164 |
+
�
|
| 165 |
+
□−1R
|
| 166 |
+
�
|
| 167 |
+
∂β
|
| 168 |
+
�
|
| 169 |
+
□−1�
|
| 170 |
+
Rf ′�
|
| 171 |
+
□−1R
|
| 172 |
+
���
|
| 173 |
+
.
|
| 174 |
+
(2.4)
|
| 175 |
+
Furthermore, the non-local gravitational action in Equation (2.2) can be easily rewritten under the standard of
|
| 176 |
+
local scalar–tensor theories by introducing an auxiliary scalar field
|
| 177 |
+
R(x) = □η(x) ,
|
| 178 |
+
(2.5)
|
| 179 |
+
which does not carry any independent degree of freedom.
|
| 180 |
+
The local canonical form of the scalar–tensor action,
|
| 181 |
+
equivalent to the non-local theory, thus reads [64]
|
| 182 |
+
S = 1
|
| 183 |
+
2κ
|
| 184 |
+
�
|
| 185 |
+
d4x√−g
|
| 186 |
+
�
|
| 187 |
+
R
|
| 188 |
+
�
|
| 189 |
+
1 + f
|
| 190 |
+
�
|
| 191 |
+
η
|
| 192 |
+
��
|
| 193 |
+
− ∂µξ∂µη − ξR
|
| 194 |
+
�
|
| 195 |
+
,
|
| 196 |
+
(2.6)
|
| 197 |
+
where ξ(x) is a Lagrangian multiplier which has been promoted to a position- and time-dependent scalar field. In this
|
| 198 |
+
formulation, the gravitational field equation is
|
| 199 |
+
Gµν =
|
| 200 |
+
1
|
| 201 |
+
1 + f(η) − ξ
|
| 202 |
+
�
|
| 203 |
+
κT (m)
|
| 204 |
+
µν
|
| 205 |
+
− 1
|
| 206 |
+
2gµν∂αξ∂αη + 1
|
| 207 |
+
2
|
| 208 |
+
�
|
| 209 |
+
∂µξ∂νη + ∂µη∂νξ
|
| 210 |
+
�
|
| 211 |
+
−
|
| 212 |
+
�
|
| 213 |
+
gµν□ − ∇µ∇ν
|
| 214 |
+
��
|
| 215 |
+
f(η) − ξ
|
| 216 |
+
�
|
| 217 |
+
�
|
| 218 |
+
,
|
| 219 |
+
(2.7)
|
| 220 |
+
while the Klein–Gordon equations for the two auxiliary scalar fields are
|
| 221 |
+
□η = R ,
|
| 222 |
+
(2.8)
|
| 223 |
+
□ξ = −R∂f(η)
|
| 224 |
+
∂η
|
| 225 |
+
.
|
| 226 |
+
(2.9)
|
| 227 |
+
B.
|
| 228 |
+
The Ricci-Transverse Model
|
| 229 |
+
The second non-local model that we investigate through this paper is a metric IKG proposed in [51]. This is a
|
| 230 |
+
quantum-inspired model, whose quantum effective action is
|
| 231 |
+
Γ =
|
| 232 |
+
1
|
| 233 |
+
64πG
|
| 234 |
+
�
|
| 235 |
+
d4x
|
| 236 |
+
�
|
| 237 |
+
hµνEµν,αβhαβ − 2
|
| 238 |
+
3m2�
|
| 239 |
+
P µνhµν
|
| 240 |
+
�2
|
| 241 |
+
�
|
| 242 |
+
,
|
| 243 |
+
(2.10)
|
| 244 |
+
|
| 245 |
+
4
|
| 246 |
+
where gµν = ηµν+κhµν is the linearized metric tensor, Eµν,αβ is the Lichnerowicz operator1, P µν = ηµν−(∂µ∂ν/□) is a
|
| 247 |
+
projector operator and m is the mass of the conformal mode of the gravitational field. Performing the covariantization
|
| 248 |
+
of Equation (2.10), the modified gravitational field equation reads
|
| 249 |
+
Gµν − 1
|
| 250 |
+
3m2(gµν□−1R)T = κTµν ,
|
| 251 |
+
(2.11)
|
| 252 |
+
where we take the transverse part of the symmetric non-local tensor Sµν = gµν□−1R
|
| 253 |
+
Sµν = ST
|
| 254 |
+
µν + 1
|
| 255 |
+
2(∇µSν + ∇νSµ) ,
|
| 256 |
+
(2.12)
|
| 257 |
+
and Sµ is an associated four-vector. The Bianchi identities are guaranteed accordingly, i.e., ∇µST
|
| 258 |
+
µν = 0.
|
| 259 |
+
In the same way as the DW model, the Ricci-Transverse model can be localized through a scalar–tensor–vector
|
| 260 |
+
formulation [51, 65]. Here, we introduce two auxiliary objects, namely
|
| 261 |
+
U(x) = −□−1R(x) ,
|
| 262 |
+
Sµν(x) = −U(x)gµν(x) = gµν(x)□−1R(x) .
|
| 263 |
+
(2.13)
|
| 264 |
+
An auxiliary four-vector field Sµ(x) therefore enters the localized equations because of Equation (2.12).
|
| 265 |
+
The
|
| 266 |
+
gravitational field equation, Equation (2.11), turns into
|
| 267 |
+
Gµν + m2
|
| 268 |
+
6
|
| 269 |
+
�
|
| 270 |
+
2Ugµν + ∇µSν + ∇νSµ
|
| 271 |
+
�
|
| 272 |
+
= κTµν
|
| 273 |
+
(2.14)
|
| 274 |
+
plus the two equations of motions of the two auxiliary fields
|
| 275 |
+
□U = −R ,
|
| 276 |
+
(2.15)
|
| 277 |
+
�
|
| 278 |
+
δµ
|
| 279 |
+
ν □ + ∇µ∇ν
|
| 280 |
+
�
|
| 281 |
+
Sµ = −2∂νU .
|
| 282 |
+
(2.16)
|
| 283 |
+
III.
|
| 284 |
+
THE LATE-TIME COSMIC ACCELERATION
|
| 285 |
+
The Universe is currently undergoing an accelerated expansion. The first evidence of this peculiar behavior dates
|
| 286 |
+
back to the end of the twentieth century, when the observation of several Type Ia Supernovae (SNIa) [3, 4] pointed out
|
| 287 |
+
the unavoidable necessity of a cosmological constant to fit the cosmic expansion history. On the one hand, these results
|
| 288 |
+
have been corroborated by the observations of all the recent surveys [5, 66–68]. On the other hand, the theoretical
|
| 289 |
+
explanation of this issue has two main drawbacks: the fine tuning problem [69] and the coincidence problem [70]. The
|
| 290 |
+
former is related to the huge discrepancy (∼120 orders of magnitude) between the observed value of the cosmological
|
| 291 |
+
constant and the vacuum energy density calculated via QFT. The latter is linked with the similar current values of
|
| 292 |
+
ΩΛ and ΩM, despite their radically different evolution laws.
|
| 293 |
+
The next generation of cosmological surveys should boost the investigation of the nature of the so-called cosmological
|
| 294 |
+
constant, providing powerful data to discriminate between DE solutions and extended theories of gravity. Within this
|
| 295 |
+
framework, non-local gravity provides viable mechanisms that could account for the observed accelerated expansion
|
| 296 |
+
of the Universe.
|
| 297 |
+
1 Eµν,αβ = 1
|
| 298 |
+
2 (ηµρηνσ + ηµσηνρ − 2ηµνηρσ)□ + (ηρσ∂µ∂ν + ηµν∂ρ∂σ) − 1
|
| 299 |
+
2 (ηµρ∂σ∂ν + ηνρ∂σ∂µ + ηµσ∂ρ∂ν + ηµσ∂ρ∂µ)
|
| 300 |
+
|
| 301 |
+
5
|
| 302 |
+
A.
|
| 303 |
+
The DW Case: Delayed Response to Cosmic Events
|
| 304 |
+
The main reason why the DW model has been in the spotlight since its formulation is its effective way to explain
|
| 305 |
+
late-time cosmic acceleration without the introduction of any form of dark energy. Computing the non-local correction
|
| 306 |
+
of Equation (2.2) in the Friedmann–Lemaitre–Robertson–Walker (FLRW) metric,
|
| 307 |
+
ds2 = −dt2 + a2(t)d⃗x · d⃗x ,
|
| 308 |
+
(3.1)
|
| 309 |
+
one obtains a non-negligible geometrical contribution,
|
| 310 |
+
�
|
| 311 |
+
□−1R
|
| 312 |
+
�
|
| 313 |
+
(t) =
|
| 314 |
+
� t
|
| 315 |
+
0
|
| 316 |
+
dt′
|
| 317 |
+
1
|
| 318 |
+
a3(t′)
|
| 319 |
+
� t′
|
| 320 |
+
0
|
| 321 |
+
dt′′a3(t′′)R(t′′) = −6s(2s − 1)
|
| 322 |
+
3s − 1
|
| 323 |
+
�
|
| 324 |
+
�ln
|
| 325 |
+
�
|
| 326 |
+
t
|
| 327 |
+
teq
|
| 328 |
+
�
|
| 329 |
+
−
|
| 330 |
+
1
|
| 331 |
+
3s − 1 +
|
| 332 |
+
1
|
| 333 |
+
3s − 1
|
| 334 |
+
�
|
| 335 |
+
teq
|
| 336 |
+
t
|
| 337 |
+
�3s−1�
|
| 338 |
+
� ,
|
| 339 |
+
(3.2)
|
| 340 |
+
where a(t) ∼ t s, and the integration constant is set to make the non-local correction vanish before the radiation–
|
| 341 |
+
matter equivalence time, teq. Then, for t > teq the non-local correction starts to grow, becoming non-negligible at
|
| 342 |
+
late time and driving the accelerated cosmic expansion. Non-locality thus emerges in the cosmological framework as
|
| 343 |
+
a delayed response to the radiation-to-matter dominance transition, i.e., as a time-like non-local effect.
|
| 344 |
+
The introduction of non-locality may therefore have beneficial effects on cosmological scales, both at background
|
| 345 |
+
level and perturbations level. Two different approaches can be adopted for the DW model: on the one hand, one can
|
| 346 |
+
exploit the freedom guaranteed by the undetermined form of the distortion function to fit the observed expansion
|
| 347 |
+
history of the universe. In such a scenario, the DW cosmology is made equivalent to ΛCDM at the background
|
| 348 |
+
level. However, different features emerge when perturbations are taken into account, and the physics of structure
|
| 349 |
+
formation is affected accordingly. On the other hand, one can select the form of the distortion function building on
|
| 350 |
+
some fundamental principles, such as the Noether symmetries of the system. In this case, the non-local cosmology is
|
| 351 |
+
also modified at background level and stronger deviations from the concordance model should rise.
|
| 352 |
+
In [71], the first method has been applied, and the ΛCDM expansion history of the Universe has been accurately
|
| 353 |
+
reproduced by matching the data through a non-trivial form of the distortion function
|
| 354 |
+
f(□−1R) = 0.245
|
| 355 |
+
�
|
| 356 |
+
tanh
|
| 357 |
+
�
|
| 358 |
+
0.350X + 0.032X2 + 0.003X3�
|
| 359 |
+
− 1
|
| 360 |
+
�
|
| 361 |
+
,
|
| 362 |
+
(3.3)
|
| 363 |
+
where X = □−1R + 16.5.
|
| 364 |
+
B.
|
| 365 |
+
The RT Case: Dynamical Dark Energy
|
| 366 |
+
Considering a spatially flat FLRW metric, Equation (3.1), the equations of motion of the RT model, Equa-
|
| 367 |
+
tions (2.14)–(2.16), become [72]
|
| 368 |
+
H2 − m2
|
| 369 |
+
9 (U − ˙S0) = 8πG
|
| 370 |
+
3
|
| 371 |
+
ρ ,
|
| 372 |
+
(3.4)
|
| 373 |
+
¨U + 3H ˙U = 6 ˙H + 12H2 ,
|
| 374 |
+
(3.5)
|
| 375 |
+
¨S0 + 3H ˙S0 − 3H2S0 = ˙U ,
|
| 376 |
+
(3.6)
|
| 377 |
+
where the spatial components of the vector field Sµ vanish to preserve the rotational invariance of the FLRW metric,
|
| 378 |
+
and the stress–energy tensor is taken to be T µ
|
| 379 |
+
ν
|
| 380 |
+
=diag(−ρ, p, p, p).
|
| 381 |
+
Defining Y = U − ˙S0, ˜h = H/H0 and the
|
| 382 |
+
dimensionless variable x ≡ ln a(t), then the modified Friedmann equation, Equation (3.4), reads
|
| 383 |
+
˜h2(x) = ΩMe−3x + γY (x) ,
|
| 384 |
+
(3.7)
|
| 385 |
+
|
| 386 |
+
6
|
| 387 |
+
with γ ≡ m2/(9H2
|
| 388 |
+
0). An effective dark energy thus appears
|
| 389 |
+
ρDE(t) = ρ0γY (t) ,
|
| 390 |
+
(3.8)
|
| 391 |
+
where ρ0 = 3H2
|
| 392 |
+
0/(8πG). Once the initial conditions for the auxiliary fields are set (see [56] for details), the evolution
|
| 393 |
+
of ρDE(t)/ρT OT (t) can be studied: the non-local effective dark energy is actually negligible until recent time and then
|
| 394 |
+
starts to dominate the cosmic expansion. Moreover, it is possible to study the DE equation of state
|
| 395 |
+
˙ρDE + 3H(1 + ωDE)ρDE = 0 ,
|
| 396 |
+
(3.9)
|
| 397 |
+
and different evolutions for ρDE(z) follow from different choices for the initial conditions of the auxiliary fields. For
|
| 398 |
+
small values of the initial conditions, one obtains a fully phantom DE, namely ωDE(z) is always less than −1. For
|
| 399 |
+
large values of the initial conditions, ρDE(z) has a "phantom crossing" behavior, i.e., there is a transition from the
|
| 400 |
+
phantom regime to −1 < ωDE < 0 of about z ≃ 0.3. Regardless of the initial conditions, therefore, the non-local
|
| 401 |
+
model provides a dynamical DE density which drives the accelerated expansion of the Universe.
|
| 402 |
+
IV.
|
| 403 |
+
THE GROWTH OF PERTURBATIONS AND THE σ8 TENSION
|
| 404 |
+
Building on the primordial density fluctuations emerged from the inflation, cosmic structures have formed due
|
| 405 |
+
to gravitational instability. Studying the large-scale structure of the Universe and its evolution through the cosmic
|
| 406 |
+
epochs, it is possible to trace the growth of the so-called cosmological perturbations.
|
| 407 |
+
Associated to this observable, one of the main cosmological tensions has risen: the growth tension. It has come
|
| 408 |
+
about as the result of the discrepancy between the Planck value of the cosmological parameters ΩM and σ8 and those
|
| 409 |
+
from WL measurements, CC and RSD data. The former dynamical probes point towards lower values of the amplitude
|
| 410 |
+
(σ8) or the rate (fσ8 = [ΩM(z = 0)]0.55σ8) of growth of structures with respect to the CMB experiments, giving rise to
|
| 411 |
+
a 2−3σ tension [9, 11]. Moreover, the Planck 2018 value of the joint parameter S8 = σ8
|
| 412 |
+
�
|
| 413 |
+
ΩM/0.3 (S8 = 0.834±0.016
|
| 414 |
+
[5]) is confirmed by another recent CMB analysis by the ACT + WMAP collaboration (S8 = 0.840 ± 0.030 [66]),
|
| 415 |
+
thus erasing the possibility of a systematic error related to the excess of lensing amplitude measured by Planck [73].
|
| 416 |
+
A 2.3σ tension emerges accordingly with both the original WL analysis of KiDS-450 [74] and KiDS-450 + VIKING
|
| 417 |
+
data [75], while updated constraints from the same datasets [76, 77] show greater discrepancies.
|
| 418 |
+
The same 2.3σ
|
| 419 |
+
tension also occurs with the data from DES’s first year release (DESY1) [78], while the combination of KiDS-450 +
|
| 420 |
+
VIKING + DESY1 weak lensing datasets results in a 2.5σ [79] or 3.2σ [80] tension depending on the analysis. The
|
| 421 |
+
most recent cosmic shear data release from both KiDS-1000 and DESY3 confirms the previous estimates [18, 81–84]
|
| 422 |
+
(S8 = 0.759+0.024
|
| 423 |
+
−0.021 from KiDS-1000 [18]). Analogous results have been obtained with the 3 × 2 pt correlation function
|
| 424 |
+
analysis (cosmic shear correlation function, galaxy clustering angular auto-correlation function and galaxy–galaxy
|
| 425 |
+
lensing cross-correlation function) of KiDS-1000 + BOSS + 2dFLenS datset [85]. Additional results, in agreement
|
| 426 |
+
with those from WL surveys, have been achieved by number counting of galaxy clusters, using multiwavelength
|
| 427 |
+
datasets [19, 86–91]. Supplementary observational evidence for the weaker growth of structures is also given by the
|
| 428 |
+
exploitation of RSD data [20, 92–95].
|
| 429 |
+
A.
|
| 430 |
+
The Deser–Woodard Evolution of Scalar Perturbations
|
| 431 |
+
To investigate the growth of structures in the non-local DW model, we select the phenomenological form of the
|
| 432 |
+
distortion function given by Equation (3.3). As a consequence, the non-local background evolution is made equivalent
|
| 433 |
+
to that of ΛCDM, and any deviation is enclosed in the cosmological perturbations.
|
| 434 |
+
Consider the field equations of the scalar–tensor equivalent of the DW model, Equations (2.7)–(2.9). Specializing
|
| 435 |
+
to the cosmological case by assuming the FLRW metric, Equation (3.1), the field equations now read
|
| 436 |
+
H2�
|
| 437 |
+
1 + f − ξ
|
| 438 |
+
�
|
| 439 |
+
+ H
|
| 440 |
+
�
|
| 441 |
+
f ′ ˙η − ˙ξ
|
| 442 |
+
�
|
| 443 |
+
− 1
|
| 444 |
+
6 ˙η ˙ξ = 8πG
|
| 445 |
+
3
|
| 446 |
+
ρ ,
|
| 447 |
+
(4.1)
|
| 448 |
+
˙H
|
| 449 |
+
�
|
| 450 |
+
1 + f − ξ
|
| 451 |
+
�
|
| 452 |
+
− H
|
| 453 |
+
2
|
| 454 |
+
�
|
| 455 |
+
f ′ ˙η − ˙ξ
|
| 456 |
+
�
|
| 457 |
+
+ 1
|
| 458 |
+
2 ˙η ˙ξ + 1
|
| 459 |
+
2
|
| 460 |
+
�
|
| 461 |
+
f ′′ ˙η2 + f ′¨η − ¨ξ
|
| 462 |
+
�
|
| 463 |
+
= −4πG(p + ρ) ,
|
| 464 |
+
(4.2)
|
| 465 |
+
|
| 466 |
+
7
|
| 467 |
+
¨η + 3H ˙η = −6
|
| 468 |
+
� ˙H + 2H2�
|
| 469 |
+
,
|
| 470 |
+
(4.3)
|
| 471 |
+
¨ξ + 3H ˙ξ = 6f ′� ˙H + 2H2�
|
| 472 |
+
,
|
| 473 |
+
(4.4)
|
| 474 |
+
where the former two are the (0,0) and the (1,1) component of Equation (2.7), while the latter two are the cosmological
|
| 475 |
+
formulation of Equations (2.8) and (2.9).
|
| 476 |
+
The linear perturbation equations have been derived in [96] for the scalar–tensor equivalent of the non-local theory,
|
| 477 |
+
and then analogous results have been found in [97] for the original formulation. Using the perturbed FLRW metric
|
| 478 |
+
in the Newtonian gauge,
|
| 479 |
+
ds2 = −(1 + 2Ψ)dt2 + a2(t)(1 + 2Φ)δijdxidxj ,
|
| 480 |
+
(4.5)
|
| 481 |
+
the growth equation reads
|
| 482 |
+
¨δM + (2 − ξ) ˙δM =
|
| 483 |
+
3H2
|
| 484 |
+
0
|
| 485 |
+
�
|
| 486 |
+
1 − ξ − 8f ′(η) + f(η)
|
| 487 |
+
�
|
| 488 |
+
Ω0
|
| 489 |
+
M
|
| 490 |
+
2a3H2�
|
| 491 |
+
1 − ξ − 6f ′(η) + f(η)
|
| 492 |
+
��
|
| 493 |
+
1 + f(η) − ξ
|
| 494 |
+
� δM ,
|
| 495 |
+
(4.6)
|
| 496 |
+
where δM = δρM/ρM is the matter density perturbation in the sub-horizon limit.
|
| 497 |
+
Numerical results for the growth rate fσ8 ≡ σ8δ′
|
| 498 |
+
M/δM have been obtained in [96] and [97] for both the formulations
|
| 499 |
+
of the Deser–Woodard model, and good agreement with the Redshift Space Distortion (RSD) data has emerged
|
| 500 |
+
(σNL
|
| 501 |
+
8
|
| 502 |
+
= 0.78). Moreover, when the DW cosmological parameters are inferred by matching the CMB data [98], a lower
|
| 503 |
+
growth amplitude with respect to that of ΛCDM turns out. The non-local model thus alleviates the growth tension,
|
| 504 |
+
predicting compatible values of σ8 both from Planck–CMB and the other dynamical probes, as shown in Figure 1.
|
| 505 |
+
However, even though the non-local clustering of linear structures is weakened with respect to ΛCDM, and the DW
|
| 506 |
+
prediction for the matter power spectrum is about 10% lower [98], the non-local lensing response is counterintuitively
|
| 507 |
+
enhanced due to a severe increase in the lensing potential. This peculiar behavior results in a slight tension between
|
| 508 |
+
CMB and RSD [98]: performing the joint fit, the RSD dataset tends to push the DW predictions for the CMB lensing
|
| 509 |
+
potential Cφφ
|
| 510 |
+
ℓ
|
| 511 |
+
out of the 1σ error bars at low-ℓ. Applying the Bayesian tools for the model selection, a “weak evidence”
|
| 512 |
+
[103] for the ΛCDM model consequently emerges.
|
| 513 |
+
B.
|
| 514 |
+
The Ricci-Transverse Evolution of Scalar Perturbations
|
| 515 |
+
The scalar perturbations of the RT model have been investigated in [56, 104], using the FLRW metric in the
|
| 516 |
+
Newtonian gauge, Equation (4.5), and perturbing the auxiliary fields as
|
| 517 |
+
U(t, x) = ¯U(t) + δU(t, x) ,
|
| 518 |
+
(4.7)
|
| 519 |
+
Sµ(t, x) = ¯S0(t) + δSµ(t, x) = ¯S0(t) + δS0(t, x) + ∂i
|
| 520 |
+
�
|
| 521 |
+
δS(t, x)
|
| 522 |
+
�
|
| 523 |
+
,
|
| 524 |
+
(4.8)
|
| 525 |
+
where the spatial part of the vector perturbation does not vanish and, for scalar perturbations, only depends on
|
| 526 |
+
δS. Building on the RT cosmological equations Equations (3.4)–(3.6), the growth equation for the matter density
|
| 527 |
+
perturbation in the sub-horizon limit reads [104]
|
| 528 |
+
¨δM + 2H ˙δM = 3
|
| 529 |
+
2
|
| 530 |
+
Geff
|
| 531 |
+
G
|
| 532 |
+
H2
|
| 533 |
+
0ΩMδM ,
|
| 534 |
+
(4.9)
|
| 535 |
+
where in Geff
|
| 536 |
+
�
|
| 537 |
+
Ψ, Φ, δU, δS0, S
|
| 538 |
+
�
|
| 539 |
+
is encoded the deviation of the non-local theory from GR. In the sub-horizon modes,
|
| 540 |
+
namely ˆk ≫ 1, such deviation is
|
| 541 |
+
|
| 542 |
+
8
|
| 543 |
+
0.70
|
| 544 |
+
0.75
|
| 545 |
+
0.80
|
| 546 |
+
0.85
|
| 547 |
+
S8
|
| 548 |
+
CMB Planck (DW non-local)
|
| 549 |
+
CMB Planck + RSD + JLA (DW non-local)
|
| 550 |
+
CMB Planck + BAO + Pantheon (RT-minimal non-local)
|
| 551 |
+
CMB Planck + BAO + Pantheon (RT non-local, ΔN=64)
|
| 552 |
+
CMB Planck TT,TE,EE + lowE
|
| 553 |
+
CMB ACT + WMAP
|
| 554 |
+
WL KiDS-1000
|
| 555 |
+
WL DES-Y3
|
| 556 |
+
WL CFHTLenS
|
| 557 |
+
WL KiDS + VIKING + DES-Y1
|
| 558 |
+
WL + CMB lensing DES-Y3 + SPT + Planck
|
| 559 |
+
WL + GC KiDS-1000 3×2pt
|
| 560 |
+
WL + GC DES-Y3 3×2pt
|
| 561 |
+
WL + GC KiDS + VIKING-450 + BOSS
|
| 562 |
+
GC BOSS + eBOSS
|
| 563 |
+
GC BOSS power spectra
|
| 564 |
+
GC + CMB lensing DESI + Plank
|
| 565 |
+
CC AMICO KiDS-DR3
|
| 566 |
+
CC SDSS-DR8
|
| 567 |
+
CC Planck tSZ
|
| 568 |
+
RSD + BAO + Pantheon
|
| 569 |
+
RSD
|
| 570 |
+
RSD
|
| 571 |
+
0.70
|
| 572 |
+
0.75
|
| 573 |
+
0.80
|
| 574 |
+
0.85
|
| 575 |
+
S8
|
| 576 |
+
FIG. 1: Estimates of S8 provided by the two non-local cosmological analyses [56, 98], and the ΛCDM fit of the CMB [5, 66],
|
| 577 |
+
the WL data [18, 20, 80, 83, 84, 99], the combination of WL and galaxy clustering observations [100–102], cluster counting
|
| 578 |
+
[19, 87, 88] and RSD surveys [92, 94]. The colored band corresponds to the S8 value derived by the analysis of the Planck–CMB
|
| 579 |
+
data in the ΛCDM framework [5].
|
| 580 |
+
1 − Geff
|
| 581 |
+
G
|
| 582 |
+
= O
|
| 583 |
+
� 1
|
| 584 |
+
ˆk2
|
| 585 |
+
�
|
| 586 |
+
,
|
| 587 |
+
(4.10)
|
| 588 |
+
and the RT model is thus safe regarding the time variation of the effective Newton’s constant. Geff indeed reduces
|
| 589 |
+
to G at the Solar System scale, while a deviation of ∼1% rises at cosmological scales.
|
| 590 |
+
In [56], the growth rate f(z, k) ≡ d ln δM/d ln a is also derived. The results do not differ from those of ΛCDM
|
| 591 |
+
cosmology: f(z, k) can be fitted with a k-independent function f(z) = [ΩM(z)]γ, where γ ≃ 0.55 is roughly constant.
|
| 592 |
+
Accordingly, any possible deviation in the growth of perturbations should be due to the amplitude σ8. In order to find
|
| 593 |
+
any signature of the non-local model at perturbation level, which could account for the growth tension, the theory was
|
| 594 |
+
compared with cosmological observations: Planck–CMB, Pantheon SNIa and SDSS-BAO. The Bayesian parameter
|
| 595 |
+
estimation shows a full equivalence between the RT non-local cosmology and the ΛCDM one. No statistically signifi-
|
| 596 |
+
cant deviation in the σ8 parameter emerges for any of the tested versions of the Ricci-Transverse model. Eventually,
|
| 597 |
+
this theory cannot alleviate the growth tension, as shown in Figure 1.
|
| 598 |
+
V.
|
| 599 |
+
HUBBLE TENSION IN LIGHT OF THE NON-LOCAL MODELS
|
| 600 |
+
Hubble tension is certainly the most renowned and significant tension of the ΛCDM model. It emerges from the
|
| 601 |
+
comparison between early-time and late-time measurements of the Hubble constant. From one side, CMB analysis
|
| 602 |
+
[5, 66, 105–108], BAO surveys [6, 101, 109, 110] with standard BBN constraints [111] and combinations of CMB,
|
| 603 |
+
BAO, SNIa [112], RSD and cosmic shear data [78, 113, 114] point towards lower values of H0 (H0 = 67.4 ± 0.5 km
|
| 604 |
+
s−1Mpc−1 from Planck 2018 [5]). On the other side, the local measurements based on standard candles prefer higher
|
| 605 |
+
values for the Hubble constant [115] (H0 = 73.04 ± 1.04 km s−1Mpc−1 from SH0ES 2022 [17]). The main results are
|
| 606 |
+
achieved by the SH0ES collaboration using Hubble Space Telescope observations: on the one hand, they analyzed
|
| 607 |
+
|
| 608 |
+
9
|
| 609 |
+
65
|
| 610 |
+
70
|
| 611 |
+
75
|
| 612 |
+
80
|
| 613 |
+
H0 ( km s-1 Mpc-1 )
|
| 614 |
+
CMB Planck (DW non-local)
|
| 615 |
+
CMB Planck + RSD + JLA (DW non-local)
|
| 616 |
+
CMB Planck + BAO + Pantheon (RT-minimal non-local)
|
| 617 |
+
CMB Planck + BAO + Pantheon (RT non-local, ΔN=64)
|
| 618 |
+
CMB Planck
|
| 619 |
+
CMB Planck + lensing
|
| 620 |
+
SPT-3G CMB
|
| 621 |
+
ACT + WMAP CMB
|
| 622 |
+
Planck + SPT + ACT CMB
|
| 623 |
+
BOSS correlation function + BAO + BBN
|
| 624 |
+
BOSS power spectrum + BAO + BBN
|
| 625 |
+
BOSS DR12 + BBN
|
| 626 |
+
BAO + RSD
|
| 627 |
+
LSS equivalence-time ruler
|
| 628 |
+
LSS equivalence-time ruler + lensing
|
| 629 |
+
SNIa-Cepheid
|
| 630 |
+
SNIa-TRGB
|
| 631 |
+
SNIa-Miras
|
| 632 |
+
SneII
|
| 633 |
+
SnIa-Cepheid + TD lensing
|
| 634 |
+
Time-delay lensing
|
| 635 |
+
Time-delay lensing
|
| 636 |
+
Time-delay lensing + SLACS
|
| 637 |
+
GW Standard Sirens
|
| 638 |
+
GW Standard Sirens
|
| 639 |
+
GW Standard Sirens
|
| 640 |
+
Masers
|
| 641 |
+
Masers
|
| 642 |
+
Tully Fisher
|
| 643 |
+
Surface Brightness Fluctuations
|
| 644 |
+
0.70
|
| 645 |
+
0.72
|
| 646 |
+
0.74
|
| 647 |
+
0.76
|
| 648 |
+
0.78
|
| 649 |
+
0.80
|
| 650 |
+
S8
|
| 651 |
+
FIG. 2: Estimates of H0 provided by the two non-local cosmological analyses [56, 98], and the ΛCDM fit of the CMB [5, 66,
|
| 652 |
+
105, 107], the matter power spectrum combined with BAO [20, 110, 126] and RSD [127], the Large Scale Structure teq standard
|
| 653 |
+
ruler [128, 129], the supernovae [17, 121, 124, 130, 131], the time-delay lensing [121, 132, 133], the gravitational waves [134–136],
|
| 654 |
+
the water megamasers [125, 137], the Tully–Fisher relation [138] and the SBF [139]. The colored bands correspond to the H0
|
| 655 |
+
estimates derived by the Planck–CMB analysis in the ΛCDM framework (purple) [5] and the SNIa–Cepheids analysis by SH0ES
|
| 656 |
+
(orange) [17].
|
| 657 |
+
SNIa data with distance calibration by Cepheid variables in the host galaxies [116, 117]; on the other hand, they
|
| 658 |
+
targeted long-period pulsating Cepheid variables [17, 118], calibrating the geometric distance to the Large Magellanic
|
| 659 |
+
Cloud, both from eclipsing binaries and parallaxes from the Gaia satellite [119, 120]. Moreover, other independent
|
| 660 |
+
local measurement of H0 have been performed by using time delays between multiple images of strong lensed quasars
|
| 661 |
+
[121, 122], the tip of the Red Giant Branch [123] and Miras (variable red giant stars) [124] with water megamaser as
|
| 662 |
+
distance indicator [125]. All these measurements agree on higher values of the Hubble constant, thus generating a
|
| 663 |
+
4 − 5σ tension with early-time model-dependent estimates.
|
| 664 |
+
A.
|
| 665 |
+
The Deser–Woodard Expansion History
|
| 666 |
+
The stat-of-the-art investigation of the DW non-local model does not allow any attempt to address H0 tension. To
|
| 667 |
+
make the model predictive, the form of the distortion function needs to be specified, and most of the analyses have
|
| 668 |
+
been focused on the phenomenological ΛCDM form of Equation (3.3), until now (see [98] for the latest results). This
|
| 669 |
+
choice implies that the DW cosmology is made equivalent to that of the concordance model at background level, and
|
| 670 |
+
the same expansion history, as well as the same H0, are thus predicted (see Figure 2).
|
| 671 |
+
However, another option is also available for the selection of the distortion function. In [57, 140, 141], a specific
|
| 672 |
+
form of f(η) has been derived by exploiting the Noether symmetries [142] of a spherically symmetric background
|
| 673 |
+
spacetime
|
| 674 |
+
f(η) = 1 + e η .
|
| 675 |
+
(5.1)
|
| 676 |
+
The accurate cosmological analysis of this form of the DW model has yet to be carried out, but some results have
|
| 677 |
+
already been achieved, such as exact solutions [49] and a phase-space view of solutions [143]. Furthermore, several
|
| 678 |
+
|
| 679 |
+
10
|
| 680 |
+
astrophysical tests have been performed on very different scales, and viable results turned out. In [141], the lensing
|
| 681 |
+
properties of the galaxy clusters have been investigated in light of the exponential DW model, and a fully non-local
|
| 682 |
+
regime with enhanced lensing strength has been highlighted. This feature clearly resembles the improved lensing
|
| 683 |
+
response of the phenomenological form of the DW model, which is co-responsible for the lowered estimate of the σ8
|
| 684 |
+
parameter. A promising insight upon the cosmological behavior of the non-local theory based on Equation (5.1) thus
|
| 685 |
+
emerges. Therefore, this model may alleviate not only the growth tension but also the Hubble tension, since it also
|
| 686 |
+
deviates from GR at the background level [144]. Further analysis of the exponential DW model should be carried out
|
| 687 |
+
accordingly.
|
| 688 |
+
B.
|
| 689 |
+
The Ricci-Transverse Expansion History
|
| 690 |
+
For what concerns the RT model, the most updated cosmological analysis is due to Belgacem et al. [56]. As we
|
| 691 |
+
saw in Section IV, different versions of the non-local model, relying on different choices for initial conditions of the
|
| 692 |
+
auxiliary fields, have been compared against Planck–CMB, Pantheon SNIa and SDSS-BAO data. Since the RT model
|
| 693 |
+
has no freedom with regard to the functional form of the action, the theory cannot be adjusted to data, and no
|
| 694 |
+
background equivalence to the ΛCDM cosmology can be established a priori. In such a scenario, the solution to the
|
| 695 |
+
Hubble tension may thus be possible. However, the estimator tool defined in Equation (4.10), which accounts for
|
| 696 |
+
the deviation from GR of the non-local theory, only shows little discrepancies. This manifests in the values of the
|
| 697 |
+
cosmological parameters inferred via Markov Chain Monte Carlo (MCMC), which are almost equivalent to those of
|
| 698 |
+
the concordance model. The only model that exhibits some slight discrepancies is the so-called "RT-minimal", which
|
| 699 |
+
relies on the assumption that the auxiliary scalar field U(x) starts its evolution during the radiation dominance era.
|
| 700 |
+
On the one hand, this model predict a non-vanishing value for the sum of neutrino masses, while the ΛCDM model
|
| 701 |
+
and the other versions of the RT model show a marginalized posterior which is peaked in zero. On the other hand,
|
| 702 |
+
the RT-minimal model provides a barely higher estimate of the Hubble constant, i.e., H0 = 68.74+0.59
|
| 703 |
+
−0.51 km s−1Mpc−1.
|
| 704 |
+
Accordingly, the Hubble tension is just reduced to ∼4σ, as shown in Figure 2.
|
| 705 |
+
The RT model in its minimal setup thus provides a viable mechanism to account for the late-time cosmic acceleration,
|
| 706 |
+
as well as for the inclusion of non-zero neutrino masses. However, the predictions for both the background evolution
|
| 707 |
+
and the linear perturbations are too similar to that of the ΛCDM model, hence the cosmological tensions cannot be
|
| 708 |
+
alleviated.
|
| 709 |
+
VI.
|
| 710 |
+
ASTROPHYSICAL TESTS OF NON-LOCAL GRAVITY
|
| 711 |
+
As we saw, good cosmological behavior emerges for both of the non-local models, thus enabling the possibility to
|
| 712 |
+
avoid the introduction of any form of unknown dark energy. In order to further investigate the viability of such models
|
| 713 |
+
as alternatives to GR, it is then necessary to test the non-local predictions down to astrophysical scales. Moreover,
|
| 714 |
+
an accurate investigation of the possible screening mechanisms should be performed, if necessary.
|
| 715 |
+
A.
|
| 716 |
+
Testing the Deser–Woodard Model by Galaxy Clusters, Elliptical Galaxies and the S2 Star
|
| 717 |
+
The DW model has been tested on a wide range of astrophysical scales, from the galaxy clusters [141] to the stellar
|
| 718 |
+
orbits around Sagittarius A* [140]. Most of the tests have been carried out for the exponential form of the non-local
|
| 719 |
+
model, namely
|
| 720 |
+
S = 1
|
| 721 |
+
2κ
|
| 722 |
+
�
|
| 723 |
+
d4x√−g
|
| 724 |
+
�
|
| 725 |
+
R
|
| 726 |
+
�
|
| 727 |
+
2 + e η�
|
| 728 |
+
− ∂µξ∂µη − ξR
|
| 729 |
+
�
|
| 730 |
+
,
|
| 731 |
+
(6.1)
|
| 732 |
+
where the distortion function has been picked out by exploiting the Noether Symmetry Approach [145]. The analyses
|
| 733 |
+
presented are all performed in the post-Newtonian limit, hence the non-local gravitational and metric potential are
|
| 734 |
+
φ(r) = − GMηc
|
| 735 |
+
r
|
| 736 |
+
+ G2M 2
|
| 737 |
+
2c2r2
|
| 738 |
+
�
|
| 739 |
+
14
|
| 740 |
+
9 η2
|
| 741 |
+
c + 18rξ − 11rη
|
| 742 |
+
6rηrξ
|
| 743 |
+
r
|
| 744 |
+
�
|
| 745 |
+
− G3M 3
|
| 746 |
+
2c4r3
|
| 747 |
+
�
|
| 748 |
+
50rξ − 7rη
|
| 749 |
+
12rηrξ
|
| 750 |
+
ηcr + 16
|
| 751 |
+
27η3
|
| 752 |
+
c −
|
| 753 |
+
2r2
|
| 754 |
+
ξ − r2
|
| 755 |
+
η
|
| 756 |
+
r2ηr2
|
| 757 |
+
ξ
|
| 758 |
+
r2
|
| 759 |
+
�
|
| 760 |
+
,
|
| 761 |
+
(6.2)
|
| 762 |
+
ψ(r) = −GMηc
|
| 763 |
+
3r
|
| 764 |
+
− G2M 2
|
| 765 |
+
2c2r2
|
| 766 |
+
�
|
| 767 |
+
2
|
| 768 |
+
9η2
|
| 769 |
+
c + 3rη − 2rξ
|
| 770 |
+
2rηrξ
|
| 771 |
+
r
|
| 772 |
+
�
|
| 773 |
+
,
|
| 774 |
+
(6.3)
|
| 775 |
+
|
| 776 |
+
11
|
| 777 |
+
where ηc is set to 1 so as to recover GR in the limit of φ(r). The two length scales rη and rξ are the characteristic
|
| 778 |
+
non-local parameters that define the scale at which the non-local gravity corrections become effective.
|
| 779 |
+
The first test of this form of the DW model has been carried out in [140], where the weak field non-local predictions
|
| 780 |
+
have been compared against the NTT/VLT observations of S2 star orbit [146]. Exploiting a modified Marquardt–
|
| 781 |
+
Levenberg algorithm, the fit between the simulated orbit and the observed one has shown a slightly better agreement
|
| 782 |
+
for the non-local model with respect to the Keplerian orbit. Moreover, some constraints have been set on the non-local
|
| 783 |
+
length scales.
|
| 784 |
+
A further test has been subsequently performed in [141], exploiting the CLASH lensing data from 19 massive clusters
|
| 785 |
+
[147, 148]. The point-mass potentials of Equations (6.2) and (6.3) were extended to a spherically symmetric mass
|
| 786 |
+
distribution, i.e., the Navarro–Frenk–White density profile, and the non-local predictions for the lensing convergence
|
| 787 |
+
were achieved. Therefore, the MCMC analysis has highlighted two effective regimes in which the non-local model
|
| 788 |
+
is able to match the observations at the same level of statistical significance as GR. In the high-value limit of the
|
| 789 |
+
non-local parameters, the non-local model reduces to a GR-like theory, whose lensing strength is 2/3 of the standard
|
| 790 |
+
one. In this scenario, the DW theory is thus able to fit the data at the cost of increased cluster mass estimates.
|
| 791 |
+
On the other hand, approaching the low-value limit of the non-local length scales, the non-local corrections to the
|
| 792 |
+
lensing potential become larger and comparable to the zeroth-order terms. In this regime, the non-local model is
|
| 793 |
+
able to reproduce GR phenomenology, neither affecting the mass estimates nor the statistical viability of the model.
|
| 794 |
+
Furthermore, when the non-local contributions becomes completely dominant, the non-local theory seems to be able
|
| 795 |
+
to fit the lensing observations with extremely low cluster masses. Accordingly, an intriguing possibility to fit data
|
| 796 |
+
with no dark matter emerges. Additional constraints on the non-local parameters were also derived.
|
| 797 |
+
The most recent astrophysical test of the exponential-DW model was carried out in [57], using the velocity distri-
|
| 798 |
+
bution of elliptical galaxies [149]. Computing the non-local velocity dispersion as a function of the galaxy effective
|
| 799 |
+
radius, the empirical relation of the so-called Fundamental Plane has been recovered so as to constrain the non-local
|
| 800 |
+
gravity parameters. The results of the fit highlight the possibility to recover the fundamental plane without the dark
|
| 801 |
+
matter hypothesis, setting new constraints for rη and rξ.
|
| 802 |
+
It is worth noticing, however, that the non-local Deser–Woodard model exhibits worrisome features at the scale of
|
| 803 |
+
the Solar System. Indeed, in [150], it was demonstrated that the screening mechanism proposed by the same authors
|
| 804 |
+
of the non-local model does not work. As a consequence, the DW model would show a time dependence of the effective
|
| 805 |
+
Newton constant in the small-scale limit, and it would be ruled out by Lunar Laser Ranging (LLR) observations. This
|
| 806 |
+
conclusion, however, seems to be too strong, since it is still not clear how an FLRW background quantity behaves
|
| 807 |
+
when evaluated from cosmological scales down to Solar System ones, where the system decouples from the Hubble
|
| 808 |
+
flow. In fact, a full non-linear time- and scale-dependent solution around a non-linear structure would be necessary.
|
| 809 |
+
A number of proposals go in this direction, and the so-called Vainshtein mechanism [151] can be regarded as the
|
| 810 |
+
paradigm to realize the screening. Basically, any screening mechanism requires a scalar field coupled to matter and
|
| 811 |
+
mediating a fifth force which might span from Solar System up to cosmological scales. Since non-local terms can be
|
| 812 |
+
“localized”, thus resulting in effective scalar fields depending on the scale, some screening mechanism could naturally
|
| 813 |
+
emerge so as to solve the above reported problems.
|
| 814 |
+
B.
|
| 815 |
+
Testing the Ricci-Transverse Model by Solar System Observations and Gravitational Waves Detection
|
| 816 |
+
The main astrophysical tests of the RT model are related to Solar System observations. As we saw in the previous
|
| 817 |
+
sub-section, any theory that extends GR has to reduce to Einstein’s theory at small scales. However, this is highly
|
| 818 |
+
non-trivial when additional degrees of freedom are included, and screening mechanisms involving non-linear features
|
| 819 |
+
are required. The RT model, instead, smoothly reduces to GR already at linear level, and no vDVZ discontinuity
|
| 820 |
+
arises when m → 0 [56]. Note that such results are valid both in the flat and the Schwarzschild spacetime. Moreover,
|
| 821 |
+
the non-local model passes the LLR test about the time variation of the effective Newton constant [150]. As stated
|
| 822 |
+
in Equation (4.10), indeed, the deviation parameter Geff reduces to GN as soon as the system’s characteristic scale
|
| 823 |
+
decreases.
|
| 824 |
+
Another non-local feature of the RT model that has been investigated is the deviation from GR of the predicted
|
| 825 |
+
gravitational radiation [152, 153]. The RT model, similarly to some other extended theories of gravity such as f(R)
|
| 826 |
+
gravity and DHOST theories, has survived the GW170817 event, which set a stringent constraint on the Gravitational
|
| 827 |
+
Waves (GW) speed [154]. Indeed, this non-local model only modifies the friction term in the GW propagation equation,
|
| 828 |
+
thus predicting a massless graviton. Moreover, neither the coupling with matter nor the gravitational interaction
|
| 829 |
+
between the coalescing binaries are affected (the RT model reduces to GR at short distances), and the only difference
|
| 830 |
+
will therefore be due to the free propagation of the GW from the source to the observer. The GW amplitude indeed
|
| 831 |
+
undergoes a modified dampening in the non-local model
|
| 832 |
+
|
| 833 |
+
12
|
| 834 |
+
˜hA(η, k) ∼
|
| 835 |
+
1
|
| 836 |
+
dgw
|
| 837 |
+
L (z) =
|
| 838 |
+
�
|
| 839 |
+
dem
|
| 840 |
+
L (z) exp
|
| 841 |
+
�
|
| 842 |
+
−
|
| 843 |
+
� z
|
| 844 |
+
0
|
| 845 |
+
dz′
|
| 846 |
+
1 + z′ δ(z′)
|
| 847 |
+
��−1
|
| 848 |
+
,
|
| 849 |
+
(6.4)
|
| 850 |
+
where
|
| 851 |
+
δ(η) = m2 ¯S0(η)
|
| 852 |
+
6H(η) ,
|
| 853 |
+
(6.5)
|
| 854 |
+
and ˜hA(η, k) are the Fourier modes of the GW amplitude, with A = ×, + labeling the polarization. Computing
|
| 855 |
+
the ratio between the non-local behavior given by Equation (6.4) and the GR behavior, ˜hA(η, k) ∼ 1/dem
|
| 856 |
+
L (z), little
|
| 857 |
+
deviation emerges for the RT-minimal model, while a 20−80% deviation manifests at large z for the RT formulations
|
| 858 |
+
in which the auxiliary fields start their evolution during the de Sitter inflation. The more e-folds we consider between
|
| 859 |
+
the onset of the auxiliary fields and the end of the inflation, the greater the deviation from GR. We can use a simple
|
| 860 |
+
parametrization for the considered ratio
|
| 861 |
+
dgw
|
| 862 |
+
L (z)
|
| 863 |
+
dem
|
| 864 |
+
L (z) = Ξ0 + 1 − Ξ0
|
| 865 |
+
(1 + z)n ,
|
| 866 |
+
(6.6)
|
| 867 |
+
where Ξ0 is the asymptotic value reached by the ratio and n is the rate at which Ξ0 is approached. Then,
|
| 868 |
+
δ(z) =
|
| 869 |
+
δ(0)
|
| 870 |
+
1 − Ξ0 + Ξ0(1 + z)n ,
|
| 871 |
+
(6.7)
|
| 872 |
+
with δ(0) = n(1 − Ξ0), and the event GW170817 provided the following constraint for such a parameter [153]:
|
| 873 |
+
δ(0) = −7.8+9.7
|
| 874 |
+
−18.4.
|
| 875 |
+
More stringent constraints will certainly be set with the next generation of GW detectors by
|
| 876 |
+
exploiting the observations of GW events with electromagnetic counterparts.
|
| 877 |
+
VII.
|
| 878 |
+
CONCLUSIONS AND PERSPECTIVES
|
| 879 |
+
In this paper, we reviewed the cosmological properties of two of the main proposals in the framework of the non-
|
| 880 |
+
locally extended theories of gravity. In particular, we considered two metric IKGs that are inspired by quantum
|
| 881 |
+
corrections and manifest a suitable cosmological behavior as well. Both the DW and RT models are able to reproduce
|
| 882 |
+
the expansion history of the Universe, exhibiting a late-time accelerated expansion driven by the onset of the non-local
|
| 883 |
+
corrections. The non-local extensions of the Hilbert–Einstein Lagrangian thus provide a viable mechanism to avoid
|
| 884 |
+
the introduction of any form of unknown dark energy. Building on these appealing properties, we inquired into the
|
| 885 |
+
chance of addressing the two main cosmological tensions, namely the σ8 and H0 tensions.
|
| 886 |
+
On the one hand, the non-local DW model has shown suitable features towards this aim. The phenomenological
|
| 887 |
+
formulation of the model indeed predicts a lowered amplitude of growth of perturbations, therefore solving the σ8
|
| 888 |
+
tension. However, this model is made equivalent to the ΛCDM cosmology at the background level, hence no chance
|
| 889 |
+
to account for the Hubble tension arises. Another formulation of the DW theory, based on the Noether symmetries
|
| 890 |
+
of the system, may address both the tensions. This model lacks a proper cosmological analysis, but the investigation
|
| 891 |
+
of its lensing properties at the galaxy clusters scale has shown the same features that, in the phenomenological DW
|
| 892 |
+
model, allow the weakening of the growth of structures. Moreover, this formulation of the non-local theory deviates
|
| 893 |
+
from GR also at background level, thus enabling the possibility to alleviate the Hubble tension as well. The model has
|
| 894 |
+
been also tested on astrophysical scales, and substantial statistical equivalence to GR has emerged in very different
|
| 895 |
+
systems, such as the S2 star, the elliptical galaxies and the galaxy clusters. The main drawback of the DW model,
|
| 896 |
+
however, is the absence of an effective screening mechanism on small scales, which has to be further investigated.
|
| 897 |
+
On the other hand, the non-local RT model perfectly reduces to GR at the Solar System scale, thus avoiding the
|
| 898 |
+
necessity of non-trivial screening mechanisms. Accordingly, the model is not ruled out by the LLR test. Moreover, the
|
| 899 |
+
non-minimal formulations of the RT model show a strong deviation from GR for what concerns the GW propagation
|
| 900 |
+
at large redshift. A powerful tool to test the model with the next generation of GW detectors thus emerges. However,
|
| 901 |
+
this non-local model is not able to address any of the cosmological tensions, as it mimics the ΛCDM evolution both
|
| 902 |
+
at the background and linear perturbations level.
|
| 903 |
+
|
| 904 |
+
13
|
| 905 |
+
In view of the fact that the next generation of cosmological surveys are expected to provide sufficiently accurate
|
| 906 |
+
data to reach a turning point in our comprehension of the Universe, it is of great interest to further investigate the
|
| 907 |
+
main alternatives to GR. A complete cosmological analysis should especially be carried out for the non-local DW
|
| 908 |
+
model in its formulation based on the Noether Symmetry Approach. This model indeed provides one of the most
|
| 909 |
+
promising windows towards the solution of both the cosmological tensions and the dark energy problem. The large-
|
| 910 |
+
scale structure especially appears as a privileged environment for testing the non-local models, since one of their main
|
| 911 |
+
features is the emergence of characteristic length scales. However, it must be stressed that as long as no screening
|
| 912 |
+
mechanism will be found for the DW model, its reliability will be compromised.
|
| 913 |
+
Acknowledgments
|
| 914 |
+
This article is based upon work from COST Action CA21136 Addressing observational tensions in cosmology
|
| 915 |
+
with systematic and fundamental physics (CosmoVerse) supported by COST (European Cooperation in Science and
|
| 916 |
+
Technology). FB and SC acknowledge the support of Istituto Nazionale di Fisica Nucleare (INFN), iniziative specifiche
|
| 917 |
+
QGSKY and MOONLIGHT2.
|
| 918 |
+
Appendix A: Abbreviations
|
| 919 |
+
The following abbreviations are used in this manuscript:
|
| 920 |
+
BBN
|
| 921 |
+
Big Bang Nucleosynthesis
|
| 922 |
+
BAO
|
| 923 |
+
Baryon Acoustic Oscillations
|
| 924 |
+
ΛCDM Lambda Cold Dark Matter
|
| 925 |
+
GR
|
| 926 |
+
General Relativity
|
| 927 |
+
DE
|
| 928 |
+
Dark Energy
|
| 929 |
+
DM
|
| 930 |
+
Dark Matter
|
| 931 |
+
CMB
|
| 932 |
+
Cosmic Microwave Background
|
| 933 |
+
WL
|
| 934 |
+
Weak Lensing
|
| 935 |
+
CC
|
| 936 |
+
Cluster Counts
|
| 937 |
+
RSD
|
| 938 |
+
Redshift Space Distortion
|
| 939 |
+
DW
|
| 940 |
+
Deser–Woodard
|
| 941 |
+
RT
|
| 942 |
+
Ricci-Transverse
|
| 943 |
+
QFT
|
| 944 |
+
Quantum Field Theory
|
| 945 |
+
IDG
|
| 946 |
+
Infinite Derivative Theory of Gravity
|
| 947 |
+
IKG
|
| 948 |
+
Integral Kernel Theory of Gravity
|
| 949 |
+
UV
|
| 950 |
+
UltraViolet
|
| 951 |
+
IR
|
| 952 |
+
InfraRed
|
| 953 |
+
SNIa
|
| 954 |
+
Type Ia Supernovae
|
| 955 |
+
FLRW Friedmann–Lemaitre–Robertson–Walker
|
| 956 |
+
MCMC Markov Chain Monte Carlo
|
| 957 |
+
LLR
|
| 958 |
+
Lunar Laser Ranging
|
| 959 |
+
GW
|
| 960 |
+
Gravitational Waves
|
| 961 |
+
[1] Hogg, D.W.; Eisenstein, D.J.; Blanton, M.R.; Bahcall, N.A.; Brinkmann, J.; Gunn, J.E.; Schneider, D.P.
|
| 962 |
+
Cosmic
|
| 963 |
+
homogeneity demonstrated with luminous red galaxies. Astrophys. J. 2005, 624, 54. https://doi.org/10.1086/429084.
|
| 964 |
+
[2] Labini, F.S.; Vasilyev, N.L.; Pietronero, L.; Baryshev, Y.V. Absence of self-averaging and of homogeneity in the large-scale
|
| 965 |
+
galaxy distribution. Europhys. Lett. 2009, 86, 49001. https://doi.org/10.1209/0295-5075/86/49001.
|
| 966 |
+
[3] Riess, A.G.; Filippenko, A.V.; Challis, P.; Clocchiatti, A.; Diercks, A.; Garnavich, P.M.; Gilliland, R.L.; Hogan, C.J.;
|
| 967 |
+
Jha, S.; Kirshner, R.P.; et al. Observational Evidence from Supernovae for an Accelerating Universe and a Cosmological
|
| 968 |
+
Constant. Astron. J. 1998, 116, 1009. https://doi.org/10.1086/300499.
|
| 969 |
+
[4] Perlmutter, S.; Aldering, G.; Goldhaber, G.; Knop, R.A.; Nugent, P.; Castro, P.G.; Deustua, S.; Fabbro, S.; Goobar, A.;
|
| 970 |
+
Groom, D.E.; et al. Measurements of Omega and Λ from 42 High-Redshift Supernovae. Astrophys. J. 1999, 517, 565.
|
| 971 |
+
https://doi.org/10.1086/307221.
|
| 972 |
+
[5] Aghanim, N.; Akrami, Y.; Ashdown, M.; Aumont, J.; Baccigalupi, C.; Ballardini, M.; Banday, A.J.; Barreiro, R.B.;
|
| 973 |
+
Bartolo, N.; Basak, S.; et al. Planck 2018 results. VI. Cosmological parameters. Astron. Astrophys. 2020, 641, A6;
|
| 974 |
+
Erratum in Astron. Astrophys. 2021, 652, C4. https://doi.org/10.1051/0004-6361/201833910.
|
| 975 |
+
|
| 976 |
+
14
|
| 977 |
+
[6] Alam, S.; Aubert, M.; Avila, S.; Balland, C.; Bautista, J.E.; Bershady, M.A.; Bizyaev, D.; Blanton, M.R.; Bolton,
|
| 978 |
+
A.S.; Bovy, J.; et al. Completed SDSS-IV extended Baryon Oscillation Spectroscopic Survey: Cosmological implications
|
| 979 |
+
from two decades of spectroscopic surveys at the Apache Point Observatory. Phys. Rev. D 2021, 103, 083533. https:
|
| 980 |
+
//doi.org/10.1103/physrevd.103.083533.
|
| 981 |
+
[7] Abbott, T.; Aguena, M.; Alarcon, A.; Allam, S.; Alves, O.; Amon, A.; Andrade-Oliveira, F.; Annis, J.; Avila, S.; Bacon,
|
| 982 |
+
D.; et al. Dark Energy Survey Year 3 results: Cosmological constraints from galaxy clustering and weak lensing. Phys.
|
| 983 |
+
Rev. D 2022, 105, 023520. https://doi.org/10.1103/physrevd.105.023520.
|
| 984 |
+
[8] Bull, P.; Akrami, Y.; Adamek, J.; Baker, T.; Bellini, E.; Jiménez, J.B.; Bentivegna, E.; Camera, S.; Clesse, S.; Davis,
|
| 985 |
+
J.H.; et al. Beyond ΛCDM: Problems, solutions, and the road ahead. Phys. Dark Universe 2016, 12, 56–99. https:
|
| 986 |
+
//doi.org/10.1016/j.dark.2016.02.001.
|
| 987 |
+
[9] Perivolaropoulos, L.; Skara, F. Challenges for ΛCDM: An update. New Astron. Rev. 2022, 95, 101659. https://doi.
|
| 988 |
+
org/10.1016/j.newar.2022.101659.
|
| 989 |
+
[10] Di Valentino, E.; Anchordoqui, L.A.; Özgür Akarsu.; Ali-Haimoud, Y.; Amendola, L.; Arendse, N.; Asgari, M.; Ballardini,
|
| 990 |
+
M.; Basilakos, S.; Battistelli, E.; et al. Snowmass2021—Letter of interest cosmology intertwined II: The hubble constant
|
| 991 |
+
tension. Astropart. Phys. 2021, 131, 102605. https://doi.org/10.1016/j.astropartphys.2021.102605.
|
| 992 |
+
[11] Di Valentino, E.; Anchordoqui, L.A.; Özgür Akarsu.; Ali-Haimoud, Y.; Amendola, L.; Arendse, N.; Asgari, M.; Ballardini,
|
| 993 |
+
M.; Basilakos, S.; Battistelli, E.; et al. Cosmology intertwined III: fσ8 and S8. Astropart. Phys. 2021, 131, 102604.
|
| 994 |
+
https://doi.org/10.1016/j.astropartphys.2021.102604.
|
| 995 |
+
[12] Bertone, G.; Hooper, D.; Silk, J. Particle dark matter: Evidence, candidates and constraints. Phys. Rep. 2005, 405,
|
| 996 |
+
279–390. https://doi.org/10.1016/j.physrep.2004.08.031.
|
| 997 |
+
[13] Batista, R.A.; Amin, M.A.; Barenboim, G.; Bartolo, N.; Baumann, D.; Bauswein, A.; Bellini, E.; Benisty, D.; Bertone,
|
| 998 |
+
G.; Blasi, P.; et al. EuCAPT White Paper: Opportunities and Challenges for Theoretical Astroparticle Physics in the
|
| 999 |
+
Next Decade. arXiv Prepr. 2021, arXiv:2110.10074. https://doi.org/10.48550/ARXIV.2110.10074.
|
| 1000 |
+
[14] Copeland, E.J.; Sami, M.; Tsujikawa, S. Dynamics of dark energy. Int. J. Mod. Phys. D 2006, 15, 1753–1935. https:
|
| 1001 |
+
//doi.org/10.1142/S021827180600942X.
|
| 1002 |
+
[15] Padmanabhan, T. Cosmological constant: The Weight of the vacuum. Phys. Rept. 2003, 380, 235–320. https://doi.
|
| 1003 |
+
org/10.1016/S0370-1573(03)00120-0.
|
| 1004 |
+
[16] Nojiri, S.; Odintsov, S.D. Introduction to modified gravity and gravitational alternative for dark energy. Int. J. Geom.
|
| 1005 |
+
Methods Mod. Phys. 2007, 4, 115–145. https://doi.org/10.1142/S0219887807001928.
|
| 1006 |
+
[17] Riess, A.G.; Yuan, W.; Macri, L.M.; Scolnic, D.; Brout, D.; Casertano, S.; Jones, D.O.; Murakami, Y.; Anand, G.S.;
|
| 1007 |
+
Breuval, L.; et al. A Comprehensive Measurement of the Local Value of the Hubble Constant with 1 km s−1 Mpc−1
|
| 1008 |
+
Uncertainty from the Hubble Space Telescope and the SH0ES Team. Astrophys. J. Lett. 2022, 934, L7. https://doi.
|
| 1009 |
+
org/10.3847/2041-8213/ac5c5b.
|
| 1010 |
+
[18] Asgari, M.; Lin, C.A.; Joachimi, B.; Giblin, B.; Heymans, C.; Hildebrandt, H.; Kannawadi, A.; Stölzner, B.; Tröster, T.;
|
| 1011 |
+
van den Busch, J.L.; et al. KiDS-1000 cosmology: Cosmic shear constraints and comparison between two point statistics.
|
| 1012 |
+
Astron. Astrophys. 2021, 645, A104. https://doi.org/10.1051/0004-6361/202039070.
|
| 1013 |
+
[19] Lesci, G.F.; Marulli, F.; Moscardini, L.; Sereno, M.; Veropalumbo, A.; Maturi, M.; Giocoli, C.; Radovich, M.; Bellagamba,
|
| 1014 |
+
F.; Roncarelli, M.; et al. AMICO galaxy clusters in KiDS-DR3: Cosmological constraints from counts and stacked weak
|
| 1015 |
+
lensing. Astron. Astrophys. 2022, 659, A88. https://doi.org/10.1051/0004-6361/202040194.
|
| 1016 |
+
[20] Chen, S.F.; Vlah, Z.; White, M. A new analysis of galaxy 2-point functions in the BOSS survey, including full-shape
|
| 1017 |
+
information and post-reconstruction BAO. J. Cosmol. Astropart. Phys. 2022, 2022, 008. https://doi.org/10.1088/
|
| 1018 |
+
1475-7516/2022/02/008.
|
| 1019 |
+
[21] Capozziello, S.
|
| 1020 |
+
Curvature Quintessence.
|
| 1021 |
+
Int. J. Mod. Phys. D 2002, 11, 483–491.
|
| 1022 |
+
https://doi.org/10.1142/
|
| 1023 |
+
s0218271802002025.
|
| 1024 |
+
[22] Nojiri, S.; Odintsov, S.D. Modified f(R) gravity consistent with realistic cosmology: From a matter dominated epoch to
|
| 1025 |
+
a dark energy universe. Phys. Rev. D 2006, 74, 086005. https://doi.org/10.1103/physrevd.74.086005.
|
| 1026 |
+
[23] Starobinsky, A.A. Disappearing cosmological constant in f(R) gravity. JETP Lett. 2007, 86, 157–163. https://doi.
|
| 1027 |
+
org/10.1134/s0021364007150027.
|
| 1028 |
+
[24] Fay, S.; Nesseris, S.; Perivolaropoulos, L. Can f(R) Modified Gravity Theories Mimic a ΛCDM Cosmology? Phys. Rev.
|
| 1029 |
+
D 2007, 76, 063504. https://doi.org/10.1103/PhysRevD.76.063504.
|
| 1030 |
+
[25] Lazkoz, R.; Ortiz-Baños, M.; Salzano, V. f(R) gravity modifications: From the action to the data. Eur. Phys. J. C 2018,
|
| 1031 |
+
78, 213. https://doi.org/10.1140/epjc/s10052-018-5711-6.
|
| 1032 |
+
[26] Bajardi, F.; D’Agostino, R.; Benetti, M.; De Falco, V.; Capozziello, S. Early and late time cosmology: The f(R) gravity
|
| 1033 |
+
perspective. Eur. Phys. J. Plus 2022, 137, 1239. https://doi.org/10.1140/epjp/s13360-022-03418-8.
|
| 1034 |
+
[27] D’Agostino, R.; Nunes, R.C. Measurements of H0 in modified gravity theories: The role of lensed quasars in the late-time
|
| 1035 |
+
Universe. Phys. Rev. D 2020, 101, 103505. https://doi.org/10.1103/physrevd.101.103505.
|
| 1036 |
+
[28] Nesseris, S.; Basilakos, S.; Saridakis, E.N.; Perivolaropoulos, L. Viable f(T) models are practically indistinguishable from
|
| 1037 |
+
ΛCDM. Phys. Rev. D 2013, 88, 103010. https://doi.org/10.1103/PhysRevD.88.103010.
|
| 1038 |
+
[29] Cai, Y.F.; Capozziello, S.; De Laurentis, M.; Saridakis, E.N. f(T) teleparallel gravity and cosmology. Rep. Prog. Phys.
|
| 1039 |
+
2016, 79, 106901. https://doi.org/10.1088/0034-4885/79/10/106901.
|
| 1040 |
+
[30] Golovnev, A.; Koivisto, T. Cosmological perturbations in modified teleparallel gravity models. J. Cosmol. Astropart.
|
| 1041 |
+
Phys. 2018, 11, 012. https://doi.org/10.1088/1475-7516/2018/11/012.
|
| 1042 |
+
[31] Wang, D.; Mota, D. Can f(T) gravity resolve the H0 tension? Phys. Rev. D 2020, 102, 063530. https://doi.org/10.
|
| 1043 |
+
1103/physrevd.102.063530.
|
| 1044 |
+
|
| 1045 |
+
15
|
| 1046 |
+
[32] Bahamonde, S.; Dialektopoulos, K.F.; Escamilla-Rivera, C.; Farrugia, G.; Gakis, V.; Hendry, M.; Hohmann, M.;
|
| 1047 |
+
Said, J.L.; Mifsud, J.; Di Valentino, E.
|
| 1048 |
+
Teleparallel Gravity: From Theory to Cosmology. Rep. Prog. Phys. 2022,
|
| 1049 |
+
doi:10.1088/1361-6633/ac9cef.
|
| 1050 |
+
[33] Nojiri, S.; Odintsov, S.D. Modified Gauss-Bonnet theory as gravitational alternative for dark energy. Phys. Lett. B 2005,
|
| 1051 |
+
631, 1–6. https://doi.org/10.1016/j.physletb.2005.10.010.
|
| 1052 |
+
[34] Li, B.; Barrow, J.D.; Mota, D.F. The Cosmology of Modified Gauss-Bonnet Gravity. Phys. Rev. D 2007, 76, 044027.
|
| 1053 |
+
https://doi.org/10.1103/PhysRevD.76.044027.
|
| 1054 |
+
[35] Myrzakulov, R.; Saez-Gomez, D.; Tureanu, A. On the ΛCDM Universe in f(G) gravity. Gen. Relativ. Gravit. 2011, 43,
|
| 1055 |
+
1671–1684. https://doi.org/10.1007/s10714-011-1149-y.
|
| 1056 |
+
[36] Bajardi, F.; Capozziello, S. f(G) Noether cosmology. Eur. Phys. J. C 2020, 80, 704. https://doi.org/10.1140/epjc/
|
| 1057 |
+
s10052-020-8258-2.
|
| 1058 |
+
[37] Capozziello, S.; Nesseris, S.; Perivolaropoulos, L. Reconstruction of the Scalar-Tensor Lagrangian from a LCDM Back-
|
| 1059 |
+
ground and Noether Symmetry. J. Cosmol. Astropart. Phys. 2007, 12, 009. https://doi.org/10.1088/1475-7516/
|
| 1060 |
+
2007/12/009.
|
| 1061 |
+
[38] Heisenberg, L. A systematic approach to generalisations of General Relativity and their cosmological implications. Phys.
|
| 1062 |
+
Rept. 2019, 796, 1–113. https://doi.org/10.1016/j.physrep.2018.11.006.
|
| 1063 |
+
[39] Langlois, D. Dark energy and modified gravity in degenerate higher-order scalar–tensor (DHOST) theories: A review.
|
| 1064 |
+
Int. J. Mod. Phys. D 2019, 28, 1942006. https://doi.org/10.1142/S0218271819420069.
|
| 1065 |
+
[40] D’Agostino, R.; Luongo, O. Growth of matter perturbations in nonminimal teleparallel dark energy. Phys. Rev. D 2018,
|
| 1066 |
+
98, 124013. https://doi.org/10.1103/physrevd.98.124013.
|
| 1067 |
+
[41] Bajardi, F.; Capozziello, S. Equivalence of nonminimally coupled cosmologies by Noether symmetries. Int. J. Mod. Phys.
|
| 1068 |
+
D 2020, 29, 2030015. https://doi.org/10.1142/s0218271820300153.
|
| 1069 |
+
[42] Amendola, L.; Campos, G.C.; Rosenfeld, R.
|
| 1070 |
+
Consequences of dark matter-dark energy interaction on cosmological
|
| 1071 |
+
parameters derived from type Ia supernova data. Phys. Rev. D 2007, 75, 083506. https://doi.org/10.1103/physrevd.
|
| 1072 |
+
75.083506.
|
| 1073 |
+
[43] Wang, B.; Abdalla, E.; Atrio-Barandela, F.; Pavón, D. Dark matter and dark energy interactions: Theoretical challenges,
|
| 1074 |
+
cosmological implications and observational signatures. Rep. Prog. Phys. 2016, 79, 096901. https://doi.org/10.1088/
|
| 1075 |
+
0034-4885/79/9/096901.
|
| 1076 |
+
[44] Di Valentino, E.; Melchiorri, A.; Mena, O. Can interacting dark energy solve the H0 tension? Phys. Rev. D 2017, 96,
|
| 1077 |
+
043503. https://doi.org/10.1103/physrevd.96.043503.
|
| 1078 |
+
[45] Asghari, M.; Jiménez, J.B.; Khosravi, S.; Mota, D.F. On structure formation from a small-scales-interacting dark sector.
|
| 1079 |
+
J. Cosmol. Astropart. Phys. 2019, 2019, 042. https://doi.org/10.1088/1475-7516/2019/04/042.
|
| 1080 |
+
[46] Yang, W.; Vagnozzi, S.; Di Valentino, E.; Nunes, R.C.; Pan, S.; Mota, D.F.
|
| 1081 |
+
Listening to the sound of dark sector
|
| 1082 |
+
interactions with gravitational wave standard sirens. J. Cosmol. Astropart. Phys. 2019, 2019, 037. https://doi.org/
|
| 1083 |
+
10.1088/1475-7516/2019/07/037.
|
| 1084 |
+
[47] Saridakis, E.N.; Lazkoz, R.; Salzano, V.; Moniz, P.V.; Capozziello, S.; Jiménez, J.B.; De Laurentis, M.; Olmo, G.J.
|
| 1085 |
+
Modified Gravity and Cosmology: An Update by the CANTATA Network; Springer: Cham, Switzerland, 2021.
|
| 1086 |
+
[48] Di Valentino, E.; Mena, O.; Pan, S.; Visinelli, L.; Yang, W.; Melchiorri, A.; Mota, D.F.; Riess, A.G.; Silk, J. In the
|
| 1087 |
+
realm of the Hubble tension—A review of solutions. Class. Quant. Grav. 2021, 38, 153001. https://doi.org/10.1088/
|
| 1088 |
+
1361-6382/ac086d.
|
| 1089 |
+
[49] Capozziello, S.; Bajardi, F.
|
| 1090 |
+
Nonlocal gravity cosmology: An overview.
|
| 1091 |
+
Int. J. Mod. Phys. D 2021, 31, 2230009.
|
| 1092 |
+
https://doi.org/10.1142/s0218271822300099.
|
| 1093 |
+
[50] Deser, S.; Woodard, R.P.
|
| 1094 |
+
Nonlocal Cosmology.
|
| 1095 |
+
Phys. Rev. Lett. 2007, 99, 111301.
|
| 1096 |
+
https://doi.org/10.1103/
|
| 1097 |
+
physrevlett.99.111301.
|
| 1098 |
+
[51] Maggiore, M. Phantom dark energy from nonlocal infrared modifications of general relativity. Phys. Rev. D 2014, 89,
|
| 1099 |
+
043008. https://doi.org/10.1103/physrevd.89.043008.
|
| 1100 |
+
[52] Buoninfante, L.
|
| 1101 |
+
Nonlocal Field Theories: Theoretical and Phenomenological Aspects.
|
| 1102 |
+
Ph.D. Thesis, University of
|
| 1103 |
+
Groningen, Groningen, The Netherlands, 2019. https://doi.org/10.33612/diss.99349099.
|
| 1104 |
+
[53] Biswas, T.; Gerwick, E.; Koivisto, T.; Mazumdar, A. Towards Singularity- and Ghost-Free Theories of Gravity. Phys.
|
| 1105 |
+
Rev. Lett. 2012, 108, 031101. https://doi.org/10.1103/physrevlett.108.031101.
|
| 1106 |
+
[54] Briscese, F.; Marcianò , A.; Modesto, L.; Saridakis, E.N. Inflation in (super-)renormalizable gravity. Phys. Rev. D 2013,
|
| 1107 |
+
87, 083507. https://doi.org/10.1103/physrevd.87.083507.
|
| 1108 |
+
[55] Biswas, T.; Mazumdar, A.; Siegel, W. Bouncing universes in string-inspired gravity. J. Cosmol. Astropart. Phys. 2006,
|
| 1109 |
+
2006, 009. https://doi.org/10.1088/1475-7516/2006/03/009.
|
| 1110 |
+
[56] Belgacem, E.; Dirian, Y.; Finke, A.; Foffa, S.; Maggiore, M. Gravity in the infrared and effective nonlocal models. J.
|
| 1111 |
+
Cosmol. Astropart. Phys. 2020, 2020, 010. https://doi.org/10.1088/1475-7516/2020/04/010.
|
| 1112 |
+
[57] Borka, D.; Borka Jovanović, V.; Capozziello, S.; Jovanović, P. Velocity distribution of elliptical galaxies in the framework
|
| 1113 |
+
of Non-local Gravity model. Adv. Space Res. 2022, in press. https://doi.org/https://doi.org/10.1016/j.asr.2022.
|
| 1114 |
+
08.060.
|
| 1115 |
+
[58] Strominger, A. Lectures on the Infrared Structure of Gravity and Gauge Theory; Princeton University Press: Princeton,
|
| 1116 |
+
NJ, USA, 2018. https://doi.org/10.48550/ARXIV.1703.05448.
|
| 1117 |
+
[59] Reuter, M.; Saueressig, F. A class of nonlocal truncations in quantum Einstein gravity and its renormalization group
|
| 1118 |
+
behavior. Phys. Rev. D 2002, 66, 125001. https://doi.org/10.1103/physrevd.66.125001.
|
| 1119 |
+
[60] Wetterich, C. Infrared limit of quantum gravity. Phys. Rev. D 2018, 98, 026028. https://doi.org/10.1103/physrevd.
|
| 1120 |
+
|
| 1121 |
+
16
|
| 1122 |
+
98.026028.
|
| 1123 |
+
[61] Barvinsky, A.O.; Gusev, Y.V.; Mukhanov, V.F.; Nesterov, D.V. Nonperturbative late time asymptotics for heat kernel
|
| 1124 |
+
in gravity theory. Phys. Rev. D 2003, 68, 105003. https://doi.org/10.1103/PhysRevD.68.105003.
|
| 1125 |
+
[62] Barvinsky, A.O. Aspects of nonlocality in quantum field theory, quantum gravity and cosmology. Mod. Phys. Lett. A
|
| 1126 |
+
2015, 30, 1540003. https://doi.org/10.1142/s0217732315400039.
|
| 1127 |
+
[63] Maggiore, M. Nonlocal Infrared Modifications of Gravity. A Review. In Gravity and the Quantum; Springer: Cham,
|
| 1128 |
+
Switzerland, 2017; pp. 221–281. https://doi.org/10.48550/ARXIV.1606.08784.
|
| 1129 |
+
[64] Nojiri, S.; Odintsov, S.D. Modified non-local-F(R) gravity as the key for the inflation and dark energy. Phys. Lett. B
|
| 1130 |
+
2008, 659, 821–826. https://doi.org/10.1016/j.physletb.2007.12.001.
|
| 1131 |
+
[65] Kehagias, A.; Maggiore, M. Spherically symmetric static solutions in a nonlocal infrared modification of General Relativity.
|
| 1132 |
+
J. High Energy Phys. 2014, 2014, 29. https://doi.org/10.1007/jhep08(2014)029.
|
| 1133 |
+
[66] Aiola, S.; Calabrese, E.; Maurin, L.; Naess, S.; Schmitt, B.L.; Abitbol, M.H.; Addison, G.E.; Ade, P.A.R.; Alonso, D.;
|
| 1134 |
+
Amiri, M.; et al. The Atacama Cosmology Telescope: DR4 maps and cosmological parameters. J. Cosmol. Astropart.
|
| 1135 |
+
Phys. 2020, 2020, 47. https://doi.org/10.1088/1475-7516/2020/12/047.
|
| 1136 |
+
[67] Tröster, T.; Asgari, M.; Blake, C.; Cataneo, M.; Heymans, C.; Hildebrandt, H.; Joachimi, B.; Lin, C.A.; Sá nchez, A.G.;
|
| 1137 |
+
Wright, A.H.; et al. KiDS-1000 Cosmology: Constraints beyond flat LambdaCDM. Astron. Astrophys. 2021, 649, A88.
|
| 1138 |
+
https://doi.org/10.1051/0004-6361/202039805.
|
| 1139 |
+
[68] Pandey, S.; Krause, E.; DeRose, J.; MacCrann, N.; Jain, B.; Crocce, M.; Blazek, J.; Choi, A.; Huang, H.; To, C.; et al.
|
| 1140 |
+
Dark Energy Survey year 3 results: Constraints on cosmological parameters and galaxy-bias models from galaxy clustering
|
| 1141 |
+
and galaxy-galaxy lensing using the redMaGiC sample. Phys. Rev. D 2022, 106, 043520. https://doi.org/10.1103/
|
| 1142 |
+
physrevd.106.043520.
|
| 1143 |
+
[69] Weinberg, S. The cosmological constant problem. Rev. Mod. Phys. 1989, 61, 1. https://doi.org/10.1103/RevModPhys.
|
| 1144 |
+
61.1.
|
| 1145 |
+
[70] Velten, H.E.S.; vom Marttens, R.F.; Zimdahl, W. Aspects of the cosmological “coincidence problem”. Eur. Phys. J. C
|
| 1146 |
+
2014, 74, 3160. https://doi.org/10.1140/epjc/s10052-014-3160-4.
|
| 1147 |
+
[71] Deffayet, C.; Woodard, R. Reconstructing the distortion function for nonlocal cosmology. J. Cosmol. Astropart. Phys.
|
| 1148 |
+
2009, 2009, 023. https://doi.org/10.1088/1475-7516/2009/08/023.
|
| 1149 |
+
[72] Foffa, S.; Maggiore, M.; Mitsou, E. Cosmological dynamics and dark energy from nonlocal infrared modifications of
|
| 1150 |
+
gravity. Int. J. Mod. Phys. A 2014, 29, 1450116. https://doi.org/10.1142/s0217751x14501164.
|
| 1151 |
+
[73] Calabrese, E.; Slosar, A.; Melchiorri, A.; Smoot, G.F.; Zahn, O. Cosmic microwave weak lensing data as a test for the
|
| 1152 |
+
dark universe. Phys. Rev. D 2008, 77, 123531. https://doi.org/10.1103/physrevd.77.123531.
|
| 1153 |
+
[74] Hildebrandt, H.; Viola, M.; Heymans, C.; Joudaki, S.; Kuijken, K.; Blake, C.; Erben, T.; Joachimi, B.; Klaes, D.; Miller,
|
| 1154 |
+
L.; et al. KiDS-450: Cosmological parameter constraints from tomographic weak gravitational lensing. Mon. Not. R.
|
| 1155 |
+
Astron. Soc. 2016, 465, 1454–1498. https://doi.org/10.1093/mnras/stw2805.
|
| 1156 |
+
[75] Hildebrandt, H.; Köhlinger, F.; van den Busch, J.L.; Joachimi, B.; Heymans, C.; Kannawadi, A.; Wright, A.H.; Asgari,
|
| 1157 |
+
M.; Blake, C.; Hoekstra, H.; et al. KiDS+VIKING-450: Cosmic shear tomography with optical and infrared data. Astron.
|
| 1158 |
+
Astrophys. 2020, 633, A69. https://doi.org/10.1051/0004-6361/201834878.
|
| 1159 |
+
[76] Köhlinger, F.; Viola, M.; Joachimi, B.; Hoekstra, H.; van Uitert, E.; Hildebrandt, H.; Choi, A.; Erben, T.; Heymans, C.;
|
| 1160 |
+
Joudaki, S.; et al. KiDS-450: The tomographic weak lensing power spectrum and constraints on cosmological parameters.
|
| 1161 |
+
Mon. Not. R. Astron. Soc. 2017, 471, 4412–4435. https://doi.org/10.1093/mnras/stx1820.
|
| 1162 |
+
[77] Wright, A.H.; Hildebrandt, H.; van den Busch, J.L.; Heymans, C.; Joachimi, B.; Kannawadi, A.; Kuijken, K.
|
| 1163 |
+
KiDS+VIKING-450: Improved cosmological parameter constraints from redshift calibration with self-organising maps.
|
| 1164 |
+
Astron. Astrophys. 2020, 640, L14. https://doi.org/10.1051/0004-6361/202038389.
|
| 1165 |
+
[78] Troxel, M.; MacCrann, N.; Zuntz, J.; Eifler, T.; Krause, E.; Dodelson, S.; Gruen, D.; Blazek, J.; Friedrich, O.; Samuroff,
|
| 1166 |
+
S.; et al. Dark Energy Survey Year 1 results: Cosmological constraints from cosmic shear. Phys. Rev. D 2018, 98, 043528.
|
| 1167 |
+
https://doi.org/10.1103/physrevd.98.043528.
|
| 1168 |
+
[79] Joudaki, S.; Hildebrandt, H.; Traykova, D.; Chisari, N.E.; Heymans, C.; Kannawadi, A.; Kuijken, K.; Wright, A.H.;
|
| 1169 |
+
Asgari, M.; Erben, T.; et al.
|
| 1170 |
+
KiDS+VIKING-450 and DES-Y1 combined: Cosmology with cosmic shear.
|
| 1171 |
+
Astron.
|
| 1172 |
+
Astrophys. 2020, 638, L1. https://doi.org/10.1051/0004-6361/201936154.
|
| 1173 |
+
[80] Asgari, M.; Tröster, T.; Heymans, C.; Hildebrandt, H.; van den Busch, J.L.; Wright, A.H.; Choi, A.; Erben, T.; Joachimi,
|
| 1174 |
+
B.; Joudaki, S.; et al. KiDS+VIKING-450 and DES-Y1 combined: Mitigating baryon feedback uncertainty with COSEBIs.
|
| 1175 |
+
Astron. Astrophys. 2020, 634, A127. https://doi.org/10.1051/0004-6361/201936512.
|
| 1176 |
+
[81] Loureiro, A.; Whittaker, L.; Mancini, A.S.; Joachimi, B.; Cuceu, A.; Asgari, M.; Stölzner, B.; Tröster, T.; Wright, A.H.;
|
| 1177 |
+
Bilicki, M.; et al. KiDS and Euclid: Cosmological implications of a pseudo angular power spectrum analysis of KiDS-1000
|
| 1178 |
+
cosmic shear tomography. Astron. Astrophys. 2022, 665. https://doi.org/10.1051/0004-6361/202142481.
|
| 1179 |
+
[82] Chang, C.; Omori, Y.; Baxter, E.J.; Doux, C.; Choi, A.; Pandey, S.; Alarcon, A.; Alves, O.; Amon, A.; Andrade-Oliveira,
|
| 1180 |
+
F.; et al. Joint analysis of DES Year 3 data and CMB lensing from SPT and Planck II: Cross-correlation measurements
|
| 1181 |
+
and cosmological constraints. arXiv Prepr. 2022, arXiv:2203.12440. https://doi.org/10.48550/ARXIV.2203.12440.
|
| 1182 |
+
[83] Amon, A.; Gruen, D.; Troxel, M.; MacCrann, N.; Dodelson, S.; Choi, A.; Doux, C.; Secco, L.; Samuroff, S.; Krause, E.;
|
| 1183 |
+
et al. Dark Energy Survey Year 3 results: Cosmology from cosmic shear and robustness to data calibration. Phys. Rev.
|
| 1184 |
+
D 2022, 105, 023514. https://doi.org/10.1103/physrevd.105.023514.
|
| 1185 |
+
[84] Secco, L.; Samuroff, S.; Krause, E.; Jain, B.; Blazek, J.; Raveri, M.; Campos, A.; Amon, A.; Chen, A.; Doux, C.; et al.
|
| 1186 |
+
Dark Energy Survey Year 3 results: Cosmology from cosmic shear and robustness to modeling uncertainty. Phys. Rev. D
|
| 1187 |
+
2022, 105, 023515. https://doi.org/10.1103/physrevd.105.023515.
|
| 1188 |
+
|
| 1189 |
+
17
|
| 1190 |
+
[85] Heymans, C.; Tröster, T.; Asgari, M.; Blake, C.; Hildebrandt, H.; Joachimi, B.; Kuijken, K.; Lin, C.A.; Sá nchez, A.G.;
|
| 1191 |
+
van den Busch, J.L.; et al.
|
| 1192 |
+
KiDS-1000 Cosmology: Multi-probe weak gravitational lensing and spectroscopic galaxy
|
| 1193 |
+
clustering constraints. Astron. Astrophys. 2021, 646, A140. https://doi.org/10.1051/0004-6361/202039063.
|
| 1194 |
+
[86] Mantz, A.B.; von der Linden, A.; Allen, S.W.; Applegate, D.E.; Kelly, P.L.; Morris, R.G.; Rapetti, D.A.; Schmidt, R.W.;
|
| 1195 |
+
Adhikari, S.; Allen, M.T.; et al. Weighing the giants – IV. Cosmology and neutrino mass. Mon. Not. R. Astron. Soc.
|
| 1196 |
+
2014, 446, 2205–2225. https://doi.org/10.1093/mnras/stu2096.
|
| 1197 |
+
[87] Salvati, L.; Douspis, M.; Aghanim, N. Constraints from thermal Sunyaev-Zel’dovich cluster counts and power spectrum
|
| 1198 |
+
combined with CMB. Astron. Astrophys. 2018, 614, A13. https://doi.org/10.1051/0004-6361/201731990.
|
| 1199 |
+
[88] Costanzi, M.; Rozo, E.; Simet, M.; Zhang, Y.; Evrard, A.E.; Mantz, A.; Rykoff, E.S.; Jeltema, T.; Gruen, D.; Allen, S.;
|
| 1200 |
+
et al. Methods for cluster cosmology and application to the SDSS in preparation for DES Year 1 release. Mon. Not. R.
|
| 1201 |
+
Astron. Soc. 2019, 488, 4779–4800. https://doi.org/10.1093/mnras/stz1949.
|
| 1202 |
+
[89] Bocquet, S.; Dietrich, J.P.; Schrabback, T.; Bleem, L.E.; Klein, M.; Allen, S.W.; Applegate, D.E.; Ashby, M.L.N.;
|
| 1203 |
+
Bautz, M.; Bayliss, M.; et al. Cluster Cosmology Constraints from the 2500 deg2 SPT-SZ Survey: Inclusion of Weak
|
| 1204 |
+
Gravitational Lensing Data from Magellan and the Hubble Space Telescope.
|
| 1205 |
+
Astrophys. J. 2019, 878, 55.
|
| 1206 |
+
https:
|
| 1207 |
+
//doi.org/10.3847/1538-4357/ab1f10.
|
| 1208 |
+
[90] Abbott, T.; Aguena, M.; Alarcon, A.; Allam, S.; Allen, S.; Annis, J.; Avila, S.; Bacon, D.; Bechtol, K.; Bermeo, A.; et al.
|
| 1209 |
+
Dark Energy Survey Year 1 Results: Cosmological constraints from cluster abundances and weak lensing. Phys. Rev. D
|
| 1210 |
+
2020, 102, 023509. https://doi.org/10.1103/physrevd.102.023509.
|
| 1211 |
+
[91] Abdullah, M.H.; Klypin, A.; Wilson, G. Cosmological Constraints on ΩM and σ8 from Cluster Abundances Using the
|
| 1212 |
+
GalWCat19 Optical-spectroscopic SDSS Catalog. Astrophys. J. 2020, 901, 90. https://doi.org/10.3847/1538-4357/
|
| 1213 |
+
aba619.
|
| 1214 |
+
[92] Kazantzidis, L.; Perivolaropoulos, L. Evolution of the fσ8 tension with the Planck15/ΛCDM determination and implica-
|
| 1215 |
+
tions for modified gravity theories. Phys. Rev. D 2018, 97, 103503. https://doi.org/10.1103/physrevd.97.103503.
|
| 1216 |
+
[93] Benisty, D. Quantifying the S8 tension with the Redshift Space Distortion data set. Phys. Dark Universe 2021, 31,
|
| 1217 |
+
100766. https://doi.org/10.1016/j.dark.2020.100766.
|
| 1218 |
+
[94] Nunes, R.C.; Vagnozzi, S. Arbitrating the S8 discrepancy with growth rate measurements from redshift-space distortions.
|
| 1219 |
+
Mon. Not. R. Astron. Soc. 2021, 505, 5427–5437. https://doi.org/10.1093/mnras/stab1613.
|
| 1220 |
+
[95] Philcox, O.H.; Ivanov, M.M. BOSS DR12 full-shape cosmology: ΛCDM constraints from the large-scale galaxy power
|
| 1221 |
+
spectrum and bispectrum monopole. Phys. Rev. D 2022, 105, 043517. https://doi.org/10.1103/physrevd.105.043517.
|
| 1222 |
+
[96] Nersisyan, H.; Cid, A.F.; Amendola, L. Structure formation in the Deser-Woodard nonlocal gravity model: A reappraisal.
|
| 1223 |
+
J. Cosmol. Astropart. Phys. 2017, 2017, 046. https://doi.org/10.1088/1475-7516/2017/04/046.
|
| 1224 |
+
[97] Park, S. Revival of the Deser-Woodard nonlocal gravity model: Comparison of the original nonlocal form and a localized
|
| 1225 |
+
formulation. Phys. Rev. D 2018, 97, 044006. https://doi.org/10.1103/physrevd.97.044006.
|
| 1226 |
+
[98] Amendola, L.; Dirian, Y.; Nersisyan, H.; Park, S. Observational constraints in nonlocal gravity: The Deser-Woodard
|
| 1227 |
+
case. J. Cosmol. Astropart. Phys. 2019, 2019, 045. https://doi.org/10.1088/1475-7516/2019/03/045.
|
| 1228 |
+
[99] Joudaki, S.; Blake, C.; Heymans, C.; Choi, A.; Harnois-Deraps, J.; Hildebrandt, H.; Joachimi, B.; Johnson, A.; Mead,
|
| 1229 |
+
A.; Parkinson, D.; et al. CFHTLenS revisited: Assessing concordance with Planck including astrophysical systematics.
|
| 1230 |
+
Mon. Not. R. Astron. Soc. 2016, 465, 2033–2052. https://doi.org/10.1093/mnras/stw2665.
|
| 1231 |
+
[100] Ivanov, M.M. Cosmological constraints from the power spectrum of eBOSS emission line galaxies. Phys. Rev. D 2021,
|
| 1232 |
+
104, 103514. https://doi.org/10.1103/physrevd.104.103514.
|
| 1233 |
+
[101] Ivanov, M.M.; Simonović , M.; Zaldarriaga, M. Cosmological parameters from the BOSS galaxy power spectrum. J.
|
| 1234 |
+
Cosmol. Astropart. Phys. 2020, 2020, 042. https://doi.org/10.1088/1475-7516/2020/05/042.
|
| 1235 |
+
[102] White, M.; Zhou, R.; DeRose, J.; Ferraro, S.; Chen, S.F.; Kokron, N.; Bailey, S.; Brooks, D.; Garcí a-Bellido, J.; Guy,
|
| 1236 |
+
J.; et al. Cosmological constraints from the tomographic cross-correlation of DESI Luminous Red Galaxies and Planck
|
| 1237 |
+
CMB lensing. J. Cosmol. Astropart. Phys. 2022, 2022, 007. https://doi.org/10.1088/1475-7516/2022/02/007.
|
| 1238 |
+
[103] Jeffreys, H. The Theory of Probability; Oxford University Press: Oxford, UK, 1998.
|
| 1239 |
+
[104] Nesseris, S.; Tsujikawa, S. Cosmological perturbations and observational constraints on nonlocal massive gravity. Phys.
|
| 1240 |
+
Rev. D 2014, 90, 024070. https://doi.org/10.1103/physrevd.90.024070.
|
| 1241 |
+
[105] Dutcher, D.; Balkenhol, L.; Ade, P.; Ahmed, Z.; Anderes, E.; Anderson, A.; Archipley, M.; Avva, J.; Aylor, K.; Barry,
|
| 1242 |
+
P.; et al. Measurements of the E-mode polarization and temperature-E-mode correlation of the CMB from SPT-3G 2018
|
| 1243 |
+
data. Phys. Rev. D 2021, 104, 022003. https://doi.org/10.1103/physrevd.104.022003.
|
| 1244 |
+
[106] Wang, K.; Huang, Q.G. Implications for cosmology from ground-based Cosmic Microwave Background observations. J.
|
| 1245 |
+
Cosmol. Astropart. Phys. 2020, 2020, 045. https://doi.org/10.1088/1475-7516/2020/06/045.
|
| 1246 |
+
[107] Balkenhol, L.; Dutcher, D.; Ade, P.; Ahmed, Z.; Anderes, E.; Anderson, A.; Archipley, M.; Avva, J.; Aylor, K.; Barry,
|
| 1247 |
+
P.; et al. Constraints on ΛCDM extensions from the SPT-3G 2018 EE and TE power spectra. Phys. Rev. D 2021, 104,
|
| 1248 |
+
083509. https://doi.org/10.1103/physrevd.104.083509.
|
| 1249 |
+
[108] Addison, G.E. High H0 values from CMB E-mode Data: A Clue for Resolving the Hubble Tension? Astrophys. J. Lett.
|
| 1250 |
+
2021, 912, L1. https://doi.org/10.3847/2041-8213/abf56e.
|
| 1251 |
+
[109] D’Amico, G.; Gleyzes, J.; Kokron, N.; Markovic, K.; Senatore, L.; Zhang, P.; Beutler, F.; Gil-Marín, H. The cosmological
|
| 1252 |
+
analysis of the SDSS/BOSS data from the Effective Field Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys.
|
| 1253 |
+
2020, 2020, 005. https://doi.org/10.1088/1475-7516/2020/05/005.
|
| 1254 |
+
[110] Colas, T.; D’Amico, G.; Senatore, L.; Zhang, P.; Beutler, F. Efficient cosmological analysis of the SDSS/BOSS data from
|
| 1255 |
+
the Effective Field Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys. 2020, 2020, 001. https://doi.org/10.
|
| 1256 |
+
1088/1475-7516/2020/06/001.
|
| 1257 |
+
|
| 1258 |
+
18
|
| 1259 |
+
[111] Cooke, R.J.; Pettini, M.; Steidel, C.C. One Percent Determination of the Primordial Deuterium Abundance. Astrophys.
|
| 1260 |
+
J. 2018, 855, 102. https://doi.org/10.3847/1538-4357/aaab53.
|
| 1261 |
+
[112] Scolnic, D.M.; Jones, D.O.; Rest, A.; Pan, Y.C.; Chornock, R.; Foley, R.J.; Huber, M.E.; Kessler, R.; Narayan, G.;
|
| 1262 |
+
Riess, A.G.; et al. The Complete Light-curve Sample of Spectroscopically Confirmed SNe Ia from Pan-STARRS1 and
|
| 1263 |
+
Cosmological Constraints from the Combined Pantheon Sample. Astrophys. J. 2018, 859, 101. https://doi.org/10.
|
| 1264 |
+
3847/1538-4357/aab9bb.
|
| 1265 |
+
[113] Abbott, T.; Abdalla, F.; Alarcon, A.; Aleksić, J.; Allam, S.; Allen, S.; Amara, A.; Annis, J.; Asorey, J.; Avila, S.; et al.
|
| 1266 |
+
Dark Energy Survey year 1 results: Cosmological constraints from galaxy clustering and weak lensing. Phys. Rev. D
|
| 1267 |
+
2018, 98, 043526. https://doi.org/10.1103/physrevd.98.043526.
|
| 1268 |
+
[114] Krause, E.; Eifler, T.F.; Zuntz, J.; Friedrich, O.; Troxel, M.A.; Dodelson, S.; Blazek, J.; Secco, L.F.; MacCrann, N.;
|
| 1269 |
+
Baxter, E.; et al. Dark Energy Survey Year 1 Results: Multi-Probe Methodology and Simulated Likelihood Analyses.
|
| 1270 |
+
arXiv Prepr. 2017, arXiv:1706.09359. https://doi.org/10.48550/ARXIV.1706.09359.
|
| 1271 |
+
[115] Riess, A.G. The expansion of the Universe is faster than expected. Nat. Rev. Phys. 2019, 2, 10–12. https://doi.org/
|
| 1272 |
+
10.1038/s42254-019-0137-0.
|
| 1273 |
+
[116] Riess, A.G.; Macri, L.; Casertano, S.; Lampeitl, H.; Ferguson, H.C.; Filippenko, A.V.; Jha, S.W.; Li, W.; Chornock, R.
|
| 1274 |
+
A 3% solution: Determination of the Hubble constant with the Hubble Space Telescope and the Wide Field Camera 3.
|
| 1275 |
+
Astrophys. J. 2011, 730, 119. https://doi.org/10.1088/0004-637x/730/2/119.
|
| 1276 |
+
[117] Riess, A.G.; Macri, L.M.; Hoffmann, S.L.; Scolnic, D.; Casertano, S.; Filippenko, A.V.; Tucker, B.E.; Reid, M.J.; Jones,
|
| 1277 |
+
D.O.; Silverman, J.M.; et al. A 2.4% determination of the local value of the Hubble constant. Astrophys. J. 2016, 826,
|
| 1278 |
+
56. https://doi.org/10.3847/0004-637x/826/1/56.
|
| 1279 |
+
[118] Riess, A.G.; Casertano, S.; Yuan, W.; Bowers, J.B.; Macri, L.; Zinn, J.C.; Scolnic, D. Cosmic Distances Calibrated to
|
| 1280 |
+
1% Precision with Gaia EDR3 Parallaxes and Hubble Space Telescope Photometry of 75 Milky Way Cepheids Confirm
|
| 1281 |
+
Tension with ΛCDM. Astrophys. J. Lett. 2021, 908, L6. https://doi.org/10.3847/2041-8213/abdbaf.
|
| 1282 |
+
[119] Gaia Collaboration.; Brown, A. G. A..; Vallenari, A..; Prusti, T..; de Bruijne, J. H. J..; Babusiaux, C..; Biermann, M..;
|
| 1283 |
+
Creevey, O. L..; Evans, D. W..; Eyer, L..; et al.
|
| 1284 |
+
Gaia Early Data Release 3—Summary of the contents and survey
|
| 1285 |
+
properties. Astron. Astrophys. 2021, 649. https://doi.org/10.1051/0004-6361/202039657.
|
| 1286 |
+
[120] Lindegren, L..; Bastian, U..; Biermann, M..; Bombrun, A..; de Torres, A..; Gerlach, E..; Geyer, R..; Hernández, J..; Hilger,
|
| 1287 |
+
T..; Hobbs, D..; et al. Gaia Early Data Release 3 - Parallax bias versus magnitude, colour, and position. Astronomy &
|
| 1288 |
+
Astrophysics 2021, 649, A1. https://doi.org/10.1051/0004-6361/202039653.
|
| 1289 |
+
[121] Wong, K.C.; Suyu, S.H.; Chen, G.C.F.; Rusu, C.E.; Millon, M.; Sluse, D.; Bonvin, V.; Fassnacht, C.D.; Taubenberger, S.;
|
| 1290 |
+
Auger, M.W.; et al. H0LiCOW - XIII. A 2.4 per cent measurement of H0 from lensed quasars: 5.3σ tension between early-
|
| 1291 |
+
and late-Universe probes. Mon. Not. R. Astron. Soc. 2019, 498, 1420–1439. https://doi.org/10.1093/mnras/stz3094.
|
| 1292 |
+
[122] Shajib, A.J.; Birrer, S.; Treu, T.; Agnello, A.; Buckley-Geer, E.J.; Chan, J.H.H.; Christensen, L.; Lemon, C.; Lin, H.;
|
| 1293 |
+
Millon, M.; et al. STRIDES: A 3.9 per cent measurement of the Hubble constant from the strong lens system DES
|
| 1294 |
+
J0408-5354. Mon. Not. R. Astron. Soc. 2020, 494, 6072–6102. https://doi.org/10.1093/mnras/staa828.
|
| 1295 |
+
[123] Yuan, W.; Riess, A.G.; Macri, L.M.; Casertano, S.; Scolnic, D.M. Consistent Calibration of the Tip of the Red Giant
|
| 1296 |
+
Branch in the Large Magellanic Cloud on the Hubble Space Telescope Photometric System and a Re-determination of
|
| 1297 |
+
the Hubble Constant. Astrophys. J. 2019, 886, 61. https://doi.org/10.3847/1538-4357/ab4bc9.
|
| 1298 |
+
[124] Huang, C.D.; Riess, A.G.; Yuan, W.; Macri, L.M.; Zakamska, N.L.; Casertano, S.; Whitelock, P.A.; Hoffmann, S.L.;
|
| 1299 |
+
Filippenko, A.V.; Scolnic, D. Hubble Space Telescope Observations of Mira Variables in the SN Ia Host NGC 1559: An
|
| 1300 |
+
Alternative Candle to Measure the Hubble Constant. Astrophys. J. 2020, 889, 5. https://doi.org/10.3847/1538-4357/
|
| 1301 |
+
ab5dbd.
|
| 1302 |
+
[125] Reid, M.J.; Pesce, D.W.; Riess, A.G. An Improved Distance to NGC 4258 and Its Implications for the Hubble Constant.
|
| 1303 |
+
Astrophys. J. 2019, 886, L27. https://doi.org/10.3847/2041-8213/ab552d.
|
| 1304 |
+
[126] Zhang, P.; D’Amico, G.; Senatore, L.; Zhao, C.; Cai, Y. BOSS Correlation Function analysis from the Effective Field
|
| 1305 |
+
Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys. 2022, 2022, 036. https://doi.org/10.1088/1475-7516/
|
| 1306 |
+
2022/02/036.
|
| 1307 |
+
[127] Wang, Y.; Xu, L.; Zhao, G.B. A Measurement of the Hubble Constant Using Galaxy Redshift Surveys. Astrophys. J.
|
| 1308 |
+
2017, 849, 84. https://doi.org/10.3847/1538-4357/aa8f48.
|
| 1309 |
+
[128] Farren, G.S.; Philcox, O.H.; Sherwin, B.D. Determining the Hubble constant without the sound horizon: Perspectives
|
| 1310 |
+
with future galaxy surveys. Phys. Rev. D 2022, 105, 063503. https://doi.org/10.1103/physrevd.105.063503.
|
| 1311 |
+
[129] Philcox, O.H.; Sherwin, B.D.; Farren, G.S.; Baxter, E.J. Determining the Hubble constant without the sound horizon:
|
| 1312 |
+
Measurements from galaxy surveys. Phys. Rev. D 2021, 103, 023538. https://doi.org/10.1103/physrevd.103.023538.
|
| 1313 |
+
[130] Anand, G.S.; Tully, R.B.; Rizzi, L.; Riess, A.G.; Yuan, W. Comparing Tip of the Red Giant Branch Distance Scales: An
|
| 1314 |
+
Independent Reduction of the Carnegie-Chicago Hubble Program and the Value of the Hubble Constant. Astrophys. J.
|
| 1315 |
+
2022, 932, 15. https://doi.org/10.3847/1538-4357/ac68df.
|
| 1316 |
+
[131] de Jaeger, T.; Galbany, L.; Riess, A.G.; Stahl, B.E.; Shappee, B.J.; Filippenko, A.V.; Zheng, W. A 5% measurement of
|
| 1317 |
+
the Hubble constant from Type II supernovae. Mon. Not. R. Astron. Soc. 2022, 514, 4620–4628. https://doi.org/10.
|
| 1318 |
+
1093/mnras/stac1661.
|
| 1319 |
+
[132] Denzel, P.; Coles, J.P.; Saha, P.; Williams, L.L.R. The Hubble constant from eight time-delay galaxy lenses. Mon. Not.
|
| 1320 |
+
R. Astron. Soc. 2020, 501, 784–801. https://doi.org/10.1093/mnras/staa3603.
|
| 1321 |
+
[133] Chen, G.C.F.; Fassnacht, C.D.; Suyu, S.H.; Rusu, C.E.; Chan, J.H.H.; Wong, K.C.; Auger, M.W.; Hilbert, S.; Bonvin,
|
| 1322 |
+
V.; Birrer, S.; et al. A SHARP view of H0LiCOW: H0 from three time-delay gravitational lens systems with adaptive
|
| 1323 |
+
optics imaging. Mon. Not. R. Astron. Soc. 2019, 490, 1743–1773. https://doi.org/10.1093/mnras/stz2547.
|
| 1324 |
+
|
| 1325 |
+
19
|
| 1326 |
+
[134] Mukherjee, S.; Krolewski, A.; Wandelt, B.D.; Silk, J. Cross-correlating dark sirens and galaxies: Measurement of H0
|
| 1327 |
+
from GWTC-3 of LIGO-Virgo-KAGRA. arXiv Prepr. 2022, arXiv:2203.03643. https://doi.org/10.48550/ARXIV.2203.
|
| 1328 |
+
03643.
|
| 1329 |
+
[135] The LIGO Scientific Collaboration; The Virgo Collaboration; The KAGRA Collaboration; Abbott, R.; Abe, H.; Acernese,
|
| 1330 |
+
F.; Ackley, K.; Adhikari, N.; Adhikari, R.X.; Adkins, V.K.; et al. Constraints on the cosmic expansion history from
|
| 1331 |
+
GWTC-3. arXiv Prepr. 2021, arXiv:2111.03604. https://doi.org/10.48550/ARXIV.2111.03604.
|
| 1332 |
+
[136] Gayathri, V.; Healy, J.; Lange, J.; O’Brien, B.; Szczepanczyk, M.; Bartos, I.; Campanelli, M.; Klimenko, S.; Lousto, C.;
|
| 1333 |
+
O’Shaughnessy, R. Hubble Constant Measurement with GW190521 as an Eccentric Black Hole Merger. arXiv Prepr.,
|
| 1334 |
+
2020, arXiv:2009.14247. https://doi.org/10.48550/ARXIV.2009.14247.
|
| 1335 |
+
[137] Pesce, D.W.; Braatz, J.A.; Reid, M.J.; Riess, A.G.; Scolnic, D.; Condon, J.J.; Gao, F.; Henkel, C.; Impellizzeri, C.M.V.;
|
| 1336 |
+
Kuo, C.Y.; et al. The Megamaser Cosmology Project. XIII. Combined Hubble Constant Constraints. Astrophys. J. 2020,
|
| 1337 |
+
891, L1. https://doi.org/10.3847/2041-8213/ab75f0.
|
| 1338 |
+
[138] Kourkchi, E.; Tully, R.B.; Anand, G.S.; Courtois, H.M.; Dupuy, A.; Neill, J.D.; Rizzi, L.; Seibert, M. Cosmicflows-4: The
|
| 1339 |
+
Calibration of Optical and Infrared Tully—Fisher Relations. Astrophys. J. 2020, 896, 3. https://doi.org/10.3847/
|
| 1340 |
+
1538-4357/ab901c.
|
| 1341 |
+
[139] Blakeslee, J.P.; Jensen, J.B.; Ma, C.P.; Milne, P.A.; Greene, J.E. The Hubble Constant from Infrared Surface Brightness
|
| 1342 |
+
Fluctuation Distances. Astrophys. J. 2021, 911, 65. https://doi.org/10.3847/1538-4357/abe86a.
|
| 1343 |
+
[140] Dialektopoulos, K.F.; Borka, D.; Capozziello, S.; Borka Jovanović, V.; Jovanović, P. Constraining nonlocal gravity by S2
|
| 1344 |
+
star orbits. Phys. Rev. D 2019, 99, 044053. https://doi.org/10.1103/PhysRevD.99.044053.
|
| 1345 |
+
[141] Bouchè, F.; Capozziello, S.; Salzano, V.; Umetsu, K. Testing non-local gravity by clusters of galaxies. Eur. Phys. J. C
|
| 1346 |
+
2022, 82, 652, https://doi.org/10.1140/epjc/s10052-022-10586-5.
|
| 1347 |
+
[142] Capozziello, S.; De Ritis, R.; Rubano, C.; Scudellaro, P. Noether symmetries in cosmology. La Rivista del Nuovo Cimento
|
| 1348 |
+
1996, 19N4, 1–114. https://doi.org/10.1007/BF02742992.
|
| 1349 |
+
[143] Capozziello, S.; D’Agostino, R.; Luongo, O. The phase-space view of non-local gravity cosmology. Phys. Lett. B 2022,
|
| 1350 |
+
834, 137475. https://doi.org/10.1016/j.physletb.2022.137475.
|
| 1351 |
+
[144] Capozziello, S.; Lambiase, G. PeV IceCube signals and H0 tension in the framework of Non-Local Gravity. arXiv Prepr.
|
| 1352 |
+
2022, arXiv:2206.03690. https://doi.org/10.48550/ARXIV.2206.03690.
|
| 1353 |
+
[145] Dialektopoulos, K.F.; Capozziello, S. Noether symmetries as a geometric criterion to select theories of gravity. Int. J.
|
| 1354 |
+
Geom. Methods Mod. Phys. 2018, 15, 1840007. https://doi.org/10.1142/s0219887818400078.
|
| 1355 |
+
[146] Gillessen, S.; Eisenhauer, F.; Trippe, S.; Alexander, T.; Genzel, R.; Martins, F.; Ott, T. Monitoring stellar orbits around
|
| 1356 |
+
the massive black hole in the galactic centre. Astrophys. J. 2009, 692, 1075. https://doi.org/10.1088/0004-637x/
|
| 1357 |
+
692/2/1075.
|
| 1358 |
+
[147] Postman, M.; Coe, D.; Benítez, N.; Bradley, L.; Broadhurst, T.; Donahue, M.; Ford, H.; Graur, O.; Graves, G.; Jouvel,
|
| 1359 |
+
S.; et al. The Cluster Lensing And Supernova survey with Hubble: An overview. Astrophys. J. Suppl. Ser. 2012, 199, 25.
|
| 1360 |
+
https://doi.org/10.1088/0067-0049/199/2/25.
|
| 1361 |
+
[148] Umetsu, K.; Zitrin, A.; Gruen, D.; Merten, J.; Donahue, M.; Postman, M. CLASH: Joint analysis of strong-lensing,
|
| 1362 |
+
weak-lensing shear, and magnification data for 20 galaxy clusters. Astrophys. J. 2016, 821, 116. https://doi.org/10.
|
| 1363 |
+
3847/0004-637X/821/2/116.
|
| 1364 |
+
[149] Burstein, D.; Bender, R.; Faber, S.; Nolthenius, R.
|
| 1365 |
+
Global Relationships Among the Physical Properties of Stellar
|
| 1366 |
+
Systems. Astron. J. 1997, 114. https://doi.org/10.1086/118570.
|
| 1367 |
+
[150] Belgacem, E.; Finke, A.; Frassino, A.; Maggiore, M. Testing nonlocal gravity with Lunar Laser Ranging. J. Cosmol.
|
| 1368 |
+
Astropart. Phys. 2019, 2019, 035. https://doi.org/10.1088/1475-7516/2019/02/035.
|
| 1369 |
+
[151] Vainshtein, A. To the problem of nonvanishing gravitation mass. Phys. Lett. B 1972, 39, 393–394. https://doi.org/
|
| 1370 |
+
https://doi.org/10.1016/0370-2693(72)90147-5.
|
| 1371 |
+
[152] Belgacem, E.; Dirian, Y.; Foffa, S.; Maggiore, M. Gravitational-wave luminosity distance in modified gravity theories.
|
| 1372 |
+
Phys. Rev. D 2018, 97, 104066. https://doi.org/10.1103/physrevd.97.104066.
|
| 1373 |
+
[153] Belgacem, E.; Dirian, Y.; Foffa, S.; Maggiore, M. Modified gravitational-wave propagation and standard sirens. Phys.
|
| 1374 |
+
Rev. D 2018, 98, 023510. https://doi.org/10.1103/physrevd.98.023510.
|
| 1375 |
+
[154] Abbott, B.P.; Abbott, R.; Abbott, T.D.; Acernese, F.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, R.X.;
|
| 1376 |
+
Adya, V.B.; et al. Gravitational Waves and Gamma-Rays from a Binary Neutron Star Merger: GW170817 and GRB
|
| 1377 |
+
170817A. Astrophys. J. 2017, 848, L13. https://doi.org/10.3847/2041-8213/aa920c.
|
| 1378 |
+
|
EdAzT4oBgHgl3EQfiv0h/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:26e51f1f84cbced899d3e749d3156d6dcc0ff3f14c0766b6b2a546d8a40f5f39
|
| 3 |
+
size 983080
|
GdAzT4oBgHgl3EQfHfsT/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:04071f60b7794af0b2f4ffc14ffa1a615373752da79cabbf997956ad012b0a7e
|
| 3 |
+
size 176024
|
GtFLT4oBgHgl3EQfHC_F/content/tmp_files/2301.11995v1.pdf.txt
ADDED
|
@@ -0,0 +1,1568 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
A NEW SYMMETRIC HOMOMORPHIC FUNCTIONAL
|
| 2 |
+
ENCRYPTION OVER A HIDDEN RING FOR POLYNOMIAL PUBLIC
|
| 3 |
+
KEY ENCAPSULATIONS
|
| 4 |
+
Randy Kuang, Maria Perepechaenko, Ryan Toth
|
| 5 |
+
Quantropi Inc.
|
| 6 |
+
Ottawa, Canada
|
| 7 |
+
{randy.kuang, maria.perepechaenko, ryan.toth}@quantropi.com
|
| 8 |
+
ABSTRACT
|
| 9 |
+
This paper proposes a new homomorphic functional encryption using modular multiplications over
|
| 10 |
+
a hidden ring. Unlike traditional homomorphic encryption where users can only passively perform
|
| 11 |
+
ciphertext addition or multiplication, the homomorphic functional encryption retains homomorphic
|
| 12 |
+
addition and scalar multiplication properties, but also allows for the user’s inputs through polynomial
|
| 13 |
+
variables. The homomorphic encryption key consists of a pair of values, one used to create the hidden
|
| 14 |
+
ring and the other taken from this ring to form an encryption operator for modular multiplication en-
|
| 15 |
+
cryption. The proposed homomorphic encryption can be applied to any polynomials over a finite field,
|
| 16 |
+
with their coefficients considered as their privacy. We denote the polynomials before homomorphic
|
| 17 |
+
encryption as plain polynomials and after homomorphic encryption as cipher polynomials. A cipher
|
| 18 |
+
polynomial can be evaluated with variables from the finite field, GF(p), by calculating the monomials
|
| 19 |
+
of variables modulo a prime p. These properties allow functional homomorphic encryption to be
|
| 20 |
+
used for public key encryption of certain asymmetric cryptosystems, such as Multivariate Public Key
|
| 21 |
+
Cryptography schemes or MPKC to hide the structure of its central map construction. We propose
|
| 22 |
+
a new variant of MPKC with homomorphic encryption of its public key. This variant simplifies
|
| 23 |
+
MPKC central map to two multivariate polynomials constructed from polynomial multiplications,
|
| 24 |
+
applying homomorphic encryption to the map, and changing its decryption from employing inverse
|
| 25 |
+
maps to a polynomial division. We propose to use a single plaintext vector and a noise vector of
|
| 26 |
+
multiple variables to be associated with the central map, in place of the secret plaintext vector to be
|
| 27 |
+
encrypted in MPKC. We call this variant of encrypted MPKC, a Homomorphic Polynomial Public
|
| 28 |
+
Key algorithm or HPPK algorithm. The HPPK algorithm holds the property of indistinguishability
|
| 29 |
+
under the chosen-plaintext attacks or IND-CPA. The overall classical complexity to crack the HPPK
|
| 30 |
+
algorithm is exponential in the size of the prime field GF(p). We briefly report on benchmarking
|
| 31 |
+
performance results using the SUPERCOP toolkit. Benchmarking results demonstrate that HPPK
|
| 32 |
+
offers rather fast performance, which is comparable and in some cases outperforms the NIST PQC
|
| 33 |
+
finalists for key generation, encryption, and decryption.
|
| 34 |
+
Keywords Homomorphic Functional Encryption · Post-Quantum Cryptography · Public-Key Cryptography · PQC ·
|
| 35 |
+
Key Encapsulation Mechanism · KEM · Multivariate Public Key Cryptosystem · MPKC · PQC Performance.
|
| 36 |
+
1
|
| 37 |
+
Introduction
|
| 38 |
+
Homomorphic encryption was first proposed by Rivest et al. in 1978 [1], one year after filing the patent for the
|
| 39 |
+
RSA public key cryptography [2]. Homomorphic encryption commonly refers to privacy encryption for computation
|
| 40 |
+
in an encrypted mode, without knowing the homomorphic key and the decryption procedure. This is noticeably
|
| 41 |
+
different from the cryptographic algorithms used to encrypt data for secure communications or storage with public key
|
| 42 |
+
mechanisms such as RSA [2] and Diffie-Hellman [3], and Elliptic Curve Cryptography [4, 5] to establish the shared key
|
| 43 |
+
for symmetric encryption using algorithms as Advanced Encryption Standard or AES.
|
| 44 |
+
arXiv:2301.11995v1 [cs.CR] 27 Jan 2023
|
| 45 |
+
|
| 46 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 47 |
+
Homomorphic encryption can be classified into partially homomorphic and fully homomorphic. The partially homomor-
|
| 48 |
+
phic encryption supports either multiplicative or additive homomorphic operations, RSA [6] and ElGamal cryptosystems
|
| 49 |
+
[7] are multiplicatively homomorphic; Goldwasser–Micali [8], Benaloh [9], and Paillier [10] are additively homo-
|
| 50 |
+
morphic. The first milestone for fully homomorphic encryption was achieved by Gentry in 2009 using lattice-based
|
| 51 |
+
cryptography [11] to support both addition and multiplication operators in the encrypted mode. Meanwhile, Chan in
|
| 52 |
+
2009 proposed a symmetric homomorphic scheme based on improved Hill Cipher [12]. Kipnis and Hibshoosh proposed
|
| 53 |
+
their symmetric homomorphic scheme in 2012 [13] with a randomization function for non-deterministic encryption.
|
| 54 |
+
Gupta and Sharma proposed their symmetric homomorphic scheme based on linear algebraic computation in 2013 [14].
|
| 55 |
+
Very recently, Li et al. in 2016 proposed a new symmetric homomorphic scheme, called Li-Scheme for outsourcing
|
| 56 |
+
databases [15]. Their scheme, at large, is associated with two finite fields: a secret small field Fq and a big public field
|
| 57 |
+
Fp, with modular exponentiation with its secret base s followed by modular multiplication with plaintext message m.
|
| 58 |
+
Li-Scheme supports both additive and multiplicative operations so it is a full homomorphic encryption. Wang et al.
|
| 59 |
+
performed a cryptoanalysis of the Li-Scheme in 2018 [16] and broke the scheme with certain known plaintext-ciphertext
|
| 60 |
+
pairs. Wang et al. further improved their cryptoanalysis in 2019 and successfully recovered the secret key with the
|
| 61 |
+
ciphertext-only attack using lattice reduction algorithm [17].
|
| 62 |
+
Homomorphic encryption solely focuses on addition and multiplication operations on the encrypted data for plain data
|
| 63 |
+
privacy. However, it would be very interesting to see an extension of homomorphic encryption from data privacy to
|
| 64 |
+
functional privacy with variables to take the user’s inputs in a framework of a public key scheme. It is rarely seen
|
| 65 |
+
that a public key cryptosystem, more precisely quantum-safe public key cryptosystem, is purposely designed with
|
| 66 |
+
careful considerations not only to leverage homomorphic properties of ciphertext addition and scalar multiplication
|
| 67 |
+
but also to take user’s secrets into ciphertext computation. This served as a motivation for our paper. We introduce a
|
| 68 |
+
new Homomorphic Polynomial Public Key encapsulation or HPPK, which is an asymmetric key encapsulation scheme,
|
| 69 |
+
with public keys encrypted using functional homomorphic encryption. HPPK uses multivariate polynomials to not
|
| 70 |
+
only leverage homomorphic properties of addition and scalar multiplication but also allows for encrypting party’s
|
| 71 |
+
input during the ciphertext creation. That is, the public key polynomial coefficients are encrypted using homomorphic
|
| 72 |
+
function to ensure they are never truly public and hide the structure of the public key, at the same time, treating variables
|
| 73 |
+
of the said public key polynomials as user input allows for freedom during the encryption process.
|
| 74 |
+
HPPK cryptosystem has two distinct features, namely, the homomorphic encryption of the public key that allows
|
| 75 |
+
for the user’s input during ciphertext creation, and the use of a hidden ring. HPPK is not the first cryptosystem to
|
| 76 |
+
use hidden structure. For instance, the work of Li et al. describes a cryptosystem with a hidden prime ring [15].
|
| 77 |
+
Another important example is Hidden Field Equations (HFE) cryptosystems. The examples of asymmetric multivariate
|
| 78 |
+
encryption schemes that are based on HFE include [18, 19, 20, 21]. Various signature schemes based on HFE were
|
| 79 |
+
also proposed [22, 23, 24, 25, 26]. In the framework of HFE, the private polynomials as well as the structure they are
|
| 80 |
+
defined over, a field extension, are both hidden using affine transformations.
|
| 81 |
+
The algorithms based on HFE, mentioned above fall in the category of quantum-safe algorithms. More precisely,
|
| 82 |
+
multivariate quantum-safe algorithms. Quantum computing developments have been receiving a lot of focus from the
|
| 83 |
+
academic community as well as industry leaders since Google announced its first quantum advantage in 2019 [27].
|
| 84 |
+
But it was the National Institution of Standards and Technology (NIST) that opened the arena for quantum-resistant
|
| 85 |
+
cryptography, when they started the post-quantum cryptography (PQC) standardization process in November 2017.
|
| 86 |
+
Recently, they have announced third-round finalists which include four key exchange mechanism schemes (KEM) and
|
| 87 |
+
three finalists for digital signatures [28]. Four KEM finalists include code-based Classic McEliece [29], lattice-based
|
| 88 |
+
CRYSTALS-KYBER [30], NTRU [31, 32], and Saber [33] algorithms. At the latest announcement, NIST selected
|
| 89 |
+
CRYSTALS-KYBER to be standardized algorithm for KEM. In addition to the aforementioned finalists for KEM, the
|
| 90 |
+
Multivariate Public Key Cryptosystems or MPKC is worth a special discussion. Algorithms based on multivariate
|
| 91 |
+
polynomial problems are considered to be quantum-safe, but they also make an excellent candidate for homomorphic
|
| 92 |
+
encryption due to the use of multivariate polynomials.
|
| 93 |
+
The framework of MPKC is built on a system of quadratic polynomials. The public key is represented by a central map
|
| 94 |
+
P : Fm
|
| 95 |
+
p → Fℓ
|
| 96 |
+
p with m variables and ℓ polynomials [34]. Many variants of MPKC central map constructions have been
|
| 97 |
+
proposed since Matsumoto and Imai first introduced this cryptosystem in 1988 [35], including single field systems and
|
| 98 |
+
mixed field systems [36]. Single field MPKC includes several Triangular systems and the Oil and Vinegar system since
|
| 99 |
+
Patarin and Goubin in 1997 [37] and unbalanced Oil and Vinegar scheme by Kipnis et. al. in 1999 [18]. The mixed
|
| 100 |
+
field MPKC refers to Matsumoto-Imai system [35] and Hidden Field Equation [38]. In addition, Wang et al. in 2006
|
| 101 |
+
proposed a Medium-Field MPKC scheme [39] and an improved scheme in 2008 [40]. Ding and Schmidt proposed
|
| 102 |
+
Rainbow as a MPKC digital signature scheme in 2005 [25].
|
| 103 |
+
Attacks on MPKC cryptosystems are mainly classified into two categories: algebraic solving attacks and linear algebra
|
| 104 |
+
attacks. Algebra solving attacks attempt to solve the MPKC multivariate equation system from the public key with
|
| 105 |
+
2
|
| 106 |
+
|
| 107 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 108 |
+
ciphertext (z1, z2, . . . , zℓ) to recover the pre-image (x1, x2, . . . , xm). Faugére reported his first attack on MPKC in
|
| 109 |
+
1999[41] and in 2002[42] using Gröber bases (F4), later in 2003 Faugére and Antoine reported their attack on HFE
|
| 110 |
+
Gröber bases (F5). Ding et. al. proposed their new Zhuang-Zi algorithm to solve the multivariate system in 2006 [43].
|
| 111 |
+
In linear algebra attacks, Courtois et al. reported their attack on MPKC using the relinearization technique, aclled XL
|
| 112 |
+
in 2000 [44]. The Minrank attack has been successfully applied by Goubin and Courtois on the single field system in
|
| 113 |
+
2000 [45] and by Kipnis and Patarin on the mixed field system in 1999 [46].
|
| 114 |
+
A new type of polynomial public key has been recently proposed by Kuang in 2021 [47], based on univariate polynomial
|
| 115 |
+
multiplications, by Kuang and Barbeau in 2021 [48, 49, 50], based on multivariate polynomial multiplications with two
|
| 116 |
+
noise functions to increase the public key security against possible public key attacks. The digital signature scheme of
|
| 117 |
+
the multivariate polynomial public key or MPPK has been prosoed by Kuang, Perepechaenko and Barbeau in 2022 [51].
|
| 118 |
+
This paper explores the possibility to combine a new homomorphic encryption to key construction to further enhance
|
| 119 |
+
the security of the MPPK cryptography for key encapsulation mechanism or KEM.
|
| 120 |
+
The proposed HPPK scheme can be also considered as a new variant of MPKC scheme with public keys being
|
| 121 |
+
encrypted using homomorphic functional encryption. We begin by introducing the proposed symmetric homomorphic
|
| 122 |
+
encryption scheme in A New Symmetric Homomorphic Functional Encryption over a Hidden Ring. The proposed
|
| 123 |
+
HPPK algorithm is then discussed in Homomorphic Polynomial Public Key Cryptosystem. We present the reader with
|
| 124 |
+
thorough security analysis of HPPK in HPPK Security Analysis, and report on benchmarking the performance of HPPK
|
| 125 |
+
in Brief Benchmarking Performance. We conclude with Conclusion.
|
| 126 |
+
2
|
| 127 |
+
A New Symmetric Homomorphic Functional Encryption over a Hidden Ring
|
| 128 |
+
In contrast to conventional homomorphic cryptography used for data privacy, in this paper we propose homomorphic
|
| 129 |
+
functional encryption to be applied to the public key in the framework of multivariate asymmetric cryptography. This
|
| 130 |
+
will allow for an asymmetric scheme with encrypted public keys. Moreover, by construction, functional homomorphic
|
| 131 |
+
encryption allows for user’s input during the ciphertext generation procedure. That is, the ciphertext can be created
|
| 132 |
+
with the input of the encrypting party, however, the public key used for encryption is itself encrypted using functional
|
| 133 |
+
homomorphic operator. The decrypting party is the only party that has knowledge of the private key associated
|
| 134 |
+
with the functional homomorphic encryption operator as well as the asymmetric scheme private key. Essentially, the
|
| 135 |
+
homomorphic functional encryption defined in this paper provides a round-trip envelope for a public key encryption.
|
| 136 |
+
In a way, such approach combines three main areas of cryptography, namely, asymmetric cryptography, homomorphic
|
| 137 |
+
encryption, and symmetric cryptography with self-shared key. This phenomenon is illustrated in Fig. 1. In the figure, the
|
| 138 |
+
traditional public key derived from a given assymetric algorithm is called plain public key or PPK, the homomorphically
|
| 139 |
+
encrypted PPK is called cipher public key or CPK. The cipher is produced by evaluating the public key polynomial
|
| 140 |
+
values using a user-selected secret. The decryption would perform in two stages: homomorphic decryption and then
|
| 141 |
+
secret extraction.
|
| 142 |
+
Figure 1: Illustration of a cryptosystem combining asymmetric cryptography, symmetric cryptography with a single
|
| 143 |
+
self-shared key, and homomorphic encryption.
|
| 144 |
+
We begin by introducing the Homomorphic Functional Encryption Operator. In order to allow for the user’s input during
|
| 145 |
+
ciphertext creation, and leverage additive and scalar multiplicative homomorphic features, the functional homomorphic
|
| 146 |
+
3
|
| 147 |
+
|
| 148 |
+
Symmetric
|
| 149 |
+
Encrypt
|
| 150 |
+
0
|
| 151 |
+
Enc
|
| 152 |
+
Crypto
|
| 153 |
+
PPK
|
| 154 |
+
Dec
|
| 155 |
+
Dec
|
| 156 |
+
HPPK
|
| 157 |
+
997
|
| 158 |
+
CPK
|
| 159 |
+
Cipher
|
| 160 |
+
Homomorphic CryptoNovel Homomorphic Functional Encryption over a Hidden Ring
|
| 161 |
+
encryption is applied to polynomials. We discuss the reason for this further. Hence, when introducing the said operator
|
| 162 |
+
we assume that it will be applied to polynomials.
|
| 163 |
+
2.1
|
| 164 |
+
Homomorphic Encryption Operator
|
| 165 |
+
Let S be a positive integer, and R be a randomly chosen value such that R ∈ ZS and gcd(R, S) = 1. We propose a
|
| 166 |
+
Homomorphic Functional Encryption Operator ˆE(R,S), with a secret homomorphic key being a tuple (R, S). The values
|
| 167 |
+
S and R are never shared.
|
| 168 |
+
In its general form, the encryption operator is defined as a multiplicative operation modulo a hidden value S as
|
| 169 |
+
ˆE(R,S)(f) = (R ◦ f) mod S,
|
| 170 |
+
(1)
|
| 171 |
+
where f denotes any univariate or multivariate polynomial f = �k
|
| 172 |
+
i=0 fiXi, over Fp with Xi being its monomials. The
|
| 173 |
+
encryption operator acts on the coefficients of f, which we refer to as plain coefficients. This produces what we call
|
| 174 |
+
cipher coefficients, denoted hi, as
|
| 175 |
+
ˆE(R,S)fi = Rfi mod S = hi
|
| 176 |
+
for every i. Similarly, we can define a Homomorphic Functional Decryption Operator as
|
| 177 |
+
ˆE(R−1,S)h = (R−1 ◦ h) mod S.
|
| 178 |
+
(2)
|
| 179 |
+
Such operator decrypts the coefficients of the polynomial h. That is, it successfully decrypts the cipher coefficients
|
| 180 |
+
back to the plain coefficients. More precisely,
|
| 181 |
+
ˆE(R−1,S)hi = R−1(Rfi) mod S = (R−1R)fi mod S = fi
|
| 182 |
+
for any i.
|
| 183 |
+
The above defined homomorphic operator ˆE(R,S) holds following homomorphic properties:
|
| 184 |
+
• ˆE(R,S) is additively homomorphic: if a and b are two plain constants, then ˆE(R,S)(a+b) = R(a+b) mod S =
|
| 185 |
+
Ra + Rb mod S = ˆE(R,S)a + ˆE(R,S)b;
|
| 186 |
+
• ˆE(R,S) is scalar multiplicatively homomorphic: if a is a plain constant and x is a variable, then ˆE(R,S)(ax) =
|
| 187 |
+
R(ax) = (Ra)x = [ ˆE(R,S)a]x.
|
| 188 |
+
Thus, the operator ˆE(R,S) offers partially homomorphic encryption. We leave it to the reader to verify that the
|
| 189 |
+
same properties hold true for the proposed homomorphic functional decryption operator ˆE(R−1,S). Note that these
|
| 190 |
+
homomorphic properties come from linearity, and thus are natural to polynomials. Indeed, polynomials hold additive
|
| 191 |
+
and scalar multiplicative properties through their coefficients. Moreover, polynomials can be defined and evaluated with
|
| 192 |
+
coefficients in a field or a ring, different from a field or a ring for variables. We leverage this property, and thus, apply
|
| 193 |
+
the functional homomorphic encryption to public key cryptosystems with polynomial public keys.
|
| 194 |
+
2.2
|
| 195 |
+
Homomorphically Encrypted Polynomials
|
| 196 |
+
As we have previously stated, the proposed homomorphic encryption is applicable to all polynomials over a ring Zp
|
| 197 |
+
or finite field Fp characterized by a prime p. In this work, when we refer to polynomials, we imply that the plain
|
| 198 |
+
polynomials, to be encrypted, are considered modulo p, unless stated otherwise. A generic multivariate polynomial has
|
| 199 |
+
the following form
|
| 200 |
+
p(x1, . . . , xm) =
|
| 201 |
+
ℓ1
|
| 202 |
+
�
|
| 203 |
+
j1=1
|
| 204 |
+
· · ·
|
| 205 |
+
ℓm
|
| 206 |
+
�
|
| 207 |
+
jm=1
|
| 208 |
+
pij1...jmxj1
|
| 209 |
+
1 · · · xjm
|
| 210 |
+
m .
|
| 211 |
+
Alternatively, let Xj = xj1
|
| 212 |
+
1 · · · xjm
|
| 213 |
+
m denote the monomials of such polynomial, then
|
| 214 |
+
p(x1, . . . , xm) =
|
| 215 |
+
L
|
| 216 |
+
�
|
| 217 |
+
j=1
|
| 218 |
+
pjXj,
|
| 219 |
+
(3)
|
| 220 |
+
where L denotes the total number of terms.
|
| 221 |
+
To successfully encrypt and decrypt any polynomial p(x1, . . . , xm) using the functional homomorphic encryption and
|
| 222 |
+
decryption operators defined in Eq. (1) and (2) respectively, the following conditions must be met:
|
| 223 |
+
4
|
| 224 |
+
|
| 225 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 226 |
+
• The monomials Xj are to be computed as Xj = (Xj mod p). The values of monomials reduced modulo p are
|
| 227 |
+
used to compute the value of the polynomial p(x1, . . . , xm).
|
| 228 |
+
• The homomorphic secret key value S should satisfy the bit length condition: |S|2 > 2|p|2 + |L|2.
|
| 229 |
+
The first condition ensures that polynomial p(x1, . . . , xm) is evaluated as if the mononials Xj are new variables over
|
| 230 |
+
Fp, Indeed, the operator ˆE(R,S) is applied to the polynomial p(x1, . . . , xm) in the following way
|
| 231 |
+
ˆE(R,S)p(x1, . . . , xm) =
|
| 232 |
+
L
|
| 233 |
+
�
|
| 234 |
+
j=1
|
| 235 |
+
[Rpj mod S]Xj.
|
| 236 |
+
(4)
|
| 237 |
+
Such encrypted polynomial can be computed as
|
| 238 |
+
L
|
| 239 |
+
�
|
| 240 |
+
j=1
|
| 241 |
+
[Rpj mod S](Xj mod p) = ¯p.
|
| 242 |
+
Note that the computed value was not reduced modulo any integer, nor is the arithmetic performed modulo any integer.
|
| 243 |
+
Thus, the user’s input through monomials Xj remains intact and can be decrypted correctly. Let the plain value of the
|
| 244 |
+
polynomial with user’s input, that is, if the polynomial was not encrypted with ˆE(R,S), be
|
| 245 |
+
ˆp =
|
| 246 |
+
L
|
| 247 |
+
�
|
| 248 |
+
j=1
|
| 249 |
+
pjXj mod p.
|
| 250 |
+
To ensure successful decryption, the second condition must be met. If the size of S is sufficiently large, the values of
|
| 251 |
+
coefficients and variables remains the same after decryption, and it is possible to recover ˆp. Indeed,
|
| 252 |
+
ˆE(R−1,S)¯p =
|
| 253 |
+
L
|
| 254 |
+
�
|
| 255 |
+
j=1
|
| 256 |
+
[R−1Rpj mod S](Xj mod p) =
|
| 257 |
+
L
|
| 258 |
+
�
|
| 259 |
+
j=1
|
| 260 |
+
pj(Xj mod p),
|
| 261 |
+
(5)
|
| 262 |
+
and then the value �L
|
| 263 |
+
j=1 pj(Xj mod p) can be reduced modulo p to yield �L
|
| 264 |
+
j=1 pjXj mod p = ˆp.
|
| 265 |
+
To elaborate more on this, we present the reader with two examples of functional homomorphic encryption of linear
|
| 266 |
+
and quadratic polynomials.
|
| 267 |
+
2.2.1
|
| 268 |
+
Linear Polynomials
|
| 269 |
+
Recall, that we encrypt the coefficients of the polynomials defined over Fp, which successfully maps polynomials from
|
| 270 |
+
Fp[x1, . . . , xm] to ZS[x1, . . . , xm], leaving x1, . . . , xm ∈ Fp. A generic linear multivariate polynomial over a finite
|
| 271 |
+
field Fp has form
|
| 272 |
+
p(x1, x2, . . . , xm) =
|
| 273 |
+
m
|
| 274 |
+
�
|
| 275 |
+
j=1
|
| 276 |
+
pjxj mod p.
|
| 277 |
+
(6)
|
| 278 |
+
Conventionally, in the asymmetric encryption schemes, the public key inherits mathematical logic from the private
|
| 279 |
+
key, making it vulnerable. Hence, if public key consists of polynomials, we wish to encrypt the coefficients of the said
|
| 280 |
+
polynomials using functional homomorphic operator, to hide the mathematical logic. In this case we share the cipher
|
| 281 |
+
public key, encrypted using functional homomorphic operator. To ensure that the ciphertext can be still created in the
|
| 282 |
+
framework of asymmetric public key scheme, the variables in the public key polynomials are used for user’s input.
|
| 283 |
+
They are not encrypted using homomorphic encryption, but only using the encryption procedure from the asymmetric
|
| 284 |
+
scheme. Such variable values can consist of the plaintext only, or plaintext and noise used for obscurity.
|
| 285 |
+
Applying homomorphic encryption operator to the above linear polynomial, defined in Eq.(6), produces a cipher linear
|
| 286 |
+
polynomial with coefficients in a hidden ring ZS, and variables in Fp :
|
| 287 |
+
P(x1, x2, . . . , xm) = ˆE(R,S)p(x1, x2, . . . , xm)
|
| 288 |
+
=
|
| 289 |
+
m
|
| 290 |
+
�
|
| 291 |
+
j=1
|
| 292 |
+
(Rpj mod S)xj =
|
| 293 |
+
m
|
| 294 |
+
�
|
| 295 |
+
j=1
|
| 296 |
+
Pjxj.
|
| 297 |
+
(7)
|
| 298 |
+
5
|
| 299 |
+
|
| 300 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 301 |
+
While the plain coefficients, pj, are encrypted into cipher coefficients, Pj, the cipher polynomial P(x1, x2, . . . , xm)
|
| 302 |
+
can still be evaluated with a set of chosen values r1, . . . , rm ∈ Fp to produce value ¯P
|
| 303 |
+
¯P = P(r1, r2, . . . , rm) =
|
| 304 |
+
m
|
| 305 |
+
�
|
| 306 |
+
j=1
|
| 307 |
+
Pj(rj mod p).
|
| 308 |
+
(8)
|
| 309 |
+
Let the value ¯p = �m
|
| 310 |
+
i=1 pjrj mod p, be the original ciphertext of the asymmetric scheme. However, it is encrypted
|
| 311 |
+
into the value ¯P using homomorphic encryption. To recover the plain polynomial value, that is, decrypt the cipher
|
| 312 |
+
coefficients, into the plain coefficients and evaluate polynomial modulo p, we first apply the functional homomorphic
|
| 313 |
+
decryption operator ˆE(R−1,S) to get ˆE(R−1,S) ¯P, and then reduce this value modulo p. More precisely,
|
| 314 |
+
ˆE(R−1,S) ¯P =
|
| 315 |
+
m
|
| 316 |
+
�
|
| 317 |
+
j=1
|
| 318 |
+
[R−1Pj mod S](rj mod p) =
|
| 319 |
+
m
|
| 320 |
+
�
|
| 321 |
+
i=1
|
| 322 |
+
pj(rj mod p),
|
| 323 |
+
which reduced modulo p is
|
| 324 |
+
m
|
| 325 |
+
�
|
| 326 |
+
i=1
|
| 327 |
+
pjrj mod p = ¯p.
|
| 328 |
+
In a framework of asymmetric scheme with functional homomorphic encryption element, polynomials such as in Eq. (6)
|
| 329 |
+
are associated with plain coefficients, that is, the original public keys. The cipher polynomials have form as in Eq. (7),
|
| 330 |
+
with coefficients being encrypted from the plain public keys, using homomorphic encryption. Such cipher public keys
|
| 331 |
+
are shared, and the plain public keys are stored securely and never shared. The ciphertext in this combined algorithm
|
| 332 |
+
is of the form as in Eq. (8). The decrypting party first needs to decrypt the ciphertext to nullify the homomorphic
|
| 333 |
+
encryption of the public key, as shown in Eq. (8). Afterwards, the decryption party can perform decryption procedure
|
| 334 |
+
that corresponds to the given asymmetric scheme.
|
| 335 |
+
2.2.2
|
| 336 |
+
Quadratic Polynomials
|
| 337 |
+
Multivariate quadratic polynomials serve as the foundation of Multivariate Public Key Cryptosystem or MPKC[34,
|
| 338 |
+
52, 53]. Thus, we want to pay special attention on applications of functional homomorphic encryption on multivariate
|
| 339 |
+
quadratic polynomials. A general quadratic multivariate polynomial p(x1, x2, . . . , xn) over a finite field Fp has the
|
| 340 |
+
following form
|
| 341 |
+
p(x1, x2, . . . , xm) =
|
| 342 |
+
m
|
| 343 |
+
�
|
| 344 |
+
1≤i≤j
|
| 345 |
+
pijxixj mod p,
|
| 346 |
+
(9)
|
| 347 |
+
where the coefficients pij are considered as the privacy constants for this polynomial function so they must be hidden
|
| 348 |
+
from public. This is done by applying the functional homomorphic encryption operator to this polynomial as follows
|
| 349 |
+
P(x1, x2, . . . , xm) = ˆE(R,S)p(x1, x2, . . . , xm)
|
| 350 |
+
(10)
|
| 351 |
+
=
|
| 352 |
+
m
|
| 353 |
+
�
|
| 354 |
+
1≤i≤j
|
| 355 |
+
(Rpij mod S)xixj =
|
| 356 |
+
m
|
| 357 |
+
�
|
| 358 |
+
1≤i≤j
|
| 359 |
+
Pijxixj.
|
| 360 |
+
(11)
|
| 361 |
+
(12)
|
| 362 |
+
Here, the encrypted coefficients are defined over the hidden ring ZS, however, all the variables x1, . . . , xm are still
|
| 363 |
+
elements of the field Fp. As we have previously mentioned, we refer to the coefficients pij as plain coefficients, and Pij
|
| 364 |
+
are referred to as cipher coefficients. Similarly, P(x1, x2, . . . , xm) and p(x1, x2, . . . , xm) are referred to as cipher and
|
| 365 |
+
plain polynomials respectively.
|
| 366 |
+
While coefficients are encrypted with homomorphic encryption operator, the polynomial P(x1, x2, . . . , xm) still accepts
|
| 367 |
+
user’s input. That is, the cipher polynomial value ¯P can be still calculated with a chosen set of r1, . . . , rm from the
|
| 368 |
+
field Fp as follows
|
| 369 |
+
¯P = P(r1, r2, . . . , rm) =
|
| 370 |
+
m
|
| 371 |
+
�
|
| 372 |
+
1≤i≤j
|
| 373 |
+
Pij(xixj mod p).
|
| 374 |
+
(13)
|
| 375 |
+
Note that the computed value ¯P is an integer. The arithmetic to compute such value was not performned modulo any
|
| 376 |
+
integer. The plain polynomial values are securely hidden through the hidden ring ZS. To recover the plain polynomial
|
| 377 |
+
6
|
| 378 |
+
|
| 379 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 380 |
+
equation, decryption opertor ˆE(R−1,S) can be applied to the cipher polynomial value ¯P, followed by reduction mod p:
|
| 381 |
+
ˆE(R−1,S) ¯P = R−1 ¯P mod S, then
|
| 382 |
+
(14)
|
| 383 |
+
(R−1 ¯P mod S) mod p = p(r1, r2, . . . , rm) = ¯p.
|
| 384 |
+
(15)
|
| 385 |
+
The value ¯p is the plain polynomial value for the chosen values of variables x1, . . . , xm by the encrypting party.
|
| 386 |
+
Similar to the linear case, the public key of the asymmetric scheme consist of quadratic polynomials of the form (9), to
|
| 387 |
+
be encrypted using homomorphic functional encryption operators. The cipher public keys are of the form (10). Such
|
| 388 |
+
cipher public keys are the ones shared, while the plain public keys are not. The ciphertext in the combined scheme is of
|
| 389 |
+
the form (13), which needs to be decrypted back to the plain value. For that a homomorphic decryption operator is
|
| 390 |
+
applied, as in Eq (14), and the plain ciphertext value is recovered.
|
| 391 |
+
3
|
| 392 |
+
Homomorphic Polynomial Public Key Cryptosystem
|
| 393 |
+
3.1
|
| 394 |
+
Brief Summary of MPKC
|
| 395 |
+
An interested reader can find the detail description of MPKC schemes by Ding and Yang [34]. In this section, we
|
| 396 |
+
briefly outline the basic mechanism of MPKC algorithms. The framework mainly consists of ℓ quadratic multivariate
|
| 397 |
+
polynomials
|
| 398 |
+
p1(x1, . . . , xm), p2(x1, . . . , xm), . . . , pℓ(x1, . . . , xm)
|
| 399 |
+
in m variables over finite field Fp. Each polynomial pk(x1, . . . , xm) can be written in its expanded form as
|
| 400 |
+
pk(x1, . . . , xm) =
|
| 401 |
+
m
|
| 402 |
+
�
|
| 403 |
+
i<j=1
|
| 404 |
+
pijkxixj
|
| 405 |
+
(16)
|
| 406 |
+
for k = 1, 2, . . . , l. In the literature Eq.(16) is generally written in a matrix form as
|
| 407 |
+
pk(x1, . . . , xm) = (x1, . . . , xm)
|
| 408 |
+
�
|
| 409 |
+
�
|
| 410 |
+
�
|
| 411 |
+
�
|
| 412 |
+
�
|
| 413 |
+
p11k
|
| 414 |
+
p12k
|
| 415 |
+
. . .
|
| 416 |
+
p1mk
|
| 417 |
+
. . .
|
| 418 |
+
. . .
|
| 419 |
+
. . .
|
| 420 |
+
. . .
|
| 421 |
+
pi1k
|
| 422 |
+
pi2k
|
| 423 |
+
. . .
|
| 424 |
+
pimk
|
| 425 |
+
. . .
|
| 426 |
+
. . .
|
| 427 |
+
. . .
|
| 428 |
+
. . .
|
| 429 |
+
pm1k
|
| 430 |
+
pm2k
|
| 431 |
+
. . .
|
| 432 |
+
pmmk
|
| 433 |
+
�
|
| 434 |
+
�
|
| 435 |
+
�
|
| 436 |
+
�
|
| 437 |
+
� (x1, . . . , xm)T
|
| 438 |
+
(17)
|
| 439 |
+
briefly expressed as,
|
| 440 |
+
pk(x1, . . . , xm) = ⃗x · Pk · ⃗xT ,
|
| 441 |
+
where Pk is an m × m square matrix. Considering all ℓ polynomials, we can write the MPKC map from Fm
|
| 442 |
+
p to Fℓ
|
| 443 |
+
p as a
|
| 444 |
+
3-dimensional matrix P[ℓ][m][m], which is a trapdoor called the central map. The central map is selected to be easily
|
| 445 |
+
invertible. In order to protect this central map and its structure, two affine linear invertible maps T and S are chosen to
|
| 446 |
+
construct the MPKC public key:
|
| 447 |
+
• Public Key: ¯P = T ◦ P ◦ S.
|
| 448 |
+
• Private Key: (T, P, S).
|
| 449 |
+
The MPKC encryption procedure simply to evaluates ℓ polynomials over the field Fp as
|
| 450 |
+
⃗z = ¯P(⃗x) = {z1 = p1(x1, . . . , xm), z2 = p2(x1, . . . , xm), . . . , zℓ = pℓ(x1, . . . , xm)}
|
| 451 |
+
(18)
|
| 452 |
+
and decryption works as follows
|
| 453 |
+
⃗u = T −1(⃗z),⃗v = P−1(⃗u), ⃗x = S−1(⃗v).
|
| 454 |
+
The major step to use MPKC is to construct the invertible central map P over a finite field Fp to perform a map:
|
| 455 |
+
Fm
|
| 456 |
+
p → Fℓ
|
| 457 |
+
p.
|
| 458 |
+
There may be a potential way to enhance the security of MPKC cryptosystem by applying the proposed homomorphic
|
| 459 |
+
encryption on its map: Fm
|
| 460 |
+
p → Fℓ
|
| 461 |
+
p. The homomorphic encryption effectively hides the public key construction logic
|
| 462 |
+
over a hidden ring ZS. In this case, an encryption key Rk is required for each quadratic polynomial pk(x1, . . . , xm),
|
| 463 |
+
with value Rk chosen over the hidden ring ZS for all k. Hence, there are a total of ℓ encryption keys for MPKC. The
|
| 464 |
+
MPKC encryption in this case is almost the same as the original MPKC encryption. The ciphertext (z1, z2, . . . , zℓ) is to
|
| 465 |
+
be homomorphically decrypted to create original multivariate equation system, as illustrated in Eq.(18). This means,
|
| 466 |
+
7
|
| 467 |
+
|
| 468 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 469 |
+
Eq.(18) is hidden under the hidden ring ZS. On one hand, applying the homomorphic encryption would increase the
|
| 470 |
+
public key size for MPKC, however, the number of variables can be reduced due to the homomorphic encryption.
|
| 471 |
+
In this paper, we are not going to further explore this variant of MPKC schemes but we will focus on another variant of
|
| 472 |
+
MPKC, called HPPK which we propose in the new section.
|
| 473 |
+
3.2
|
| 474 |
+
HPPK Encapsulation
|
| 475 |
+
We propose a new variant of an MPKC scheme, called the Homomorphic Polynomial Public Key or HPPK, with the
|
| 476 |
+
following considerations:
|
| 477 |
+
• The vector on the left hand side of the map P is treated as ⃗xl and the vector on the right hand side as ⃗xr;
|
| 478 |
+
• The vector ⃗xl is replaced with ⃗xl = (x0, x1, x2, . . . , xn), considering ⃗xl as a message vector in a polynomial
|
| 479 |
+
vector space represented by a basis {x0, x1, x2, . . . , xn} for a message variable x and ⃗xr = (x1, . . . , xm) as a
|
| 480 |
+
noise vector for noise variables x1, . . . , xm;
|
| 481 |
+
• The proposed homomorphic encryption is applied to the central map P, mapping the elements from Fp → ZS:
|
| 482 |
+
¯P = ˆE(R,S)P
|
| 483 |
+
and the decryption is de-mapping from ZS → Fp:
|
| 484 |
+
P = ˆE(R−1,S) ¯P mod p
|
| 485 |
+
• The number of polynomials is reduced to ℓ = 2;
|
| 486 |
+
• The decryption mechanism is changed from inverting maps to modular division, which automatically cancels
|
| 487 |
+
the noise used for obscurity.
|
| 488 |
+
3.2.1
|
| 489 |
+
Key Construction
|
| 490 |
+
Without loss of generality, we change the notation of the unencrypted central map to P. Under the above considerations,
|
| 491 |
+
the central map P consists of two multivariate polynomials
|
| 492 |
+
p1(x, x1, x2, . . . , xm) = (1, x1, . . . , xn)
|
| 493 |
+
�
|
| 494 |
+
�
|
| 495 |
+
�
|
| 496 |
+
�
|
| 497 |
+
�
|
| 498 |
+
�
|
| 499 |
+
�
|
| 500 |
+
p011
|
| 501 |
+
p021
|
| 502 |
+
. . .
|
| 503 |
+
p0m1
|
| 504 |
+
p111
|
| 505 |
+
p121
|
| 506 |
+
. . .
|
| 507 |
+
p1m1
|
| 508 |
+
. . .
|
| 509 |
+
. . .
|
| 510 |
+
. . .
|
| 511 |
+
. . .
|
| 512 |
+
pi11
|
| 513 |
+
pi21
|
| 514 |
+
. . .
|
| 515 |
+
pim1
|
| 516 |
+
. . .
|
| 517 |
+
. . .
|
| 518 |
+
. . .
|
| 519 |
+
. . .
|
| 520 |
+
pn11
|
| 521 |
+
pn21
|
| 522 |
+
. . .
|
| 523 |
+
pnm1
|
| 524 |
+
�
|
| 525 |
+
�
|
| 526 |
+
�
|
| 527 |
+
�
|
| 528 |
+
�
|
| 529 |
+
�
|
| 530 |
+
�
|
| 531 |
+
(x1, x2, . . . , xm)T ,
|
| 532 |
+
(19)
|
| 533 |
+
and
|
| 534 |
+
p2(x, x1, x2, . . . , xm) = (1, x1, . . . , xn)
|
| 535 |
+
�
|
| 536 |
+
�
|
| 537 |
+
�
|
| 538 |
+
�
|
| 539 |
+
�
|
| 540 |
+
�
|
| 541 |
+
�
|
| 542 |
+
p012
|
| 543 |
+
p122
|
| 544 |
+
. . .
|
| 545 |
+
p0m2
|
| 546 |
+
p112
|
| 547 |
+
p122
|
| 548 |
+
. . .
|
| 549 |
+
p1m2
|
| 550 |
+
. . .
|
| 551 |
+
. . .
|
| 552 |
+
. . .
|
| 553 |
+
. . .
|
| 554 |
+
pi12
|
| 555 |
+
pi22
|
| 556 |
+
. . .
|
| 557 |
+
pim2
|
| 558 |
+
. . .
|
| 559 |
+
. . .
|
| 560 |
+
. . .
|
| 561 |
+
. . .
|
| 562 |
+
pn12
|
| 563 |
+
pn22
|
| 564 |
+
. . .
|
| 565 |
+
pnm2
|
| 566 |
+
�
|
| 567 |
+
�
|
| 568 |
+
�
|
| 569 |
+
�
|
| 570 |
+
�
|
| 571 |
+
�
|
| 572 |
+
�
|
| 573 |
+
(x1, x2, . . . , xm)T .
|
| 574 |
+
(20)
|
| 575 |
+
Note that the matrix maps P1 and P2 are of size (n + 1) × m, thus, no longer square.
|
| 576 |
+
The construction of
|
| 577 |
+
p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) can alternatively be achieved with polynomial multiplications
|
| 578 |
+
p1(x, x1, . . . , xm) = b(x, x1, . . . , xm)f1(x)
|
| 579 |
+
(21)
|
| 580 |
+
p2(x, x1, . . . , xm) = b(x, x1, . . . , xm)f2(x),
|
| 581 |
+
where the base multivariate polynomial b(x, x1, x2, . . . , xm) and univariate polynomials f1(x) and f2(x) have the
|
| 582 |
+
following generic forms
|
| 583 |
+
b(x, x1, . . . , xm) =
|
| 584 |
+
nb
|
| 585 |
+
�
|
| 586 |
+
i=0
|
| 587 |
+
m
|
| 588 |
+
�
|
| 589 |
+
j=1
|
| 590 |
+
bijxixj
|
| 591 |
+
(22)
|
| 592 |
+
f1(x) =
|
| 593 |
+
λ
|
| 594 |
+
�
|
| 595 |
+
i=0
|
| 596 |
+
f1ixi
|
| 597 |
+
f2(x) =
|
| 598 |
+
λ
|
| 599 |
+
�
|
| 600 |
+
i=0
|
| 601 |
+
f2ixi.
|
| 602 |
+
8
|
| 603 |
+
|
| 604 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 605 |
+
Here, nb and λ are orders of base multivariate polynomial and univariate polynomials with respect to message variable
|
| 606 |
+
x respectively. Without loss of generality, we assume that the univariate polynomials f1(x) and f2(x) are solvable, in
|
| 607 |
+
other words λ < 5. Using Eq.(21) and (22), we can express
|
| 608 |
+
p1(x, x1, . . . , xm) =
|
| 609 |
+
n
|
| 610 |
+
�
|
| 611 |
+
i=0
|
| 612 |
+
m
|
| 613 |
+
�
|
| 614 |
+
j=1
|
| 615 |
+
pij1xixj = ⃗xl · P1 · ⃗xr
|
| 616 |
+
(23)
|
| 617 |
+
p2(x, x1, . . . , xm) =
|
| 618 |
+
n
|
| 619 |
+
�
|
| 620 |
+
i=0
|
| 621 |
+
m
|
| 622 |
+
�
|
| 623 |
+
j=1
|
| 624 |
+
pij2xixj = ⃗xl · P2 · ⃗xr,
|
| 625 |
+
with pij1 = �
|
| 626 |
+
s+t=i bsjf1t and pij2 = �
|
| 627 |
+
s+t=i bsjf2t being the coefficients, and n = nb + λ. It is apparent that
|
| 628 |
+
the plain central map P as shown in Eq.(19) and Eq.(20) expanded as Eq.(23) inherits a lot of structure. Given
|
| 629 |
+
that the components of the central map are private key elements, the map in its unaltered form is not secure against
|
| 630 |
+
potential attacks such as polynomial factorization, root finding, etc. To secure the central map, we apply functional
|
| 631 |
+
homomorphic encryption operator to the plain central map by acting with ˆE(R1,S) on p1(x, x1, . . . , xm) and ˆE(R2,S) on
|
| 632 |
+
p2(x, x1, . . . , xm). To be more precise, the cipher central map consists of two polynomials
|
| 633 |
+
P1(x, x1, . . . , xm) =
|
| 634 |
+
n
|
| 635 |
+
�
|
| 636 |
+
i=0
|
| 637 |
+
m
|
| 638 |
+
�
|
| 639 |
+
j=1
|
| 640 |
+
(R1pij1 mod S)xixj = ⃗xl · P1 · ⃗xr
|
| 641 |
+
(24)
|
| 642 |
+
P2(x, x1, . . . , xm) =
|
| 643 |
+
n
|
| 644 |
+
�
|
| 645 |
+
i=0
|
| 646 |
+
m
|
| 647 |
+
�
|
| 648 |
+
j=1
|
| 649 |
+
(R2pij2 mod S)xixj = ⃗xl · P2 · ⃗xr.
|
| 650 |
+
We set public key to be the cipher central map P, while private key consists of the homomorphic operators, the hidden
|
| 651 |
+
ring, together with univariate polynomials:
|
| 652 |
+
• Security parameter: the prime finite field Fp which is agreed on before the key generation procedure.
|
| 653 |
+
• Private Key:
|
| 654 |
+
◦ hidden ring ZS with a randomly selected S for the required bit length;
|
| 655 |
+
◦ homomorphic encryption key values R1 and R2 chosen from ZS;
|
| 656 |
+
◦ univariate polynomials f1(x) and f2(x) with coefficients randomly selected from FS;
|
| 657 |
+
• Public Key: the map P, consisting of
|
| 658 |
+
◦P1(⃗xl, ⃗xr) = ⃗xl · P1 · ⃗xr
|
| 659 |
+
◦P2(⃗xl, ⃗xr) = ⃗xl · P2 · ⃗xr
|
| 660 |
+
3.2.2
|
| 661 |
+
Encryption
|
| 662 |
+
Encryption is straightforward by determining the value for the secret x and randomly choosing values for the noise
|
| 663 |
+
variables x1, . . . , xm over the field Fp and evaluating ciphertext integer values ¯P1 and ¯P2. That is, the ciphertext
|
| 664 |
+
consists of two integer values C = ( ¯P1, ¯P2), where
|
| 665 |
+
¯P1 =
|
| 666 |
+
n
|
| 667 |
+
�
|
| 668 |
+
i=0
|
| 669 |
+
m
|
| 670 |
+
�
|
| 671 |
+
j=1
|
| 672 |
+
Pij1(xjxi mod p)
|
| 673 |
+
(25)
|
| 674 |
+
¯P2 =
|
| 675 |
+
n
|
| 676 |
+
�
|
| 677 |
+
i=0
|
| 678 |
+
m
|
| 679 |
+
�
|
| 680 |
+
j=1
|
| 681 |
+
Pij2(xjxi mod p).
|
| 682 |
+
Here, Pij1 and Pij2 denote the cipher coefficients encrypted with the homomorphic encryption operators. Note that the
|
| 683 |
+
cipher polynomials have coefficients in the hidden ring ZS, and all monomial calculations are performed mod p, the rest
|
| 684 |
+
of the arithmetic is performed over integers. The values ¯P1, and ¯P2 are integers forming the ciphertext C = {P1, P2}.
|
| 685 |
+
3.2.3
|
| 686 |
+
Decryption
|
| 687 |
+
It is easy to verify that the HPPK map as in Eq.(19) and Eq.(20), under construction as shown in Eq.(21), holds a
|
| 688 |
+
division invariant property on the multiplicand or the base multivariate polynomial b(x, x1, x2, . . . , xm). Indeed,
|
| 689 |
+
p1(x, x1, . . . , xm)
|
| 690 |
+
p2(x, x1, . . . , xm) = b(x, x1, . . . , xm)f1(x)
|
| 691 |
+
b(x, x1, . . . , xm)f2(x) = f1(x)
|
| 692 |
+
f2(x).
|
| 693 |
+
9
|
| 694 |
+
|
| 695 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 696 |
+
The first step in the decryption process is to apply the functional homomorphic decryption operator to the cipher-
|
| 697 |
+
text to recover plain polynomial values ¯p1 and ¯p2, which are evaluation results of plain multivariate polynomials
|
| 698 |
+
p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) at the chosen message and noises respectively. This can be done as
|
| 699 |
+
ˆE(R−1
|
| 700 |
+
1
|
| 701 |
+
,S) ¯P1 = p1(x, x1, . . . , xm) = ¯p1
|
| 702 |
+
ˆE(R−1
|
| 703 |
+
2
|
| 704 |
+
,S) ¯P2 = p2(x, x1, . . . , xm) = ¯p2.
|
| 705 |
+
These values are used to compute the ratio K modulo p of the form
|
| 706 |
+
K = ¯p1
|
| 707 |
+
¯p2
|
| 708 |
+
= p1(x, x1, . . . , xm)
|
| 709 |
+
p2(x, x1, . . . , xm) = f1(x)
|
| 710 |
+
f2(x) mod p
|
| 711 |
+
(26)
|
| 712 |
+
Note that the noise vector ⃗xr is automatically eliminated through the division. The secret x can then be found from
|
| 713 |
+
Eq.(26) by radicals if f1(x) and f2(x) are solvable such as linear or quadratic polynomials.
|
| 714 |
+
Note that when λ > 1, an extra 8-bit flag σ should be added to the plaintext to distinguish the correct plaintext during
|
| 715 |
+
the decryption procedure. We propose a formatted plaintext X = (σ|x), with σ to be a one byte flag. That is, σ is
|
| 716 |
+
concatenated with x, such that the most significant 8 bits of X are set as σ and the remaining bits as x. The flag σ
|
| 717 |
+
can be generated by a cyclic redundancy check or CRC with the secret x. There are different CRC algorithms such as
|
| 718 |
+
CRC-8, CRC-32, etc. 8 bits of CRC codes should be sufficient to make a right decision from the roots obtained during
|
| 719 |
+
decryption. After decryption with successful flag verification, the shared secret would be established by removing the
|
| 720 |
+
most significant 8 bits of the obtained value X. Note that the field size should account for the flag σ. In this work,
|
| 721 |
+
however, we focus mainly on the case λ = 1.
|
| 722 |
+
This division invariant property is the foundation for the HPPK encapsulation to be indistinguishable under chosen
|
| 723 |
+
plaintext attacks.
|
| 724 |
+
3.3
|
| 725 |
+
A Toy Example
|
| 726 |
+
We demonstrate how HPPK works with a toy example.
|
| 727 |
+
3.3.1
|
| 728 |
+
Key Pair Generation
|
| 729 |
+
Considering a prime field F13 with the prime p = 13 and two noise variables x1, x2 for the simplicity of the
|
| 730 |
+
demonstration purpose only, we can choose the hidden ring characterized by an integer of length > 12 bits. The private
|
| 731 |
+
key consists of the following values:
|
| 732 |
+
• S = 6798, R1 = 4267, R2 = 6475
|
| 733 |
+
• f1(x) = 4 + 9x
|
| 734 |
+
• f2(x) = 10 + 7x
|
| 735 |
+
• B(x, x1, x2) = (8 + 7x)x1 + (5 + 11x)x2 (note: just for key pair construction procedure; this polynomial is
|
| 736 |
+
not stored in the memory)
|
| 737 |
+
The plain public key or PPK is simply constructed as
|
| 738 |
+
• P1(x, x1, x2) = f1(x)B(x, x1, x2) mod 13 = x1(6 + 9x + 11x2) + x2(7 + 11x + 8x2),
|
| 739 |
+
• P2(x, x1, x2) = f2(x)B(x, x1, x2) mod 13 = x1(2 + 9x + 10x2) + x2(11 + 2x + 12x2).
|
| 740 |
+
The PPK polynomials are encrypted with the self-shared key R1, R2 over the ring ZS
|
| 741 |
+
• P1(x, x1, x2) = E(R−1
|
| 742 |
+
1
|
| 743 |
+
,S)P1(x, x1, x2) = x1(5208 + 4413x + 6149x2) + x2(2677 + 6149x + 146x2)
|
| 744 |
+
=⇒ P1 =
|
| 745 |
+
�5208
|
| 746 |
+
2677
|
| 747 |
+
4413
|
| 748 |
+
6149
|
| 749 |
+
6149
|
| 750 |
+
146
|
| 751 |
+
�
|
| 752 |
+
• P2(x, x1, x2) = E(R−1
|
| 753 |
+
1
|
| 754 |
+
,S)P2(x, x1, x2) = x1(6152 + 3891x + 3568x2) + x2(3245 + 6152x + 2922x2)
|
| 755 |
+
=⇒ P2 =
|
| 756 |
+
�6152
|
| 757 |
+
3245
|
| 758 |
+
3891
|
| 759 |
+
6152
|
| 760 |
+
3568
|
| 761 |
+
2922
|
| 762 |
+
�
|
| 763 |
+
to create the so-called CPK P1 and P2.
|
| 764 |
+
10
|
| 765 |
+
|
| 766 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 767 |
+
3.3.2
|
| 768 |
+
Encryption
|
| 769 |
+
We randomly choose variables from F13: x = 8, x1 = 3, x2 = 6. We, then, pre-calculate values
|
| 770 |
+
x11 = xx1 mod 13 = 8 × 3 mod 13 = 11,
|
| 771 |
+
x12 = x2x1 mod 13 = 82 × 3 mod 13 = 10,
|
| 772 |
+
x21 = xx2 mod 13 = 8 × 6 mod 13 = 9,
|
| 773 |
+
x22 = x2x2 mod 13 = 82 × 6 mod 13 = 7.
|
| 774 |
+
Now we can calculate the ciphertext C = {198082, 192229} as follows
|
| 775 |
+
• ¯P1 = x1(5208 + 4413x + 6149x2) + x2(2677 + 6149x + 146x2) = 198082
|
| 776 |
+
• ¯P2 = x1(6152 + 3891x + 3568x2) + x2(3245 + 6152x + 2922x2) = 192229
|
| 777 |
+
3.3.3
|
| 778 |
+
Decryption
|
| 779 |
+
We first perform the homomorphic decryption to rebuild the plain polynomial equations
|
| 780 |
+
• P1(x, x1, x2) = f1(x)B(x, x1, x2) = [E(R−1
|
| 781 |
+
1
|
| 782 |
+
,S)19808] mod 13 = [ 19808
|
| 783 |
+
4267 mod 6798] mod 13 = 8
|
| 784 |
+
• P2(x, x1, x2) = f2(x)B(x, x1, x2) = [E(R−1
|
| 785 |
+
2
|
| 786 |
+
,S)192229] mod 13 = [ 192229
|
| 787 |
+
6475 mod 6798] mod 13 = 9
|
| 788 |
+
then we can eliminate the noise introduced by the base multivariate polynomial
|
| 789 |
+
P1(x, x1, x2)
|
| 790 |
+
P2(x, x1, x2) = 4 + 9x
|
| 791 |
+
10 + 7x = 8
|
| 792 |
+
9 mod 13 = 11
|
| 793 |
+
where the secret x can be easily extracted as x = 8. The encryption can be done with any possible values for x1 and x2
|
| 794 |
+
at a given secret x, which would produce different ciphertext C, but the decryption would reveal the same secret. This
|
| 795 |
+
simple toy example demonstrates its capability of randomized encryption.
|
| 796 |
+
4
|
| 797 |
+
HPPK Security Analysis
|
| 798 |
+
In this section, we analyze the security of the proposed HPPK algorithm. The security of HPPK relies on computational
|
| 799 |
+
hardness of Modular Diophantine Equation, introduced in Definition 4.1, and Hilbert’s tenth Problem, introduced in
|
| 800 |
+
Definition 4.7. We begin by proving that HPPK satisfies the IND-CPA indistinguishability property. These results are
|
| 801 |
+
then extended to prove that task of recovering plaintext from ciphertext in the framework of HPPK is NP-complete, and
|
| 802 |
+
state its classical and quantum complexity. Afterwards, we focus on the private key attack and prove that the problem of
|
| 803 |
+
obtaining the private key from the public key is NP-complete. Here we also provide classical and quantum complexities
|
| 804 |
+
of obtaining privates key from public key.
|
| 805 |
+
4.1
|
| 806 |
+
Plaintext attack
|
| 807 |
+
An attentive reader will notice that the evaluated ciphertext as illustrated in Eq. (25) has not been reduced modulo
|
| 808 |
+
any integer. Thus, an adversary looking to perpetrate an attack to recover the plaintext can treat the coefficients of the
|
| 809 |
+
polynomials in Eq. (25) and evaluated ciphertext as integers. The plaintext values, sought after by the adversary, are
|
| 810 |
+
elements of the field Fp, thus the malicious party can reduce the public values of the ciphertext modulo p to solve for
|
| 811 |
+
plaintext variables in the Eq (25). We formally phrase it in the following remark.
|
| 812 |
+
Remark 4.0.1. For the purpose of obtaining the plaintext, the ciphertext and cipher coefficients as illustrated in the
|
| 813 |
+
Eq. (25) can be considered modulo p as follows
|
| 814 |
+
C =
|
| 815 |
+
��n
|
| 816 |
+
i=0
|
| 817 |
+
�m
|
| 818 |
+
j=1 Pij1xjxi − ¯P1 = 0 (mod p)
|
| 819 |
+
�n
|
| 820 |
+
i=0
|
| 821 |
+
�m
|
| 822 |
+
j=1 Pij2xjxi − ¯P2 = 0 (mod p)
|
| 823 |
+
(27)
|
| 824 |
+
Definition 4.1 (Modular Diophantine Equation). The Modular Diophantine Equation asks whether an integer solution
|
| 825 |
+
exists to the equation
|
| 826 |
+
P(y1, . . . , yk) − 1 = 0
|
| 827 |
+
mod p,
|
| 828 |
+
given as an input of a polynomial P(y1, . . . , yk) and a prime p.
|
| 829 |
+
Remark 4.0.2. A positive answer to this question would include a solution.
|
| 830 |
+
11
|
| 831 |
+
|
| 832 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 833 |
+
Let m + 1 > 2. Note that the system in the Eq. (27) can be normalized as
|
| 834 |
+
C =
|
| 835 |
+
��n
|
| 836 |
+
i=0
|
| 837 |
+
�m
|
| 838 |
+
j=1 P′
|
| 839 |
+
ij1xjxi − 1 = 0 (mod p),
|
| 840 |
+
�n
|
| 841 |
+
i=0
|
| 842 |
+
�m
|
| 843 |
+
j=1 P′
|
| 844 |
+
ij2xjxi − 1 = 0 (mod p).
|
| 845 |
+
(28)
|
| 846 |
+
The most naive way of solving such normalized system is to solve each equation and find a common solution. Each
|
| 847 |
+
such equation is an instance of a Modular Diophantine Equation. The more obvious way to solve the system in Eq. (27)
|
| 848 |
+
would be to use Gaussian elimination and transform the system to a single equation. Indeed, since the coefficients of
|
| 849 |
+
the ciphertext are publicly known, and the noise variables are linear in the ciphertext, the adversary can express any
|
| 850 |
+
noise variable using the remaining terms of the equation and reduce the system to a single equation of the form
|
| 851 |
+
H(x, x1, . . . , xm−1) − 1 = 0
|
| 852 |
+
(29)
|
| 853 |
+
over Fp with m unknowns, where m > 1. We assume that the adversary favours the ciphertext form with less variables.
|
| 854 |
+
Thus, from the perspective of the adversary the cipheretext has form as in Eq. (29). From here on forward, we consider
|
| 855 |
+
the ciphertext in the form given in Eq. (29). We formally define said form below.
|
| 856 |
+
Definition 4.2. Let m + 1 > 2. The ciphertext in its normalized reduced form is a single equation
|
| 857 |
+
H(x, x1, . . . , xm−1) − 1 = 0
|
| 858 |
+
(30)
|
| 859 |
+
over Fp, where x corresponds to the plaintext variable and the remaining variables are noise variables.
|
| 860 |
+
Note that even in its normalized reduced form the ciphertext is an instance of a Modular Diophantine Equation. Since
|
| 861 |
+
m + 1 > 2 we can argue that the adversary does not benefit much by reducing the system in Eq. (28) to a single
|
| 862 |
+
equation (30), and eliminating one variable. The number of expected solutions to the Eq. (30) remains pm−1, and
|
| 863 |
+
the adversary is facing with the problem of deciding which solution is the correct one. That is, a brute-force search
|
| 864 |
+
algorithm can find a list of solutions to the Eq. (30) by trying all the possible m − 1 variables values over Fp. The
|
| 865 |
+
adversary is interested in a particular solution from the list.
|
| 866 |
+
One might argue that the attacker is interested only in the plaintext variable x ∈ Fp. Thus, the adversary can simply
|
| 867 |
+
guess the value x. The complexity of this guess is O(p). However, note that the guess has to be tested for correctness.
|
| 868 |
+
This will require coming up with noise variables and testing whether the guess is correct. Moreover, NIST requires the
|
| 869 |
+
size of the actual communicated secret to be 32 bytes. Thus, the secret that is transferred between two parties consists
|
| 870 |
+
of K blocks, where each block is p bits. Each block corresponds to the HPPK secret x. The secret message is then
|
| 871 |
+
K different values x concatenated together to form a 32 byte secret. Each such block x is encrypted separately using
|
| 872 |
+
HPPK. The complexity of correctly guessing the transferred secret message is then O(p4).
|
| 873 |
+
Theorem 4.1. The Modular Diophantine Equation Problem is NP-complete.
|
| 874 |
+
Proof. The proof, using the Boolean Satisfiability Problem, is given by Moore and Meterns [54, Section 5.4.4].
|
| 875 |
+
Theorem 4.1 states that a brute-force search algorithm can find a solution to the Modular Diophantine Equation by
|
| 876 |
+
trying all the possible solutions. Thus, without loss of generality, we treat the ciphertext-only attack on a ciphertext in
|
| 877 |
+
its normal reduced form as a Modular Diophantine Problem. Indeed, by Theorem 4.1 the algorithm to find a solution
|
| 878 |
+
to a Modular Diophantine Equation does not simply terminate to give a solution, it is a brute-force search algorithm
|
| 879 |
+
that considers every possible solution before producing a result. In other words, it goes through all the possibilities to
|
| 880 |
+
choose the correct one.
|
| 881 |
+
4.1.1
|
| 882 |
+
IND-CPA Indistinguishability Property and Ciphertext only Attack
|
| 883 |
+
We suppose that the adversary will choose to perpetrate the attack on the ciphertext in its normal reduced form as in
|
| 884 |
+
Eq. (30), for its easier to attack. In the framework of HPPK, the public key elements are the coefficients of the ciphertext
|
| 885 |
+
polynomials. Thus, if the ciphertext is presented in its reduced normalized form, as defined in Eq. (30), setting the
|
| 886 |
+
coefficients of such polynomial to be the ciphertext does not disadvantage the adversary.
|
| 887 |
+
Theorem 4.2 (HPPK has IND-CPA property). Let m > 1, where m is the total number of variables in the normalized
|
| 888 |
+
reduced form of the ciphertext as in Eq. (30). If the Modular Diophantine Equation is NP-complete, the HPPK
|
| 889 |
+
encryption system is provably secure in the IND-CPA security model with a reduction loss of pm−2.
|
| 890 |
+
Proof. Assume that there exists an adversary A that (t, ϵ)-breaks the HPPK encryption system in the IND-CPA
|
| 891 |
+
security model. We construct a simulator B that solves the Modular Diophantine Equation. Given as input, a Modular
|
| 892 |
+
Diophantine Equation instance (p, H(x, x1, . . . , xm−1)), where H(x, x1, . . . , xm−1) is of the form (30) and m > 1,
|
| 893 |
+
12
|
| 894 |
+
|
| 895 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 896 |
+
the simulator B runs A as follows. The simulator sets the normalized public key over Fp to the coefficients of the
|
| 897 |
+
polynomial H(x, x1, . . . , xm−1). The challenge consists of the following game. The adversary A generates two distinct
|
| 898 |
+
messages m0 and m1 ∈ Fp, and submits them to the simulator. The simulator B randomly chooses b in {0, 1} as well
|
| 899 |
+
as random values r1, . . . , rm−1 for the noise variables, and sets the ciphertext to be the value
|
| 900 |
+
¯H = H(mb, r1, . . . , rm−1).
|
| 901 |
+
The challenge for the adversary then consists of the following equation to be solved for x:
|
| 902 |
+
ˆH(x, x1, . . . , xm−1) − 1 = 0
|
| 903 |
+
over Fp. Here,
|
| 904 |
+
ˆH(x, x1, . . . , xm−1) = 1
|
| 905 |
+
¯H H(x, x1, . . . , xm−1).
|
| 906 |
+
The challenge remains to be the Modular Diophantine Equation H(x, x1, . . . , xm−1) − 1 = 0, since the value 1
|
| 907 |
+
¯
|
| 908 |
+
H can
|
| 909 |
+
be pushed to the noise variables, which are random and do not influence the plaintext. Indeed, let hij be the coefficients
|
| 910 |
+
of the polynomial H(x, x1, . . . , xm−1) for any i ∈ {0, . . . , n} and j ∈ {1, . . . , m − 1}, then
|
| 911 |
+
l
|
| 912 |
+
�
|
| 913 |
+
i=0
|
| 914 |
+
m−1
|
| 915 |
+
�
|
| 916 |
+
j=1
|
| 917 |
+
hijxixj ×
|
| 918 |
+
1
|
| 919 |
+
H(mb, r1, . . . , rm−1) =
|
| 920 |
+
l
|
| 921 |
+
�
|
| 922 |
+
i=0
|
| 923 |
+
m−1
|
| 924 |
+
�
|
| 925 |
+
j=1
|
| 926 |
+
hijxix′
|
| 927 |
+
j,
|
| 928 |
+
where x′
|
| 929 |
+
j = xj
|
| 930 |
+
¯
|
| 931 |
+
H . The challenge in this case is correct, as it corresponds to the challenged plaintext and remains in the
|
| 932 |
+
form of a Diophantine equation chosen by the simulator.
|
| 933 |
+
The coefficients of the challenge equation come from the submitted Diophantine equation, and thus, from the point
|
| 934 |
+
of view of the adversary are random. The values r1, . . . , rm−1 are selected at random. The adversary does not
|
| 935 |
+
have knowledge of the values {x′
|
| 936 |
+
1, . . . , x′
|
| 937 |
+
m−1} and they can not be calculated from the other parameters given to the
|
| 938 |
+
adversary. So the noise variables x′
|
| 939 |
+
j for all j ∈ {1, . . . , m − 1} are random. Hence, the simulation holds randomness
|
| 940 |
+
property. By construction, the simulation is indistinguishable from a real attack. That is, the adversary is challenged
|
| 941 |
+
with solving the equation as in the Eq. (30), which is HPPK ciphertext in its normalized reduced form.
|
| 942 |
+
There is no abort in the simulation. The adversary outputs a random guess b′ of b. When b′ is equal to b, the adversary
|
| 943 |
+
wins. Otherwise, the adversary looses. The probability of simply guessing the value for x is Pr = 1
|
| 944 |
+
2. We will calculate
|
| 945 |
+
the probability of solving the IND-CPA challenge with the advantage of the adversary, that is Pr = 1
|
| 946 |
+
2 + α. The
|
| 947 |
+
advantage comes from the assumption that the adversary can break the HPPK cryptosystem.
|
| 948 |
+
The challenge has a general form as in the Eq. (30), thus, the equation is expected to have pm−1 distinct solutions,
|
| 949 |
+
considering all m variables. On the other hand, it is known that the variable x ∈ {m0, m1}. Assuming x = m0,
|
| 950 |
+
there are now pm−2 possible solutions to choose the correct solution from. The same is true for x = m1. That is, the
|
| 951 |
+
probability of finding correct solution of the equation H(x, x1, . . . , xm−1) − 1 = 0 is
|
| 952 |
+
Pr(correct solution|x0 = m0) = Pr(correct solution|x = m1) =
|
| 953 |
+
1
|
| 954 |
+
pm−2 ,
|
| 955 |
+
where Pr(correct solution) denotes probability of finding the correct solution to the equation H(x, x1, . . . , xm−1)−1 =
|
| 956 |
+
0. Then by the law of total probability, the probability of solving the challenge equation is
|
| 957 |
+
Pr(correct solution) = Pr(correct solution|x = m0)Pr(x = m0)+Pr(correct solution|x = m1)Pr(x = m1) =
|
| 958 |
+
1
|
| 959 |
+
pm−2 .
|
| 960 |
+
Accounting for the advantage that the adversary has, the probability α is Pr(correct solution) =
|
| 961 |
+
ϵ
|
| 962 |
+
pm−2 . The total
|
| 963 |
+
probability of solving the IND-CPA challenge is then 1
|
| 964 |
+
2 +
|
| 965 |
+
ϵ
|
| 966 |
+
pm−2 .
|
| 967 |
+
The simulation is indistinguishable from a real attack. So the adversary who can break the challenge ciphertext will
|
| 968 |
+
uncover the solution to the given Modular Diophantine Equation problem. The probability of breaking the ciphertext is
|
| 969 |
+
ϵ
|
| 970 |
+
pm−2 .
|
| 971 |
+
The advantage of solving the Diophantive Equation problem is then
|
| 972 |
+
ϵ
|
| 973 |
+
pm−2 . Let Ts denote the time cost of the simulation.
|
| 974 |
+
We have Ts = O(1). The simulator B solves the Modular Diophantine Equation with time cost and advantage
|
| 975 |
+
(t + Ts, ϵ/pm−2) = (t, ϵ/pm−2). Thus, contradicting the Theorem 4.1 so the initial assumption is wrong.
|
| 976 |
+
The framework of the IND-CPA challenge entails known plaintext, in other words, the adversary knows that the secret
|
| 977 |
+
x ∈ {m0, m1}. We now state the complexity of the unknown plaintext ciphertext-only attack.
|
| 978 |
+
13
|
| 979 |
+
|
| 980 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 981 |
+
Lemma 4.3 (Ciphertext-only attack). Let m + 1 > 2. The classical complexity of finding the plaintext from the
|
| 982 |
+
ciphertext is O(pm−1).
|
| 983 |
+
Proof. Let the adversary favour the ciphertext in its reduced normal form (30). Without any knowledge about the
|
| 984 |
+
plaintext, the adversary will need to solve the Eq. (30) to obtain the plaintext along with the noise variables. A single
|
| 985 |
+
equation over Fp with m variables is expected to have pm−1 possible solutions over Fp. The correct one is among them.
|
| 986 |
+
That is, the plaintext encapsulated in a single variable x is not the sole variable in the ciphertext equation. However, it is
|
| 987 |
+
the only unknown of interest. The adversary can try and simply guess x, the complexity of the guess is O(p). However,
|
| 988 |
+
they have to test whether their guess is correct. Moreover, the secret transferred between the communicating parties
|
| 989 |
+
consist of 32 bytes as required by NIST. Thus, the adversary will have to guess K many values for x, where K = 32×8
|
| 990 |
+
p
|
| 991 |
+
.
|
| 992 |
+
In this case, the complexity is O(pK). We expect K > m − 1. Quantum complexity of the described attack due to
|
| 993 |
+
Grover’s search algorithm is O(p
|
| 994 |
+
m−1
|
| 995 |
+
2 ).
|
| 996 |
+
4.2
|
| 997 |
+
Private key attack
|
| 998 |
+
Lemma 4.4. Let λ ≤ 2. There exists a polynomial time algorithm to find coefficients of univariate polynomials f1(x0)
|
| 999 |
+
and f2(x0) given the plain central maps P1 and P2.
|
| 1000 |
+
Proof. Note that all the plain coefficients of the polynomials p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) as defined in
|
| 1001 |
+
Eq. (22) are defined over the prime field Fp. Thus, for any fixed j, it is possible to use Gaussian elimination to reduce
|
| 1002 |
+
the system of equations formed by the plain coefficients of p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) of the form
|
| 1003 |
+
�
|
| 1004 |
+
�
|
| 1005 |
+
�
|
| 1006 |
+
�
|
| 1007 |
+
�
|
| 1008 |
+
�
|
| 1009 |
+
�
|
| 1010 |
+
�
|
| 1011 |
+
�
|
| 1012 |
+
fz0b0j = p0jz,
|
| 1013 |
+
fz1b0j + fz0b1j = p1jz,
|
| 1014 |
+
...
|
| 1015 |
+
fzλbnbj = pnjz,
|
| 1016 |
+
(31)
|
| 1017 |
+
where z ∈ {1, 2} corresponding to either plain polynomial p1(x, x1, . . . , xm) or p2(x, x1, . . . , xm) for any given noise
|
| 1018 |
+
variable xj. Gaussian elimination would produce a single polynomial in λ variables, namely fz2
|
| 1019 |
+
fz0 and fz1
|
| 1020 |
+
fz0 for λ = 2 or
|
| 1021 |
+
fz1
|
| 1022 |
+
fz0 if λ = 1. Such univariate or bivariate equation is solvable. Depending on the HPPK parameters, the adversary can
|
| 1023 |
+
simply use radical solutions, Evdokimov’s algorithm [55], or resultants together with Evdokimov’s algorithm to solve
|
| 1024 |
+
such equation [55, 56]. Gaussian elimination can be performed in polynomial time, and finding solutions by radicals,
|
| 1025 |
+
Evdokimov’s algorithm and computing resultants all have polynomial time complexity [55, 56].
|
| 1026 |
+
Lemma 4.5. Let λ ≤ 2. Finding private key from the cipher public key in the framework of HPPK reduces to finding
|
| 1027 |
+
the homomorphic encryption key S, R1, and R2.
|
| 1028 |
+
Proof. The private key consists of the coefficients of the univariate polynomials f1(x), f2(x) as well as values S, R1, R2
|
| 1029 |
+
used to encrypt the plain public key to the cipher public key. By Lemma 4.4 once the values R1, R2 and S are known,
|
| 1030 |
+
the coefficients of f1(x), f2(x) can be found in polynomial time.
|
| 1031 |
+
Definition 4.3 (Diophantine set). The Diophantine set is a set S ⊂ N associated with a Diophantine equation
|
| 1032 |
+
P(b, a1, . . . , ak) ∈ Z[b, a1, . . . , ak], where k > 0 such that
|
| 1033 |
+
b ∈ S if and only if (∃a1, . . . , ak)(P(b, a1, . . . , am) = 0)
|
| 1034 |
+
Theorem 4.6 (MRDP Theorem). The Matiyasevich–Robinson–Davis–Putnam (MRDP) theorem states that every
|
| 1035 |
+
computably enumerable set is Diophantine, and every Diophantine set is computably enumerable.
|
| 1036 |
+
Proof. The result has been proven in various works, for instance [57].
|
| 1037 |
+
Theorem 4.7 (Hilbert’s tenth problem). Hilbert’s tenth problem asks whether the general Diophantine Problem is
|
| 1038 |
+
solvable. Due to MRDP, Hilbert’s tenth problem is undecidable.
|
| 1039 |
+
Proof. For proof see [57].
|
| 1040 |
+
Theorem 4.8. Private key attack is non-deterministic and has complexity of at least O(T 3), where T is the largest
|
| 1041 |
+
number with 2|p|2 + |L|2 bit-length.
|
| 1042 |
+
14
|
| 1043 |
+
|
| 1044 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1045 |
+
Proof. By Lemma 4.4 and 4.5 the attack on public key reduces to finding the values S, R1, and R2. From the perspective
|
| 1046 |
+
of the attacker, the values S, R1, and R2 could be treated as a one-time pad keys as they have been chosen at random,
|
| 1047 |
+
and can not be calculated from other parameters given to the attacker. An obvious attack would be a brute force search
|
| 1048 |
+
for all the three values, S, R1, and R2. The direct brute force search classical complexity would be greater than O(T 3)
|
| 1049 |
+
for the three values together, where T is the largest (2|p|2 + |L|2)-bit number. Due to Grover’s algorithm, the quantum
|
| 1050 |
+
complexity is greater than O(T
|
| 1051 |
+
3
|
| 1052 |
+
2 ). Note however, because of the condition gcd(S, R1) = gcd(S, R2) = 1, once S is
|
| 1053 |
+
found the search span for R1 and R2 reduces. Brute force search entails a non-deterministic result, however, we provide
|
| 1054 |
+
a more formal argument below.
|
| 1055 |
+
For each fixed chose of j, each public key coefficient can be written in the integer domain as follows
|
| 1056 |
+
�
|
| 1057 |
+
�
|
| 1058 |
+
�
|
| 1059 |
+
�
|
| 1060 |
+
�
|
| 1061 |
+
�
|
| 1062 |
+
�
|
| 1063 |
+
�
|
| 1064 |
+
�
|
| 1065 |
+
fz0b′
|
| 1066 |
+
z0j = r0jzS + P0jz,
|
| 1067 |
+
fz1b′
|
| 1068 |
+
z0j + fz0b′
|
| 1069 |
+
z1j = r1jzS + P1jz,
|
| 1070 |
+
...
|
| 1071 |
+
fzλb′
|
| 1072 |
+
znbj = rnjzS + Pnjz,
|
| 1073 |
+
(32)
|
| 1074 |
+
with j = 1, . . . , m, z = 1, 2, and b′
|
| 1075 |
+
zij = Rzbij. Here, Rz, and S are unknowns from the hidden ring ZS. Values rijz
|
| 1076 |
+
are merely some unknown integers. The only known values are those of the form Pijz. Using Gaussian eliminations,
|
| 1077 |
+
all unknowns of the form b′
|
| 1078 |
+
zij can be eliminated, and the equation system in Eq (32) can be reduced to a single equation
|
| 1079 |
+
over Z
|
| 1080 |
+
P(fz0, . . . , fzλ, r0jz, . . . , rnjz, S) − ¯P = 0.
|
| 1081 |
+
(33)
|
| 1082 |
+
Solving such equation by Theorem 4.6 and 4.7 is an NP-complete task. For each j, we can generate one such equation.
|
| 1083 |
+
Considering them all together, the adversary will arrive at an underdetermined system as the variables in the system
|
| 1084 |
+
depend on j. Each equation in such a system is a multivariate Diophantine equation. One way to solve this system
|
| 1085 |
+
is to solve each equation separately and search for common solutions. However, by Theorem 4.6 and 4.7 this is an
|
| 1086 |
+
NP-complete problem. Reducing the system to a single polynomial still produces a multivariate Diophantine equation,
|
| 1087 |
+
solving which is an NP-complete problem by Theorem 4.6 and 4.7.
|
| 1088 |
+
4.3
|
| 1089 |
+
Security Conclusion
|
| 1090 |
+
At large, the security of the HPPK cryptosystem relies on the problem of solving undetermined system of equations
|
| 1091 |
+
over Fp. Such system is expected to have pn−m possible solutions, where n is the number of variables and m is the
|
| 1092 |
+
number of equations in the system. The attacker can solve this system to find all possible solutions, however, it is the
|
| 1093 |
+
problem of determining the correct solution from all the possible solutions that makes HPPK secure.
|
| 1094 |
+
The ciphertext attack requires the adversary to solve an underdetermined system of equations over Fp, which can be
|
| 1095 |
+
reduced to a single Modular Diophantine equation. Solving this equation is an NP-complete problem.
|
| 1096 |
+
The public key attack aimed to unveil the plaintext reduces to a brute force search for three unknown values S, R1, R2.
|
| 1097 |
+
To find these values, the attacker can either use brute-force search or solve an underdetermined system of equations
|
| 1098 |
+
over the integers. The former yields non-deterministic results and the latter is an NP-complete problem.
|
| 1099 |
+
We conclude that from the point of view of the adversary, the following is true.
|
| 1100 |
+
Proposition 4.8.1. The best classical complexity to attack HPPK is O(pm−1).
|
| 1101 |
+
Proof. We assume that the malicious party will take the most advantageous path for them. Thus, by Lemma 4.3,
|
| 1102 |
+
Lemma 4.4, Lemma 4.5, and Theorem 4.8 we can conclude that the best attack is to obtain the plaintext from the
|
| 1103 |
+
ciphertext. Such attack is non-deterministic with classical complexity of O(pm−1).
|
| 1104 |
+
5
|
| 1105 |
+
Brief Benchmarking Performance
|
| 1106 |
+
To account for the best complexity of O(pm−1), we recommend the following configuration to achieve NIST security
|
| 1107 |
+
levels I, III, and V, as illustrated in Table 1.
|
| 1108 |
+
To measure the performance of the HPPK algorithm we used benchmarking toolkit, called the SUPERCOP. NIST PQC
|
| 1109 |
+
finalists used the SUPERCOP for their benchmarking and have contributed the results to the platform, thus, we take
|
| 1110 |
+
advantage of the available resources, and report on the performance of HPPK alongside with the NIST PQC schemes,
|
| 1111 |
+
namely, McEliece, Kyber, NTRU, and Saber algorithms. From now on we refer to them as the NIST finalists. For our
|
| 1112 |
+
work we used a 16-core Intel®Core™i7-10700 CPU at 2.90 GHz system. We have not, however, configured the AVX
|
| 1113 |
+
15
|
| 1114 |
+
|
| 1115 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1116 |
+
Table 1: Configuration of HPPK for different NIST Security Levels.
|
| 1117 |
+
Security Level
|
| 1118 |
+
Configuration
|
| 1119 |
+
Level I
|
| 1120 |
+
Level III
|
| 1121 |
+
Level V
|
| 1122 |
+
(log p, nb, λ, m)
|
| 1123 |
+
(64, 1, 1, 3)
|
| 1124 |
+
(64, 1, 1, 4),
|
| 1125 |
+
(64, 1, 1, 5)
|
| 1126 |
+
(log p, nb, λ, m)
|
| 1127 |
+
(64, 2, 1, 3)
|
| 1128 |
+
(64, 2, 1, 4),
|
| 1129 |
+
(64, 2, 1, 5)
|
| 1130 |
+
solution for optimized HPPK performance. Therefore, comparisons in this benchmarking performance are set to the
|
| 1131 |
+
reference mode for all finalists but in the same computing system.
|
| 1132 |
+
We start by illustrating the parameter set of all the measured primitives for all three security levels in the Table 2. As
|
| 1133 |
+
required by NIST, the secret is set at 32 bytes. The data illustrates that for each security level, HPPK offers considerably
|
| 1134 |
+
small public key sizes and ciphertext sizes for all three security levels compared to all NIST finalists, except for the
|
| 1135 |
+
ciphertext size of McEliece at level I and level III. We point out that, HPPK offers the same secret key size of 83 bytes
|
| 1136 |
+
and ciphertext size of 208 bytes for all three levels. In comparison with the NIST standardized KEM algorithm Kyber,
|
| 1137 |
+
HPPK’s public key sizes are less than half of respective public key sizes for Kyber for all three security levels. Secret
|
| 1138 |
+
key sizes for Kyber are about 20 times bigger at level I and close to 40 times bigger at level V than those of HPPK. As
|
| 1139 |
+
for the ciphertext sizes, Kyber demonstrates 3.7-7.5 times bigger ciphertext sizes than those of HPPK.
|
| 1140 |
+
Table 2: Parameter set of the measured primitives for NIST security levels I, III, and V, given the secret size of 32 bytes
|
| 1141 |
+
Crypto
|
| 1142 |
+
Size (Bytes)
|
| 1143 |
+
system
|
| 1144 |
+
Level I
|
| 1145 |
+
Level III
|
| 1146 |
+
Level V
|
| 1147 |
+
PK1
|
| 1148 |
+
SK1
|
| 1149 |
+
CT1
|
| 1150 |
+
PK
|
| 1151 |
+
SK
|
| 1152 |
+
CT
|
| 1153 |
+
PK
|
| 1154 |
+
SK
|
| 1155 |
+
CT
|
| 1156 |
+
McEliece2 [29]
|
| 1157 |
+
261120
|
| 1158 |
+
6492
|
| 1159 |
+
128
|
| 1160 |
+
524,160
|
| 1161 |
+
13,608
|
| 1162 |
+
188
|
| 1163 |
+
1,044,992
|
| 1164 |
+
13,932
|
| 1165 |
+
240
|
| 1166 |
+
NTRU4 [31]
|
| 1167 |
+
699
|
| 1168 |
+
935
|
| 1169 |
+
699
|
| 1170 |
+
930
|
| 1171 |
+
1,234
|
| 1172 |
+
930
|
| 1173 |
+
1,230
|
| 1174 |
+
1,590
|
| 1175 |
+
1,230
|
| 1176 |
+
Saber5 [33]
|
| 1177 |
+
672
|
| 1178 |
+
1568
|
| 1179 |
+
736
|
| 1180 |
+
1,312
|
| 1181 |
+
3,040
|
| 1182 |
+
1,472
|
| 1183 |
+
1,312
|
| 1184 |
+
3,040
|
| 1185 |
+
1,472
|
| 1186 |
+
Kyber3 [30]
|
| 1187 |
+
800
|
| 1188 |
+
1632
|
| 1189 |
+
768
|
| 1190 |
+
1,184
|
| 1191 |
+
2,400
|
| 1192 |
+
1,088
|
| 1193 |
+
1,568
|
| 1194 |
+
3,168
|
| 1195 |
+
1,568
|
| 1196 |
+
HPPK(nb = 1)6
|
| 1197 |
+
306
|
| 1198 |
+
83
|
| 1199 |
+
208
|
| 1200 |
+
408
|
| 1201 |
+
83
|
| 1202 |
+
208
|
| 1203 |
+
510
|
| 1204 |
+
83
|
| 1205 |
+
208
|
| 1206 |
+
HPPK(nb = 2)6
|
| 1207 |
+
408
|
| 1208 |
+
83
|
| 1209 |
+
208
|
| 1210 |
+
544
|
| 1211 |
+
83
|
| 1212 |
+
208
|
| 1213 |
+
680
|
| 1214 |
+
83
|
| 1215 |
+
208
|
| 1216 |
+
1 We denote the secret key as SK, the public key as PK, and the ciphertext as CT.
|
| 1217 |
+
2 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
|
| 1218 |
+
for Level V
|
| 1219 |
+
3 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
|
| 1220 |
+
4 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
|
| 1221 |
+
for Level V
|
| 1222 |
+
5 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
|
| 1223 |
+
6 For each security level, HPPK primitive is configured as shown in Table 1
|
| 1224 |
+
Table 3 provides the reader with median values in clock cycles of the measurement results for the key generation
|
| 1225 |
+
procedure of all the primitives configured to provide security levels I, III, and V. To provide a bigger picture we include
|
| 1226 |
+
results for RSA-2048. The results correspond only to security level I, as RSA-2048 provides 112 bits of entropy. The
|
| 1227 |
+
reader can see that HPPK key generation performance is rather fast, with median clock cycles of over 18, 000 for nb = 1
|
| 1228 |
+
and 22, 000 for nb = 2 for level I, over 21, 000 for nb = 1 and 28, 000 for nb = 2 for level III, and over 26, 000 for
|
| 1229 |
+
nb = 1 and 34, 000 for nb = 2 for level V. The fastest key generation performance among the NIST finalists is offered
|
| 1230 |
+
by Saber and Kyber, with median values of over 39, 000 and 72, 000 clock cycles respectively for level I, median values
|
| 1231 |
+
over 115000 for level III, and median values of 128, 000 clock cycles for level V. Compared to the standard algorithm
|
| 1232 |
+
Kyber, HPPK demonstrates a 3.5-6 times faster key generation performance. The remaining primitives measured,
|
| 1233 |
+
including RSA, display median values of over 6 million clock cycles for level I, over 10 million for level III, and over
|
| 1234 |
+
16 million clock cycles for level V.
|
| 1235 |
+
We provide Table 4 to illustrate encryption procedure performance of HPPK, NIST finalists, and RSA-2048. The table
|
| 1236 |
+
illustrates median values given in clock cycles. HPPK offers fast encryption with clock cycles from 17,000 for security
|
| 1237 |
+
level I to 25,000 for security level V, outperforming all mentioned NIST finalists. More specifically comparing the
|
| 1238 |
+
NIST standard algorithm, Kyber, to HPPK the table illustartes that Kyber offers 4-8 times slower encryption than HPPK
|
| 1239 |
+
for all levels. However, RSA-2048 offers the fastest encryption performance among all the other primitives measured
|
| 1240 |
+
for level I, due to its small public encryption key, usually chosen to be 65535.
|
| 1241 |
+
In Table 5 we illustrate median values given in clock cycles for the decryption procedure corresponding to the HPPK
|
| 1242 |
+
algortihm, the NIST finalists algorithms, and RSA-2048. Table 5 shows that HPPK offers fast decryption performance
|
| 1243 |
+
16
|
| 1244 |
+
|
| 1245 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1246 |
+
Table 3: Median values of the key generation performance for NIST security levels I, III, and V.
|
| 1247 |
+
Crypto
|
| 1248 |
+
Performance (Clock cycles)
|
| 1249 |
+
system
|
| 1250 |
+
Level I
|
| 1251 |
+
Level III
|
| 1252 |
+
Level V
|
| 1253 |
+
McEliece1 [29]
|
| 1254 |
+
152,424,455
|
| 1255 |
+
509,364,485
|
| 1256 |
+
1,127,581,201
|
| 1257 |
+
NTRU3 [31]
|
| 1258 |
+
6,554,031
|
| 1259 |
+
10,860,295
|
| 1260 |
+
16,046,953
|
| 1261 |
+
Saber4 [33]
|
| 1262 |
+
39,654
|
| 1263 |
+
128,935
|
| 1264 |
+
128,412
|
| 1265 |
+
Kyber2 [30]
|
| 1266 |
+
72,403
|
| 1267 |
+
115,654
|
| 1268 |
+
177,818
|
| 1269 |
+
HPPK (nb = 1)5
|
| 1270 |
+
18,034
|
| 1271 |
+
21,946
|
| 1272 |
+
26,603
|
| 1273 |
+
HPPK(nb = 2)5
|
| 1274 |
+
22,625
|
| 1275 |
+
28,360
|
| 1276 |
+
34,719
|
| 1277 |
+
RSA-2048
|
| 1278 |
+
91,985,129
|
| 1279 |
+
-
|
| 1280 |
+
-
|
| 1281 |
+
1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
|
| 1282 |
+
for Level V
|
| 1283 |
+
2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
|
| 1284 |
+
3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
|
| 1285 |
+
for Level V
|
| 1286 |
+
4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
|
| 1287 |
+
5 For each security level, HPPK primitive is configured as shown in Table 1
|
| 1288 |
+
Table 4: Median values of the key encapsulation performance estimated in clock cycles for NIST security levels I, III,
|
| 1289 |
+
and V.
|
| 1290 |
+
Crypto
|
| 1291 |
+
Performance (Clock cycles)
|
| 1292 |
+
system
|
| 1293 |
+
Level I
|
| 1294 |
+
Level III
|
| 1295 |
+
Level V
|
| 1296 |
+
McEliece1 [29]
|
| 1297 |
+
108,741
|
| 1298 |
+
172,538
|
| 1299 |
+
263,169
|
| 1300 |
+
NTRU3 [31]
|
| 1301 |
+
418,622
|
| 1302 |
+
703,046
|
| 1303 |
+
1,063,124
|
| 1304 |
+
Saber4 [33]
|
| 1305 |
+
62,154
|
| 1306 |
+
157,704
|
| 1307 |
+
157,521
|
| 1308 |
+
Kyber2 [30]
|
| 1309 |
+
95,466
|
| 1310 |
+
140,376
|
| 1311 |
+
205,505
|
| 1312 |
+
HPPK(nb = 1)5
|
| 1313 |
+
17,354
|
| 1314 |
+
20,951
|
| 1315 |
+
25,087
|
| 1316 |
+
HPPK(nb = 2)5
|
| 1317 |
+
23,073
|
| 1318 |
+
28,642
|
| 1319 |
+
35,173
|
| 1320 |
+
RSA-2048
|
| 1321 |
+
13,429
|
| 1322 |
+
-
|
| 1323 |
+
-
|
| 1324 |
+
1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
|
| 1325 |
+
for Level V
|
| 1326 |
+
2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
|
| 1327 |
+
3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
|
| 1328 |
+
for Level V
|
| 1329 |
+
4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
|
| 1330 |
+
5 For each security level, HPPK primitive is configured as shown in Table 1
|
| 1331 |
+
with median values for level I being at 28, 000 clock cycles. Meanwhile, median values for the faster NIST finalists
|
| 1332 |
+
are over 63, 000 and 117, 000 clcok cycles for Saber and Kyber respectively configured to provide level I security.
|
| 1333 |
+
Both RSA-2048 and NTRU have median values over 1 million clock cycles for level I. McEliece median value is over
|
| 1334 |
+
45 million clock cycles. For levels III and V the account is similar. HPPK offers median values for both of these
|
| 1335 |
+
levels which fall in the interval of [28000, 30000] clock cycles, while median values for Saber are over 170, 000 for
|
| 1336 |
+
levels III and V. Median values for Kyber fall into the interval of [166000, 238000] for levels III and V. NTRU displays
|
| 1337 |
+
median values of over 2 million clock cycles for level III and V. McEliece offers the slowest decryption procedure with
|
| 1338 |
+
median values being over 93 million for level III, and 179 million for level V. HPPK decryption demonstrates a stable
|
| 1339 |
+
performance at 30, 000 clock cycles for all security levels, due to its special decryption mechanism with a modular
|
| 1340 |
+
division.
|
| 1341 |
+
6
|
| 1342 |
+
Conclusion
|
| 1343 |
+
In this paper, we introduced a new Functional Homomorphic Encryption, which in contrast with conventional homomor-
|
| 1344 |
+
phic encryption, is intended to secure public keys of multivariate asymmetric cryptosystems. Functional homomorphic
|
| 1345 |
+
encryption is applied to polynomials, to leverage homomorphic properties and allow for user input through variables.
|
| 1346 |
+
The functional homomorphic encryption and decryption operators are multiplication operators modulo a hidden value S,
|
| 1347 |
+
with values R1 and R2 respectively. Such values R1 and R2 are chosen uniformly at random from the hidden ring ZS
|
| 1348 |
+
with certain conditions. We propose to use said homomorphic encryption in conjunction with Multivariate Polynomial
|
| 1349 |
+
17
|
| 1350 |
+
|
| 1351 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1352 |
+
Table 5: Median values of key decapsulation performance for NIST security levels I, III, and V.
|
| 1353 |
+
Crypto
|
| 1354 |
+
Performance (Clock cycles)
|
| 1355 |
+
system
|
| 1356 |
+
Level I
|
| 1357 |
+
Level III
|
| 1358 |
+
Level V
|
| 1359 |
+
McEliece1 [29]
|
| 1360 |
+
45,119,775
|
| 1361 |
+
93,121,708
|
| 1362 |
+
179,917,369
|
| 1363 |
+
NTRU3 [31]
|
| 1364 |
+
1,245,062
|
| 1365 |
+
2,099,254
|
| 1366 |
+
3,129,150
|
| 1367 |
+
Saber4 [33]
|
| 1368 |
+
63,048
|
| 1369 |
+
173,712
|
| 1370 |
+
177,109
|
| 1371 |
+
Kyber2 [30]
|
| 1372 |
+
117,245
|
| 1373 |
+
166,062
|
| 1374 |
+
237,484
|
| 1375 |
+
HPPK(nb = 1)5
|
| 1376 |
+
28,301
|
| 1377 |
+
28,759
|
| 1378 |
+
29,671
|
| 1379 |
+
HPPK (nb = 2)5
|
| 1380 |
+
29,791
|
| 1381 |
+
29,266
|
| 1382 |
+
29,364
|
| 1383 |
+
RSA-2048
|
| 1384 |
+
1,670,173
|
| 1385 |
+
-
|
| 1386 |
+
-
|
| 1387 |
+
1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
|
| 1388 |
+
for Level V
|
| 1389 |
+
2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
|
| 1390 |
+
3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
|
| 1391 |
+
for Level V
|
| 1392 |
+
4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
|
| 1393 |
+
5 For each security level, HPPK primitive is configured as shown in Table 1
|
| 1394 |
+
Public-key Cryptography, to secure the polynomial public keys, however, we do not study the encrypted MPKC in
|
| 1395 |
+
detail. Instead, we suggest a new variant of multivariate public-key cryptosystem with public keys encrypted using
|
| 1396 |
+
homomorphic encryption, called Homomorphic Polynomial Public Key or HPPK. We described the HPPK algorithm
|
| 1397 |
+
in detail, with the framework drawn from MPKC. HPPK public keys are product polynomials of a multivariate and
|
| 1398 |
+
univariate polynomials, encrypted with a homomorphic encryption operator. The ciphertext is created by the encrypting
|
| 1399 |
+
party through the input of plaintext and random noise as public polynomial variables. The decryption procedure
|
| 1400 |
+
involves first decrypting the public key, to nullify the homomorphic encryption and produce the original ciphertext.
|
| 1401 |
+
Said ciphertext is used to divide two product polynomials. By construction, such division cancels the base multiplicand
|
| 1402 |
+
polynomial with noise variable. and retains a single equation in one variable. Said variable is the plaintext, which
|
| 1403 |
+
can be found by radicals. We give a thorough security analysis of the HPPK cryptosystem, proving that the hardness
|
| 1404 |
+
of breaking the HPPK algorithm comes from the computational hardness of the Modular Diophantine Equation, and
|
| 1405 |
+
Hilbert’s tenth problem. We also show that HPPK holds IND-CPA property. We report briefly on benchmarking the
|
| 1406 |
+
performance of the HPPK cryptosystem, using the NIST-recognized SUPERCOP benchmarking tool, with nb = 1 and
|
| 1407 |
+
λ = 1. The benchmarking data illustrates that the HPPK offers rather small public keys and comparable ciphertext sizes.
|
| 1408 |
+
The key generation, key encapsulation, and key decapsulation procedure performance are efficient, being noticeably
|
| 1409 |
+
faster when considered together with the NIST PQC finalists. If the degree of univariate polynomial f1(x) and f2(x)
|
| 1410 |
+
are higher than 1, such as quadratic polynomials, the decryption would produce multiple roots, then an extra verification
|
| 1411 |
+
procedure is required. Moreover, the decryption speed would be dramatically slower than linear polynomials f1(x) and
|
| 1412 |
+
f2(x). In the future work, we will perform more detail benchmarking with variety of configurations as well as a more
|
| 1413 |
+
extensive security analysis, considering attacks that have not been described in the work.
|
| 1414 |
+
References
|
| 1415 |
+
[1] R L Rivest, L Adleman, and M L Dertouzos. On data banks and privacy homomorphisms. Foundations of Secure
|
| 1416 |
+
Computation, Academia Press, pages 169–179, 1978.
|
| 1417 |
+
[2] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Cryptographic communications system and method,
|
| 1418 |
+
December 1977. US Patent 4,405,829.
|
| 1419 |
+
[3] W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–
|
| 1420 |
+
654, November 1976.
|
| 1421 |
+
[4] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203–209, 1987.
|
| 1422 |
+
[5] Victor S. Miller. Use of elliptic curves in cryptography. In Hugh C. Williams, editor, Advances in Cryptology —
|
| 1423 |
+
CRYPTO ’85 Proceedings, pages 417–426, Berlin, Heidelberg, 1986. Springer Berlin Heidelberg.
|
| 1424 |
+
[6] Ronald L Rivest, Adi Shamir, and Leonard Adleman. A method for obtaining digital signatures and public-key
|
| 1425 |
+
cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
|
| 1426 |
+
[7] Taher Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In ADV. IN
|
| 1427 |
+
CRYPTOLOGY, SPRINGER-VERLAG, 1985.
|
| 1428 |
+
18
|
| 1429 |
+
|
| 1430 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1431 |
+
[8] Shafi Goldwasser and Silvio Micali. Probabilistic encryption; how to play mental poker keeping secret all partial
|
| 1432 |
+
information. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC ’82, page
|
| 1433 |
+
365–377, New York, NY, USA, 1982. Association for Computing Machinery.
|
| 1434 |
+
[9] Laurent Fousse, Pascal Lafourcade, and Mohamed Alnuaimi. Benaloh’s dense probabilistic encryption revisited.
|
| 1435 |
+
In Abderrahmane Nitaj and David Pointcheval, editors, Progress in Cryptology – AFRICACRYPT 2011, pages
|
| 1436 |
+
348–362, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
|
| 1437 |
+
[10] Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern,
|
| 1438 |
+
editor, Advances in Cryptology — EUROCRYPT ’99, pages 223–238, Berlin, Heidelberg, 1999. Springer Berlin
|
| 1439 |
+
Heidelberg.
|
| 1440 |
+
[11] Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the
|
| 1441 |
+
integers. In Henri Gilbert, editor, Advances in Cryptology – EUROCRYPT 2010, pages 24–43, Berlin, Heidelberg,
|
| 1442 |
+
2010. Springer Berlin Heidelberg.
|
| 1443 |
+
[12] A. C.-F. Chan. Symmetric-key homomorphic encryption for encrypted data processing. In 2009 IEEE International
|
| 1444 |
+
Conference on Communications, pages 1–5, 2009.
|
| 1445 |
+
[13] Aviad Kipnis and Eli Hibshoosh. Efficient methods for practical fully-homomorphic symmetric-key encryption,
|
| 1446 |
+
randomization, and verification, 2012.
|
| 1447 |
+
[14] C P Gupta and Iti Sharma. A fully homomorphic encryption scheme with symmetric keys with application to
|
| 1448 |
+
private data processing in clouds. In 2013 Fourth International Conference on the Network of the Future (NoF),
|
| 1449 |
+
pages 1–4, 2013.
|
| 1450 |
+
[15] Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao. Privacy-preserving-
|
| 1451 |
+
outsourced association rule mining on vertically partitioned databases. IEEE Transactions on Information
|
| 1452 |
+
Forensics and Security, 11(8):1847–1861, 2016.
|
| 1453 |
+
[16] Baocang Wang, Yu Zhan, and Zhili Zhang. Cryptanalysis of a symmetric fully homomorphic encryption scheme.
|
| 1454 |
+
IEEE Transactions on Information Forensics and Security, 13(6):1460–1467, 2018.
|
| 1455 |
+
[17] Quanbo Qu, Baocang Wang, Yuan Ping, and Zhili Zhang. Improved cryptanalysis of a fully homomorphic
|
| 1456 |
+
symmetric encryption scheme. Security and Communication Networks, 2019:1847–1861, 2019.
|
| 1457 |
+
[18] Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In IN
|
| 1458 |
+
ADVANCES IN CRYPTOLOGY — EUROCRYPT 1999, pages 206–222. Springer, 1999.
|
| 1459 |
+
[19] Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, and Ming-shing Chen. Square, a new multivariate
|
| 1460 |
+
encryption scheme. In Topics in Cryptology – CT-RSA 2009, Lecture Notes in Computer Science, pages 252–264.
|
| 1461 |
+
Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
|
| 1462 |
+
[20] Jaiberth Porras, John Baena, and Jintai Ding. Zhfe, a new multivariate public key encryption scheme. In Post-
|
| 1463 |
+
Quantum Cryptography, Lecture Notes in Computer Science, pages 229–245. Springer International Publishing,
|
| 1464 |
+
Cham, 2014.
|
| 1465 |
+
[21] Alan Szepieniec, Jintai Ding, and Bart Preneel.
|
| 1466 |
+
Extension field cancellation: A new central trapdoor for
|
| 1467 |
+
multivariate quadratic systems. In Post-Quantum Cryptography, Lecture Notes in Computer Science, pages
|
| 1468 |
+
182–196. Springer International Publishing, Cham, 2016.
|
| 1469 |
+
[22] Jacques PATARIN, Nicolas COURTOIS, and Louis GOUBIN. Quartz, 128-bit long digital signatures. In Lecture
|
| 1470 |
+
notes in computer science, pages 282–297, Berlin, 2001. Springer.
|
| 1471 |
+
[23] Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, and Jintai Ding. Design principles for hfev-
|
| 1472 |
+
based multivariate signature schemes. In Advances in Cryptology – ASIACRYPT 2015, Lecture Notes in Computer
|
| 1473 |
+
Science, pages 311–334. Springer Berlin Heidelberg, Berlin, Heidelberg, 2016.
|
| 1474 |
+
[24] Wenbin Zhang and Chik How Tan. Mi-t-hfe, a new multivariate signature scheme. In Jens Groth, editor,
|
| 1475 |
+
Cryptography and Coding, pages 43–56, Cham, 2015. Springer International Publishing.
|
| 1476 |
+
[25] Jintai Ding and Dieter S. Schmidt. Rainbow, a new multivariable polynomial signature scheme. In ACNS, 2005.
|
| 1477 |
+
[26] Antoine Casanova, Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret, and Jocelyn
|
| 1478 |
+
Ryckeghem. Gemss: A great multivariate short signature, 2017.
|
| 1479 |
+
[27] Frank Arute, Kunal Arya, Ryan Babbush, Dave Bacon, Joseph C. Bardin, Rami Barends, Rupak Biswas, Sergio
|
| 1480 |
+
Boixo, Fernando G. S. L. Brandao, David A. Buell, Brian Burkett, Yu Chen, Zijun Chen, Ben Chiaro, Roberto
|
| 1481 |
+
Collins, William Courtney, Andrew Dunsworth, Edward Farhi, Brooks Foxen, Austin Fowler, Craig Gidney,
|
| 1482 |
+
Marissa Giustina, Rob Graff, Keith Guerin, Steve Habegger, Matthew P. Harrigan, Michael J. Hartmann, Alan
|
| 1483 |
+
Ho, Markus Hoffmann, Trent Huang, Travis S. Humble, Sergei V. Isakov, Evan Jeffrey, Zhang Jiang, Dvir Kafri,
|
| 1484 |
+
19
|
| 1485 |
+
|
| 1486 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1487 |
+
Kostyantyn Kechedzhi, Julian Kelly, Paul V. Klimov, Sergey Knysh, Alexander Korotkov, Fedor Kostritsa, David
|
| 1488 |
+
Landhuis, Mike Lindmark, Erik Lucero, Dmitry Lyakh, Salvatore Mandrà, Jarrod R. McClean, Matthew McEwen,
|
| 1489 |
+
Anthony Megrant, Xiao Mi, Kristel Michielsen, Masoud Mohseni, Josh Mutus, Ofer Naaman, Matthew Neeley,
|
| 1490 |
+
Charles Neill, Murphy Yuezhen Niu, Eric Ostby, Andre Petukhov, John C. Platt, Chris Quintana, Eleanor G.
|
| 1491 |
+
Rieffel, Pedram Roushan, Nicholas C. Rubin, Daniel Sank, Kevin J. Satzinger, Vadim Smelyanskiy, Kevin J. Sung,
|
| 1492 |
+
Matthew D. Trevithick, Amit Vainsencher, Benjamin Villalonga, Theodore White, Z. Jamie Yao, Ping Yeh, Adam
|
| 1493 |
+
Zalcman, Hartmut Neven, and John M. Martinis. Quantum supremacy using a programmable superconducting
|
| 1494 |
+
processor. Nature, 574(7779):505–510, 2019.
|
| 1495 |
+
[28] NIST. Post-quantum cryptography. https://csrc.nist.gov/projects/post-quantum-cryptography, 2021.
|
| 1496 |
+
[29] R. J. McEliece. A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress
|
| 1497 |
+
Report, 44:114–116, January 1978.
|
| 1498 |
+
[30] Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M Schanck,
|
| 1499 |
+
Peter Schwabe, Gregor Seiler, and Damien Stehlé. Crystals-kyber algorithm specifications and supporting
|
| 1500 |
+
documentation. NIST PQC Round, 2:4, 2017.
|
| 1501 |
+
[31] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. Ntru: A ring-based public key cryptosystem. In Joe P.
|
| 1502 |
+
Buhler, editor, Algorithmic Number Theory, pages 267–288, Berlin, Heidelberg, 1998. Springer Berlin Heidelberg.
|
| 1503 |
+
[32] Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal. NTRU prime:
|
| 1504 |
+
Reducing attack surface at low cost. In Carlisle Adams and Jan Camenisch, editors, Selected Areas in Cryptography
|
| 1505 |
+
– SAC 2017, pages 235–260, Cham, 2018. Springer International Publishing.
|
| 1506 |
+
[33] Ir Frederik Vercauteren. Saber: Mod-lwr based kem (round 3 submission).
|
| 1507 |
+
[34] Jintai Ding and Bo-Yin Yang. Multivariate Public Key Cryptography, pages 193–241. Springer Berlin Heidelberg,
|
| 1508 |
+
Berlin, Heidelberg, 2009.
|
| 1509 |
+
[35] Tsutomu Matsumoto and Hideki Imai. Public quadratic polynomial-tuples for efficient signature-verification and
|
| 1510 |
+
message-encryption. In D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli,
|
| 1511 |
+
G. Seegmüller, J. Stoer, N. Wirth, and Christoph G. Günther, editors, Advances in Cryptology — EUROCRYPT
|
| 1512 |
+
’88, pages 419–453, Berlin, Heidelberg, 1988. Springer Berlin Heidelberg.
|
| 1513 |
+
[36] Christopher Wolf and Bart Preneel. Large superfluous keys in multivariate quadratic asymmetric systems. In
|
| 1514 |
+
Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography, PKC’05,
|
| 1515 |
+
page 275–287, Berlin, Heidelberg, 2005. Springer-Verlag.
|
| 1516 |
+
[37] Jacques Patarin and Louis Goubin. Trapdoor one-way permutations and multivariate polynomials. In Proc. of
|
| 1517 |
+
ICICS’97, LNCS 1334, pages 356–368. Springer, 1997.
|
| 1518 |
+
[38] Jacques Patarin. Hidden fields equations (hfe) and isomorphisms of polynomials (ip): Two new families of
|
| 1519 |
+
asymmetric algorithms. In Ueli Maurer, editor, Advances in Cryptology — EUROCRYPT ’96, pages 33–48, Berlin,
|
| 1520 |
+
Heidelberg, 1996. Springer Berlin Heidelberg.
|
| 1521 |
+
[39] Lih chung Wang, Bo yin Yang, Yu hua Hu, and Feipei Lai. A medium field multivariate public-key encryption
|
| 1522 |
+
scheme. In In CT-RSA 2006, volume 3860 of LNCS, pages 132–149, 2006.
|
| 1523 |
+
[40] Xin Wang and Xinmei Wang. An improved medium field multivariate public key cryptosystem. In 2008 Third
|
| 1524 |
+
International Conference on Convergence and Hybrid Information Technology, volume 2, pages 1120–1124, 2008.
|
| 1525 |
+
[41] Jean-Charles Faugére. A new efficient algorithm for computing gröbner bases (f4). Journal of Pure and Applied
|
| 1526 |
+
Algebra, 139(1):61–88, 1999.
|
| 1527 |
+
[42] Jean charles Faugère. A new efficient algorithm for computing gröbner bases (f4). In IN: ISSAC ’02: PROCEED-
|
| 1528 |
+
INGS OF THE 2002 INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION,
|
| 1529 |
+
pages 75–83, 2002.
|
| 1530 |
+
[43] Jintai Ding, J. Gower, and D. Schmidt. Zhuang-zi: A new algorithm for solving multivariate polynomial equations
|
| 1531 |
+
over a finite field. IACR Cryptol. ePrint Arch., 2006:38, 2006.
|
| 1532 |
+
[44] Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir. Efficient algorithms for solving overdefined
|
| 1533 |
+
systems of multivariate polynomial equations. In Advances in Cryptology - EUROCRYPT 2000, International
|
| 1534 |
+
Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000,
|
| 1535 |
+
Proceeding, volume 1807 of Lecture Notes in Computer Science, pages 392–407. Springer, 2000.
|
| 1536 |
+
[45] Louis Goubin and Nicolas T. Courtois. Cryptanalysis of the ttm cryptosystem. In Tatsuaki Okamoto, editor,
|
| 1537 |
+
Advances in Cryptology — ASIACRYPT 2000, pages 44–57, Berlin, Heidelberg, 2000. Springer Berlin Heidelberg.
|
| 1538 |
+
20
|
| 1539 |
+
|
| 1540 |
+
Novel Homomorphic Functional Encryption over a Hidden Ring
|
| 1541 |
+
[46] Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In Jacques
|
| 1542 |
+
Stern, editor, Advances in Cryptology — EUROCRYPT ’99, pages 206–222, Berlin, Heidelberg, 1999. Springer
|
| 1543 |
+
Berlin Heidelberg.
|
| 1544 |
+
[47] Randy Kuang. A deterministic polynomial public key algorithm over a prime galois field gf(p). In 2021 2nd Asia
|
| 1545 |
+
Conference on Computers and Communications (ACCC), pages 79–88, 2021.
|
| 1546 |
+
[48] Randy Kuang and Michel Barbeau. Indistinguishability and non-deterministic encryption of the quantum safe
|
| 1547 |
+
multivariate polynomial public key cryptographic system. In 2021 IEEE Canadian Conference on Electrical and
|
| 1548 |
+
Computer Engineering (CCECE), pages 1–5, 2021.
|
| 1549 |
+
[49] Randy Kuang and Michel Barbeau. Performance analysis of the quantum safe multivariate polynomial public
|
| 1550 |
+
key algorithm. In 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pages
|
| 1551 |
+
351–358. IEEE, 2021.
|
| 1552 |
+
[50] Randy Kuang and Michel Barbeau. Performance analysis of the quantum safe multivariate polynomial public
|
| 1553 |
+
key algorithm. In 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pages
|
| 1554 |
+
351–358, 2021.
|
| 1555 |
+
[51] Randy Kuang, Maria Perepechaenko, and Michel Barbeau. A new quantum-safe multivariate polynomial public
|
| 1556 |
+
key digital signature algorithm. Scientific Reports, 12, 2022.
|
| 1557 |
+
[52] Jintai Ding, Albrecht Petzoldt, and Dieter S. Schmidt. The SimpleMatrix Encryption Scheme, pages 169–183.
|
| 1558 |
+
Springer US, New York, NY, 2020.
|
| 1559 |
+
[53] Jintai Ding, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Cryptography, pages 7–23. Springer US, New
|
| 1560 |
+
York, NY, 2020.
|
| 1561 |
+
[54] C. Moore and S. Mertens. The Nature of Computation. OUP Oxford, 2011.
|
| 1562 |
+
[55] Sergei Evdokimov. Factorization of polynomials over finite fields in subexponential time under grh. In Interna-
|
| 1563 |
+
tional Algorithmic Number Theory Symposium, pages 209–219. Springer, 1994.
|
| 1564 |
+
[56] Peter F. Stiller. An introduction to the theory of resultants. 2004.
|
| 1565 |
+
[57] Yuri Matiyasevich. Hilbert’s tenth problem. Foundations of Computing Series. MIT Press, Cambridge, MA, 1993.
|
| 1566 |
+
Translated from the 1993 Russian original by the author, with a foreword by Martin Davis.
|
| 1567 |
+
21
|
| 1568 |
+
|
GtFLT4oBgHgl3EQfHC_F/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
H9E1T4oBgHgl3EQfrgXE/content/tmp_files/2301.03356v1.pdf.txt
ADDED
|
@@ -0,0 +1,531 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 2 |
+
DOI: 10.5121/ijans.2022.12403 35
|
| 3 |
+
|
| 4 |
+
SENSOR SIGNAL PROCESSING USING HIGH-LEVEL
|
| 5 |
+
SYNTHESIS AND INTERNET OF THINGS WITH A
|
| 6 |
+
LAYERED ARCHITECTURE
|
| 7 |
+
|
| 8 |
+
CS Reddy1 and Krishna Anand2
|
| 9 |
+
|
| 10 |
+
1Department of Mathematics, CIT - NC, VTU University, Bangalore, India
|
| 11 |
+
2Department of Computer Engineering, Anurag University, Hyderabad, India
|
| 12 |
+
|
| 13 |
+
ABSTRACT
|
| 14 |
+
|
| 15 |
+
Sensor routers play a crucial role in the sector of Internet of Things applications, in which the capacity for
|
| 16 |
+
transmission of the network signal is limited from cloud systems to sensors and its reversal process. It
|
| 17 |
+
describes a robust recognized framework with various architected layers to process data at high level
|
| 18 |
+
synthesis. It is designed to sense the nodes instinctually with the help of Internet of Things where the
|
| 19 |
+
applications arise in cloud systems. In this paper embedded PEs with four layer new design framework
|
| 20 |
+
architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis
|
| 21 |
+
DBMF (database management function) tool.
|
| 22 |
+
|
| 23 |
+
KEYWORDS
|
| 24 |
+
|
| 25 |
+
Network Protocols, Wireless Network, Mobile Network, Internet of Things, Reconfigurable dynamic
|
| 26 |
+
processor, Sensor signal processing.
|
| 27 |
+
|
| 28 |
+
1. INTRODUCTION
|
| 29 |
+
|
| 30 |
+
Sensor routers play a crucial role in the sector of Internet of Things (IOT) applications, in which
|
| 31 |
+
the capacity for transmission of the network signal is limited from cloud systems to sensors and
|
| 32 |
+
its reversal process. Consequence to this volume of the data reduction is obligatory to combat
|
| 33 |
+
device computing functions between sensor nodes and transmitter to exchange the sufficient data
|
| 34 |
+
with the available networks [1-3]. Hence, low power consumption and small footprints are
|
| 35 |
+
commanded among sensor nodes to process information. One of the replacements for
|
| 36 |
+
microcontroller units is field programmable gate arrays to optimize the footprints size, so that it is
|
| 37 |
+
to be observed keenly the routing with configurable logic blocks and switches of look-up tables
|
| 38 |
+
which causes placement inefficiency [4, 7]. To fabricate Field Programmable Gate Arrays
|
| 39 |
+
(FPGA) it is wise to use High-level synthesis which will enable global optimization and
|
| 40 |
+
recompense the limitation of Routing and Placement [5, 6].
|
| 41 |
+
|
| 42 |
+
In this paper embedded PEs with four layer new design framework architecture is proposed to
|
| 43 |
+
sense the devises of IOT applications with the support of high-level synthesis DBMF (database
|
| 44 |
+
management function) tool [8, 17, 19]. It exploits the repetitive high level synthesis process.
|
| 45 |
+
Macro blocks synthesized through high-level behavioural synthesis are registered in a database
|
| 46 |
+
before the system level synthesis, and the information in the database is used for the optimization
|
| 47 |
+
of resource consumption through the system level synthesis [10]. In this work authors tried to
|
| 48 |
+
investigate the dependencies of resource consumption on the granularity of coarse grained
|
| 49 |
+
function definitions using the extended database management function of Cyber Work Bench.
|
| 50 |
+
The evaluation results show that small footprint was achieved especially with dynamically
|
| 51 |
+
reconfigurable technique [9, 15].
|
| 52 |
+
|
| 53 |
+
International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 54 |
+
36
|
| 55 |
+
Dynamically reconfigurable processors using high-level synthesis were proposed to improve the
|
| 56 |
+
efficiency, whereas the inefficiency of fixed mesh pointed out in still remains [11-14]. Fixed bit
|
| 57 |
+
widths of data paths, elementary blocks, and switch matrices aiming at mass production of the
|
| 58 |
+
devices were one example of the inefficiency. Sensors used in IOT applications have various data
|
| 59 |
+
interfaces, such as 8, 12, 14, or 16 bits [ 17, 19]. Predefined data path between arrays of
|
| 60 |
+
arithmetic logic units prevents behavioural synthesis tools from the optimization of layout size
|
| 61 |
+
and the reduction in power consumption. Therefore, optimized Arithmetic Logic Units (ALU)
|
| 62 |
+
and flexible data paths are required to embed processors in sensor units [13, 15-17].
|
| 63 |
+
|
| 64 |
+
2. HIGH-LEVEL SYNTHESIS TOOLS
|
| 65 |
+
|
| 66 |
+
High-level synthesis is increasingly popular for the design of high-performance and energy-
|
| 67 |
+
efficient heterogeneous systems, shortening time-to-market and addressing today’s system
|
| 68 |
+
complexity [18, 20, 25]. Early academic work extracted scheduling, allocation, and binding as the
|
| 69 |
+
basic steps for high-level-synthesis [22, 24, 32]. Scheduling partitions in the algorithm to control
|
| 70 |
+
steps that are used in the model are defined the states in the finite-state machine [21, 33].
|
| 71 |
+
|
| 72 |
+
First generation behavioural synthesis was introduced by Synopsys in 1994 as behavioural
|
| 73 |
+
Compiler and used Verilog or VHDL as input languages. 10 years later, in 2004, there emerged a
|
| 74 |
+
number of next generation commercial high-level synthesis products which provided synthesis of
|
| 75 |
+
circuits specified at C level to a register transfer level specification [23, 25, 26]. It was primarily
|
| 76 |
+
adopted in Japan and Europe in the early years. As of late 2008, there was an emerging adoption
|
| 77 |
+
in the United States. High-level synthesis (HLS) allows designers to work at a higher level of
|
| 78 |
+
abstraction by using a software program to specify the hardware functionality [28, 29].
|
| 79 |
+
Additionally, HLS is particularly interesting for designing field-programmable gate array circuits,
|
| 80 |
+
where hardware implementations can be easily refined and replaced in the target device [27, 30-
|
| 81 |
+
32]. Recent years have seen much activity in the HLS research community, with a plethora of
|
| 82 |
+
HLS tool offerings, from both industry and academia.
|
| 83 |
+
|
| 84 |
+
|
| 85 |
+
|
| 86 |
+
Fig.1. Classification of High-Level Synthesis Input Language.
|
| 87 |
+
|
| 88 |
+
Applicationdomains:
|
| 89 |
+
HighLevelSynthesis
|
| 90 |
+
Tool status:
|
| 91 |
+
All domains
|
| 92 |
+
Imaging
|
| 93 |
+
Tools
|
| 94 |
+
InUse
|
| 95 |
+
Streaming
|
| 96 |
+
Stream/lmage
|
| 97 |
+
Abandoned
|
| 98 |
+
Loop/Pipeline
|
| 99 |
+
NIA
|
| 100 |
+
DSP
|
| 101 |
+
DataFlow
|
| 102 |
+
.NET
|
| 103 |
+
DomainSpecific
|
| 104 |
+
Generic
|
| 105 |
+
ODSE
|
| 106 |
+
Languages
|
| 107 |
+
Languages
|
| 108 |
+
NEW
|
| 109 |
+
C-extended
|
| 110 |
+
Procedural
|
| 111 |
+
ObjectOriented
|
| 112 |
+
Languages
|
| 113 |
+
Languages
|
| 114 |
+
Languages
|
| 115 |
+
Languages
|
| 116 |
+
O CyberWorkBench (BDL)
|
| 117 |
+
CoDeveloper (ImpulseC)
|
| 118 |
+
O Vivado HLS
|
| 119 |
+
CtoVerilog
|
| 120 |
+
Maxeler (MaxJ)
|
| 121 |
+
OBluespec (BSV)
|
| 122 |
+
DK Design Suite (HandelC)
|
| 123 |
+
oCatapult
|
| 124 |
+
O C2H
|
| 125 |
+
X
|
| 126 |
+
KIWI (C#)
|
| 127 |
+
PipeRench(DIL)
|
| 128 |
+
SA-C (SA-C)
|
| 129 |
+
oCtos
|
| 130 |
+
OSynphHLS
|
| 131 |
+
SeaCucumber (Java)
|
| 132 |
+
O HercuLeS (NAC)
|
| 133 |
+
Garp (Cpragmas)
|
| 134 |
+
SPARK
|
| 135 |
+
MATCH
|
| 136 |
+
Cynthesizer (SystemC)
|
| 137 |
+
Napa-C (Cpragmas)
|
| 138 |
+
O CHC
|
| 139 |
+
AccelDSP
|
| 140 |
+
eXCite (CSP pragmas)
|
| 141 |
+
O LegUp
|
| 142 |
+
O CHiMPS
|
| 143 |
+
ROCCC (C extended)
|
| 144 |
+
OBambu
|
| 145 |
+
?DEFACTO
|
| 146 |
+
GAUT
|
| 147 |
+
ogcc2verilog
|
| 148 |
+
TridentInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 149 |
+
37
|
| 150 |
+
HLS tools start from a software programmable high-level language to automatically produce a
|
| 151 |
+
circuit specification in HDL that performs the same function. The most common source inputs for
|
| 152 |
+
high-level synthesis are based on standard languages such as ANSI C/C++, System C and
|
| 153 |
+
MATLAB. HLS has also been recently applied to a variety of applications (e.g., medical
|
| 154 |
+
imaging, convolutional neural networks, and machine learning), with significant benefits in terms
|
| 155 |
+
of performance and energy consumption.
|
| 156 |
+
|
| 157 |
+
These HLS tools can leverage dedicated optimizations or micro architectural solutions for the
|
| 158 |
+
specific domain. However, the algorithm designer, who is usually a software engineer, has to
|
| 159 |
+
understand how to properly update the code. This approach is usually time-consuming and error
|
| 160 |
+
prone. For this reason, some HLS tools offer complete support for a standard HLL, such as C,
|
| 161 |
+
giving complete freedom to the algorithm designer. High level languages mainly classified into
|
| 162 |
+
two types that are shown in Fig. 1. One is Domain specific languages and other one is Generic
|
| 163 |
+
languages. In Domain specific languages it consist new languages and C- extended languages,
|
| 164 |
+
whereas, in Generic languages it consist Procedural and Object Oriented languages. HLS tool
|
| 165 |
+
select specific language for specific applications.
|
| 166 |
+
|
| 167 |
+
2.1. Five Key Challenges
|
| 168 |
+
|
| 169 |
+
In this section the important crucial challenges that arise in the process of signal synthesis in the
|
| 170 |
+
layered architecture.
|
| 171 |
+
|
| 172 |
+
Hardware in inherently concurrent, whereas software representations are sequential. HLS
|
| 173 |
+
must map the sequential algorithm onto concurrent hardware.
|
| 174 |
+
Timing is implicit in software in the sequence of instructions used. Synchronous hardware
|
| 175 |
+
must deal with timing constraints, with controlling and synchronizing operations at the clock
|
| 176 |
+
cycle level.
|
| 177 |
+
In software, the word length is fixed (8, 16, 32 or 64bits), but in hardware, it is usually
|
| 178 |
+
optimized for the task being performed.
|
| 179 |
+
The software model of memory is as a single block with a monolithic address space, with
|
| 180 |
+
almost all data items stored in memory. On an FPGA, local variables are stored in registers,
|
| 181 |
+
with multiple distributed memory blocks, each with their own independent address space. In
|
| 182 |
+
such an environment, pointers have little meaning, and dynamic memory allocation is very
|
| 183 |
+
difficult. Communication in software is usually through shared memory, whereas on an
|
| 184 |
+
FPGA it relies on constructing appropriate hardware, from implicit (within stream
|
| 185 |
+
processing), to simple token passing, to using dedicated FIFOs to manage flow control.
|
| 186 |
+
|
| 187 |
+
3. DATA LAYER INTERACTION ARCHITECTURE
|
| 188 |
+
|
| 189 |
+
|
| 190 |
+
Traditionally, the word architecture is concerned with the art or science of building, where it
|
| 191 |
+
relates to structural concepts and to styles of design. Here the authors will use it in the sense of
|
| 192 |
+
structured deceptions of a system from a number of compatible and complementary viewpoints
|
| 193 |
+
which, taken together, cover functional, design, fabrication and performance issues. The term
|
| 194 |
+
layer is used to refer to a particular descriptive viewpoint. Within a layer, descriptions will
|
| 195 |
+
generally be hierarchic to allow the containment of complexity or the exposure of detail by
|
| 196 |
+
suitable aggregation or decomposition techniques. Architecture(s) may be singular or plural
|
| 197 |
+
depending on whether it will be addressed as an individual layer or the complete set of
|
| 198 |
+
descriptions across all layers. It is clear from this definition that the architecture of a system is not
|
| 199 |
+
just confined to some sort of functional partitioning at the front end of a development, but
|
| 200 |
+
essentially embraces descriptions generated during all phases and stages of the development
|
| 201 |
+
process.
|
| 202 |
+
|
| 203 |
+
International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 204 |
+
38
|
| 205 |
+
The Data Interaction Architecture is a prime example of a layered architecture. It contains four
|
| 206 |
+
layers, each of which can be regarded as a model of the system from a particular viewpoint.
|
| 207 |
+
Fig.2. shows some small representational fragments for each of the four layers. The layers consist
|
| 208 |
+
of I/O circuitry, fine grained layer, coarse grained function definition layer, and bypass
|
| 209 |
+
connection layer, where they are listed from the bottom layer to the top layer, respectively. Well
|
| 210 |
+
defined notations and technical conventions exist for each of these layers and are closely
|
| 211 |
+
modelled on those of MASCOT, Modular Approach to Software Construction Operation and
|
| 212 |
+
Test. Where relevant the notations include composite structures to support hierarchical
|
| 213 |
+
representations over multiple levels within a layer. The motivation behind the layered
|
| 214 |
+
architecture method is to provide the means of moving from a functional model of a system to an
|
| 215 |
+
execution model.
|
| 216 |
+
|
| 217 |
+
|
| 218 |
+
|
| 219 |
+
Fig.2. Data Interaction Architecture
|
| 220 |
+
|
| 221 |
+
The emphasis on the identification of well-defined interactions in the functional model, and the
|
| 222 |
+
preservation of these speck tied interaction properties through the subsequent layers, provides the
|
| 223 |
+
structural conformance by which traceability is achieved. It follows that the functional model is
|
| 224 |
+
binding on subsequent development. Developers are not free to reverse engineer the functional
|
| 225 |
+
model to allow an alternative development path in which traceability would be lost. Of course the
|
| 226 |
+
functional model may need to be changed, either because system requirements have changed, or
|
| 227 |
+
because detail design has shown that an alternative functional model would be better. Whatever
|
| 228 |
+
the reason for change, consistency across the model set must be preserved.
|
| 229 |
+
|
| 230 |
+
The main distinguishing feature of Data Interaction Architecture (DIA) is the explicit
|
| 231 |
+
representation of shared information and shared data. Here i will concentrate on the sharing
|
| 232 |
+
|
| 233 |
+
Model
|
| 234 |
+
Representation example
|
| 235 |
+
Focus
|
| 236 |
+
Functional
|
| 237 |
+
What
|
| 238 |
+
Generator
|
| 239 |
+
User
|
| 240 |
+
Design
|
| 241 |
+
How
|
| 242 |
+
Writer
|
| 243 |
+
Reader
|
| 244 |
+
Distribution
|
| 245 |
+
Where
|
| 246 |
+
Writer
|
| 247 |
+
Reader
|
| 248 |
+
Execution
|
| 249 |
+
When
|
| 250 |
+
Writer
|
| 251 |
+
Reader
|
| 252 |
+
V
|
| 253 |
+
Kemel
|
| 254 |
+
KermelInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 255 |
+
39
|
| 256 |
+
implicit in the bilateral interactions between processes, leaving discussion of the more general
|
| 257 |
+
information retention element. A summary description of the model in each layer shows how
|
| 258 |
+
bilateral interaction properties are tracked.
|
| 259 |
+
|
| 260 |
+
4. ARCHITECTURE OF PROCESSING ELEMENTS
|
| 261 |
+
|
| 262 |
+
In this paper authors proposed to establish a new design framework to solve issues described in
|
| 263 |
+
the preceding section by exploiting the binding process of high-level/behavioural synthesis.
|
| 264 |
+
|
| 265 |
+
4.1. Layered Architecture
|
| 266 |
+
|
| 267 |
+
The purpose of the conventional high-level synthesis tools is to generate finite state machines
|
| 268 |
+
with data paths. Here File System Meta-Data (FSMD) referred as fine grained layer. It is
|
| 269 |
+
expanded with the scope of high-level synthesis to coarse grained layer to exploit the functional
|
| 270 |
+
representations of circuitries. ALUs in coarse grained layer are defined by the functional
|
| 271 |
+
representations of high-level programming languages. Switches are added as bypass connection
|
| 272 |
+
layer for the scope of high-level synthesis intentionally. Implicit as-built meshes of switches put
|
| 273 |
+
constraints on high-level synthesis. In the processes are allowed as unprejudiced bypass switches
|
| 274 |
+
to remove the meshes. Communications between the PEs are limited between adjacent PEs,
|
| 275 |
+
whereas it is found no limitations for sensor applications with the limited communication paths.
|
| 276 |
+
|
| 277 |
+
The following explains these layers I/O circuitry is implemented with random logic gates and
|
| 278 |
+
mixed signal I/O circuitries. They are connected to the fine grained blocks in the above layer. The
|
| 279 |
+
fine grained layer mainly consists of finite state machines and data paths. They are replaceable to
|
| 280 |
+
follow the context described by high-level languages. The coarse grained function definition
|
| 281 |
+
layer is located on the fine grained layer. Optimized ALUs for a certain application are defined in
|
| 282 |
+
this layer. An operation primitive defined in the layer corresponds to an operation code (op code)
|
| 283 |
+
of a conventional multipoint control unit (MCU), whereas it does not have to be standardized for
|
| 284 |
+
over many applications. As for the topmost bypass connection layer, simple bypass switch
|
| 285 |
+
images can be specified over coarse grained blocks. The connections between inputs and outputs
|
| 286 |
+
of PEs are configurable with the bypass switches.
|
| 287 |
+
|
| 288 |
+
4.2. Design Flow
|
| 289 |
+
|
| 290 |
+
The following six steps compose the design flow of the design framework to design a PE through
|
| 291 |
+
layered scheme.
|
| 292 |
+
|
| 293 |
+
Step 1: Describe a system in high-level language.
|
| 294 |
+
Step 2: Define coarse grained operations. Typical dedicated functions for sensor signals are
|
| 295 |
+
signal compensation, feature point identification for image recognition, and image
|
| 296 |
+
compression in addition to basic arithmetic operations. The defined coarse grained
|
| 297 |
+
operations are exploited in high-level synthesis and behavioural synthesis process.
|
| 298 |
+
Step 3: Generate source codes written in hardware description language through behavioural
|
| 299 |
+
synthesis. The hard macros defined and implemented in the step 2 are exploited for
|
| 300 |
+
generating circuitries by the functions of CWB.
|
| 301 |
+
Step 4: This step is identical to conventional logic synthesis.
|
| 302 |
+
Step 5: This step is identical to conventional layout design.
|
| 303 |
+
Step 6: The verification and validation step include back annotation based on the result of delay
|
| 304 |
+
analysis.
|
| 305 |
+
|
| 306 |
+
|
| 307 |
+
International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 308 |
+
40
|
| 309 |
+
In the work authors used a data base management function of CWB to exploit the definitions of
|
| 310 |
+
operations in the coarse grained layer during the behavioural synthesis to treat a function as an
|
| 311 |
+
operator. The operations can be implemented as hard macros by using custom ASIC design tools
|
| 312 |
+
and/or LUTs of FPGAs. The operator definitions were exploited on the step 3 as macro blocks.
|
| 313 |
+
Once macro blocks are registered in a database, CWB can use the macro blocks during the
|
| 314 |
+
binding process of high-level synthesis automatically to reduce layout area size. The binding
|
| 315 |
+
process of high-level synthesis is regarded as nondeterministic polynomial (NP) hard and
|
| 316 |
+
heuristic approach was often employed. The design flow enables the automation of binding
|
| 317 |
+
process instead of the heuristic approach.
|
| 318 |
+
|
| 319 |
+
4.3. Typical Design of Processing Element
|
| 320 |
+
|
| 321 |
+
Two types of context were identified with reference to semantics or lambda calculus of functional
|
| 322 |
+
representations to define ALUs in coarse grained function definition layer. One is a configurable
|
| 323 |
+
static context often mentioned as stored information in a file, and the other is a dynamic context
|
| 324 |
+
as stored information in heap registers as shown in Fig. 3. The static contexts of an application
|
| 325 |
+
are expressed with finite state machines and data paths implemented by n sets of hard- ware
|
| 326 |
+
circuitry of PEs. The dynamic contexts of an application are specified as m sets of registers and
|
| 327 |
+
instructions. The instruction sets are optimized for an application, and each optimized instruction
|
| 328 |
+
set can be shared among some dynamic contexts.
|
| 329 |
+
|
| 330 |
+
|
| 331 |
+
|
| 332 |
+
Fig.3. Modified High-Level Synthesis Process.
|
| 333 |
+
|
| 334 |
+
The program code is implemented with a specific C-language comment description /* Cyber func
|
| 335 |
+
= operator */ for defining dynamic and static contexts, which are the sets of pairs of registers and
|
| 336 |
+
optimized instruction sets. The pair of a register set and an instruction set can be shared among
|
| 337 |
+
dynamic contexts using another specific C-language comment description as /* Cyber share name
|
| 338 |
+
= NAME */. NAME is an arbitrary designation. The binding process of high-level behavioural
|
| 339 |
+
|
| 340 |
+
Higher
|
| 341 |
+
Hard
|
| 342 |
+
Hard
|
| 343 |
+
module
|
| 344 |
+
Macro
|
| 345 |
+
Macro
|
| 346 |
+
Highlevel/Behavioral
|
| 347 |
+
Highlevel /Behavioral
|
| 348 |
+
Highlevel/Behavioral
|
| 349 |
+
synthesis
|
| 350 |
+
synthesis
|
| 351 |
+
synthesis
|
| 352 |
+
CDFGgeneration
|
| 353 |
+
Allocation
|
| 354 |
+
不
|
| 355 |
+
LMSPEC
|
| 356 |
+
RTL
|
| 357 |
+
LMSPEC
|
| 358 |
+
RTL
|
| 359 |
+
Scheduling
|
| 360 |
+
不
|
| 361 |
+
Binding
|
| 362 |
+
FSMDgeneration
|
| 363 |
+
RTL
|
| 364 |
+
Logic synthesis
|
| 365 |
+
Place and Route
|
| 366 |
+
RTL:RegisterTransferLevel
|
| 367 |
+
不
|
| 368 |
+
LMSPEC:LowerModuleSpecificationFile
|
| 369 |
+
CDFG:ControlandDataFlowGraph
|
| 370 |
+
Configuration
|
| 371 |
+
FSMD:FiniteStateMachinewithDatapath
|
| 372 |
+
DataInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 373 |
+
41
|
| 374 |
+
synthesis can be controlled by these descriptions to exploit the functional representations defined
|
| 375 |
+
in a high-level programming language.
|
| 376 |
+
|
| 377 |
+
5. RESULTS
|
| 378 |
+
|
| 379 |
+
Experiments are carried out to evaluate the design framework using convolution operations; those
|
| 380 |
+
are often used for sensor applications, with following three conditions. The matrix functions of
|
| 381 |
+
the filters are similar and the difference is the parameters of 3×3 matrices. It is observed one can
|
| 382 |
+
evaluate the layout area size reduction results by using an FPGA, Xilinx XC7A200T FPGA,
|
| 383 |
+
although the design framework was established aiming at improving ASIC design at first.
|
| 384 |
+
|
| 385 |
+
Defining a convolution function as one operator.
|
| 386 |
+
Implementing ALUs with basic operations, i.e., plus, minus, multiply, divide, and
|
| 387 |
+
comparison operations, using dynamically reconfiguration technique designated as
|
| 388 |
+
flexible reliability reconfigurable array (FRRA).
|
| 389 |
+
Elaborating whole design with FPGA libraries without operator definitions and a
|
| 390 |
+
function definition database.
|
| 391 |
+
|
| 392 |
+
|
| 393 |
+
|
| 394 |
+
Fig.4. Comparison of LUT utilizations According to Operator Definitions
|
| 395 |
+
|
| 396 |
+
Derived LUT counts for each evaluation case are shown in Fig.4. The LUT counts of basic
|
| 397 |
+
operations were excluded for comparison. The larger the granularity of an operation was, the less
|
| 398 |
+
counts of LUTs were consumed. Remarkable difference of LUT counts was shown for cascaded
|
| 399 |
+
operations. The LUT counts of cascaded operations using FPGA library was more than double
|
| 400 |
+
compared to single operation. The results show that exploiting granularity in behavioural
|
| 401 |
+
synthesis was carried out by CWB automatically without specifying the reuse of macro blocks
|
| 402 |
+
explicitly. The difference between one operation and cascaded operations using FRRAs with
|
| 403 |
+
dynamically reconfiguration technique was 22% less than the difference using the operator
|
| 404 |
+
definition on convolution operations.
|
| 405 |
+
|
| 406 |
+
6. CONCLUSIONS
|
| 407 |
+
|
| 408 |
+
A novel model is developed to design a framework to reduce the footprints of programmable
|
| 409 |
+
functions of sensing devices for IOT applications. The design framework consists of four layered
|
| 410 |
+
structure of PE architecture and the extended database management function of a high-level
|
| 411 |
+
synthesis tool to exploit functional representations in high-level programming languages.
|
| 412 |
+
|
| 413 |
+
Laplacian Filter
|
| 414 |
+
GaussianFilter+LaplacianFilter
|
| 415 |
+
(a)
|
| 416 |
+
(b)
|
| 417 |
+
(c)
|
| 418 |
+
0
|
| 419 |
+
200
|
| 420 |
+
400
|
| 421 |
+
600
|
| 422 |
+
800
|
| 423 |
+
LUT countsInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 424 |
+
42
|
| 425 |
+
The layout size reduction is useful to embed a PE into a sensing device and to provide device
|
| 426 |
+
computing capabilities with a sensing device. The experimental results report the power
|
| 427 |
+
consumption reduction by adopting the design framework on a Nano Bridge FPGA.
|
| 428 |
+
|
| 429 |
+
REFERENCES
|
| 430 |
+
|
| 431 |
+
[1]
|
| 432 |
+
Hihara, H., Iwasaki, A., Hashimoto, M., Ochi, H., Mitsuyama, Y., Onodera, H., ... & Sakamoto, T.
|
| 433 |
+
(2018). “Sensor signal processing using high-level synthesis with a layered architecture”, IEEE
|
| 434 |
+
Embedded Systems Letters, 10(4), 119-122.
|
| 435 |
+
[2]
|
| 436 |
+
Sreelatha, V., Mamatha, E., Reddy, C. S., & Rajdurai, P. S. (2022). “Spectrum Relay Performance of
|
| 437 |
+
Cognitive Radio between Users with Random Arrivals and Departures,” In Mobile Radio
|
| 438 |
+
Communications and 5G Networks (pp. 533-542). Springer, Singapore.
|
| 439 |
+
[3]
|
| 440 |
+
R. Zhao, M. Tan, S. Dai, and Z. Zhang, “Area-efficient pipelining for FPGA-targeted high-level
|
| 441 |
+
synthesis,” in Proc. 52nd ACM/EDAC/IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
|
| 442 |
+
2015.
|
| 443 |
+
[4]
|
| 444 |
+
Saritha, S., Mamatha, E., Reddy, C. S., & Rajadurai, P. (2022). “A model for overflow queuing
|
| 445 |
+
network with two-station heterogeneous system,” International Journal of Process Management and
|
| 446 |
+
Benchmarking, 12(2), 147-158.
|
| 447 |
+
[5]
|
| 448 |
+
Mamatha, E., Anand, S. K., Devika, B., Prasad, S. T., & Reddy, C. S. (2021, July). “Performance
|
| 449 |
+
Analysis of Data Packets Service in Queuing Networks System,” In 2021 12th International
|
| 450 |
+
Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-4).
|
| 451 |
+
IEEE.
|
| 452 |
+
[6]
|
| 453 |
+
M. Gort and J. Anderson, “Design re-use for compile time reduction in FPGA high-level synthesis
|
| 454 |
+
flows,” in Proc. Int. Conf. Field Program. Technol. (FPT), Shanghai, China, 2014, pp. 4–11.
|
| 455 |
+
[7]
|
| 456 |
+
Saritha, S., Mamatha, E., Reddy, C.S., Anand, K. (2019). “A model for compound poisson process
|
| 457 |
+
queuing system with batch arrivals and services,” Journal Européen des Systèmes Automatisés, Vol.
|
| 458 |
+
53, No. 1, pp. 81-86.
|
| 459 |
+
[8]
|
| 460 |
+
M. Schmid, O. Reiche, C. Schmitt, F. Hannig, and J. Teich, “Code generation for high-level synthesis
|
| 461 |
+
of multi resolution applications on FPGAs,” in Proc. FSP, 2014, pp. 21–26.
|
| 462 |
+
[9]
|
| 463 |
+
Mamatha, E., et al. "Mathematical modelling and performance analysis of single server queuing
|
| 464 |
+
system-eigenspectrum," International Journal of Mathematics in Operational Research 16.4 (2020):
|
| 465 |
+
455-468.
|
| 466 |
+
[10] Saritha, S., Mamatha, E., Reddy, C.S. (2019). “Performance measures of online warehouse service
|
| 467 |
+
system with replenishment policy. Journal Européen des Systèmes Automatisés,” Vol. 52, No. 6, pp.
|
| 468 |
+
631-638
|
| 469 |
+
[11] D. Alnajjar et al., “Reliability-configurable mixed-grained reconfigurable array supporting C-to-array
|
| 470 |
+
mapping and its radiation testing,” in Proc. IEEE A-SSCC, 2013, pp. 313–316.
|
| 471 |
+
[12] Mamatha, E., C. S. Reddy, and Rohit Sharma. "Effects of viscosity variation and thermal effects in
|
| 472 |
+
squeeze films." Annales de Chimie. Science des Materiaux. Vol. 42. No. 1. Lavoisier, 2018.
|
| 473 |
+
[13] Kumar, MV Sravan, et al. "Data hiding with dual based reversible image using sudoku technique."
|
| 474 |
+
2017 International Conference on Advances in Computing, Communications and Informatics
|
| 475 |
+
(ICACCI). IEEE, 2017.
|
| 476 |
+
[14] Mamatha, E., C. S. Reddy, and S. Krishna Anand. "Focal point computation and homogeneous
|
| 477 |
+
geometrical transformation for linear curves." Perspectives in Science 8 (2016): 19-21.
|
| 478 |
+
[15] Mamatha, E., Reddy, C. S., & Prasad, R. (2012). “Mathematical modeling of markovian queuing
|
| 479 |
+
network with repairs, breakdown and fixed buffer.” i-Manager's Journal on Software Engineering,
|
| 480 |
+
6(3), 21.
|
| 481 |
+
[16] Anand, Krishna, et al. "Design of neural network based expert system for automated lime kiln
|
| 482 |
+
system." Journal Européen des Systèmes Automatisés 52.4 (2019): 369-376.
|
| 483 |
+
[17] F. Wang, G. T. Wang, R. H. Wang, and X. W. Huang, “FPGA implementation of Laplacian of
|
| 484 |
+
Gaussian edge detection algorithm,” Adv. Mater. Res., vols. 282–283, pp. 157–160, Jul. 2011.
|
| 485 |
+
[18] Elliriki, M., Reddy, C. S., Anand, K., & Saritha, S. (2021). “Multi server queuing system with crashes
|
| 486 |
+
and alternative repair strategies.” Communications in Statistics-Theory and Methods, 1-13.
|
| 487 |
+
[19] Y. Hasegawa et al., “Design methodology and trade-offs analysis for parameterized dynamically
|
| 488 |
+
reconfigurable processor arrays,” in Proc. FPL, Amsterdam, The Netherlands, 2007, pp. 796–799.
|
| 489 |
+
|
| 490 |
+
International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
|
| 491 |
+
43
|
| 492 |
+
[20] T. Toi et al., “High-level synthesis challenges and solutions for a dynamically reconfigurable
|
| 493 |
+
processor,” in Proc. IEEE/ACM Int. Conf. Comput. Aided Design, San Jose, CA, USA, 2006, pp.
|
| 494 |
+
702–708.
|
| 495 |
+
[21] Mamatha, E., C. S. Reddy, and K. R. Prasad. "Antialiased Digital Pixel Plotting for Raster Scan Lines
|
| 496 |
+
Using Area Evaluation." Emerging Research in Computing, Information, Communication and
|
| 497 |
+
Applications. Springer, Singapore, 2016. 461-468.
|
| 498 |
+
[22] K. Wakabayashi, “Cyber Workbench: Integrated design environment based on C-based behavior
|
| 499 |
+
synthesis and verification,” in Proc. IEEE VLSI-TSA Int. Symp., H sinchu, Taiwan, 2005, pp. 173–
|
| 500 |
+
176.
|
| 501 |
+
[23] Mamatha, E., S. Saritha, and C. S. Reddy. "Stochastic Scheduling Algorithm for Distributed Cloud
|
| 502 |
+
Networks using Heuristic Approach." International Journal of Advanced Networking and
|
| 503 |
+
Applications 8.1 (2016): 3009.
|
| 504 |
+
[24] Reddy, C. S., et al. "Obtaining Description for Simple Images using Surface Realization Techniques
|
| 505 |
+
and Natural Language Processing." Indian Journal of Science and Technology 9.22 (2016): 1-7.
|
| 506 |
+
[25] M. Meribout and M. Motomura, “A-combined approach to highlevel synthesis for dynamically
|
| 507 |
+
reconfigurable systems,” IEEE Trans. Comput., vol. 53, no. 12, pp. 1508–1522, Dec. 2004.
|
| 508 |
+
[26] R. Hartenstein, “The microprocessor is no longer general purpose: Why future reconfigurable
|
| 509 |
+
platforms will win,” in Proc. 2nd Annu. IEEE Int. Conf. Innov. Syst. Silicon, Austin, TX, USA, 1997,
|
| 510 |
+
pp. 2–12.
|
| 511 |
+
[27] Elliriki, M., Reddy, C. C. S., & Anand, K. (2019). “An efficient line clipping algorithm in 2D space.”
|
| 512 |
+
Int. Arab J. Inf. Technol., 16(5), 798-807.
|
| 513 |
+
[28] L. Chen, “Fast generation of Gaussian and Laplacian image pyramids using an FPGA-based custom
|
| 514 |
+
computing platform,” M.S. thesis, Virginia Polytechnic Inst. State Univ., Blacksburg, VA, USA,
|
| 515 |
+
1994.
|
| 516 |
+
[29] Raw, R. S., & Lobiyal, D. K. (2012). Throughput and delay analysis of next-hop forwarding method
|
| 517 |
+
for non-linear vehicular ad hoc networks. International Journal on Ad Hoc Networking Systems, 2(2),
|
| 518 |
+
33-44.
|
| 519 |
+
[30] Mamatha, E., Sasritha, S., & Reddy, C. S. (2017). “Expert system and heuristics algorithm for cloud
|
| 520 |
+
resource scheduling.” Romanian Statistical Review, 65(1), 3-18.
|
| 521 |
+
[31] H. Hihara et al., “Novel processor architecture for onboard infrared sensors,” in Proc. SPIE Infrared
|
| 522 |
+
Remote Sens. Instrum. XXIV, vol. 9973, San Diego, CA, USA, Sep. 2016, Art. no. 99730S.
|
| 523 |
+
[32] Abdelgadir, M., Saeed, R. A., & Babiker, A. (2018). Cross layer design approach for efficient data
|
| 524 |
+
delivery based on IEEE 802.11 P in vehicular ad-hoc networks (VANETS) for city scenarios.
|
| 525 |
+
International Journal on Ad Hoc Networking Systems (IJANS), 8(4), 01-12.
|
| 526 |
+
[33] Beritelli, F., La Corte, A., Rametta, C., & Scaglione, F. (2015). A Cellular bonding and adaptive load
|
| 527 |
+
balancing based multi-sim gateway for mobile ad hoc and sensor networks. International Journal on
|
| 528 |
+
Ad Hoc Networking Systems (IJANS), 5(3).
|
| 529 |
+
|
| 530 |
+
|
| 531 |
+
|
H9E1T4oBgHgl3EQfrgXE/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,531 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf,len=530
|
| 2 |
+
page_content='International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 3 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 4 |
+
page_content=' 4, October 2022 DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 5 |
+
page_content='5121/ijans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 6 |
+
page_content='2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 7 |
+
page_content='12403 35 SENSOR SIGNAL PROCESSING USING HIGH-LEVEL SYNTHESIS AND INTERNET OF THINGS WITH A LAYERED ARCHITECTURE CS Reddy1 and Krishna Anand2 1Department of Mathematics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 8 |
+
page_content=' CIT - NC,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 9 |
+
page_content=' VTU University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 10 |
+
page_content=' Bangalore,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 11 |
+
page_content=' India 2Department of Computer Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 12 |
+
page_content=' Anurag University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 13 |
+
page_content=' Hyderabad,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 14 |
+
page_content=' India ABSTRACT Sensor routers play a crucial role in the sector of Internet of Things applications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 15 |
+
page_content=' in which the capacity for transmission of the network signal is limited from cloud systems to sensors and its reversal process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 16 |
+
page_content=' It describes a robust recognized framework with various architected layers to process data at high level synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 17 |
+
page_content=' It is designed to sense the nodes instinctually with the help of Internet of Things where the applications arise in cloud systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 18 |
+
page_content=' In this paper embedded PEs with four layer new design framework architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis DBMF (database management function) tool.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 19 |
+
page_content=' KEYWORDS Network Protocols, Wireless Network, Mobile Network, Internet of Things, Reconfigurable dynamic processor, Sensor signal processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 20 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 21 |
+
page_content=' INTRODUCTION Sensor routers play a crucial role in the sector of Internet of Things (IOT) applications, in which the capacity for transmission of the network signal is limited from cloud systems to sensors and its reversal process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 22 |
+
page_content=' Consequence to this volume of the data reduction is obligatory to combat device computing functions between sensor nodes and transmitter to exchange the sufficient data with the available networks [1-3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 23 |
+
page_content=' Hence, low power consumption and small footprints are commanded among sensor nodes to process information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 24 |
+
page_content=' One of the replacements for microcontroller units is field programmable gate arrays to optimize the footprints size, so that it is to be observed keenly the routing with configurable logic blocks and switches of look-up tables which causes placement inefficiency [4, 7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 25 |
+
page_content=' To fabricate Field Programmable Gate Arrays (FPGA) it is wise to use High-level synthesis which will enable global optimization and recompense the limitation of Routing and Placement [5, 6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 26 |
+
page_content=' In this paper embedded PEs with four layer new design framework architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis DBMF (database management function) tool [8, 17, 19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 27 |
+
page_content=' It exploits the repetitive high level synthesis process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 28 |
+
page_content=' Macro blocks synthesized through high-level behavioural synthesis are registered in a database before the system level synthesis, and the information in the database is used for the optimization of resource consumption through the system level synthesis [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 29 |
+
page_content=' In this work authors tried to investigate the dependencies of resource consumption on the granularity of coarse grained function definitions using the extended database management function of Cyber Work Bench.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 30 |
+
page_content=' The evaluation results show that small footprint was achieved especially with dynamically reconfigurable technique [9, 15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 31 |
+
page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 32 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 33 |
+
page_content=' 4, October 2022 36 Dynamically reconfigurable processors using high-level synthesis were proposed to improve the efficiency, whereas the inefficiency of fixed mesh pointed out in still remains [11-14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 34 |
+
page_content=' Fixed bit widths of data paths, elementary blocks, and switch matrices aiming at mass production of the devices were one example of the inefficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 35 |
+
page_content=' Sensors used in IOT applications have various data interfaces, such as 8, 12, 14, or 16 bits [ 17, 19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 36 |
+
page_content=' Predefined data path between arrays of arithmetic logic units prevents behavioural synthesis tools from the optimization of layout size and the reduction in power consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 37 |
+
page_content=' Therefore, optimized Arithmetic Logic Units (ALU) and flexible data paths are required to embed processors in sensor units [13, 15-17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 38 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 39 |
+
page_content=' HIGH LEVEL SYNTHESIS TOOLS High-level synthesis is increasingly popular for the design of high-performance and energy- efficient heterogeneous systems, shortening time-to-market and addressing today’s system complexity [18, 20, 25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 40 |
+
page_content=' Early academic work extracted scheduling, allocation, and binding as the basic steps for high-level-synthesis [22, 24, 32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 41 |
+
page_content=' Scheduling partitions in the algorithm to control steps that are used in the model are defined the states in the finite-state machine [21, 33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 42 |
+
page_content=' First generation behavioural synthesis was introduced by Synopsys in 1994 as behavioural Compiler and used Verilog or VHDL as input languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 43 |
+
page_content=' 10 years later, in 2004, there emerged a number of next generation commercial high-level synthesis products which provided synthesis of circuits specified at C level to a register transfer level specification [23, 25, 26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 44 |
+
page_content=' It was primarily adopted in Japan and Europe in the early years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 45 |
+
page_content=' As of late 2008, there was an emerging adoption in the United States.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 46 |
+
page_content=' High-level synthesis (HLS) allows designers to work at a higher level of abstraction by using a software program to specify the hardware functionality [28, 29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 47 |
+
page_content=' Additionally, HLS is particularly interesting for designing field-programmable gate array circuits, where hardware implementations can be easily refined and replaced in the target device [27, 30- 32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 48 |
+
page_content=' Recent years have seen much activity in the HLS research community, with a plethora of HLS tool offerings, from both industry and academia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 49 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 50 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 51 |
+
page_content=' Classification of High Level Synthesis Input Language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 52 |
+
page_content=' Applicationdomains: HighLevelSynthesis Tool status: All domains Imaging Tools InUse Streaming Stream/lmage Abandoned Loop/Pipeline NIA DSP DataFlow .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 53 |
+
page_content='NET ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 54 |
+
page_content='DomainSpecific ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 55 |
+
page_content='Generic ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 56 |
+
page_content='ODSE ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 57 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 58 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 59 |
+
page_content='NEW ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 60 |
+
page_content='C-extended ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 61 |
+
page_content='Procedural ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 62 |
+
page_content='ObjectOriented ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 63 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 64 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 65 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 66 |
+
page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 67 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 68 |
+
page_content='CyberWorkBench ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 69 |
+
page_content='(BDL) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 70 |
+
page_content='CoDeveloper ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 71 |
+
page_content='(ImpulseC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 72 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 73 |
+
page_content='Vivado ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 74 |
+
page_content='HLS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 75 |
+
page_content='CtoVerilog ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 76 |
+
page_content='Maxeler ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 77 |
+
page_content='(MaxJ) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 78 |
+
page_content='OBluespec ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 79 |
+
page_content='(BSV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 80 |
+
page_content='DK ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 81 |
+
page_content='Design ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 82 |
+
page_content='Suite ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 83 |
+
page_content='(HandelC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 84 |
+
page_content='oCatapult ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 85 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 86 |
+
page_content='C2H ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 87 |
+
page_content='X ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 88 |
+
page_content='KIWI ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 89 |
+
page_content='(C#) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 90 |
+
page_content='PipeRench(DIL) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 91 |
+
page_content='SA-C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 92 |
+
page_content='(SA-C) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 93 |
+
page_content='oCtos ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 94 |
+
page_content='OSynphHLS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 95 |
+
page_content='SeaCucumber ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 96 |
+
page_content='(Java) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 97 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 98 |
+
page_content='HercuLeS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 99 |
+
page_content='(NAC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 100 |
+
page_content='Garp ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 101 |
+
page_content='(Cpragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 102 |
+
page_content='SPARK ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 103 |
+
page_content='MATCH ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 104 |
+
page_content='Cynthesizer ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 105 |
+
page_content='(SystemC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 106 |
+
page_content='Napa-C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 107 |
+
page_content='(Cpragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 108 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 109 |
+
page_content='CHC ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 110 |
+
page_content='AccelDSP ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 111 |
+
page_content='eXCite ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 112 |
+
page_content='(CSP ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 113 |
+
page_content='pragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 114 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 115 |
+
page_content='LegUp ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 116 |
+
page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 117 |
+
page_content='CHiMPS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 118 |
+
page_content='ROCCC ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 119 |
+
page_content='(C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 120 |
+
page_content='extended) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 121 |
+
page_content='OBambu ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 122 |
+
page_content='?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 123 |
+
page_content='DEFACTO GAUT ogcc2verilog TridentInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 124 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 125 |
+
page_content=' 4, October 2022 37 HLS tools start from a software programmable high-level language to automatically produce a circuit specification in HDL that performs the same function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 126 |
+
page_content=' The most common source inputs for high-level synthesis are based on standard languages such as ANSI C/C++, System C and MATLAB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 127 |
+
page_content=' HLS has also been recently applied to a variety of applications (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 128 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 129 |
+
page_content=', medical imaging, convolutional neural networks, and machine learning), with significant benefits in terms of performance and energy consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 130 |
+
page_content=' These HLS tools can leverage dedicated optimizations or micro architectural solutions for the specific domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 131 |
+
page_content=' However, the algorithm designer, who is usually a software engineer, has to understand how to properly update the code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 132 |
+
page_content=' This approach is usually time-consuming and error prone.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 133 |
+
page_content=' For this reason, some HLS tools offer complete support for a standard HLL, such as C, giving complete freedom to the algorithm designer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 134 |
+
page_content=' High level languages mainly classified into two types that are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 135 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 136 |
+
page_content=' One is Domain specific languages and other one is Generic languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 137 |
+
page_content=' In Domain specific languages it consist new languages and C- extended languages, whereas, in Generic languages it consist Procedural and Object Oriented languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 138 |
+
page_content=' HLS tool select specific language for specific applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 139 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 140 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 141 |
+
page_content=' Five Key Challenges In this section the important crucial challenges that arise in the process of signal synthesis in the layered architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 142 |
+
page_content=' \uf0d8 Hardware in inherently concurrent, whereas software representations are sequential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 143 |
+
page_content=' HLS must map the sequential algorithm onto concurrent hardware.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 144 |
+
page_content=' \uf0d8 Timing is implicit in software in the sequence of instructions used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 145 |
+
page_content=' Synchronous hardware must deal with timing constraints, with controlling and synchronizing operations at the clock cycle level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 146 |
+
page_content=' \uf0d8 In software, the word length is fixed (8, 16, 32 or 64bits), but in hardware, it is usually optimized for the task being performed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 147 |
+
page_content=' \uf0d8 The software model of memory is as a single block with a monolithic address space, with almost all data items stored in memory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 148 |
+
page_content=' On an FPGA, local variables are stored in registers, with multiple distributed memory blocks, each with their own independent address space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 149 |
+
page_content=' In such an environment, pointers have little meaning, and dynamic memory allocation is very difficult.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 150 |
+
page_content=' Communication in software is usually through shared memory, whereas on an FPGA it relies on constructing appropriate hardware, from implicit (within stream processing), to simple token passing, to using dedicated FIFOs to manage flow control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 151 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 152 |
+
page_content=' DATA LAYER INTERACTION ARCHITECTURE Traditionally, the word architecture is concerned with the art or science of building, where it relates to structural concepts and to styles of design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 153 |
+
page_content=' Here the authors will use it in the sense of structured deceptions of a system from a number of compatible and complementary viewpoints which, taken together, cover functional, design, fabrication and performance issues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 154 |
+
page_content=' The term layer is used to refer to a particular descriptive viewpoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 155 |
+
page_content=' Within a layer, descriptions will generally be hierarchic to allow the containment of complexity or the exposure of detail by suitable aggregation or decomposition techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 156 |
+
page_content=' Architecture(s) may be singular or plural depending on whether it will be addressed as an individual layer or the complete set of descriptions across all layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 157 |
+
page_content=' It is clear from this definition that the architecture of a system is not just confined to some sort of functional partitioning at the front end of a development, but essentially embraces descriptions generated during all phases and stages of the development process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 158 |
+
page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 159 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 160 |
+
page_content=' 4, October 2022 38 The Data Interaction Architecture is a prime example of a layered architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 161 |
+
page_content=' It contains four layers, each of which can be regarded as a model of the system from a particular viewpoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 162 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 163 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 164 |
+
page_content=' shows some small representational fragments for each of the four layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 165 |
+
page_content=' The layers consist of I/O circuitry, fine grained layer, coarse grained function definition layer, and bypass connection layer, where they are listed from the bottom layer to the top layer, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 166 |
+
page_content=' Well defined notations and technical conventions exist for each of these layers and are closely modelled on those of MASCOT, Modular Approach to Software Construction Operation and Test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 167 |
+
page_content=' Where relevant the notations include composite structures to support hierarchical representations over multiple levels within a layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 168 |
+
page_content=' The motivation behind the layered architecture method is to provide the means of moving from a functional model of a system to an execution model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 169 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 170 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 171 |
+
page_content=' Data Interaction Architecture The emphasis on the identification of well-defined interactions in the functional model, and the preservation of these speck tied interaction properties through the subsequent layers, provides the structural conformance by which traceability is achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 172 |
+
page_content=' It follows that the functional model is binding on subsequent development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 173 |
+
page_content=' Developers are not free to reverse engineer the functional model to allow an alternative development path in which traceability would be lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 174 |
+
page_content=' Of course the functional model may need to be changed, either because system requirements have changed, or because detail design has shown that an alternative functional model would be better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 175 |
+
page_content=' Whatever the reason for change, consistency across the model set must be preserved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 176 |
+
page_content=' The main distinguishing feature of Data Interaction Architecture (DIA) is the explicit representation of shared information and shared data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 177 |
+
page_content=' Here i will concentrate on the sharing Model Representation example Focus Functional What Generator User Design How Writer Reader Distribution Where Writer Reader Execution When Writer Reader V Kemel KermelInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 178 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 179 |
+
page_content=' 4, October 2022 39 implicit in the bilateral interactions between processes, leaving discussion of the more general information retention element.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 180 |
+
page_content=' A summary description of the model in each layer shows how bilateral interaction properties are tracked.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 181 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 182 |
+
page_content=' ARCHITECTURE OF PROCESSING ELEMENTS In this paper authors proposed to establish a new design framework to solve issues described in the preceding section by exploiting the binding process of high-level/behavioural synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 183 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 184 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 185 |
+
page_content=' Layered Architecture The purpose of the conventional high-level synthesis tools is to generate finite state machines with data paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 186 |
+
page_content=' Here File System Meta-Data (FSMD) referred as fine grained layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 187 |
+
page_content=' It is expanded with the scope of high-level synthesis to coarse grained layer to exploit the functional representations of circuitries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 188 |
+
page_content=' ALUs in coarse grained layer are defined by the functional representations of high-level programming languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 189 |
+
page_content=' Switches are added as bypass connection layer for the scope of high-level synthesis intentionally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 190 |
+
page_content=' Implicit as-built meshes of switches put constraints on high-level synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 191 |
+
page_content=' In the processes are allowed as unprejudiced bypass switches to remove the meshes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 192 |
+
page_content=' Communications between the PEs are limited between adjacent PEs, whereas it is found no limitations for sensor applications with the limited communication paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 193 |
+
page_content=' The following explains these layers I/O circuitry is implemented with random logic gates and mixed signal I/O circuitries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 194 |
+
page_content=' They are connected to the fine grained blocks in the above layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 195 |
+
page_content=' The fine grained layer mainly consists of finite state machines and data paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 196 |
+
page_content=' They are replaceable to follow the context described by high-level languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 197 |
+
page_content=' The coarse grained function definition layer is located on the fine grained layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 198 |
+
page_content=' Optimized ALUs for a certain application are defined in this layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 199 |
+
page_content=' An operation primitive defined in the layer corresponds to an operation code (op code) of a conventional multipoint control unit (MCU), whereas it does not have to be standardized for over many applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 200 |
+
page_content=' As for the topmost bypass connection layer, simple bypass switch images can be specified over coarse grained blocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 201 |
+
page_content=' The connections between inputs and outputs of PEs are configurable with the bypass switches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 202 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 203 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 204 |
+
page_content=' Design Flow The following six steps compose the design flow of the design framework to design a PE through layered scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 205 |
+
page_content=' Step 1: Describe a system in high-level language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 206 |
+
page_content=' Step 2: Define coarse grained operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 207 |
+
page_content=' Typical dedicated functions for sensor signals are signal compensation, feature point identification for image recognition, and image compression in addition to basic arithmetic operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 208 |
+
page_content=' The defined coarse grained operations are exploited in high-level synthesis and behavioural synthesis process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 209 |
+
page_content=' Step 3: Generate source codes written in hardware description language through behavioural synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 210 |
+
page_content=' The hard macros defined and implemented in the step 2 are exploited for generating circuitries by the functions of CWB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 211 |
+
page_content=' Step 4: This step is identical to conventional logic synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 212 |
+
page_content=' Step 5: This step is identical to conventional layout design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 213 |
+
page_content=' Step 6: The verification and validation step include back annotation based on the result of delay analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 214 |
+
page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 215 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 216 |
+
page_content=' 4, October 2022 40 In the work authors used a data base management function of CWB to exploit the definitions of operations in the coarse grained layer during the behavioural synthesis to treat a function as an operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 217 |
+
page_content=' The operations can be implemented as hard macros by using custom ASIC design tools and/or LUTs of FPGAs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 218 |
+
page_content=' The operator definitions were exploited on the step 3 as macro blocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 219 |
+
page_content=' Once macro blocks are registered in a database, CWB can use the macro blocks during the binding process of high-level synthesis automatically to reduce layout area size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 220 |
+
page_content=' The binding process of high-level synthesis is regarded as nondeterministic polynomial (NP) hard and heuristic approach was often employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 221 |
+
page_content=' The design flow enables the automation of binding process instead of the heuristic approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 222 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 223 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 224 |
+
page_content=' Typical Design of Processing Element Two types of context were identified with reference to semantics or lambda calculus of functional representations to define ALUs in coarse grained function definition layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 225 |
+
page_content=' One is a configurable static context often mentioned as stored information in a file, and the other is a dynamic context as stored information in heap registers as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 226 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 227 |
+
page_content=' The static contexts of an application are expressed with finite state machines and data paths implemented by n sets of hard- ware circuitry of PEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 228 |
+
page_content=' The dynamic contexts of an application are specified as m sets of registers and instructions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 229 |
+
page_content=' The instruction sets are optimized for an application, and each optimized instruction set can be shared among some dynamic contexts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 230 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 231 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 232 |
+
page_content=' Modified High Level Synthesis Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 233 |
+
page_content=' The program code is implemented with a specific C-language comment description /* Cyber func = operator */ for defining dynamic and static contexts, which are the sets of pairs of registers and optimized instruction sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 234 |
+
page_content=' The pair of a register set and an instruction set can be shared among dynamic contexts using another specific C-language comment description as /* Cyber share name = NAME */.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 235 |
+
page_content=' NAME is an arbitrary designation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 236 |
+
page_content=' The binding process of high-level behavioural ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 237 |
+
page_content='Higher Hard Hard module Macro Macro Highlevel/Behavioral Highlevel /Behavioral Highlevel/Behavioral synthesis synthesis synthesis CDFGgeneration Allocation 不 LMSPEC RTL LMSPEC RTL Scheduling 不 Binding FSMDgeneration RTL Logic synthesis Place and Route RTL:RegisterTransferLevel 不 LMSPEC:LowerModuleSpecificationFile CDFG:ControlandDataFlowGraph Configuration FSMD:FiniteStateMachinewithDatapath DataInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 238 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 239 |
+
page_content=' 4, October 2022 41 synthesis can be controlled by these descriptions to exploit the functional representations defined in a high-level programming language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 240 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 241 |
+
page_content=' RESULTS Experiments are carried out to evaluate the design framework using convolution operations;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 242 |
+
page_content=' those are often used for sensor applications, with following three conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 243 |
+
page_content=' The matrix functions of the filters are similar and the difference is the parameters of 3×3 matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 244 |
+
page_content=' It is observed one can evaluate the layout area size reduction results by using an FPGA, Xilinx XC7A200T FPGA, although the design framework was established aiming at improving ASIC design at first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 245 |
+
page_content=' \uf0d8 Defining a convolution function as one operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 246 |
+
page_content=' \uf0d8 Implementing ALUs with basic operations, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 247 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 248 |
+
page_content=', plus, minus, multiply, divide, and comparison operations, using dynamically reconfiguration technique designated as flexible reliability reconfigurable array (FRRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 249 |
+
page_content=' \uf0d8 Elaborating whole design with FPGA libraries without operator definitions and a function definition database.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 250 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 251 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 252 |
+
page_content=' Comparison of LUT utilizations According to Operator Definitions Derived LUT counts for each evaluation case are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 253 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 254 |
+
page_content=' The LUT counts of basic operations were excluded for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 255 |
+
page_content=' The larger the granularity of an operation was, the less counts of LUTs were consumed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 256 |
+
page_content=' Remarkable difference of LUT counts was shown for cascaded operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 257 |
+
page_content=' The LUT counts of cascaded operations using FPGA library was more than double compared to single operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 258 |
+
page_content=' The results show that exploiting granularity in behavioural synthesis was carried out by CWB automatically without specifying the reuse of macro blocks explicitly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 259 |
+
page_content=' The difference between one operation and cascaded operations using FRRAs with dynamically reconfiguration technique was 22% less than the difference using the operator definition on convolution operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 260 |
+
page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 261 |
+
page_content=' CONCLUSIONS A novel model is developed to design a framework to reduce the footprints of programmable functions of sensing devices for IOT applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 262 |
+
page_content=' The design framework consists of four layered structure of PE architecture and the extended database management function of a high-level synthesis tool to exploit functional representations in high-level programming languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 263 |
+
page_content=' Laplacian Filter GaussianFilter+LaplacianFilter (a) (b) (c) 0 200 400 600 800 LUT countsInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 264 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 265 |
+
page_content=' 4, October 2022 42 The layout size reduction is useful to embed a PE into a sensing device and to provide device computing capabilities with a sensing device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 266 |
+
page_content=' The experimental results report the power consumption reduction by adopting the design framework on a Nano Bridge FPGA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 267 |
+
page_content=' REFERENCES [1] Hihara, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 268 |
+
page_content=', Iwasaki, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 269 |
+
page_content=', Hashimoto, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 270 |
+
page_content=', Ochi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 271 |
+
page_content=', Mitsuyama, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 272 |
+
page_content=', Onodera, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 273 |
+
page_content=', .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 274 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 275 |
+
page_content=' & Sakamoto, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 276 |
+
page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 277 |
+
page_content=' “Sensor signal processing using high-level synthesis with a layered architecture”, IEEE Embedded Systems Letters, 10(4), 119-122.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 278 |
+
page_content=' [2] Sreelatha, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 279 |
+
page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 280 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 281 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 282 |
+
page_content=', & Rajdurai, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 283 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 284 |
+
page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 285 |
+
page_content=' “Spectrum Relay Performance of Cognitive Radio between Users with Random Arrivals and Departures,” In Mobile Radio Communications and 5G Networks (pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 286 |
+
page_content=' 533-542).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 287 |
+
page_content=' Springer, Singapore.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 288 |
+
page_content=' [3] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 289 |
+
page_content=' Zhao, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 290 |
+
page_content=' Tan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 291 |
+
page_content=' Dai, and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 292 |
+
page_content=' Zhang, “Area-efficient pipelining for FPGA-targeted high-level synthesis,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 293 |
+
page_content=' 52nd ACM/EDAC/IEEE Design Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 294 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 295 |
+
page_content=' (DAC), San Francisco, CA, USA, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 296 |
+
page_content=' [4] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 297 |
+
page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 298 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 299 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 300 |
+
page_content=', & Rajadurai, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 301 |
+
page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 302 |
+
page_content=' “A model for overflow queuing network with two-station heterogeneous system,” International Journal of Process Management and Benchmarking, 12(2), 147-158.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 303 |
+
page_content=' [5] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 304 |
+
page_content=', Anand, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 305 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 306 |
+
page_content=', Devika, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 307 |
+
page_content=', Prasad, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 308 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 309 |
+
page_content=', & Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 310 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 311 |
+
page_content=' (2021, July).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 312 |
+
page_content=' “Performance Analysis of Data Packets Service in Queuing Networks System,” In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 313 |
+
page_content=' 1-4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 314 |
+
page_content=' IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 315 |
+
page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 316 |
+
page_content=' Gort and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 317 |
+
page_content=' Anderson, “Design re-use for compile time reduction in FPGA high-level synthesis flows,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 318 |
+
page_content=' Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 319 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 320 |
+
page_content=' Field Program.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 321 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 322 |
+
page_content=' (FPT), Shanghai, China, 2014, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 323 |
+
page_content=' 4–11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 324 |
+
page_content=' [7] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 325 |
+
page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 326 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 327 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 328 |
+
page_content=', Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 329 |
+
page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 330 |
+
page_content=' “A model for compound poisson process queuing system with batch arrivals and services,” Journal Européen des Systèmes Automatisés, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 331 |
+
page_content=' 53, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 332 |
+
page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 333 |
+
page_content=' 81-86.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 334 |
+
page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 335 |
+
page_content=' Schmid, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 336 |
+
page_content=' Reiche, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 337 |
+
page_content=' Schmitt, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 338 |
+
page_content=' Hannig, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 339 |
+
page_content=' Teich, “Code generation for high-level synthesis of multi resolution applications on FPGAs,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 340 |
+
page_content=' FSP, 2014, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 341 |
+
page_content=' 21–26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 342 |
+
page_content=' [9] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 343 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 344 |
+
page_content=' "Mathematical modelling and performance analysis of single server queuing system-eigenspectrum," International Journal of Mathematics in Operational Research 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 345 |
+
page_content='4 (2020): 455-468.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 346 |
+
page_content=' [10] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 347 |
+
page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 348 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 349 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 350 |
+
page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 351 |
+
page_content=' “Performance measures of online warehouse service system with replenishment policy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 352 |
+
page_content=' Journal Européen des Systèmes Automatisés,” Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 353 |
+
page_content=' 52, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 354 |
+
page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 355 |
+
page_content=' 631-638 [11] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 356 |
+
page_content=' Alnajjar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 357 |
+
page_content=', “Reliability-configurable mixed-grained reconfigurable array supporting C-to-array mapping and its radiation testing,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 358 |
+
page_content=' IEEE A-SSCC, 2013, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 359 |
+
page_content=' 313–316.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 360 |
+
page_content=' [12] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 361 |
+
page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 362 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 363 |
+
page_content=' Reddy, and Rohit Sharma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 364 |
+
page_content=' "Effects of viscosity variation and thermal effects in squeeze films.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 365 |
+
page_content='" Annales de Chimie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 366 |
+
page_content=' Science des Materiaux.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 367 |
+
page_content=' Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 368 |
+
page_content=' 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 369 |
+
page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 370 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 371 |
+
page_content=' Lavoisier, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 372 |
+
page_content=' [13] Kumar, MV Sravan, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 373 |
+
page_content=' "Data hiding with dual based reversible image using sudoku technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 374 |
+
page_content='" 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 375 |
+
page_content=' IEEE, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 376 |
+
page_content=' [14] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 377 |
+
page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 378 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 379 |
+
page_content=' Reddy, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 380 |
+
page_content=' Krishna Anand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 381 |
+
page_content=' "Focal point computation and homogeneous geometrical transformation for linear curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 382 |
+
page_content='" Perspectives in Science 8 (2016): 19-21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 383 |
+
page_content=' [15] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 384 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 385 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 386 |
+
page_content=', & Prasad, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 387 |
+
page_content=' (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 388 |
+
page_content=" “Mathematical modeling of markovian queuing network with repairs, breakdown and fixed buffer.” i-Manager's Journal on Software Engineering, 6(3), 21." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 389 |
+
page_content=' [16] Anand, Krishna, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 390 |
+
page_content=' "Design of neural network based expert system for automated lime kiln system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 391 |
+
page_content='" Journal Européen des Systèmes Automatisés 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 392 |
+
page_content='4 (2019): 369-376.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 393 |
+
page_content=' [17] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 394 |
+
page_content=' Wang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 395 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 396 |
+
page_content=' Wang, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 397 |
+
page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 398 |
+
page_content=' Wang, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 399 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 400 |
+
page_content=' Huang, “FPGA implementation of Laplacian of Gaussian edge detection algorithm,” Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 401 |
+
page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 402 |
+
page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 403 |
+
page_content=', vols.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 404 |
+
page_content=' 282–283, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 405 |
+
page_content=' 157–160, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 406 |
+
page_content=' 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 407 |
+
page_content=' [18] Elliriki, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 408 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 409 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 410 |
+
page_content=', Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 411 |
+
page_content=', & Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 412 |
+
page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 413 |
+
page_content=' “Multi server queuing system with crashes and alternative repair strategies.” Communications in Statistics-Theory and Methods, 1-13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 414 |
+
page_content=' [19] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 415 |
+
page_content=' Hasegawa et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 416 |
+
page_content=', “Design methodology and trade-offs analysis for parameterized dynamically reconfigurable processor arrays,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 417 |
+
page_content=' FPL, Amsterdam, The Netherlands, 2007, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 418 |
+
page_content=' 796–799.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 419 |
+
page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 420 |
+
page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 421 |
+
page_content=' 4, October 2022 43 [20] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 422 |
+
page_content=' Toi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 423 |
+
page_content=', “High-level synthesis challenges and solutions for a dynamically reconfigurable processor,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 424 |
+
page_content=' IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 425 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 426 |
+
page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 427 |
+
page_content=' Aided Design, San Jose, CA, USA, 2006, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 428 |
+
page_content=' 702–708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 429 |
+
page_content=' [21] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 430 |
+
page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 431 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 432 |
+
page_content=' Reddy, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 433 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 434 |
+
page_content=' Prasad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 435 |
+
page_content=' "Antialiased Digital Pixel Plotting for Raster Scan Lines Using Area Evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 436 |
+
page_content='" Emerging Research in Computing, Information, Communication and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 437 |
+
page_content=' Springer, Singapore, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 438 |
+
page_content=' 461-468.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 439 |
+
page_content=' [22] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 440 |
+
page_content=' Wakabayashi, “Cyber Workbench: Integrated design environment based on C-based behavior synthesis and verification,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 441 |
+
page_content=' IEEE VLSI-TSA Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 442 |
+
page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 443 |
+
page_content=', H sinchu, Taiwan, 2005, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 444 |
+
page_content=' 173– 176.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 445 |
+
page_content=' [23] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 446 |
+
page_content=', S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 447 |
+
page_content=' Saritha, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 448 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 449 |
+
page_content=' Reddy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 450 |
+
page_content=' "Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristic Approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 451 |
+
page_content='" International Journal of Advanced Networking and Applications 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 452 |
+
page_content='1 (2016): 3009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 453 |
+
page_content=' [24] Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 454 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 455 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 456 |
+
page_content=' "Obtaining Description for Simple Images using Surface Realization Techniques and Natural Language Processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 457 |
+
page_content='" Indian Journal of Science and Technology 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 458 |
+
page_content='22 (2016): 1-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 459 |
+
page_content=' [25] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 460 |
+
page_content=' Meribout and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 461 |
+
page_content=' Motomura, “A-combined approach to highlevel synthesis for dynamically reconfigurable systems,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 462 |
+
page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 463 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 464 |
+
page_content=' 53, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 465 |
+
page_content=' 12, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 466 |
+
page_content=' 1508–1522, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 467 |
+
page_content=' 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 468 |
+
page_content=' [26] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 469 |
+
page_content=' Hartenstein, “The microprocessor is no longer general purpose: Why future reconfigurable platforms will win,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 470 |
+
page_content=' 2nd Annu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 471 |
+
page_content=' IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 472 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 473 |
+
page_content=' Innov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 474 |
+
page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 475 |
+
page_content=' Silicon, Austin, TX, USA, 1997, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 476 |
+
page_content=' 2–12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 477 |
+
page_content=' [27] Elliriki, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 478 |
+
page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 479 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 480 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 481 |
+
page_content=', & Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 482 |
+
page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 483 |
+
page_content=' “An efficient line clipping algorithm in 2D space.” Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 484 |
+
page_content=' Arab J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 485 |
+
page_content=' Inf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 486 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 487 |
+
page_content=', 16(5), 798-807.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 488 |
+
page_content=' [28] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 489 |
+
page_content=' Chen, “Fast generation of Gaussian and Laplacian image pyramids using an FPGA-based custom computing platform,” M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 490 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 491 |
+
page_content=' thesis, Virginia Polytechnic Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 492 |
+
page_content=' State Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 493 |
+
page_content=', Blacksburg, VA, USA, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 494 |
+
page_content=' [29] Raw, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 495 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 496 |
+
page_content=', & Lobiyal, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 497 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 498 |
+
page_content=' (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 499 |
+
page_content=' Throughput and delay analysis of next-hop forwarding method for non-linear vehicular ad hoc networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 500 |
+
page_content=' International Journal on Ad Hoc Networking Systems, 2(2), 33-44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 501 |
+
page_content=' [30] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 502 |
+
page_content=', Sasritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 503 |
+
page_content=', & Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 504 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 505 |
+
page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 506 |
+
page_content=' “Expert system and heuristics algorithm for cloud resource scheduling.” Romanian Statistical Review, 65(1), 3-18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 507 |
+
page_content=' [31] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 508 |
+
page_content=' Hihara et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 509 |
+
page_content=', “Novel processor architecture for onboard infrared sensors,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 510 |
+
page_content=' SPIE Infrared Remote Sens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 511 |
+
page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 512 |
+
page_content=' XXIV, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 513 |
+
page_content=' 9973, San Diego, CA, USA, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 514 |
+
page_content=' 2016, Art.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 515 |
+
page_content=' no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 516 |
+
page_content=' 99730S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 517 |
+
page_content=' [32] Abdelgadir, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 518 |
+
page_content=', Saeed, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 519 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 520 |
+
page_content=', & Babiker, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 521 |
+
page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 522 |
+
page_content=' Cross layer design approach for efficient data delivery based on IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 523 |
+
page_content='11 P in vehicular ad-hoc networks (VANETS) for city scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 524 |
+
page_content=' International Journal on Ad Hoc Networking Systems (IJANS), 8(4), 01-12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 525 |
+
page_content=' [33] Beritelli, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 526 |
+
page_content=', La Corte, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 527 |
+
page_content=', Rametta, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 528 |
+
page_content=', & Scaglione, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 529 |
+
page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 530 |
+
page_content=' A Cellular bonding and adaptive load balancing based multi-sim gateway for mobile ad hoc and sensor networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
| 531 |
+
page_content=' International Journal on Ad Hoc Networking Systems (IJANS), 5(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
|
I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fed07636ca478ef1938bc850b539e661090b9ab16058a15e896413fad068b169
|
| 3 |
+
size 205978
|
I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:14d88a780fc03fac4a0a2fe6b53ce45f90ba554374c68677cccc14f728dafd79
|
| 3 |
+
size 2752557
|
I9E1T4oBgHgl3EQfGAMz/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d4d145baeac8932cc2134bdd9e006571fddeda94ec6c72dbd8e0f6c19cc7c800
|
| 3 |
+
size 96900
|
I9FIT4oBgHgl3EQfYyvF/content/tmp_files/2301.11250v1.pdf.txt
ADDED
|
@@ -0,0 +1,1870 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Lattice models for ballistic aggregation: cluster-shape dependent exponents
|
| 2 |
+
P. Fahad,1, 2, ∗ Apurba Biswas,3, 4, † V. V. Prasad,5, ‡ and R. Rajesh3, 4, §
|
| 3 |
+
1Institut f¨ur Materialphysik im Weltraum, Deutsches Zentrum f¨ur Luft- und Raumfahrt (DLR), 51170 K¨oln, Germany
|
| 4 |
+
2Institut f¨ur Theoretische Physik, Universit¨at zu K¨oln, Z¨ulpicher Strasse 77, 50937 K¨oln, Germany
|
| 5 |
+
3The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai 600113, India
|
| 6 |
+
4Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai 400094, India
|
| 7 |
+
5Department of Physics, Cochin University of Science and Technology, Cochin - 682022 India
|
| 8 |
+
(Dated: January 27, 2023)
|
| 9 |
+
We study ballistic aggregation on a two dimensional square lattice, where particles move ballis-
|
| 10 |
+
tically in between momentum and mass conserving coalescing collisions. Three models are studied
|
| 11 |
+
based on the shapes of the aggregates: in the first the aggregates remain point particles, in the sec-
|
| 12 |
+
ond they retain the fractal shape at the time of collision, and in the third they assume a spherical
|
| 13 |
+
shape. The exponents describing the power law temporal decay of number of particles and energy
|
| 14 |
+
as well as dependence of velocity correlations on mass are determined using large scale Monte Carlo
|
| 15 |
+
simulations. It is shown that the exponents are universal only for the point particle model. In the
|
| 16 |
+
other two cases, the exponents are dependent on the initial number density and correlations vanish
|
| 17 |
+
at high number densities. The fractal dimension for the second model is close to 1.49.
|
| 18 |
+
I.
|
| 19 |
+
INTRODUCTION
|
| 20 |
+
There is a wide variety of physical phenomena at
|
| 21 |
+
different length scales in which aggregation of parti-
|
| 22 |
+
cles/clusters to form larger particles is the predominant
|
| 23 |
+
dynamical process [1]. Examples include aerosols [2, 3],
|
| 24 |
+
agglomeration of soot
|
| 25 |
+
[4, 5], gelation [6], cloud forma-
|
| 26 |
+
tion [7], astrophysical problems [8], aggregation of dust
|
| 27 |
+
particles in planetary discs [9–11], dynamics of Saturn’s
|
| 28 |
+
rings [10, 12], polyelectrolytes [13, 14], networks [15],
|
| 29 |
+
etc. A minimal model that focuses only on the effects
|
| 30 |
+
of aggregation is the cluster-cluster aggregation (CCA)
|
| 31 |
+
model in which particles that come into contact undergo
|
| 32 |
+
mass conserving coalescence (reviews may be found in
|
| 33 |
+
Refs. [16–18]).
|
| 34 |
+
In addition to its relevance for differ-
|
| 35 |
+
ent physical phenomena, CCA has also been studied as
|
| 36 |
+
a nonequilibrium system undergoing scale invariant dy-
|
| 37 |
+
namics that is described by exponents that depend only
|
| 38 |
+
on very generic features of the transport process. This
|
| 39 |
+
universal feature allows applications of results for CCA in
|
| 40 |
+
seemingly unrelated systems like Burgers turbulence [19–
|
| 41 |
+
23], Kolmogorov self-similar scaling [24–26], granular sys-
|
| 42 |
+
tems [27–29], hydrodynamics of run and tumble par-
|
| 43 |
+
ticles [30], evolution of planetesimals [31], geophysical
|
| 44 |
+
flows [32], etc.
|
| 45 |
+
Among the different transport processes,
|
| 46 |
+
ballistic
|
| 47 |
+
transport is of particular importance and the resultant
|
| 48 |
+
CCA is known as the ballistic aggregation (BA) model,
|
| 49 |
+
the focus of this paper. In the BA model, momentum
|
| 50 |
+
is additionally conserved in collisions.
|
| 51 |
+
The BA model
|
| 52 |
+
with spherical particles has been studied using mean field
|
| 53 |
+
theory, large scale simulations in two and three dimen-
|
| 54 |
+
sions, and is exactly solvable in one dimension.
|
| 55 |
+
It is
|
| 56 |
+
∗ fahad.puthalath@dlr.de
|
| 57 |
+
† apurbab@imsc.res.in
|
| 58 |
+
‡ prasad.vv@cusat.ac.in
|
| 59 |
+
§ rrajesh@imsc.res.in
|
| 60 |
+
found that the number of particles, n(t), and energy,
|
| 61 |
+
e(t), decrease with time, t, as power-laws: n(t) ∝ t−θn,
|
| 62 |
+
e(t) ∝ t−θe. These exponents have been determined in
|
| 63 |
+
d-dimensions within a mean field approximation which
|
| 64 |
+
assumes that the particle density is small, that the parti-
|
| 65 |
+
cles are compact spherical clusters of equal density, and
|
| 66 |
+
that the velocities of the particles constituting a cluster
|
| 67 |
+
are uncorrelated. Within these assumptions, scaling ar-
|
| 68 |
+
guments predict the existence of a growing length scale
|
| 69 |
+
Lt ∼ t1/zmf with zmf = (d + 2)/2d and mean field ex-
|
| 70 |
+
ponents, θmf
|
| 71 |
+
n
|
| 72 |
+
= 2d/(d + 2) and θmf
|
| 73 |
+
e
|
| 74 |
+
= θmf
|
| 75 |
+
n
|
| 76 |
+
[33].
|
| 77 |
+
The
|
| 78 |
+
correlations in the initial velocities of the constituents of
|
| 79 |
+
a cluster is characterized by an exponent η: ⟨v2
|
| 80 |
+
m⟩ ∼ m−η,
|
| 81 |
+
where ⟨v2
|
| 82 |
+
m⟩ is the mean square velocity of a particle of
|
| 83 |
+
mass m. In the mean field approximation, by assump-
|
| 84 |
+
tion, ηmf = 1. The mean field results for the exponents
|
| 85 |
+
are of particular significance to the study of the unrelated
|
| 86 |
+
problem of freely cooling granular gas in which ballis-
|
| 87 |
+
tic particles undergo energy-dissipating, momentum con-
|
| 88 |
+
serving binary collisions. It has been shown that expo-
|
| 89 |
+
nent characterizing the energy decay in the granular gas
|
| 90 |
+
is equal to θmf
|
| 91 |
+
e
|
| 92 |
+
in dimensions upto three [27, 29, 34].
|
| 93 |
+
In one dimension, BA is exactly solvable and the ex-
|
| 94 |
+
ponents match with the mean-field exponents [20, 35–
|
| 95 |
+
37]. However, in two and three dimensions, it has been
|
| 96 |
+
shown that the exponents for BA with spherical parti-
|
| 97 |
+
cles depend on the initial number density n0.
|
| 98 |
+
In two
|
| 99 |
+
dimensions and for dilute systems (n0 → 0), it has been
|
| 100 |
+
shown that the numerically obtained θn is 17% larger
|
| 101 |
+
than θmf
|
| 102 |
+
n
|
| 103 |
+
because of strong velocity correlations between
|
| 104 |
+
colliding aggregates, with η decreasing from η ≈ 1.33 for
|
| 105 |
+
low densities to η ≈ 1 = ηmf for high densities [38–41].
|
| 106 |
+
In three dimensions, it is found that as n0 increases from
|
| 107 |
+
0.005 to 0.208, θe decreases from θe = 1.283 to 1.206
|
| 108 |
+
and appears to converge to the θmf
|
| 109 |
+
e
|
| 110 |
+
= 1.2 with increasing
|
| 111 |
+
n0, and η decreases from η ≈ 1.23 for low densities to
|
| 112 |
+
η ≈ 1 = ηmf for high densities [29, 41]. It is remark-
|
| 113 |
+
able that the mean field results describe well only the
|
| 114 |
+
systems with large n0, while its derivation assumes the
|
| 115 |
+
arXiv:2301.11250v1 [cond-mat.stat-mech] 26 Jan 2023
|
| 116 |
+
|
| 117 |
+
2
|
| 118 |
+
limit n0 → 0. This counterintuitive result has been ar-
|
| 119 |
+
gued to be due to the randomization of the velocities at
|
| 120 |
+
higher densities due to avalanche of coagulation events
|
| 121 |
+
that occur due to the overlap of a newly created spheri-
|
| 122 |
+
cal particle with already existing particles, as the number
|
| 123 |
+
density is increased.
|
| 124 |
+
While the kinetics of BA with spherical particles are
|
| 125 |
+
reasonably understood, much less is known for the ex-
|
| 126 |
+
ponents when clusters have non-spherical shapes. The
|
| 127 |
+
scaling analysis can be extended to the case when the
|
| 128 |
+
mass scales with radius with a fractal dimension df [39]
|
| 129 |
+
(also see Sec. III where we review scaling theory). The
|
| 130 |
+
scaling theory leads to hyperscaling relations between
|
| 131 |
+
the different exponents independent of the mean field as-
|
| 132 |
+
sumptions. Fractal shapes are of particular importance in
|
| 133 |
+
the case of the experiments on aggregates of soot [5, 42],
|
| 134 |
+
mammary epithelial cells [43, 44], spray flames [45], etc.,
|
| 135 |
+
where the aggregates have a fractal dimension different
|
| 136 |
+
from those of compact structures (df = 2, 3).
|
| 137 |
+
While
|
| 138 |
+
the fractal dimensions seen in experiments [5, 43] are
|
| 139 |
+
sometimes close to that for diffusion limited aggregation
|
| 140 |
+
(df ≈ 1.7), there are many examples for which it is very
|
| 141 |
+
different (for instance 1.54 for sprays [45], 1.5 for cells [44]
|
| 142 |
+
or 2.4 for soot [42]). The fractal dimension of aggregates
|
| 143 |
+
formed by ballistic motion is not known to the best of
|
| 144 |
+
our knowledge.
|
| 145 |
+
In addition, it is also not known how
|
| 146 |
+
the exponents for BA change when the shape of the clus-
|
| 147 |
+
ters deviates from spherical. Neither is it known whether
|
| 148 |
+
the mean field limit is reached for any particular limit
|
| 149 |
+
of number density when the clusters are fractal. Finally,
|
| 150 |
+
in the characterization of mass distribution, a relevant
|
| 151 |
+
exponent is the scaling of mass distribution with small
|
| 152 |
+
mass, namely N(m) ∼ mζ [also see definition in Eq. (6)].
|
| 153 |
+
The exponent ζ is an independent exponent and cannot
|
| 154 |
+
be obtained from scaling theory, and is not known even
|
| 155 |
+
for BA with spherical particles.
|
| 156 |
+
To answer these questions, we study three differently
|
| 157 |
+
shaped clusters (named as models A, B, C) undergoing
|
| 158 |
+
BA on the square lattice. We choose a lattice approach
|
| 159 |
+
as it allows us to maintain fractal shapes in a computa-
|
| 160 |
+
tionally efficient manner. Lattice models are known to
|
| 161 |
+
reproduce the same results as the continuum for BA in
|
| 162 |
+
one dimension [23, 46], and we expect the equivalence to
|
| 163 |
+
hold true for two and higher dimensions. In model A, the
|
| 164 |
+
clusters occupy a single site irrespective of its mass. This
|
| 165 |
+
limiting model allows us to separate the dependence of
|
| 166 |
+
the velocity correlations on the initial density from the
|
| 167 |
+
dependence on mass-dependent shape. In model B, we
|
| 168 |
+
study clusters where the clusters maintain the shape at
|
| 169 |
+
the time of contact. Such clusters turn out to be frac-
|
| 170 |
+
tal. In model C, we study “spherical” clusters in which
|
| 171 |
+
the lattice approximation to the disc is maintained. This
|
| 172 |
+
model allows us to study lattice effects by comparing the
|
| 173 |
+
results on the lattice with the continuum results. In ad-
|
| 174 |
+
dition, we obtain the value of the exponent ζ for all the
|
| 175 |
+
three models. The results for the three models are sum-
|
| 176 |
+
marized in Table II (model A), Table III and Fig. 17
|
| 177 |
+
(model B), Table IV and Fig. 23 (model C). For model
|
| 178 |
+
A, we show that the exponents are universal, in the sense
|
| 179 |
+
that it is independent of the initial number density, n0
|
| 180 |
+
and it is different from the mean field results. For models
|
| 181 |
+
B and C, we find that the exponents are dependent on
|
| 182 |
+
n0 and approach the mean field assumptions of uncorre-
|
| 183 |
+
lated velocities only in the limit of large n0. The fractal
|
| 184 |
+
dimension for model B, on the other hand, is universal,
|
| 185 |
+
with df ≈ 1.49.
|
| 186 |
+
The remainder of the paper is organized as follows.
|
| 187 |
+
Section II contains a definition of the different models
|
| 188 |
+
as well as a description of the simulation methods. We
|
| 189 |
+
briefly review the scaling theory for BA with differently
|
| 190 |
+
shaped particles in Sec. III. In Sec. IV, for the three mod-
|
| 191 |
+
els, we describe the results for the different exponents
|
| 192 |
+
obtained from large scale Monte Carlo simulations. Sec-
|
| 193 |
+
tion V contains a summary and discussion of the results.
|
| 194 |
+
II.
|
| 195 |
+
MODEL
|
| 196 |
+
In this section, we define the three models that we
|
| 197 |
+
study in this paper.
|
| 198 |
+
Consider a square lattice of size
|
| 199 |
+
L × L with periodic boundary conditions.
|
| 200 |
+
Initially N
|
| 201 |
+
particles, each of mass 1, are randomly distributed with a
|
| 202 |
+
site having utmost one particle. Each particle is assigned
|
| 203 |
+
a velocity whose magnitude is drawn from a uniform dis-
|
| 204 |
+
tribution in [0, 1) and whose direction is chosen uniformly
|
| 205 |
+
in [0, 2π). The velocity of the center of mass is set to be
|
| 206 |
+
zero by choosing an appropriate frame of reference. The
|
| 207 |
+
system evolves stochastically in time as follows. A par-
|
| 208 |
+
ticle with velocity (vx, vy) hops in the x-direction with
|
| 209 |
+
rate |vx| in the positive (negative) direction depending on
|
| 210 |
+
whether vx is positive (negative). Likewise, it hops along
|
| 211 |
+
the y-axis with rate |vy| in the direction determined by
|
| 212 |
+
the sign of vy. When two particles collide, they aggregate
|
| 213 |
+
to form a new particle. The mass of the new particle is
|
| 214 |
+
the sum of the constituent particles while the new veloc-
|
| 215 |
+
ity is determined by conservation of linear momentum.
|
| 216 |
+
The shape of the new particle is determined based on
|
| 217 |
+
three different rules, leading to three different models.
|
| 218 |
+
Model A: Point particles
|
| 219 |
+
In model A, when a particle hops onto a site which
|
| 220 |
+
is already occupied, then the two particles coalesce, con-
|
| 221 |
+
serving mass and momentum. The new particle occupies
|
| 222 |
+
the same lattice site. We call this model the point parti-
|
| 223 |
+
cle model, since the sizes of all the particles are the same
|
| 224 |
+
(one lattice site) irrespective of their mass.
|
| 225 |
+
Model B: Fractal clusters
|
| 226 |
+
In model B, the particles, also referred to as clusters,
|
| 227 |
+
are extended objects consisting of a collection of sites
|
| 228 |
+
that are linked to each other by nearest neighbor bonds.
|
| 229 |
+
|
| 230 |
+
3
|
| 231 |
+
(a)
|
| 232 |
+
(b)
|
| 233 |
+
(c)
|
| 234 |
+
(d)
|
| 235 |
+
FIG. 1.
|
| 236 |
+
Snapshots of the configurations at different times
|
| 237 |
+
t for model B (fractal clusters), where different clusters are
|
| 238 |
+
shown by different colors. The different panels correspond to
|
| 239 |
+
(a) t = 50, (b) t = 500, (c) t = 5000 and (d) t = 25790.
|
| 240 |
+
The data are for system size L = 200 and initial number of
|
| 241 |
+
N = 2000 particles (n0 = 0.05).
|
| 242 |
+
When a cluster hops, if any of the lattice sites belong-
|
| 243 |
+
ing to it becomes adjacent to a site belonging to another
|
| 244 |
+
cluster, then the two clusters coalesce.
|
| 245 |
+
The new clus-
|
| 246 |
+
ter maintains the shape at the time of coalescing, till it
|
| 247 |
+
collides with another cluster at a future time. The new
|
| 248 |
+
velocity of the cluster is determined through momentum
|
| 249 |
+
conservation. Snapshots of the configuration at different
|
| 250 |
+
times are shown in Fig. 1. The clusters are extended and
|
| 251 |
+
will be shown to be fractals.
|
| 252 |
+
Model C: Spherical clusters
|
| 253 |
+
In model C, like in model B, particles are extended
|
| 254 |
+
clusters. However, the shape of these particles are con-
|
| 255 |
+
strained to be spherical. When two particles come into
|
| 256 |
+
contact, they are replaced by a new spherical particle.
|
| 257 |
+
The center of mass of the new particle is chosen to be
|
| 258 |
+
lattice site closest to the center of mass of the constituent
|
| 259 |
+
particles. To construct a spherical cluster on the square
|
| 260 |
+
lattice, we fill all lattice sites within circles of increas-
|
| 261 |
+
ing radius. The sites in the outermost shell, if not fully
|
| 262 |
+
occupied, are chosen at random. This rearrangement of
|
| 263 |
+
sites to form a spherical shape will, at times, lead to the
|
| 264 |
+
new cluster overlapping with other nearby clusters, trig-
|
| 265 |
+
(a)
|
| 266 |
+
(b)
|
| 267 |
+
FIG. 2. Snapshots of the configurations at different times t
|
| 268 |
+
for model C (spherical clusters), where different clusters are
|
| 269 |
+
shown by different colors. The different panels correspond to
|
| 270 |
+
(a) t = 100 and (b) t = 500. The data are for system size
|
| 271 |
+
L = 200 and initial number of N = 4000 particles (n0 = 0.1).
|
| 272 |
+
TABLE I. Simulation details.
|
| 273 |
+
Model
|
| 274 |
+
L’s simulated
|
| 275 |
+
Number densities (n0)
|
| 276 |
+
A
|
| 277 |
+
upto 1000
|
| 278 |
+
0.01 - 1.00
|
| 279 |
+
B
|
| 280 |
+
upto 10000
|
| 281 |
+
0.001 - 0.01
|
| 282 |
+
C
|
| 283 |
+
upto 10000
|
| 284 |
+
0.0001 - 0.16
|
| 285 |
+
gering an avalanche of coalescence events. Snapshots of
|
| 286 |
+
a typical time evolution are shown in Fig. 2.
|
| 287 |
+
Details of simulation
|
| 288 |
+
In model B and model C, where extended clusters
|
| 289 |
+
hop as a single unit, we identify the different clusters
|
| 290 |
+
and their merging using the Hoshen-Kopelman algo-
|
| 291 |
+
rithm [47]. Simulations were carried out for different sys-
|
| 292 |
+
tem sizes varying from L = 100 upto L = 10000 for all
|
| 293 |
+
three models and a wide range of number densities n0.
|
| 294 |
+
The simulation is continued till all the clusters aggregate
|
| 295 |
+
together to form the final single cluster. The details of
|
| 296 |
+
the densities and the lattice sizes used for simulations of
|
| 297 |
+
the three models are given in Table I.
|
| 298 |
+
III.
|
| 299 |
+
REVIEW OF SCALING THEORY
|
| 300 |
+
In this section, we review the scaling theory for BA,
|
| 301 |
+
described initially in Ref. [33]. Here, we give a scaling
|
| 302 |
+
argument based on the Smoluchowski equation for aggre-
|
| 303 |
+
gation (see Refs. [16, 17] for reviews). Different scaling
|
| 304 |
+
arguments, leading to the same results, may be found in
|
| 305 |
+
Refs. [39, 40]. Let N(m, t) denote the average density of
|
| 306 |
+
|
| 307 |
+
4
|
| 308 |
+
clusters of mass m at time t. N(m, t) evolves in time as
|
| 309 |
+
dN(m, t)
|
| 310 |
+
dt
|
| 311 |
+
= −N(m, t)
|
| 312 |
+
� ∞
|
| 313 |
+
0
|
| 314 |
+
dm1K(m, m1)N(m1, t)
|
| 315 |
+
+ 1
|
| 316 |
+
2
|
| 317 |
+
� m
|
| 318 |
+
0
|
| 319 |
+
dmK(m1, m − m1)N(m, t)N(m − m1, t), (1)
|
| 320 |
+
where the kernel K(m1, m2) is the rate at which particles
|
| 321 |
+
of masses m1 and m2 collide. The first term in the right
|
| 322 |
+
hand side of Eq. (1) describes a loss term where a particle
|
| 323 |
+
of mass m collides with another particle, while the second
|
| 324 |
+
term describes a gain term where two particles collide to
|
| 325 |
+
form a particle of mass m.
|
| 326 |
+
We restrict ourselves to homogeneous kernels, which
|
| 327 |
+
are known to describe many physical systems, examples
|
| 328 |
+
of which may be found in Refs. [16, 17]. Homogeneous
|
| 329 |
+
kernels have the property
|
| 330 |
+
K(hm1, hm2) = hλK(m1, m2),
|
| 331 |
+
h > 0,
|
| 332 |
+
(2)
|
| 333 |
+
where λ is called the homogeneity exponent. For λ < 1,
|
| 334 |
+
and for large masses and times, it can be shown that
|
| 335 |
+
Eq. (1) is solved by a N(m, t) which has the scaling form
|
| 336 |
+
N(m, t) ≃
|
| 337 |
+
1
|
| 338 |
+
t2θn Φ
|
| 339 |
+
� m
|
| 340 |
+
tθn
|
| 341 |
+
�
|
| 342 |
+
.
|
| 343 |
+
(3)
|
| 344 |
+
For x ≫ 1, Φ(x) vanishes exponentially. For x ≪ 1, Φ(x)
|
| 345 |
+
is a power law
|
| 346 |
+
Φ(x) ∼ xζ,
|
| 347 |
+
x ≪ 1.
|
| 348 |
+
(4)
|
| 349 |
+
Thus, there are two exponents θn and ζ characterizing
|
| 350 |
+
the mass distribution N(m, t).
|
| 351 |
+
The exponent θn describes how the mean density of
|
| 352 |
+
particles n(t) =
|
| 353 |
+
�
|
| 354 |
+
m N(m, t)dm decreases with time. In-
|
| 355 |
+
tegrating Eq. (3), we obtain
|
| 356 |
+
n(t) ∼ t−θn.
|
| 357 |
+
(5)
|
| 358 |
+
The exponent ζ describes the power law dependence of
|
| 359 |
+
N(m, t) on mass for small masses:
|
| 360 |
+
N(m, t) ∼
|
| 361 |
+
mζ
|
| 362 |
+
tθn(2+ζ) ,
|
| 363 |
+
m ≪ tθn.
|
| 364 |
+
(6)
|
| 365 |
+
The dependence of θn on the homogeneity exponent λ
|
| 366 |
+
can be obtained by substituting Eq. (3) into Eq. (1), and
|
| 367 |
+
is known to be (for example, see Refs. [16, 17])
|
| 368 |
+
θn =
|
| 369 |
+
1
|
| 370 |
+
1 − λ.
|
| 371 |
+
(7)
|
| 372 |
+
We now focus on the collision kernel that corresponds
|
| 373 |
+
to BA. Assuming a homogeneous mixture of clusters of
|
| 374 |
+
all masses, the rate of collision between two masses m1
|
| 375 |
+
and m2 is proportional to (r1 + r2)d−1|⃗v1 − ⃗v2| where
|
| 376 |
+
r1 and r2 are the radii of the particles, ⃗v1 and ⃗v2 the
|
| 377 |
+
velocities, and d is the dimension. The relative velocity
|
| 378 |
+
may be approximated as |⃗v1 − ⃗v2| ≈
|
| 379 |
+
�
|
| 380 |
+
v2
|
| 381 |
+
1 + v2
|
| 382 |
+
2. Thus, the
|
| 383 |
+
collision kernel for BA may be written as
|
| 384 |
+
K(m1, m2) ∝ (r1 + r2)d−1
|
| 385 |
+
�
|
| 386 |
+
v2
|
| 387 |
+
1 + v2
|
| 388 |
+
2.
|
| 389 |
+
(8)
|
| 390 |
+
To express the radii and velocities in terms of the masses,
|
| 391 |
+
we assume that the typical speed, vm, of particles of mass
|
| 392 |
+
m, scales with mass as
|
| 393 |
+
v2
|
| 394 |
+
m ∼ m−η.
|
| 395 |
+
(9)
|
| 396 |
+
The radii are related to mass though the fractal dimen-
|
| 397 |
+
sion, df, of a cluster:
|
| 398 |
+
r ∝ m1/df .
|
| 399 |
+
(10)
|
| 400 |
+
Thus, the kernel in Eq. (8) reduces to
|
| 401 |
+
K(m1, m2) ∝
|
| 402 |
+
�
|
| 403 |
+
m1/df
|
| 404 |
+
1
|
| 405 |
+
+ m1/df
|
| 406 |
+
2
|
| 407 |
+
�d−1 �
|
| 408 |
+
m−η
|
| 409 |
+
1
|
| 410 |
+
+ m−η
|
| 411 |
+
2 . (11)
|
| 412 |
+
This kernel is homogeneous in its arguments with ho-
|
| 413 |
+
mogeneity exponent given by
|
| 414 |
+
λ = d − 1
|
| 415 |
+
df
|
| 416 |
+
− η
|
| 417 |
+
2.
|
| 418 |
+
(12)
|
| 419 |
+
From Eq. (7), we then obtain
|
| 420 |
+
θn =
|
| 421 |
+
2df
|
| 422 |
+
2df − 2(d − 1) + ηdf
|
| 423 |
+
.
|
| 424 |
+
(13)
|
| 425 |
+
Another quantity of interest is the mean kinetic energy
|
| 426 |
+
e(t), defined as
|
| 427 |
+
e(t) ≃
|
| 428 |
+
�
|
| 429 |
+
dm1
|
| 430 |
+
2mv2
|
| 431 |
+
mN(m, t).
|
| 432 |
+
(14)
|
| 433 |
+
The energy density decreases in time as a power law
|
| 434 |
+
e(t) ∼ t−θe.
|
| 435 |
+
Substituting v2
|
| 436 |
+
m ∼ m−η, we obtain the
|
| 437 |
+
scaling relation
|
| 438 |
+
θe = ηθn.
|
| 439 |
+
(15)
|
| 440 |
+
We now reproduce the results obtained for BA in
|
| 441 |
+
Ref. [33] which we refer to as the mean field BA ex-
|
| 442 |
+
ponents. Here, it is assumed that the clusters that are
|
| 443 |
+
formed are spherical (df = d) and that the velocities of
|
| 444 |
+
the constituent particles of a given cluster are uncorre-
|
| 445 |
+
lated implying that η = 1. Substituting these values into
|
| 446 |
+
Eqs. (13) and (15), we reproduce the results
|
| 447 |
+
θmf
|
| 448 |
+
n
|
| 449 |
+
= θmf
|
| 450 |
+
e
|
| 451 |
+
=
|
| 452 |
+
2d
|
| 453 |
+
d + 2,
|
| 454 |
+
(16)
|
| 455 |
+
where the superscript mf denotes mean field. Note that
|
| 456 |
+
the main simplifying assumption is that η = 1. In one
|
| 457 |
+
dimension η continues to be 1 as the order of particles is
|
| 458 |
+
maintained and a cluster made up of m initial neighbor-
|
| 459 |
+
ing particles will have uncorrelated velocities. However,
|
| 460 |
+
η need not be 1 in higher dimensions.
|
| 461 |
+
|
| 462 |
+
5
|
| 463 |
+
We now summarize the scaling theory predictions for
|
| 464 |
+
the models studied in this paper.
|
| 465 |
+
For model A, since
|
| 466 |
+
particles are point-like objects we have r ∼ m0 or df =
|
| 467 |
+
∞.
|
| 468 |
+
Similarly, in model C since clusters are spherical
|
| 469 |
+
df = d, which is spatial dimension itself. We thus obtain
|
| 470 |
+
θn =
|
| 471 |
+
�
|
| 472 |
+
�
|
| 473 |
+
�
|
| 474 |
+
�
|
| 475 |
+
�
|
| 476 |
+
2
|
| 477 |
+
2+η,
|
| 478 |
+
model A,
|
| 479 |
+
2df
|
| 480 |
+
2df −2+ηdf ,
|
| 481 |
+
model B,
|
| 482 |
+
2
|
| 483 |
+
1+η,
|
| 484 |
+
model C,
|
| 485 |
+
(17)
|
| 486 |
+
with θe = ηθn.
|
| 487 |
+
It is useful to have a relation between θn and θe that
|
| 488 |
+
does not involve η. This will enable us to verify scaling
|
| 489 |
+
theory without having to numerically measure the differ-
|
| 490 |
+
ent exponents. Eliminating η, we obtain
|
| 491 |
+
2θn + θe =2,
|
| 492 |
+
model A,
|
| 493 |
+
2θn
|
| 494 |
+
2θn + θe − 2 =df,
|
| 495 |
+
model B,
|
| 496 |
+
(18)
|
| 497 |
+
θn + θe =2,
|
| 498 |
+
model C.
|
| 499 |
+
IV.
|
| 500 |
+
RESULTS
|
| 501 |
+
In this section, we describe the results, obtained from
|
| 502 |
+
extensive Monte Carlo simulations, for models A, B, and
|
| 503 |
+
C. For all the three models, we will independently de-
|
| 504 |
+
termine the exponents θn, θe, η and ζ. For model B the
|
| 505 |
+
fractal dimension df is also measured. Their dependence
|
| 506 |
+
on number density, the scaling relations between them,
|
| 507 |
+
as well as deviation from the mean field results, are de-
|
| 508 |
+
termined.
|
| 509 |
+
A.
|
| 510 |
+
Model A: Point particles
|
| 511 |
+
We first determine θn from the power law decay of
|
| 512 |
+
the mean density of particles, n, with time t. The data
|
| 513 |
+
for different initial number density n0 and initial mean
|
| 514 |
+
speed v0 collapse onto one curve when scaled, based on
|
| 515 |
+
dimensional analysis, according to
|
| 516 |
+
n(t, n0) ≃ n0f(tn0v0),
|
| 517 |
+
(19)
|
| 518 |
+
as shown in Fig. 3.
|
| 519 |
+
After an initial crossover time
|
| 520 |
+
tc ∼ n−1
|
| 521 |
+
0 , n(t) decreases as a power law. From the excel-
|
| 522 |
+
lent collapse of the data for different n0 onto one curve,
|
| 523 |
+
we conclude that the power law exponent is independent
|
| 524 |
+
of the initial number density. From fitting a power law
|
| 525 |
+
to the data, we obtain θn = 0.633(7), which describes the
|
| 526 |
+
data well over 5 decades. In the inset of Fig. 3, the com-
|
| 527 |
+
pensated curve tθnn(t) is shown for n0 = 1. The mean
|
| 528 |
+
slope of the curve changes from negative to positive as θn
|
| 529 |
+
varies from 0.626 to 0.640, consistent with our estimate
|
| 530 |
+
of θn from direct measurement.
|
| 531 |
+
We now numerically determine θn using different anal-
|
| 532 |
+
yses, both for the sake of consistency as well as for bench-
|
| 533 |
+
marking different methods that will be more useful in
|
| 534 |
+
determining exponents for models B and C.
|
| 535 |
+
10-6
|
| 536 |
+
10-5
|
| 537 |
+
10-4
|
| 538 |
+
10-3
|
| 539 |
+
10-2
|
| 540 |
+
10-1
|
| 541 |
+
100
|
| 542 |
+
10-2
|
| 543 |
+
100
|
| 544 |
+
102
|
| 545 |
+
104
|
| 546 |
+
106
|
| 547 |
+
108
|
| 548 |
+
1010
|
| 549 |
+
1012
|
| 550 |
+
1014
|
| 551 |
+
n/n0
|
| 552 |
+
tn0v0
|
| 553 |
+
n0 = 0.01
|
| 554 |
+
n0 = 0.10
|
| 555 |
+
n0 = 0.20
|
| 556 |
+
n0 = 0.40
|
| 557 |
+
n0 = 0.70
|
| 558 |
+
n0 = 1.00
|
| 559 |
+
0.9
|
| 560 |
+
1
|
| 561 |
+
1.1
|
| 562 |
+
1.2
|
| 563 |
+
102
|
| 564 |
+
103
|
| 565 |
+
104
|
| 566 |
+
105
|
| 567 |
+
106
|
| 568 |
+
107
|
| 569 |
+
tθn n(t)
|
| 570 |
+
t
|
| 571 |
+
θn = 0.640
|
| 572 |
+
θn = 0.633
|
| 573 |
+
θn = 0.626
|
| 574 |
+
FIG. 3.
|
| 575 |
+
The data (model A) for mean number density of par-
|
| 576 |
+
ticles, n(t), for different initial number densities n0 collapse
|
| 577 |
+
onto a single curve when n(t) and t are scaled as in Eq. (19).
|
| 578 |
+
The solid line is a power law t−0.633. Inset: The compensated
|
| 579 |
+
data n(t)tθn is shown for three different choices of θn differing
|
| 580 |
+
by 0.007 for n0 = 1.0. The curve is flat for θn = 0.633. The
|
| 581 |
+
data are obtained for L = 1000. All data have been averaged
|
| 582 |
+
over 300 different initial conditions.
|
| 583 |
+
10-4
|
| 584 |
+
10-3
|
| 585 |
+
10-2
|
| 586 |
+
10-1
|
| 587 |
+
100
|
| 588 |
+
101
|
| 589 |
+
102
|
| 590 |
+
103
|
| 591 |
+
104
|
| 592 |
+
10-2
|
| 593 |
+
10-1
|
| 594 |
+
100
|
| 595 |
+
101
|
| 596 |
+
102
|
| 597 |
+
103
|
| 598 |
+
104
|
| 599 |
+
t 2θn N(m,t)
|
| 600 |
+
m/tθn
|
| 601 |
+
t = 250
|
| 602 |
+
t = 1000
|
| 603 |
+
t = 4000
|
| 604 |
+
t = 16000
|
| 605 |
+
t = 64000
|
| 606 |
+
t = 256000
|
| 607 |
+
t = 1024000
|
| 608 |
+
10-3
|
| 609 |
+
10-1
|
| 610 |
+
101
|
| 611 |
+
103
|
| 612 |
+
105
|
| 613 |
+
100
|
| 614 |
+
101
|
| 615 |
+
102
|
| 616 |
+
103
|
| 617 |
+
104
|
| 618 |
+
105
|
| 619 |
+
N(m,t)
|
| 620 |
+
m
|
| 621 |
+
t = 250
|
| 622 |
+
t = 2000
|
| 623 |
+
t = 16000
|
| 624 |
+
t = 128000
|
| 625 |
+
t = 1024000
|
| 626 |
+
FIG. 4.
|
| 627 |
+
The mass distribution N(m, t) for different times
|
| 628 |
+
collapse onto a single curve when scaled as in Eq. (3), with
|
| 629 |
+
θn = 0.633. The data are for model A, with initial number
|
| 630 |
+
density n0 = 1.0, and system size L = 1000 lattice. Inset:
|
| 631 |
+
The unscaled data for N(m, t) for different times t.
|
| 632 |
+
First we check that the measured value of θn is consis-
|
| 633 |
+
tent with the mass distribution N(m, t) and then we use
|
| 634 |
+
the finite size scaling for large times. The dependence
|
| 635 |
+
of N(m, t) on time and mass are shown in the inset of
|
| 636 |
+
Fig. 4. When scaled as in Eq. (3) with θn = 0.633, the
|
| 637 |
+
data for different times, that span three decades, collapse
|
| 638 |
+
onto a single curve (see Fig. 4).
|
| 639 |
+
Finally, we examine finite size effects. For very large
|
| 640 |
+
times, when the number of clusters is order one, we ex-
|
| 641 |
+
pect that n(t) ∼ L−2, where L is the system size. As-
|
| 642 |
+
suming finite size scaling, we can write
|
| 643 |
+
n(t) ≃ 1
|
| 644 |
+
L2 fn
|
| 645 |
+
�
|
| 646 |
+
t
|
| 647 |
+
L2/θn
|
| 648 |
+
�
|
| 649 |
+
,
|
| 650 |
+
(20)
|
| 651 |
+
where the scaling function fn(x) ∼ x−θn for x ≪ 1, and
|
| 652 |
+
|
| 653 |
+
6
|
| 654 |
+
10-1
|
| 655 |
+
100
|
| 656 |
+
101
|
| 657 |
+
102
|
| 658 |
+
103
|
| 659 |
+
104
|
| 660 |
+
105
|
| 661 |
+
106
|
| 662 |
+
10-8
|
| 663 |
+
10-6
|
| 664 |
+
10-4
|
| 665 |
+
10-2
|
| 666 |
+
100
|
| 667 |
+
n L2
|
| 668 |
+
t/L2/θn
|
| 669 |
+
L = 1000
|
| 670 |
+
L = 750
|
| 671 |
+
L = 500
|
| 672 |
+
L = 250
|
| 673 |
+
t -θn
|
| 674 |
+
FIG. 5.
|
| 675 |
+
The number density n(t) for different system sizes L
|
| 676 |
+
collapse onto a single curve when scaled as in Eq. (20), with
|
| 677 |
+
θn = 0.633. The data are for model A, and initial number
|
| 678 |
+
density n0 = 1.0.
|
| 679 |
+
fn(x) ∼ constant for x ≫ 1. The data for n(t) for differ-
|
| 680 |
+
ent L, when scaled as in Eq. (20) with θn = 0.633, col-
|
| 681 |
+
lapse onto a single curve, as shown in Fig. 5. For model
|
| 682 |
+
B and C, we will find the analysis of the data based on
|
| 683 |
+
N(m, t) and finite size scaling very useful for determining
|
| 684 |
+
the exponents.
|
| 685 |
+
We now determine θe from the power law decay of
|
| 686 |
+
the mean energy density e with time t.
|
| 687 |
+
The data for
|
| 688 |
+
energy for different initial number density n0, initial
|
| 689 |
+
speed v0 and initial mean energy e0 collapse onto one
|
| 690 |
+
curve when scaled, based on dimensional analysis, as
|
| 691 |
+
e(t) ≃ e0fe(tn0v0), as can be seen in Fig. 6. After an
|
| 692 |
+
initial crossover time tc ∼ n−1
|
| 693 |
+
0 , e(t) decreases as a power
|
| 694 |
+
law. From the excellent data collapse, we conclude that
|
| 695 |
+
the power law exponent is independent of the initial num-
|
| 696 |
+
ber density. From fitting a power law to the data, we
|
| 697 |
+
obtain θe = 0.728(5), which describes the data well over
|
| 698 |
+
5 decades. In the inset of Fig. 6, the compensated curve
|
| 699 |
+
tθee(t) is shown for n0 = 1.0.
|
| 700 |
+
The mean slope of the
|
| 701 |
+
curve changes from negative to positive as θn varies from
|
| 702 |
+
0.723 to 0.733, consistent with our direct measurement
|
| 703 |
+
of θe.
|
| 704 |
+
The exponent θe can also be determined from finite
|
| 705 |
+
size scaling. As for number density, e(t) is expected to
|
| 706 |
+
obey finite size scaling of the form
|
| 707 |
+
e(t) ≃
|
| 708 |
+
1
|
| 709 |
+
L2θe/θn fe
|
| 710 |
+
�
|
| 711 |
+
t
|
| 712 |
+
L2/θn
|
| 713 |
+
�
|
| 714 |
+
,
|
| 715 |
+
(21)
|
| 716 |
+
where the scaling function fe(x) ∼ x−θe for x ≪ 1, and
|
| 717 |
+
fe(x) ∼ constant for x ≫ 1. The simulation data for
|
| 718 |
+
different L collapse onto a single curve (see Fig. 7) when
|
| 719 |
+
e(t) and t are scaled as in Eq. (21) with θn = 0.633 and
|
| 720 |
+
θe = 0.728. The power law extends over 4 decades.
|
| 721 |
+
We now determine the exponent η relating the scaling
|
| 722 |
+
of velocity with mass as v2
|
| 723 |
+
m ∼ m−η [see Eq. (9)]. As seen
|
| 724 |
+
from Fig. 8, ⟨v2⟩ for a fixed mass scales as a power law
|
| 725 |
+
with m. We obtain η = 1.1505(3).
|
| 726 |
+
Note that η is not an independent exponent, but re-
|
| 727 |
+
lated to θn and θe through scaling theory, to be η = θe/θn
|
| 728 |
+
10-14
|
| 729 |
+
10-12
|
| 730 |
+
10-10
|
| 731 |
+
10-8
|
| 732 |
+
10-6
|
| 733 |
+
10-4
|
| 734 |
+
10-2
|
| 735 |
+
100
|
| 736 |
+
10-2
|
| 737 |
+
100
|
| 738 |
+
102
|
| 739 |
+
104
|
| 740 |
+
106
|
| 741 |
+
108
|
| 742 |
+
1010
|
| 743 |
+
e/e0
|
| 744 |
+
tn0 v0
|
| 745 |
+
n0 = 0.01
|
| 746 |
+
n0 = 0.10
|
| 747 |
+
n0 = 0.20
|
| 748 |
+
n0 = 0.40
|
| 749 |
+
n0 = 0.70
|
| 750 |
+
n0 = 1.00
|
| 751 |
+
0.14
|
| 752 |
+
0.15
|
| 753 |
+
0.16
|
| 754 |
+
0.17
|
| 755 |
+
102
|
| 756 |
+
103
|
| 757 |
+
104
|
| 758 |
+
105
|
| 759 |
+
106
|
| 760 |
+
tθee(t)
|
| 761 |
+
t
|
| 762 |
+
θe = 0.733
|
| 763 |
+
θe = 0.728
|
| 764 |
+
θe = 0.723
|
| 765 |
+
FIG. 6.
|
| 766 |
+
The data for mean energy density, e(t), at time t for
|
| 767 |
+
different initial number densities n0 in model A collapse onto
|
| 768 |
+
a single curve when e(t) and t are scaled as shown in figure.
|
| 769 |
+
The solid line is a power law t−0.728. Inset: The compensated
|
| 770 |
+
data n(t)tθe is shown for three different choices of θe differing
|
| 771 |
+
by 0.005 for n0 = 1.0. The curve is flat for θe = 0.728. The
|
| 772 |
+
data are obtained for L = 1000. All data have been averaged
|
| 773 |
+
over 300 different initial conditions.
|
| 774 |
+
10-6
|
| 775 |
+
10-4
|
| 776 |
+
10-2
|
| 777 |
+
100
|
| 778 |
+
102
|
| 779 |
+
104
|
| 780 |
+
106
|
| 781 |
+
10-8
|
| 782 |
+
10-6
|
| 783 |
+
10-4
|
| 784 |
+
10-2
|
| 785 |
+
100
|
| 786 |
+
L2θe /θn e(t)
|
| 787 |
+
t/L2/θn
|
| 788 |
+
L = 1000
|
| 789 |
+
L = 750
|
| 790 |
+
L = 500
|
| 791 |
+
L = 250
|
| 792 |
+
t -θe
|
| 793 |
+
FIG. 7.
|
| 794 |
+
The mean energy e(t) for different system sizes L
|
| 795 |
+
collapse onto a single curve when scaled as in Eq. (21), with
|
| 796 |
+
θn = 0.633 and θe = 0.728. The data are for model A, and
|
| 797 |
+
initial number density n0 = 1.0.
|
| 798 |
+
[see Eq. (17)]. From the measured values of θe = 0.728
|
| 799 |
+
and θn = 0.633, we obtain η = 1.15, consistent with
|
| 800 |
+
the value from direct measurement η = 1.1505(3), thus
|
| 801 |
+
providing support for the correctness of scaling theory.
|
| 802 |
+
We now provide a more direct evidence of scaling the-
|
| 803 |
+
ory being correct. From Eqs. (17) and (15), we obtain,
|
| 804 |
+
by eliminating η, a relation between θe and θn as given in
|
| 805 |
+
Eq. (18). If this relation is true, it implies that t2n2(t)e(t)
|
| 806 |
+
should not depend on time t. In Fig. 9, we show the vari-
|
| 807 |
+
ation of tan2(t)e(t) with a = 1.98, 2.00, 2.02. It is clear
|
| 808 |
+
that only for a = 2.0, the curve is horizontal. This gives
|
| 809 |
+
us a way of validating the scaling relations without the
|
| 810 |
+
need to measure any exponent directly.
|
| 811 |
+
Finally, we determine the exponent ζ defined in Eq. (6)
|
| 812 |
+
for small masses: N(m, t) ∼ mζt−θn(2+ζ). Note that ζ
|
| 813 |
+
is not related to θn or θe and is an independent expo-
|
| 814 |
+
|
| 815 |
+
7
|
| 816 |
+
10-8
|
| 817 |
+
10-7
|
| 818 |
+
10-6
|
| 819 |
+
10-5
|
| 820 |
+
10-4
|
| 821 |
+
10-3
|
| 822 |
+
10-2
|
| 823 |
+
10-1
|
| 824 |
+
100
|
| 825 |
+
100
|
| 826 |
+
101
|
| 827 |
+
102
|
| 828 |
+
103
|
| 829 |
+
104
|
| 830 |
+
105
|
| 831 |
+
〈v2〉
|
| 832 |
+
m
|
| 833 |
+
m-1.1505
|
| 834 |
+
FIG. 8.
|
| 835 |
+
The variation of the mean square velocity ⟨v2⟩ with
|
| 836 |
+
mass m. The solid line is power law t−η with η = −1.1505.
|
| 837 |
+
The data are for model A, with n0 = 1.0 and system size
|
| 838 |
+
L = 1000.
|
| 839 |
+
0.04
|
| 840 |
+
0.05
|
| 841 |
+
0.06
|
| 842 |
+
0.07
|
| 843 |
+
0.08
|
| 844 |
+
0.09
|
| 845 |
+
0.1
|
| 846 |
+
102
|
| 847 |
+
103
|
| 848 |
+
104
|
| 849 |
+
105
|
| 850 |
+
106
|
| 851 |
+
107
|
| 852 |
+
108
|
| 853 |
+
t ae(t)n(t) 2
|
| 854 |
+
t
|
| 855 |
+
a = 2.02
|
| 856 |
+
a = 2.00
|
| 857 |
+
a = 1.98
|
| 858 |
+
FIG. 9.
|
| 859 |
+
The variation of tan2(t)e(t) with time t for three
|
| 860 |
+
different values of a close to 2.
|
| 861 |
+
The compensated curve
|
| 862 |
+
is horizontal for a = 2.0, validating the scaling relation in
|
| 863 |
+
Eq. (18). The data are for model A, with initial number den-
|
| 864 |
+
sity n0 = 1.0 and system size L = 1000.
|
| 865 |
+
nent. To determine ζ, we study the temporal behavior
|
| 866 |
+
of N(m, t) for fixed mass m = 2, 4, 8, 12, 16. As shown
|
| 867 |
+
in Fig. 10, the data for the different masses for large
|
| 868 |
+
times collapse onto one curve when N(m, t) is scaled as
|
| 869 |
+
N(m, t)/mζ, with ζ = 0.270(5). We additionally check
|
| 870 |
+
that the scaled data are consistent with the power law
|
| 871 |
+
t−θn(2+ζ) for large times.
|
| 872 |
+
The numerically obtained values of the exponents for
|
| 873 |
+
model A are summarized in Table II.
|
| 874 |
+
B.
|
| 875 |
+
Model B: Fractal Clusters
|
| 876 |
+
In this subsection, we determine the exponents θn, θe,
|
| 877 |
+
η and ζ for model B. We first show that the clusters in
|
| 878 |
+
model B are fractal with a fractal dimension, df, that
|
| 879 |
+
lies between 1 and 2. To determine df, we consider the
|
| 880 |
+
final cluster in each of the simulations for a given initial
|
| 881 |
+
number density n0. df of this cluster is measured using
|
| 882 |
+
10-8
|
| 883 |
+
10-7
|
| 884 |
+
10-6
|
| 885 |
+
10-5
|
| 886 |
+
10-4
|
| 887 |
+
10-3
|
| 888 |
+
10-2
|
| 889 |
+
10-1
|
| 890 |
+
100
|
| 891 |
+
100
|
| 892 |
+
101
|
| 893 |
+
102
|
| 894 |
+
103
|
| 895 |
+
104
|
| 896 |
+
105
|
| 897 |
+
N(m,t)/mζ
|
| 898 |
+
t
|
| 899 |
+
m = 2
|
| 900 |
+
m = 4
|
| 901 |
+
m = 8
|
| 902 |
+
m = 12
|
| 903 |
+
m = 16
|
| 904 |
+
t -θn(2+ζ)
|
| 905 |
+
FIG. 10. The data for N(m, t) for different masses for large
|
| 906 |
+
times collapse onto one curve when the number density is
|
| 907 |
+
scaled as N(m, t)/mζ with ζ = 0.270.
|
| 908 |
+
The solid line is a
|
| 909 |
+
power law t−θn(2+ζ) with θn = 0.633. The data are for model
|
| 910 |
+
A, with initial number density n0 = 1.0.
|
| 911 |
+
TABLE II. Summary of the numerically obtained values of
|
| 912 |
+
the exponents for model A. The values are independent of
|
| 913 |
+
initial density n0.
|
| 914 |
+
exponent
|
| 915 |
+
value
|
| 916 |
+
θn
|
| 917 |
+
0.633(7)
|
| 918 |
+
θe
|
| 919 |
+
0.728(5)
|
| 920 |
+
η
|
| 921 |
+
1.1505(3)
|
| 922 |
+
ζ
|
| 923 |
+
0.270(5)
|
| 924 |
+
the box counting method [48]. In this method, the lattice
|
| 925 |
+
is tiled with square boxes of length ℓ. Let M be the num-
|
| 926 |
+
ber of non-empty boxes. Then M ∼ ℓ−df . The results
|
| 927 |
+
for three different n0 are shown in Fig. 11. The data for
|
| 928 |
+
different n0 fall on top of each other for intermediate box
|
| 929 |
+
sizes. The same is true for other n0 and we conclude that
|
| 930 |
+
df is independent of n0. We estimate df to be 1.49(3).
|
| 931 |
+
Consider now the decay of the density of particles n(t)
|
| 932 |
+
with time t. We find that for model B, it is difficult to
|
| 933 |
+
accurately determine θn directly from the data for n(t)
|
| 934 |
+
because of strong crossover effects. This can be seen from
|
| 935 |
+
Fig. 12 where the variation of n(t) with t is shown for two
|
| 936 |
+
different initial densities n0 = 0.00125 and n0 = 0.01.
|
| 937 |
+
The data for the two densities overlap for short times but
|
| 938 |
+
deviate for larger times. The solid lines, which are the
|
| 939 |
+
estimates for θn from finite size scaling (to be discussed
|
| 940 |
+
below) match with the data only for late times. The con-
|
| 941 |
+
vergence to the asymptotic answer can also be seen from
|
| 942 |
+
measuring the instantaneous slope θn = −d ln n(t)/d ln t
|
| 943 |
+
for each time (see inset of Fig. 12). We find that the expo-
|
| 944 |
+
nent θn saturates only at late times for the larger initial
|
| 945 |
+
densities. We find that the same issue is present for the
|
| 946 |
+
temporal decay of energy e(t), making it also difficult to
|
| 947 |
+
measure θe directly.
|
| 948 |
+
We determine θn from finite size scaling.
|
| 949 |
+
For finite
|
| 950 |
+
systems, n(t) has the finite size scaling form given in
|
| 951 |
+
|
| 952 |
+
8
|
| 953 |
+
10-6
|
| 954 |
+
10-5
|
| 955 |
+
10-4
|
| 956 |
+
10-3
|
| 957 |
+
10-2
|
| 958 |
+
10-1
|
| 959 |
+
100
|
| 960 |
+
101
|
| 961 |
+
100
|
| 962 |
+
101
|
| 963 |
+
102
|
| 964 |
+
103
|
| 965 |
+
M /(n0 L2)
|
| 966 |
+
l
|
| 967 |
+
n0=0.0001
|
| 968 |
+
n0=0.0025
|
| 969 |
+
n0=0.01
|
| 970 |
+
l -1.49
|
| 971 |
+
FIG. 11.
|
| 972 |
+
Determination of the fractal dimension of the
|
| 973 |
+
largest cluster in model B using the box counting method.
|
| 974 |
+
The number of non-empty boxes, M, varies with the size ℓ
|
| 975 |
+
of the boxes used to tile the lattice as M ∼ ℓ−df . We find
|
| 976 |
+
df ≈ 1.49(3) (power law shown by solid line) irrespective of
|
| 977 |
+
the initial density. The data are for L = 5000.
|
| 978 |
+
10-5
|
| 979 |
+
10-4
|
| 980 |
+
10-3
|
| 981 |
+
10-2
|
| 982 |
+
10-1
|
| 983 |
+
100
|
| 984 |
+
10-3
|
| 985 |
+
10-2
|
| 986 |
+
10-1
|
| 987 |
+
100
|
| 988 |
+
101
|
| 989 |
+
102
|
| 990 |
+
103
|
| 991 |
+
104
|
| 992 |
+
t -1.10
|
| 993 |
+
t -1.01
|
| 994 |
+
n/n0
|
| 995 |
+
tn0v0
|
| 996 |
+
n0 = 0.00125
|
| 997 |
+
n0 = 0.01
|
| 998 |
+
0.2
|
| 999 |
+
0.6
|
| 1000 |
+
1
|
| 1001 |
+
1.4
|
| 1002 |
+
102
|
| 1003 |
+
104
|
| 1004 |
+
106
|
| 1005 |
+
θn
|
| 1006 |
+
t
|
| 1007 |
+
n0=0.00125
|
| 1008 |
+
n0=0.01
|
| 1009 |
+
FIG. 12. The variation of the mean density of clusters n(t) in
|
| 1010 |
+
model B with time t is shown for two different initial densi-
|
| 1011 |
+
ties. The exponents for the power laws, shown by solid lines,
|
| 1012 |
+
have been obtained from finite size scaling. Inset: The time
|
| 1013 |
+
dependent exponent θn obtained from θn = −d ln n(t)/d ln t is
|
| 1014 |
+
shown. θn saturates for the larger initial densities only at late
|
| 1015 |
+
times. Data are for L = 2000 and averaged over 300 different
|
| 1016 |
+
initial conditions.
|
| 1017 |
+
Eq. (20), namely n(t) ≃ L−2fn(t/L2/θn). In Fig. 13, we
|
| 1018 |
+
show the results for two representative initial densities
|
| 1019 |
+
n0 = 0.00125 and n0 = 0.01. The data for different L,
|
| 1020 |
+
when scaled as in Eq. (20), collapse onto a single curve
|
| 1021 |
+
with θn = 1.01(1) for n0 = 0.00125 and θn = 1.10(1) for
|
| 1022 |
+
n0 = 0.01. The results for other n0 are listed in Table III,
|
| 1023 |
+
based on which we conclude that θn depends on n0 and
|
| 1024 |
+
converges to θn = 1 as n0 → 0. We also check that the
|
| 1025 |
+
same value of θn leads to the collapse of the data for
|
| 1026 |
+
N(m, t) for different times when scaled as in Eq. (3).
|
| 1027 |
+
The limiting value of θn = 1 for n0 → 0 coincides
|
| 1028 |
+
with θmf
|
| 1029 |
+
n
|
| 1030 |
+
= 1. However, it is not clear whether the mean
|
| 1031 |
+
field result is obtained because correlations vanish. We
|
| 1032 |
+
check for correlations by measuring the exponent η. In
|
| 1033 |
+
Fig. 14, we show the dependence of the mean squared
|
| 1034 |
+
100
|
| 1035 |
+
101
|
| 1036 |
+
102
|
| 1037 |
+
103
|
| 1038 |
+
104
|
| 1039 |
+
105
|
| 1040 |
+
106
|
| 1041 |
+
107
|
| 1042 |
+
108
|
| 1043 |
+
10-6
|
| 1044 |
+
10-4
|
| 1045 |
+
10-2
|
| 1046 |
+
100
|
| 1047 |
+
102
|
| 1048 |
+
n0=0.01
|
| 1049 |
+
n0=0.00125
|
| 1050 |
+
n(t)L2
|
| 1051 |
+
t/L2/θn
|
| 1052 |
+
L = 10000
|
| 1053 |
+
L = 5000
|
| 1054 |
+
L = 2000
|
| 1055 |
+
L = 1000
|
| 1056 |
+
L = 500
|
| 1057 |
+
L = 250
|
| 1058 |
+
FIG. 13. Finite size scaling of n(t) for model B: The number
|
| 1059 |
+
density n(t) for different system sizes L collapse onto a single
|
| 1060 |
+
curve when scaled as in Eq. (20), with θn = 1.01 and θn =
|
| 1061 |
+
1.10 for the initial densities n0 = 0.00125 and n0 = 0.01
|
| 1062 |
+
respectively.
|
| 1063 |
+
The data for n0 = 0.01 has been shifted for
|
| 1064 |
+
clarity.
|
| 1065 |
+
10-10
|
| 1066 |
+
10-8
|
| 1067 |
+
10-6
|
| 1068 |
+
10-4
|
| 1069 |
+
10-2
|
| 1070 |
+
100
|
| 1071 |
+
100
|
| 1072 |
+
101
|
| 1073 |
+
102
|
| 1074 |
+
103
|
| 1075 |
+
104
|
| 1076 |
+
105
|
| 1077 |
+
m-1.293
|
| 1078 |
+
m-1.204
|
| 1079 |
+
〈v2〉
|
| 1080 |
+
m
|
| 1081 |
+
n0=0.00125
|
| 1082 |
+
n0=0.01
|
| 1083 |
+
FIG. 14.
|
| 1084 |
+
The variation of the mean square velocity ⟨v2⟩
|
| 1085 |
+
with mass m for different initial densities.
|
| 1086 |
+
The solid lines
|
| 1087 |
+
are power-laws m−η with η = 1.293(4) for n0 = 0.00125 and
|
| 1088 |
+
η = 1.204(3) for n0 = 0.01. The data are for model B with
|
| 1089 |
+
system sizes L = 10000 for n0 = 0.00125 and L = 5000 for
|
| 1090 |
+
n0 = 0.01. The data for n0 = 0.01 has been shifted for clarity.
|
| 1091 |
+
velocity on the mass m for two initial densities.
|
| 1092 |
+
The
|
| 1093 |
+
power law dependence extends over three decades and we
|
| 1094 |
+
obtain exponents that depend on the initial density n0
|
| 1095 |
+
with η = 1.293(4) for n0 = 0.00125 and η = 1.204(3) for
|
| 1096 |
+
n0 = 0.01. The results for other n0 are listed in Table III,
|
| 1097 |
+
based on which we conclude that η also depends on n0
|
| 1098 |
+
and differs significantly from one for small n0. However,
|
| 1099 |
+
as n0 increases, we find that η → 1.
|
| 1100 |
+
Since it is difficult to measure θe directly from e(t),
|
| 1101 |
+
we estimate θe using the scaling relation θe = ηθn [see
|
| 1102 |
+
Eq. (15)]. To check for consistency, we confirm that for
|
| 1103 |
+
this choice of θe, the data for different system sizes col-
|
| 1104 |
+
lapse onto one curve when e(t) and t are scaled using
|
| 1105 |
+
finite size scaling as described in Eq. (21). The data col-
|
| 1106 |
+
lapse for two different n0, shown in Fig. 15, is satisfactory.
|
| 1107 |
+
The results of θe for different n0 are listed in Table III.
|
| 1108 |
+
|
| 1109 |
+
9
|
| 1110 |
+
10-2
|
| 1111 |
+
100
|
| 1112 |
+
102
|
| 1113 |
+
104
|
| 1114 |
+
106
|
| 1115 |
+
108
|
| 1116 |
+
1010
|
| 1117 |
+
10-6
|
| 1118 |
+
10-4
|
| 1119 |
+
10-2
|
| 1120 |
+
100
|
| 1121 |
+
102
|
| 1122 |
+
n0=0.01
|
| 1123 |
+
n0=0.00125
|
| 1124 |
+
e(t)L2θe /θn
|
| 1125 |
+
t/L2/θn
|
| 1126 |
+
L = 10000
|
| 1127 |
+
L = 5000
|
| 1128 |
+
L = 2000
|
| 1129 |
+
L = 1000
|
| 1130 |
+
L = 500
|
| 1131 |
+
L = 250
|
| 1132 |
+
FIG. 15. Finite size scaling of e(t) for model B: The mean
|
| 1133 |
+
energy e(t) for different system sizes L collapse onto a single
|
| 1134 |
+
curve when scaled as in Eq. (21). Results for two different
|
| 1135 |
+
densities n0 = 0.00125 and n0 = 0.01(vertically shifted for
|
| 1136 |
+
visualization) is shown with θn obtained using finite size scal-
|
| 1137 |
+
ing [Eq. (20)] whereas θe is obtained using the hyperscaling
|
| 1138 |
+
relation [Eq. (15)].
|
| 1139 |
+
10-8
|
| 1140 |
+
10-6
|
| 1141 |
+
10-4
|
| 1142 |
+
10-2
|
| 1143 |
+
100
|
| 1144 |
+
102
|
| 1145 |
+
100
|
| 1146 |
+
101
|
| 1147 |
+
102
|
| 1148 |
+
103
|
| 1149 |
+
104
|
| 1150 |
+
105
|
| 1151 |
+
106
|
| 1152 |
+
107
|
| 1153 |
+
108
|
| 1154 |
+
n0=0.01
|
| 1155 |
+
n0=0.00125
|
| 1156 |
+
N(m,t)/mζ
|
| 1157 |
+
t
|
| 1158 |
+
m = 2
|
| 1159 |
+
m = 4
|
| 1160 |
+
m = 8
|
| 1161 |
+
m = 12
|
| 1162 |
+
m = 16
|
| 1163 |
+
t-θn(2+ζ)
|
| 1164 |
+
FIG. 16. The data for N(m, t) in model B for fixed masses
|
| 1165 |
+
collapse onto one curve when the number density is scaled as
|
| 1166 |
+
N(m, t)/mζ with ζ = −0.422(6) for n0 = 0.00125 whereas
|
| 1167 |
+
ζ = −0.538(24) for n0 = 0.01. The solid line is a power law
|
| 1168 |
+
t−θn(2+ζ) with θn taking values 1.01 and 1.10 for the initial
|
| 1169 |
+
densities 0.00125 and 0.01 (vertically shifted for visualization)
|
| 1170 |
+
respectively.
|
| 1171 |
+
Finally, we determine the exponent ζ defined in Eq. (6)
|
| 1172 |
+
for small masses. Similar to model A, in order to deter-
|
| 1173 |
+
mine ζ, we study the temporal behavior of N(m, t) for
|
| 1174 |
+
fixed mass m = 2, 4, 8, 12, 16. Here, we illustrate the be-
|
| 1175 |
+
havior of ζ for two different initial densities. As shown
|
| 1176 |
+
in Fig. 16, the data for the different masses collapse
|
| 1177 |
+
onto one curve for the respective initial densities when
|
| 1178 |
+
N(m, t) is scaled as N(m, t)/mζ, with ζ = −0.4229(6)
|
| 1179 |
+
for n0 = 0.00125 and ζ = −0.538(24) for n0 = 0.01. As
|
| 1180 |
+
an additional check, the scaled data are consistent with
|
| 1181 |
+
the power law with an exponent t−θn(2+ζ).
|
| 1182 |
+
Thus, the
|
| 1183 |
+
exponent ζ is dependent on the initial density n0. Also,
|
| 1184 |
+
they are negative, as compared to model A where the
|
| 1185 |
+
exponent is positive.
|
| 1186 |
+
TABLE III. Summary of the numerically obtained values of
|
| 1187 |
+
the exponents for model B.
|
| 1188 |
+
n0
|
| 1189 |
+
θn
|
| 1190 |
+
η
|
| 1191 |
+
θe
|
| 1192 |
+
df
|
| 1193 |
+
df
|
| 1194 |
+
ζ
|
| 1195 |
+
(= ηθn)
|
| 1196 |
+
[Eq. (18)]
|
| 1197 |
+
0.00100 1.01(5) 1.291(4) 1.30(7) 1.49(3) 1.54(17) -0.41(5)
|
| 1198 |
+
0.00125 1.01(8) 1.293(4) 1.30(10) 1.49(3) 1.54(23) -0.42(1)
|
| 1199 |
+
0.00250 1.03(4) 1.261(7) 1.30(6) 1.49(3) 1.52(14) -0.46(2)
|
| 1200 |
+
0.00500 1.08(4) 1.231(2) 1.33(5) 1.49(3) 1.46(12) -0.49(2)
|
| 1201 |
+
0.01
|
| 1202 |
+
1.10(2) 1.204(3) 1.32(3) 1.49(3)
|
| 1203 |
+
1.45(7)
|
| 1204 |
+
-0.54(2)
|
| 1205 |
+
0.04
|
| 1206 |
+
—
|
| 1207 |
+
1.10
|
| 1208 |
+
—
|
| 1209 |
+
—
|
| 1210 |
+
—
|
| 1211 |
+
—
|
| 1212 |
+
0.08
|
| 1213 |
+
—
|
| 1214 |
+
1.08
|
| 1215 |
+
—
|
| 1216 |
+
—
|
| 1217 |
+
—
|
| 1218 |
+
—
|
| 1219 |
+
0.16
|
| 1220 |
+
—
|
| 1221 |
+
1.05
|
| 1222 |
+
—
|
| 1223 |
+
—
|
| 1224 |
+
—
|
| 1225 |
+
—
|
| 1226 |
+
1
|
| 1227 |
+
1.1
|
| 1228 |
+
1.2
|
| 1229 |
+
1.3
|
| 1230 |
+
1.4
|
| 1231 |
+
1.5
|
| 1232 |
+
10-3
|
| 1233 |
+
10-2
|
| 1234 |
+
10-1
|
| 1235 |
+
θn, θe , η
|
| 1236 |
+
n0
|
| 1237 |
+
θn
|
| 1238 |
+
θe
|
| 1239 |
+
η
|
| 1240 |
+
FIG. 17.
|
| 1241 |
+
The variation of the exponents θn, θe and η are
|
| 1242 |
+
shown as function of the initial density n0. The data are for
|
| 1243 |
+
model B. θn and θe approach an asymptotic limit 1.0 and 1.3
|
| 1244 |
+
respectively for lowest densities. The exponent η ≈ 1.3 in the
|
| 1245 |
+
low density limit and approaches the mean field result (η = 1)
|
| 1246 |
+
for higher density.
|
| 1247 |
+
The results for the exponents θn, θe, η, df and ζ are
|
| 1248 |
+
summarized in Table III and their dependence on num-
|
| 1249 |
+
ber density n0 is shown in Fig. 17. For higher densities,
|
| 1250 |
+
it is difficult to get the exponents θn and hence θe due
|
| 1251 |
+
to increasing finite-size effects. However, the exponent η
|
| 1252 |
+
can be calculated for the densities larger than 0.01. From
|
| 1253 |
+
Table III, we observe that, when n0 → 0, the exponents
|
| 1254 |
+
tend to the limiting values θn → 1, η → 1.3 and θe → 1.3.
|
| 1255 |
+
When the density increases, we find that η → 1, thus ap-
|
| 1256 |
+
proaching its mean field value ηmf = 1. We conclude that
|
| 1257 |
+
velocity correlations vanish as density increases. We note
|
| 1258 |
+
that in model B, there are no avalanche of coalescence
|
| 1259 |
+
events caused due to two clusters colliding. We also ver-
|
| 1260 |
+
ify that the exponents satisfy the hyperscaling relation
|
| 1261 |
+
given by Eq. (18). In Table III, the fractal dimension
|
| 1262 |
+
determined numerically is compared with that obtained
|
| 1263 |
+
by Eq. (18) [see columns 5 and 6]. For all densities, the
|
| 1264 |
+
values are equal within error bars, thus consistent with
|
| 1265 |
+
the scaling theory.
|
| 1266 |
+
|
| 1267 |
+
10
|
| 1268 |
+
10-7
|
| 1269 |
+
10-6
|
| 1270 |
+
10-5
|
| 1271 |
+
10-4
|
| 1272 |
+
10-3
|
| 1273 |
+
10-2
|
| 1274 |
+
10-1
|
| 1275 |
+
100
|
| 1276 |
+
10-4
|
| 1277 |
+
10-2
|
| 1278 |
+
100
|
| 1279 |
+
102
|
| 1280 |
+
104
|
| 1281 |
+
106
|
| 1282 |
+
t -0.83
|
| 1283 |
+
t -0.93
|
| 1284 |
+
n(t)/n0
|
| 1285 |
+
tn0v0
|
| 1286 |
+
n0 = 0.0001
|
| 1287 |
+
n0 = 0.16
|
| 1288 |
+
0.2
|
| 1289 |
+
0.6
|
| 1290 |
+
1
|
| 1291 |
+
102
|
| 1292 |
+
104
|
| 1293 |
+
106
|
| 1294 |
+
θn
|
| 1295 |
+
t
|
| 1296 |
+
FIG. 18. The variation of the mean density of clusters n(t) in
|
| 1297 |
+
model C with time t is shown for two different initial densi-
|
| 1298 |
+
ties. The exponents for the power laws, shown by solid lines,
|
| 1299 |
+
have been obtained from finite size scaling. Inset: The time
|
| 1300 |
+
dependent exponent θn obtained from θn = −d ln n(t)/d ln t is
|
| 1301 |
+
shown. θn saturates for the larger initial densities only at late
|
| 1302 |
+
times. The dashed lines are the reference for the exponents
|
| 1303 |
+
0.83 and 0.93. Data are for L = 2000 and averaged over 300
|
| 1304 |
+
different initial conditions.
|
| 1305 |
+
C.
|
| 1306 |
+
Model C: Spherical clusters
|
| 1307 |
+
We now determine the exponents θn, θe, η and ζ for
|
| 1308 |
+
model C. We first show that the exponent θn depends on
|
| 1309 |
+
initial densities n0. Figure 18 shows the variation of n(t)
|
| 1310 |
+
with time t for two different initial densities, one small
|
| 1311 |
+
and one large. The time dependent θn = −d ln n(t)/d ln t,
|
| 1312 |
+
shown in the inset, saturates at different values for the
|
| 1313 |
+
different initial densities. Like for model B, it is difficult
|
| 1314 |
+
to measure θn directly as n(t) shows strong crossover ef-
|
| 1315 |
+
fects. For this reason, we determine θn from finite size
|
| 1316 |
+
scaling (see below) following which we obtain θn = 0.83
|
| 1317 |
+
for n0 = 0.0001 and θn = 0.93 for n0 = 0.16. The ex-
|
| 1318 |
+
ponents obtained from finite size scaling are shown in
|
| 1319 |
+
Fig. 18 for comparison and they describe the data for
|
| 1320 |
+
large times well.
|
| 1321 |
+
We determine the exponent θn using the finite size scal-
|
| 1322 |
+
ing n(t) ≃ L−2fn(t/L2/θn) [see Eq. (20)]. Two represen-
|
| 1323 |
+
tative cases are shown in Fig. 19. The data of n(t) for
|
| 1324 |
+
different L, when scaled as in Eq. (20) collapse onto a
|
| 1325 |
+
single curve for θn = 0.83 for n0 = 0.001 and θn = 0.93
|
| 1326 |
+
for n0 = 0.16. The results for other n0 are listed in Ta-
|
| 1327 |
+
ble IV, based on which we conclude that θn depends on
|
| 1328 |
+
n0 and increases to the mean field result θmf
|
| 1329 |
+
n
|
| 1330 |
+
= 1 with
|
| 1331 |
+
increasing n0. We also check that the same value of θn
|
| 1332 |
+
leads to the collapse of the data for N(m, t) for different
|
| 1333 |
+
times when scaled as in Eq. (3).
|
| 1334 |
+
It is possible that the mean field result is obtained at
|
| 1335 |
+
higher n0 because the correlations vanish. Two repre-
|
| 1336 |
+
sentative cases are shown in Fig. 20.
|
| 1337 |
+
We find that η
|
| 1338 |
+
depends on the initial density n0 with η = 1.283(13) for
|
| 1339 |
+
n0 = 0.0001 and η = 1.114(2) for n0 = 0.16. The results
|
| 1340 |
+
for other n0 are listed in Table IV and it shows that η
|
| 1341 |
+
decreases to its mean field prediction ηmf = 1 as density
|
| 1342 |
+
100
|
| 1343 |
+
101
|
| 1344 |
+
102
|
| 1345 |
+
103
|
| 1346 |
+
104
|
| 1347 |
+
105
|
| 1348 |
+
106
|
| 1349 |
+
107
|
| 1350 |
+
108
|
| 1351 |
+
109
|
| 1352 |
+
10-8
|
| 1353 |
+
10-6
|
| 1354 |
+
10-4
|
| 1355 |
+
10-2
|
| 1356 |
+
100
|
| 1357 |
+
n0=0.0001
|
| 1358 |
+
n0=0.16
|
| 1359 |
+
L2n(t)
|
| 1360 |
+
t/L2/θn
|
| 1361 |
+
L10000
|
| 1362 |
+
L5000
|
| 1363 |
+
L2000
|
| 1364 |
+
L1000
|
| 1365 |
+
L500
|
| 1366 |
+
FIG. 19. Finite size scaling of n(t) for model C: The number
|
| 1367 |
+
density n(t) for different system sizes L collapse onto a single
|
| 1368 |
+
curve when scaled as in Eq. (20), with θn = 0.83(4) and θn =
|
| 1369 |
+
0.93(5) for the initial densities n0 = 0.0001 and n0 = 0.16
|
| 1370 |
+
respectively.
|
| 1371 |
+
The data for n0 = 0.16 has been shifted for
|
| 1372 |
+
clarity.
|
| 1373 |
+
10-12
|
| 1374 |
+
10-10
|
| 1375 |
+
10-8
|
| 1376 |
+
10-6
|
| 1377 |
+
10-4
|
| 1378 |
+
10-2
|
| 1379 |
+
100
|
| 1380 |
+
100
|
| 1381 |
+
101
|
| 1382 |
+
102
|
| 1383 |
+
103
|
| 1384 |
+
104
|
| 1385 |
+
105
|
| 1386 |
+
m-1.283
|
| 1387 |
+
m-1.114
|
| 1388 |
+
〈v2〉
|
| 1389 |
+
m
|
| 1390 |
+
n0=0.0001
|
| 1391 |
+
n0=0.16
|
| 1392 |
+
FIG. 20.
|
| 1393 |
+
The variation of the mean square velocity ⟨v2⟩
|
| 1394 |
+
plotted as function of mass m for different initial densities.
|
| 1395 |
+
The solid lines are power-laws m−η with η = 1.283(13) and
|
| 1396 |
+
η = 1.114(2) for n0 = 0.0001 and n0 = 0.16 respectively.
|
| 1397 |
+
The data are for model C with system sizes L = 10000 and
|
| 1398 |
+
L = 2000 for the densities n0 = 0.0001 and n0 = 0.16 respec-
|
| 1399 |
+
tively. The data for n0 = 0.16 has been shifted for clarity.
|
| 1400 |
+
increases.
|
| 1401 |
+
We find that it is difficult to measure θe directly from
|
| 1402 |
+
the power-law decay of e(t). Hence, we measure θe using
|
| 1403 |
+
the scaling relation, θe = ηθn [see Eq. (15)]. To check
|
| 1404 |
+
for the consistency of the result for θe obtained using
|
| 1405 |
+
the scaling relation [Eq. (15)], we confirm that for this
|
| 1406 |
+
choice of θe, the data for different system sizes can be
|
| 1407 |
+
collapsed onto one curve using finite size scaling e(t) ≃
|
| 1408 |
+
L−2θe/θnfe(t/L2/θn) [see Eq. (21)]. The data collapse is
|
| 1409 |
+
satisfactory as shown in Fig. 21 for the two different n0.
|
| 1410 |
+
The results of θe for different n0 are listed in Table IV
|
| 1411 |
+
which shows that θe is close to the mean field limit, θmf
|
| 1412 |
+
e
|
| 1413 |
+
=
|
| 1414 |
+
1 for all n0.
|
| 1415 |
+
Finally, we determine the exponent ζ [defined in
|
| 1416 |
+
Eq. (6)] for small masses. In order to determine ζ, we
|
| 1417 |
+
|
| 1418 |
+
11
|
| 1419 |
+
10-8
|
| 1420 |
+
10-6
|
| 1421 |
+
10-4
|
| 1422 |
+
10-2
|
| 1423 |
+
100
|
| 1424 |
+
102
|
| 1425 |
+
104
|
| 1426 |
+
106
|
| 1427 |
+
108
|
| 1428 |
+
10-8
|
| 1429 |
+
10-7
|
| 1430 |
+
10-6
|
| 1431 |
+
10-5
|
| 1432 |
+
10-4
|
| 1433 |
+
10-3
|
| 1434 |
+
10-2
|
| 1435 |
+
10-1
|
| 1436 |
+
100
|
| 1437 |
+
n0=0.0001
|
| 1438 |
+
n0=0.16
|
| 1439 |
+
L2θe / θn n(t)
|
| 1440 |
+
t/L 2/θn
|
| 1441 |
+
L10000
|
| 1442 |
+
L5000
|
| 1443 |
+
L2000
|
| 1444 |
+
L1000
|
| 1445 |
+
L500
|
| 1446 |
+
FIG. 21.
|
| 1447 |
+
Finite size scaling of e(t) for model C: The mean
|
| 1448 |
+
energy density e(t) for different system sizes L collapse onto
|
| 1449 |
+
a single curve when scaled as in Eq. (21). Results for two
|
| 1450 |
+
different densities n0 = 0.0001 and n0 = 0.16 is shown with
|
| 1451 |
+
θn obtained using finite size scaling [Eq. (20)] whereas θe ob-
|
| 1452 |
+
tained using the hyperscaling relation [Eq. (15)]. The data
|
| 1453 |
+
for n0 = 0.0001 has been shifted for clarity.
|
| 1454 |
+
10-8
|
| 1455 |
+
10-7
|
| 1456 |
+
10-6
|
| 1457 |
+
10-5
|
| 1458 |
+
10-4
|
| 1459 |
+
10-3
|
| 1460 |
+
10-2
|
| 1461 |
+
10-1
|
| 1462 |
+
100
|
| 1463 |
+
101
|
| 1464 |
+
100
|
| 1465 |
+
101
|
| 1466 |
+
102
|
| 1467 |
+
103
|
| 1468 |
+
104
|
| 1469 |
+
105
|
| 1470 |
+
106
|
| 1471 |
+
107
|
| 1472 |
+
108
|
| 1473 |
+
109
|
| 1474 |
+
n0=0.0001
|
| 1475 |
+
n0=0.16
|
| 1476 |
+
N(m,t)/mζ
|
| 1477 |
+
t
|
| 1478 |
+
m = 2
|
| 1479 |
+
m = 4
|
| 1480 |
+
m = 8
|
| 1481 |
+
m = 16
|
| 1482 |
+
t-θn(2+ζ)
|
| 1483 |
+
FIG. 22. The data for N(m, t) in model C for fixed masses
|
| 1484 |
+
collapse onto one curve when the number density is scaled as
|
| 1485 |
+
N(m, t)/mζ with ζ = −0.248(26) for n0 = 0.0001 whereas
|
| 1486 |
+
ζ = −0.563(10) for n0 = 0.16. The solid line is a power law
|
| 1487 |
+
t−θn(2+ζ) with θn as 0.83 and 0.93 for the initial densities
|
| 1488 |
+
0.0001 and 0.16 respectively. The data for n0 = 0.0001 has
|
| 1489 |
+
been shifted for clarity.
|
| 1490 |
+
study the temporal behavior of N(m, t) for fixed mass
|
| 1491 |
+
m = 2, 4, 8, 16. Here, we illustrate the behavior of ζ for
|
| 1492 |
+
two different initial densities. As shown in Fig. 22, the
|
| 1493 |
+
data for the different masses collapse onto one curve for
|
| 1494 |
+
the respective initial densities when N(m, t) is scaled as
|
| 1495 |
+
N(m, t)/mζ, with ζ = −0.248(26) for n0 = 0.0001 and
|
| 1496 |
+
ζ = −0.563(10) for n0 = 0.16. As an additional check,
|
| 1497 |
+
the scaled data are consistent with the power law with
|
| 1498 |
+
an exponent t−θn(2+ζ). The results of ζ for other densi-
|
| 1499 |
+
ties are listed in Table IV. We conclude that ζ is strongly
|
| 1500 |
+
dependent on n0.
|
| 1501 |
+
We find that the exponents θn, θe, η and ζ are den-
|
| 1502 |
+
sity dependent [see Table IV and Fig. 23(a)].
|
| 1503 |
+
θn in-
|
| 1504 |
+
creases with the increase in density and approaches the
|
| 1505 |
+
TABLE IV. Summary of the numerically obtained values of
|
| 1506 |
+
the exponents for model C.
|
| 1507 |
+
n0
|
| 1508 |
+
θn
|
| 1509 |
+
η
|
| 1510 |
+
θe(= ηθn)
|
| 1511 |
+
ζ
|
| 1512 |
+
0.0001
|
| 1513 |
+
0.83(4)
|
| 1514 |
+
1.283(13)
|
| 1515 |
+
1.06(6)
|
| 1516 |
+
-0.248(26)
|
| 1517 |
+
0.00125
|
| 1518 |
+
0.84(5)
|
| 1519 |
+
1.275(10)
|
| 1520 |
+
1.07(7)
|
| 1521 |
+
-0.350(27)
|
| 1522 |
+
0.01
|
| 1523 |
+
0.85(5)
|
| 1524 |
+
1.241(2)
|
| 1525 |
+
1.05(6)
|
| 1526 |
+
-0.364(6)
|
| 1527 |
+
0.04
|
| 1528 |
+
0.87(6)
|
| 1529 |
+
1.174(3)
|
| 1530 |
+
1.02(7)
|
| 1531 |
+
-0.403(4)
|
| 1532 |
+
0.16
|
| 1533 |
+
0.93(5)
|
| 1534 |
+
1.114(2)
|
| 1535 |
+
1.04(6)
|
| 1536 |
+
-0.563(10)
|
| 1537 |
+
(a)
|
| 1538 |
+
(b)
|
| 1539 |
+
FIG. 23.
|
| 1540 |
+
(a) The variation of the exponents θn, θe and η with
|
| 1541 |
+
initial density, n0, for model C. The horizontal dotted line is
|
| 1542 |
+
the mean field prediction, θmf
|
| 1543 |
+
n
|
| 1544 |
+
= θmf
|
| 1545 |
+
e
|
| 1546 |
+
= ηmf = 1. (b) Com-
|
| 1547 |
+
parison of the exponent θn with results of earlier simulations
|
| 1548 |
+
of BA in the continuum [39, 41].
|
| 1549 |
+
mean field predictions θmf
|
| 1550 |
+
n
|
| 1551 |
+
= 1. An opposite trend is ob-
|
| 1552 |
+
served in the variation of exponent η with density where
|
| 1553 |
+
it decreases with the increase in initial density but, ap-
|
| 1554 |
+
proaches the mean field prediction ηmf = 1 with the in-
|
| 1555 |
+
crease in density. On the other hand, θe has a rather weak
|
| 1556 |
+
dependence on the initial density and is always close to
|
| 1557 |
+
the mean field result θmf
|
| 1558 |
+
e
|
| 1559 |
+
= 1 irrespective of the initial
|
| 1560 |
+
density. We compare our results with those for BA in the
|
| 1561 |
+
continuum [39, 41] in Fig. 23(b). We find that the data
|
| 1562 |
+
are in good agreement, suggesting that the stochasticity
|
| 1563 |
+
introduced in the temporal evolution of the lattice model
|
| 1564 |
+
is not relevant.
|
| 1565 |
+
|
| 1566 |
+
12
|
| 1567 |
+
V.
|
| 1568 |
+
CONCLUSION
|
| 1569 |
+
In this paper, we studied the problem of ballistic ag-
|
| 1570 |
+
gregation in two dimensions using three different lat-
|
| 1571 |
+
tice models. In all the three models, particles move, on
|
| 1572 |
+
an average, in a straight line and undergo momentum-
|
| 1573 |
+
conserving aggregation on contact. The three models dif-
|
| 1574 |
+
fer in the shape of the particles. In Model A, the particles
|
| 1575 |
+
are point-sized and occupy a single lattice site. In model
|
| 1576 |
+
B, the shape of the aggregate is the combined shape of
|
| 1577 |
+
the two aggregating particles at the time of collision, and
|
| 1578 |
+
is a fractal. In model C, the shape of the particles are
|
| 1579 |
+
spherical, to the closest lattice approximation. For the
|
| 1580 |
+
three models, from large scale Monte Carlo simulations,
|
| 1581 |
+
we determine the exponents characterizing the power-law
|
| 1582 |
+
decay of the number density of particles, the mean en-
|
| 1583 |
+
ergy, the fractal dimension, the correlation between the
|
| 1584 |
+
velocities of the particles constituting an aggregate and
|
| 1585 |
+
the scaling function for the mass distribution. The re-
|
| 1586 |
+
sults for the three models are summarized in Table II
|
| 1587 |
+
(model A), Table III and Fig. 17 (model B), Table IV
|
| 1588 |
+
and Fig. 23 (model C).
|
| 1589 |
+
We find that the values of the exponents are indepen-
|
| 1590 |
+
dent of the initial number density only for model A. For
|
| 1591 |
+
models B and C, the exponents are weakly dependent on
|
| 1592 |
+
the initial number density, making them non-universal.
|
| 1593 |
+
The fractal dimension in model B is, however, indepen-
|
| 1594 |
+
dent of the initial number density, within the numeri-
|
| 1595 |
+
cal accuracy that we could achieve.
|
| 1596 |
+
In model C, the
|
| 1597 |
+
trends in the dependence of the exponents on n0 are con-
|
| 1598 |
+
sistent with the corresponding simulations for spherical
|
| 1599 |
+
particles in the continuum [29, 38–41]. While the expo-
|
| 1600 |
+
nent θn matches closely with the continuum results [see
|
| 1601 |
+
Fig. 23(b)], we find that the numerical values of the ex-
|
| 1602 |
+
ponent θe is less than the continuum result [41] and ap-
|
| 1603 |
+
proaches the mean field result faster. This discrepancy
|
| 1604 |
+
could be due to difficulties in measuring θe accurately
|
| 1605 |
+
due to strong crossovers seen in the data. We have shown
|
| 1606 |
+
that the results for the exponents in all the models, irre-
|
| 1607 |
+
spective of its dependence on n0, satisfy the hyperscaling
|
| 1608 |
+
relations derived from scaling theory.
|
| 1609 |
+
The fractal dimension of clusters formed by aggrega-
|
| 1610 |
+
tion is of interest in many experiments (for example,
|
| 1611 |
+
see [5, 42–45]). While it is to be expected that the expo-
|
| 1612 |
+
nents θn and θe will depend on the nature of transport
|
| 1613 |
+
and the shapes of the clusters, it is not clear whether the
|
| 1614 |
+
fractal dimension depends on transport. Fractal dimen-
|
| 1615 |
+
sion of the cluster in two-dimensional diffusion-limited
|
| 1616 |
+
aggregation (DLA) models, where clusters grow from a
|
| 1617 |
+
nucleating center, show df ≃ 1.70 [49, 50].
|
| 1618 |
+
However,
|
| 1619 |
+
fractal dimension of clusters, when there is no nucleating
|
| 1620 |
+
center but all the aggregates undergo diffusive motion, is
|
| 1621 |
+
different from that of DLA. In the case when the diffu-
|
| 1622 |
+
sion constant of larger masses decreases with mass or is
|
| 1623 |
+
mass-independent, df has been been shown to be in the
|
| 1624 |
+
range df ≃ 1.38−1.52 [51–53]. This result is close to our
|
| 1625 |
+
result for ballistic aggregation (model B) for which we
|
| 1626 |
+
found df ≃ 1.49. While close, it is not clear whether the
|
| 1627 |
+
fractal dimension is different for the diffusive and ballis-
|
| 1628 |
+
tic models. The value 1.49 is very close to that observed
|
| 1629 |
+
in sprays (1.54) [45], and cells (1.5) [44].
|
| 1630 |
+
It would be
|
| 1631 |
+
interesting to explore this connection further as well as
|
| 1632 |
+
understand the dependence of the fractal dimension on
|
| 1633 |
+
different mass dependent velocities, especially the limit
|
| 1634 |
+
where larger masses move faster.
|
| 1635 |
+
The mean field approximation assumes that the ve-
|
| 1636 |
+
locities of the particles forming a cluster are uncorre-
|
| 1637 |
+
lated. The correlations are characterized by the power-
|
| 1638 |
+
law dependence of the speed on the mass of the aggre-
|
| 1639 |
+
gate: ⟨v2(m)⟩ ∼ m−η, with ηmf = 1. Earlier simulations
|
| 1640 |
+
of spherical particles in the continuum show that η de-
|
| 1641 |
+
creases to η = ηmf as the initial number density of parti-
|
| 1642 |
+
cles, n0, is increased [29, 38–41]. This lack of correlation
|
| 1643 |
+
was attributed to the increased avalanche of coagulation
|
| 1644 |
+
events that occur due to the overlap of a newly created
|
| 1645 |
+
spherical particle with already existing particles, as the
|
| 1646 |
+
number density is increased.
|
| 1647 |
+
In this paper, we deter-
|
| 1648 |
+
mined η for the three models.
|
| 1649 |
+
For model A, we find
|
| 1650 |
+
that η ≈ 1.15 is independent of n0 and hence there is no
|
| 1651 |
+
limit in which velocities become uncorrelated. For mod-
|
| 1652 |
+
els B and C, we find that η → ηmf with increasing n0
|
| 1653 |
+
(see Tables III and IV). However, in model B there are
|
| 1654 |
+
no avalanche of collisions while model C has avalanche
|
| 1655 |
+
of collisions.
|
| 1656 |
+
Thus, contrary to earlier conjecture, the
|
| 1657 |
+
avalanche of collisions cannot be a necessary condition
|
| 1658 |
+
for velocities to become uncorrelated.
|
| 1659 |
+
In contrast to BA in the continuum where the dy-
|
| 1660 |
+
namics is deterministic, the temporal evolution in the
|
| 1661 |
+
lattice models is stochastic.
|
| 1662 |
+
Each particle moves in a
|
| 1663 |
+
straight line only on an average. In the continuum models
|
| 1664 |
+
stochasticity enters only through the initial conditions.
|
| 1665 |
+
However, for BA in one dimension, it has been shown
|
| 1666 |
+
that the stochasticity in the dynamics not only does not
|
| 1667 |
+
affect scaling laws, the lattice models reproduce many
|
| 1668 |
+
details of the trajectory like shock positions for the same
|
| 1669 |
+
initial conditions [23, 46]. For model C, we find that the
|
| 1670 |
+
results for θn match with the earlier continuum results in
|
| 1671 |
+
two dimensions for all n0. We thus conclude that stochas-
|
| 1672 |
+
ticity in the initial conditions dominate the fluctuations
|
| 1673 |
+
induced by the dynamics. This is in sharp contrast to
|
| 1674 |
+
diffusive systems where diffusive fluctuations dominate
|
| 1675 |
+
randomness in initial conditions.
|
| 1676 |
+
For all the three models, we measure the exponent ζ
|
| 1677 |
+
[see definition in Eq. (6)] which characterizes the behavior
|
| 1678 |
+
of smaller mass aggregates. The exponent ζ is not easily
|
| 1679 |
+
obtained from scaling arguments and for the correspond-
|
| 1680 |
+
ing diffusive problem requires renormalisation group cal-
|
| 1681 |
+
culations [54–56]. For model A, we find that ζ is positive,
|
| 1682 |
+
implying that there is a typical time dependent mass.
|
| 1683 |
+
This is in contrast to point particles in one dimension
|
| 1684 |
+
where the mass distribution is a power law. For models
|
| 1685 |
+
B and C, we find that ζ is dependent on n0. However,
|
| 1686 |
+
it is negative for all values of n0, implying that the mass
|
| 1687 |
+
distribution is a power law in mass, for a given time.
|
| 1688 |
+
|
| 1689 |
+
13
|
| 1690 |
+
ACKNOWLEDGMENTS
|
| 1691 |
+
The simulations were carried out on the supercomputer
|
| 1692 |
+
Nandadevi at The Institute of Mathematical Sciences
|
| 1693 |
+
(IMSc). P.F would like to thank IMSc for the visiting stu-
|
| 1694 |
+
dentship. VVP acknowledges SERB SRG 2022/001077
|
| 1695 |
+
for support.
|
| 1696 |
+
[1] G. M. Whitesides and B. Grzybowski, Self-assembly at
|
| 1697 |
+
all scales, Science 295, 2418 (2002).
|
| 1698 |
+
[2] G. M. Hidy, J. R. Brock, et al., Dynamics of aerocolloidal
|
| 1699 |
+
systems (Pergamon Press, 1970).
|
| 1700 |
+
[3] R. Drake, Topics in current aerosol research, vol. 3, part
|
| 1701 |
+
2 (1972).
|
| 1702 |
+
[4] S. K. Friedlander et al., Smoke, dust, and haze, Vol. 198
|
| 1703 |
+
(Oxford University Press New York, 2000).
|
| 1704 |
+
[5] C. M. Sorensen, J. Yon, F. Liu, J. Maughan, W. R. Hein-
|
| 1705 |
+
son, and M. J. Berg, Light scattering and absorption by
|
| 1706 |
+
fractal aggregates including soot, Journal of Quantitative
|
| 1707 |
+
Spectroscopy and Radiative Transfer 217, 459 (2018).
|
| 1708 |
+
[6] W. H. Stockmayer, Theory of molecular size distribution
|
| 1709 |
+
and gel formation in branched-chain polymers, The Jour-
|
| 1710 |
+
nal of chemical physics 11, 45 (1943).
|
| 1711 |
+
[7] H. R. Pruppacher and J. D. Klett, Microphysics of clouds
|
| 1712 |
+
and precipitation, 2nd ed. (Dordrecht : Kluwer Academic
|
| 1713 |
+
Publishers, 1997).
|
| 1714 |
+
[8] M. H. Lee, On the validity of the coagulation equation
|
| 1715 |
+
and the nature of runaway growth, Icarus 143, 74 (2000).
|
| 1716 |
+
[9] L. Esposito, Planetary rings, Vol. 4 (Cambridge Univer-
|
| 1717 |
+
sity Press, 2006).
|
| 1718 |
+
[10] N. Brilliantov, P. Krapivsky, A. Bodrova, F. Spahn,
|
| 1719 |
+
H. Hayakawa, V. Stadnichuk, and J. Schmidt, Size distri-
|
| 1720 |
+
bution of particles in saturn’s rings from aggregation and
|
| 1721 |
+
fragmentation, Proceedings of the National Academy of
|
| 1722 |
+
Sciences 112, 9536 (2015).
|
| 1723 |
+
[11] J. Blum, Dust evolution in protoplanetary discs and the
|
| 1724 |
+
formation of planetesimals, Space Science Reviews 214,
|
| 1725 |
+
1 (2018).
|
| 1726 |
+
[12] C. Connaughton, A. Dutta, R. Rajesh, N. Siddharth, and
|
| 1727 |
+
O. Zaboronski, Stationary mass distribution and nonlo-
|
| 1728 |
+
cality in models of coalescence and shattering, Physical
|
| 1729 |
+
Review E 97, 022137 (2018).
|
| 1730 |
+
[13] A. M. Tom, R. Rajesh, and S. Vemparala, Aggregation
|
| 1731 |
+
dynamics of rigid polyelectrolytes, The Journal of Chem-
|
| 1732 |
+
ical Physics 144, 034904 (2016).
|
| 1733 |
+
[14] A. M. Tom, R. Rajesh, and S. Vemparala, Aggregation
|
| 1734 |
+
of flexible polyelectrolytes: Phase diagram and dynamics,
|
| 1735 |
+
The Journal of chemical physics 147, 144903 (2017).
|
| 1736 |
+
[15] S. N. Dorogovtsev and J. F. Mendes, Evolution of net-
|
| 1737 |
+
works, Advances in physics 51, 1079 (2002).
|
| 1738 |
+
[16] F. Leyvraz, Scaling theory and exactly solved models in
|
| 1739 |
+
the kinetics of irreversible aggregation, Physics Reports
|
| 1740 |
+
383, 95 (2003).
|
| 1741 |
+
[17] C. Connaughton, R. Rajesh, and O. Zaboronski, Ki-
|
| 1742 |
+
netics of cluster-cluster aggregation, in Handbook of
|
| 1743 |
+
Nanophysics: Clusters and Fullerenes, edited by K. D.
|
| 1744 |
+
Sattler (Taylor and Francis, 2010).
|
| 1745 |
+
[18] D. J. Aldous, Deterministic and stochastic models for co-
|
| 1746 |
+
alescence (aggregation and coagulation): a review of the
|
| 1747 |
+
mean-field theory for probabilists, Bernoulli , 3 (1999).
|
| 1748 |
+
[19] S. Kida, Asymptotic properties of burgers turbulence,
|
| 1749 |
+
Journal of Fluid mechanics 93, 337 (1979).
|
| 1750 |
+
[20] L. Frachebourg, P. A. Martin, and J. Piasecki, Ballistic
|
| 1751 |
+
aggregation: a solvable model of irreversible many parti-
|
| 1752 |
+
cles dynamics, Physica A: Statistical Mechanics and its
|
| 1753 |
+
Applications 279, 69 (2000).
|
| 1754 |
+
[21] R. Tribe and O. Zaboronski, On the large time asymp-
|
| 1755 |
+
totics of decaying burgers turbulence, Communications
|
| 1756 |
+
in Mathematical Physics 212, 415 (2000).
|
| 1757 |
+
[22] J. M. Burgers, The nonlinear diffusion equation: asymp-
|
| 1758 |
+
totic solutions and statistical problems (Springer Science
|
| 1759 |
+
& Business Media, 2013).
|
| 1760 |
+
[23] S. Dey, D. Das, and R. Rajesh, Lattice models for ballistic
|
| 1761 |
+
aggregation in one dimension, EPL (Europhysics Letters)
|
| 1762 |
+
93, 44001 (2011).
|
| 1763 |
+
[24] H. Takayasu, Steady-state distribution of generalized ag-
|
| 1764 |
+
gregation system with injection, Physical review letters
|
| 1765 |
+
63, 2563 (1989).
|
| 1766 |
+
[25] C. Connaughton, R. Rajesh, and O. Zaboronski, Break-
|
| 1767 |
+
down of kolmogorov scaling in models of cluster aggrega-
|
| 1768 |
+
tion, Physical review letters 94, 194503 (2005).
|
| 1769 |
+
[26] C. Connaughton, R. Rajesh, and O. Zaboronski, Cluster–
|
| 1770 |
+
cluster aggregation as an analogue of a turbulent cascade:
|
| 1771 |
+
Kolmogorov phenomenology, scaling laws and the break-
|
| 1772 |
+
down of self-similarity, Physica D: Nonlinear Phenomena
|
| 1773 |
+
222, 97 (2006).
|
| 1774 |
+
[27] E. Ben-Naim, S. Y. Chen, G. D. Doolen, and S. Redner,
|
| 1775 |
+
Shocklike dynamics of inelastic gases, Phys. Rev. Lett.
|
| 1776 |
+
83, 4069 (1999).
|
| 1777 |
+
[28] X. Nie, E. Ben-Naim, and S. Chen, Dynamics of freely
|
| 1778 |
+
cooling granular gases, Physical review letters 89, 204301
|
| 1779 |
+
(2002).
|
| 1780 |
+
[29] S. N. Pathak, Z. Jabeen, D. Das, and R. Rajesh, Energy
|
| 1781 |
+
decay in three-dimensional freely cooling granular gas,
|
| 1782 |
+
Phys. Rev. Lett. 112, 038001 (2014).
|
| 1783 |
+
[30] R. Dandekar, S. Chakraborti, and R. Rajesh, Hard core
|
| 1784 |
+
run and tumble particles on a one-dimensional lattice,
|
| 1785 |
+
Physical Review E 102, 062111 (2020).
|
| 1786 |
+
[31] G. Wetherill, The Formation and Evolution of Planetary
|
| 1787 |
+
Systems (Cambridge University Press, Cambridge, 1988).
|
| 1788 |
+
[32] P. Meakin, Fractal aggregates in geophysics, Reviews of
|
| 1789 |
+
Geophysics 29, 317 (1991).
|
| 1790 |
+
[33] G. F. Carnevale, Y. Pomeau, and W. R. Young, Statis-
|
| 1791 |
+
tics of ballistic agglomeration, Phys. Rev. Lett. 64, 2913
|
| 1792 |
+
(1990).
|
| 1793 |
+
[34] S. N. Pathak, D. Das, and R. Rajesh, Inhomogeneous
|
| 1794 |
+
cooling of the rough granular gas in two dimensions, EPL
|
| 1795 |
+
(Europhysics Letters) 107, 44001 (2014).
|
| 1796 |
+
[35] J. Piasecki, Universal distribution of masses in a one-
|
| 1797 |
+
dimensional sticky gas, Physica A: Statistical Mechanics
|
| 1798 |
+
and its Applications 190, 95 (1992).
|
| 1799 |
+
[36] L. Frachebourg, Exact solution of the one-dimensional
|
| 1800 |
+
|
| 1801 |
+
14
|
| 1802 |
+
ballistic aggregation, Physical review letters 82, 1502
|
| 1803 |
+
(1999).
|
| 1804 |
+
[37] E. Ben-Naim and P. Krapivsky, Stochastic aggregation:
|
| 1805 |
+
scaling properties, Journal of Physics A: Mathematical
|
| 1806 |
+
and General 33, 5477 (2000).
|
| 1807 |
+
[38] E. Trizac and J.-P. Hansen, Dynamic scaling behavior of
|
| 1808 |
+
ballistic coalescence, Phys. Rev. Lett. 74, 4114 (1995).
|
| 1809 |
+
[39] E. Trizac and J.-P. Hansen, Dynamics and growth of par-
|
| 1810 |
+
ticles undergoing ballistic coalescence, Journal of Statis-
|
| 1811 |
+
tical Physics 82, 1345 (1996).
|
| 1812 |
+
[40] E. Trizac and P. L. Krapivsky, Correlations in ballistic
|
| 1813 |
+
processes, Phys. Rev. Lett. 91, 218302 (2003).
|
| 1814 |
+
[41] S. Paul and S. K. Das, Dimension dependence of cluster-
|
| 1815 |
+
ing dynamics in models of ballistic aggregation and freely
|
| 1816 |
+
cooling granular gas, Phys. Rev. E 97, 032902 (2018).
|
| 1817 |
+
[42] C. Zhang, W. R. Heinson, P. Liu, P. Beeler, Q. Li,
|
| 1818 |
+
J. Jiang, and R. K. Chakrabarty, Three-dimensional
|
| 1819 |
+
tomography reveals distinct morphological and optical
|
| 1820 |
+
properties of soot aggregates from coal-fired residential
|
| 1821 |
+
stoves in china, Journal of Quantitative Spectroscopy and
|
| 1822 |
+
Radiative Transfer 254, 107184 (2020).
|
| 1823 |
+
[43] S. E. Leggett, Z. J. Neronha, D. Bhaskar, J. Y. Sim, T. M.
|
| 1824 |
+
Perdikari, and I. Y. Wong, Motility-limited aggregation
|
| 1825 |
+
of mammary epithelial cells into fractal-like clusters, Pro-
|
| 1826 |
+
ceedings of the National Academy of Sciences 116, 17298
|
| 1827 |
+
(2019).
|
| 1828 |
+
[44] C.-Y. Liu, H.-Y. Chen, and I. Lin, Scale-free aggregation
|
| 1829 |
+
and interface fluctuations of cancer clusters in cancer-
|
| 1830 |
+
endothelial cell mixtures: From the dilute state to con-
|
| 1831 |
+
fluent monolayer, Physical Review Research 3, L032050
|
| 1832 |
+
(2021).
|
| 1833 |
+
[45] M. Simmler, M. Meier, and H. Nirschl, Characterization
|
| 1834 |
+
of fractal structures by spray flame synthesis using x-ray
|
| 1835 |
+
scattering, Materials 15, 2124 (2022).
|
| 1836 |
+
[46] S. Ostojic, D. Panja, and B. Nienhuis, Clustering in a
|
| 1837 |
+
one-dimensional inelastic lattice gas, Physical Review E
|
| 1838 |
+
69, 041301 (2004).
|
| 1839 |
+
[47] J. Hoshen and R. Kopelman, Percolation and cluster
|
| 1840 |
+
distribution. i. cluster multiple labeling technique and
|
| 1841 |
+
critical concentration algorithm, Phys. Rev. B 14, 3438
|
| 1842 |
+
(1976).
|
| 1843 |
+
[48] K. Falconer, Fractal geometry: mathematical foundations
|
| 1844 |
+
and applications (John Wiley & Sons, 2004).
|
| 1845 |
+
[49] T. A. Witten and L. M. Sander, Diffusion-limited aggre-
|
| 1846 |
+
gation, a kinetic critical phenomenon, Phys. Rev. Lett.
|
| 1847 |
+
47, 1400 (1981).
|
| 1848 |
+
[50] J. M. Tenti, S. N. Hern´andez Guiance, and I. M. Irurzun,
|
| 1849 |
+
Fractal dimension of diffusion-limited aggregation clus-
|
| 1850 |
+
ters grown on spherical surfaces, Phys. Rev. E 103,
|
| 1851 |
+
012138 (2021).
|
| 1852 |
+
[51] P. Meakin, Formation of fractal clusters and networks
|
| 1853 |
+
by irreversible di���usion-limited aggregation, Phys. Rev.
|
| 1854 |
+
Lett. 51, 1119 (1983).
|
| 1855 |
+
[52] M. Kolb, R. Botet, and R. Jullien, Scaling of kinetically
|
| 1856 |
+
growing clusters, Phys. Rev. Lett. 51, 1123 (1983).
|
| 1857 |
+
[53] J. Wang, B. H.-j. Lee, and G. Arya, Kinetically assembled
|
| 1858 |
+
binary nanoparticle networks, Nanoscale 12, 5091 (2020).
|
| 1859 |
+
[54] S. Krishnamurthy, R. Rajesh, and O. Zaboronski, Kang-
|
| 1860 |
+
Redner small-mass anomaly in cluster-cluster aggrega-
|
| 1861 |
+
tion, Physical Review E 66, 066118 (2002).
|
| 1862 |
+
[55] S. Krishnamurthy, R. Rajesh, and O. Zaboronski, Per-
|
| 1863 |
+
sistence properties of a system of coagulating and anni-
|
| 1864 |
+
hilating random walkers, Physical Review E 68, 046103
|
| 1865 |
+
(2003).
|
| 1866 |
+
[56] R. Rajesh and O. Zaboronski, Survival probability of a
|
| 1867 |
+
diffusing test particle in a system of coagulating and an-
|
| 1868 |
+
nihilating random walkers, Physical Review E 70, 036111
|
| 1869 |
+
(2004).
|
| 1870 |
+
|
I9FIT4oBgHgl3EQfYyvF/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8a7cc32ef58ba19e6ad58eb56e17c7bdb6e4c8fc5dc6482492853b91bd7ed8a9
|
| 3 |
+
size 5073985
|
ItAyT4oBgHgl3EQf5vr6/content/tmp_files/2301.00812v1.pdf.txt
ADDED
|
@@ -0,0 +1,1909 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
*Corresponding author: erimyanik@gmail.com
|
| 3 |
+
One-shot domain adaptation in video-based assessment of surgical skills
|
| 4 |
+
Erim Yanik1*, Steven Schwaitzberg2, Gene Yang2, Xavier Intes1, and Suvranu De1,3
|
| 5 |
+
1 Center for Modeling, Simulation & Imaging in Medicine, Rensselaer Polytechnic Institute, NY,
|
| 6 |
+
USA
|
| 7 |
+
2 School of Medicine and Biomedical Sciences, University at Buffalo, NY, USA
|
| 8 |
+
3 College of Engineering, Florida A&M University and The Florida State University, FL, USA
|
| 9 |
+
|
| 10 |
+
Deep Learning (DL) has achieved automatic and objective assessment of surgical skills.
|
| 11 |
+
However, DL models are data-hungry and restricted to their training domain. This prevents
|
| 12 |
+
them from transitioning to new tasks where data is limited. Hence, domain adaptation is
|
| 13 |
+
crucial to implement DL in real life. Here, we propose a meta-learning model, A-VBANet,
|
| 14 |
+
that can deliver domain-agnostic surgical skill classification via one-shot learning. We
|
| 15 |
+
develop the A-VBANet on five laparoscopic and robotic surgical simulators. Additionally,
|
| 16 |
+
we test it on operating room (OR) videos of laparoscopic cholecystectomy. Our model
|
| 17 |
+
successfully adapts with accuracies up to 99.5% in one-shot and 99.9% in few-shot settings
|
| 18 |
+
for simulated tasks and 89.7% for laparoscopic cholecystectomy. For the first time, we
|
| 19 |
+
provide a domain-agnostic procedure for video-based assessment of surgical skills. A
|
| 20 |
+
significant implication of this approach is that it allows the use of data from surgical
|
| 21 |
+
simulators to assess performance in the operating room.
|
| 22 |
+
There is growing interest in using deep learning (DL) approaches in surgical skill assessment1,2.
|
| 23 |
+
DL models1–20 enable real-time objective assessment of surgical skills with sufficient procedure-
|
| 24 |
+
specific data. However, surgical data is scarce20–23, expensive to collect2 in real environments, and
|
| 25 |
+
time-consuming to process/annotate24. Thus, current models are typically developed and tested for
|
| 26 |
+
one specific task, limiting their utility to the community at large. To generalize such models to
|
| 27 |
+
other surgical tasks – or domains – manually-intensive post-processing methodologies, such as
|
| 28 |
+
transfer learning25,26, are required. This is highly impractical and inefficient as the number of
|
| 29 |
+
surgical procedures performed and their variations are vast. Therefore, a major hurdle for the wide
|
| 30 |
+
dissemination of DL models and impacting clinical practice is for them to provide robust
|
| 31 |
+
performances while adapting to new surgical procedures for which limited data are available.
|
| 32 |
+
Herein, we propose a domain-agnostic DL model, Adaptive Video-Based Assessment Network
|
| 33 |
+
(A-VBANet), for surgical skill assessment using video streams. Fig. 1 details our approach. We
|
| 34 |
+
utilized few-(one-)shot26–30 meta-learning26,31–36 and investigated adaptability in five physical
|
| 35 |
+
simulators and laparoscopic cholecystectomy in the operating room (OR). Existing literature in
|
| 36 |
+
surgical skill assessment is not linked to meta-learning so far, and the closest study was adaptive
|
| 37 |
+
tool detection in robotic surgery30. This renders our pipeline the first in the field. A-VBANet has
|
| 38 |
+
the potential for broad implementation for surgical training, assessment, and credentialing.
|
| 39 |
+
|
| 40 |
+
Results
|
| 41 |
+
Metaset characteristics. Datasets. Our metaset comprised six surgical tasks from four cohorts
|
| 42 |
+
that include laparoscopic pattern cutting (cohort 1), laparoscopic suturing (cohort 2), robotic
|
| 43 |
+
suturing23, needle passing23, knot tying23 (cohort 3), and laparoscopic cholecystectomy (test
|
| 44 |
+
cohort). This yielded 29 students and 43 surgeons of 16 skill classes performing more than 2,300
|
| 45 |
+
trials (Fig. 1). The skill classes for laparoscopic pattern cutting and cholecystectomy were based
|
| 46 |
+
|
| 47 |
+
|
| 48 |
+
2
|
| 49 |
+
|
| 50 |
+
on trial-wise performance. For the remaining tasks, we labeled using the surgical expertise of the
|
| 51 |
+
subjects.
|
| 52 |
+
Preprocessing. We utilized SimCLR37 to preprocess surgical videos. For each cohort, the model
|
| 53 |
+
was trained separately. Then, the trained models were used in their respective cohorts to extract
|
| 54 |
+
self-supervised features (SSFs) per frame in temporal order. This generated spatiotemporal feature
|
| 55 |
+
set used as input to the meta-learner. Our study included increasing SSFs from 2 to 64 as multiples
|
| 56 |
+
of two.
|
| 57 |
+
|
| 58 |
+
Fig. 1 | Overview of the A-VBANet pipeline. a. Surgical tasks and cohorts of the metaset. Here,
|
| 59 |
+
laparoscopic cholecystectomy is an OR surgery, while the remaining are simulators. b. The self-
|
| 60 |
+
supervision network and the corresponding spatiotemporal feature extraction. Here, T denotes
|
| 61 |
+
temporal length. c. The meta-learner pipeline. The model adapts to one task at a time in a round-
|
| 62 |
+
robin fashion, using the residual backbone designed for sequential inputs. At each turn, the trained
|
| 63 |
+
models are tested in the validation task and laparoscopic cholecystectomy. d. The t-SNE plot
|
| 64 |
+
shows the distribution of spatiotemporal feature sets. As seen, different cohorts generate different
|
| 65 |
+
clusters. e. The metaset characteristics.
|
| 66 |
+
|
| 67 |
+
|
| 68 |
+
Pattern cutting
|
| 69 |
+
Suturing (Lap.)
|
| 70 |
+
Suturing (Rob.)
|
| 71 |
+
Knot tying
|
| 72 |
+
Needle passing
|
| 73 |
+
Cholecystectomy
|
| 74 |
+
ynet
|
| 75 |
+
Irain
|
| 76 |
+
Validate
|
| 77 |
+
(+Test)
|
| 78 |
+
Proto-MAML
|
| 79 |
+
Datasets
|
| 80 |
+
Subjects
|
| 81 |
+
Classes / Number of trials
|
| 82 |
+
Fail
|
| 83 |
+
Pass
|
| 84 |
+
Pattern Cutting Residents
|
| 85 |
+
213
|
| 86 |
+
1,842
|
| 87 |
+
Novice
|
| 88 |
+
Expert
|
| 89 |
+
Suturing (Lap.)
|
| 90 |
+
Both
|
| 91 |
+
24
|
| 92 |
+
39
|
| 93 |
+
Novice Intermediate Expert
|
| 94 |
+
Suturing (Rob.)
|
| 95 |
+
38
|
| 96 |
+
20
|
| 97 |
+
20
|
| 98 |
+
Needle Passing
|
| 99 |
+
Surgeons
|
| 100 |
+
22
|
| 101 |
+
16
|
| 102 |
+
18
|
| 103 |
+
Knot Tying
|
| 104 |
+
32
|
| 105 |
+
20
|
| 106 |
+
20
|
| 107 |
+
Low perform.
|
| 108 |
+
High perform.
|
| 109 |
+
Cholecystectomy Surgeons
|
| 110 |
+
12
|
| 111 |
+
3
|
| 112 |
+
3
|
| 113 |
+
|
| 114 |
+
A-VBANet adapts to simulation tasks. We trained and validated our pipeline in a round-robin
|
| 115 |
+
fashion via one-shot learning. For instance, when pattern cutting was the target domain, the
|
| 116 |
+
remaining tasks were the source domain, i.e., the training domain of the network. At each round,
|
| 117 |
+
the validation task was also used for testing. Notably, laparoscopic cholecystectomy was excluded
|
| 118 |
+
from this scheme. Instead, we used it to further test the trained model’s adaptability in real-life
|
| 119 |
+
surgery at each round (Fig. 1). In this study, the results of a task are given for the best SSF set via
|
| 120 |
+
one-test-shot (k=1), an average of 100 repetitions for cohorts 1-3, and the best of 100 repetitions
|
| 121 |
+
for the test cohort.
|
| 122 |
+
|
| 123 |
+
A-VBANet adapts to binary-class tasks. In pattern cutting, the adaptation accuracy was
|
| 124 |
+
0.900±.023 (Table 1). We also report the area under curve (AUC) of the Receiver Operating
|
| 125 |
+
Characteristics (ROC) to be 0.955±.020. In laparoscopic suturing, these values were 0.995±.008
|
| 126 |
+
and 0.999±.005 for accuracy and AUC. Fig. 2a illustrates the ROC curves for pattern cutting and
|
| 127 |
+
suturing. In addition, accuracy increased with k, i.e., few-test-shot setting, in both tasks (Table 1
|
| 128 |
+
and Extended Table 1).
|
| 129 |
+
|
| 130 |
+
|
| 131 |
+
Besides performance, we evaluated the reliability of the true predictions in each skill class
|
| 132 |
+
using NetTrustScore (NTS)38. (Supplementary Information / NetTrustScore). In pattern cutting,
|
| 133 |
+
NTSs were 0.989±.068 for Fail and 0.991±.047 for Pass. In laparoscopic suturing, these values
|
| 134 |
+
were 0.991±.009 for Novice and 0.998±.005 for Expert. Moreover, NTS increased with k in both
|
| 135 |
+
tasks (Extended Table 2). Fig. 2b details the trust density distribution over Softmax.
|
| 136 |
+
|
| 137 |
+
AVBA-Net adapts to multi-class tasks. The adaptation accuracies were 0.651±.040, 0.626±.027,
|
| 138 |
+
and 0.688±.022 in robotic suturing, needle passing, and knot tying (Table 1). Here, the model’s
|
| 139 |
+
performance increased with k in all tasks (Extended Table 1). Notably, k = 16 was not observed
|
| 140 |
+
in needle passing due to insufficient data. In addition, for true predictions, the NTSs were
|
| 141 |
+
0.998±.003, 0.994±.008, and 0.994±.008 for Novice, Intermediate, and Expert in robotic suturing.
|
| 142 |
+
In needle passing, these values were 0.981±.020, 0.978±.022, and 0.965±.026. Finally, in knot
|
| 143 |
+
tying, we obtained 0.921±.039, 0.868±.052, and 0.817±.065. NTS increased with k in all tasks
|
| 144 |
+
(Extended Table 2). Fig. 3 illustrates the trust density distribution over SoftMax.
|
| 145 |
+
|
| 146 |
+
|
| 147 |
+
|
| 148 |
+
|
| 149 |
+
Table 1 | Task adaptation accuracies.
|
| 150 |
+
Val. and Test Dataset
|
| 151 |
+
k = 1
|
| 152 |
+
k = 2
|
| 153 |
+
k = 4
|
| 154 |
+
k = 8
|
| 155 |
+
k = 16
|
| 156 |
+
Pattern Cutting
|
| 157 |
+
0.900±.023 0.910±.022
|
| 158 |
+
0.920±.018 0.925±.019
|
| 159 |
+
0.929±.017
|
| 160 |
+
Suturing (Lap.)
|
| 161 |
+
0.995±.008 0.995±.008
|
| 162 |
+
0.995±.006 0.997±.006
|
| 163 |
+
0.999±.005
|
| 164 |
+
Suturing (Robotic)
|
| 165 |
+
0.651±.040 0.664±.027
|
| 166 |
+
0.697±.039 0.716±.035
|
| 167 |
+
0.761±.044
|
| 168 |
+
Needle Passing
|
| 169 |
+
0.626±.027 0.645±.022
|
| 170 |
+
0.690±.033 0.727±.038
|
| 171 |
+
N/A
|
| 172 |
+
Knot Tying
|
| 173 |
+
0.688±.022 0.697±.031
|
| 174 |
+
0.714±.042 0.763±.057
|
| 175 |
+
0.835±.077
|
| 176 |
+
|
| 177 |
+
|
| 178 |
+
4
|
| 179 |
+
|
| 180 |
+
|
| 181 |
+
Fig 2. | a. ROCs and b. trust spectrums, resulting from 100 repetitions in pattern cutting (purple)
|
| 182 |
+
and laparoscopic suturing (turquoise).
|
| 183 |
+
|
| 184 |
+
Fig 3. | Trust spectrums for k = 1 cumulative of 100 runs in a. robotic suturing, b. needle passing
|
| 185 |
+
and c. knot tying.
|
| 186 |
+
a
|
| 187 |
+
b
|
| 188 |
+
c
|
| 189 |
+
a
|
| 190 |
+
b
|
| 191 |
+
|
| 192 |
+
160
|
| 193 |
+
100
|
| 194 |
+
Novice
|
| 195 |
+
100
|
| 196 |
+
140
|
| 197 |
+
Intermediate
|
| 198 |
+
Expert
|
| 199 |
+
80
|
| 200 |
+
80
|
| 201 |
+
60
|
| 202 |
+
09
|
| 203 |
+
80
|
| 204 |
+
60
|
| 205 |
+
40
|
| 206 |
+
40
|
| 207 |
+
40
|
| 208 |
+
20
|
| 209 |
+
20
|
| 210 |
+
20
|
| 211 |
+
0
|
| 212 |
+
0
|
| 213 |
+
0.0
|
| 214 |
+
0.2
|
| 215 |
+
0.4
|
| 216 |
+
0.6
|
| 217 |
+
0.8
|
| 218 |
+
1.0
|
| 219 |
+
0.0
|
| 220 |
+
0.2
|
| 221 |
+
0.4
|
| 222 |
+
0.6
|
| 223 |
+
0.8
|
| 224 |
+
1.0
|
| 225 |
+
0.0
|
| 226 |
+
0.2
|
| 227 |
+
0.4
|
| 228 |
+
0.6
|
| 229 |
+
0.8
|
| 230 |
+
1.0
|
| 231 |
+
SoftmaxDistribution
|
| 232 |
+
Softmax Distribution
|
| 233 |
+
Softmax Distribution
|
| 234 |
+
80
|
| 235 |
+
70
|
| 236 |
+
Novice
|
| 237 |
+
Intermediate
|
| 238 |
+
60
|
| 239 |
+
Expert
|
| 240 |
+
60
|
| 241 |
+
50
|
| 242 |
+
·50
|
| 243 |
+
40
|
| 244 |
+
40
|
| 245 |
+
30
|
| 246 |
+
30
|
| 247 |
+
20
|
| 248 |
+
20
|
| 249 |
+
10
|
| 250 |
+
10
|
| 251 |
+
0
|
| 252 |
+
0
|
| 253 |
+
0
|
| 254 |
+
0.0
|
| 255 |
+
0.2
|
| 256 |
+
0.4
|
| 257 |
+
0.6
|
| 258 |
+
0.8
|
| 259 |
+
1.0
|
| 260 |
+
0.0
|
| 261 |
+
0.2
|
| 262 |
+
0.4
|
| 263 |
+
0.6
|
| 264 |
+
0.8
|
| 265 |
+
1.0
|
| 266 |
+
0.0
|
| 267 |
+
0.2
|
| 268 |
+
0.4
|
| 269 |
+
0.6
|
| 270 |
+
0.8
|
| 271 |
+
1.0
|
| 272 |
+
Softmax Distribution
|
| 273 |
+
Softmax Distribution
|
| 274 |
+
SoftmaxDistribution
|
| 275 |
+
70
|
| 276 |
+
Novice
|
| 277 |
+
25
|
| 278 |
+
Intermediate
|
| 279 |
+
17.5
|
| 280 |
+
Expert
|
| 281 |
+
60
|
| 282 |
+
15.0
|
| 283 |
+
20
|
| 284 |
+
12.5
|
| 285 |
+
40
|
| 286 |
+
15
|
| 287 |
+
10.0
|
| 288 |
+
10
|
| 289 |
+
7.5
|
| 290 |
+
5.0
|
| 291 |
+
10
|
| 292 |
+
5
|
| 293 |
+
2.5
|
| 294 |
+
0
|
| 295 |
+
0
|
| 296 |
+
0.0
|
| 297 |
+
0.0
|
| 298 |
+
0.2
|
| 299 |
+
0.4
|
| 300 |
+
0.6
|
| 301 |
+
0.8
|
| 302 |
+
1.0
|
| 303 |
+
0.0
|
| 304 |
+
0.2
|
| 305 |
+
0.4
|
| 306 |
+
0.6
|
| 307 |
+
0.8
|
| 308 |
+
1.0
|
| 309 |
+
0.0
|
| 310 |
+
0.2
|
| 311 |
+
0.4
|
| 312 |
+
0.6
|
| 313 |
+
0.8
|
| 314 |
+
1.0
|
| 315 |
+
Softmax Distribution
|
| 316 |
+
Softmax Distribution
|
| 317 |
+
Softmax Distribution1.0
|
| 318 |
+
1e3
|
| 319 |
+
Fail
|
| 320 |
+
Pass
|
| 321 |
+
4
|
| 322 |
+
4
|
| 323 |
+
0.6
|
| 324 |
+
3
|
| 325 |
+
2
|
| 326 |
+
2
|
| 327 |
+
1
|
| 328 |
+
1
|
| 329 |
+
0.0
|
| 330 |
+
0
|
| 331 |
+
0
|
| 332 |
+
0.0
|
| 333 |
+
0.2
|
| 334 |
+
0.4
|
| 335 |
+
0.6
|
| 336 |
+
0.8
|
| 337 |
+
1.0
|
| 338 |
+
0.0
|
| 339 |
+
0.2
|
| 340 |
+
0.4
|
| 341 |
+
0.6
|
| 342 |
+
8'0
|
| 343 |
+
1.0
|
| 344 |
+
0'0
|
| 345 |
+
0.2
|
| 346 |
+
0.4
|
| 347 |
+
0.6
|
| 348 |
+
0.8
|
| 349 |
+
1.0
|
| 350 |
+
False Positive Rate
|
| 351 |
+
Softmax
|
| 352 |
+
Distribution
|
| 353 |
+
Softmax
|
| 354 |
+
Distribution
|
| 355 |
+
1.0
|
| 356 |
+
160
|
| 357 |
+
Novice
|
| 358 |
+
200
|
| 359 |
+
Expert
|
| 360 |
+
140
|
| 361 |
+
150
|
| 362 |
+
0.6
|
| 363 |
+
100
|
| 364 |
+
80
|
| 365 |
+
100
|
| 366 |
+
0.4
|
| 367 |
+
60
|
| 368 |
+
40
|
| 369 |
+
50
|
| 370 |
+
20
|
| 371 |
+
0.0
|
| 372 |
+
0
|
| 373 |
+
0
|
| 374 |
+
0.0
|
| 375 |
+
0.2
|
| 376 |
+
0.4
|
| 377 |
+
0.6
|
| 378 |
+
0.8
|
| 379 |
+
1.0
|
| 380 |
+
0.0
|
| 381 |
+
0.2
|
| 382 |
+
0.4
|
| 383 |
+
0.6
|
| 384 |
+
0.8
|
| 385 |
+
1.0
|
| 386 |
+
0.0
|
| 387 |
+
0.2
|
| 388 |
+
0.4
|
| 389 |
+
0.6
|
| 390 |
+
0.8
|
| 391 |
+
1.0
|
| 392 |
+
False Positive Rate
|
| 393 |
+
Softmax Distribution
|
| 394 |
+
Softmax Distribution
|
| 395 |
+
5
|
| 396 |
+
|
| 397 |
+
A-VBANet adapts to an operating room procedure. After being validated on a different
|
| 398 |
+
simulator at each round, we tested how well the A-VBANet can perform on laparoscopic
|
| 399 |
+
cholecystectomy. The accuracies are reported in Table 2. We obtained an overall accuracy of 0.867
|
| 400 |
+
and an AUC of 0.840. We did not analyze the few-shot setting due to limited data. When we broke
|
| 401 |
+
down the performance in individual validation tasks, we observed consistency between the tasks
|
| 402 |
+
(Table 2 and Extended Table 3). In addition, the NTSs for true predictions were 1.0 for both the
|
| 403 |
+
Low Performance and High Performance classes (Extended Table 4). Fig. 4 shows the trust density
|
| 404 |
+
distributions over SoftMax.
|
| 405 |
+
|
| 406 |
+
|
| 407 |
+
|
| 408 |
+
|
| 409 |
+
|
| 410 |
+
|
| 411 |
+
|
| 412 |
+
|
| 413 |
+
|
| 414 |
+
|
| 415 |
+
Fig 4. | Trust spectrums for each validation task for k = 1 in laparoscopic cholecystectomy for
|
| 416 |
+
Low Performance (left) and High Performance (right) classes.
|
| 417 |
+
|
| 418 |
+
Discussion
|
| 419 |
+
For over two decades, global rating tools, i.e., OSATS24 and FLS39 scoring, have been the gold
|
| 420 |
+
standard in assessing surgical skills. Current surgical skill assessment models rely on these rating
|
| 421 |
+
tools. However, such models are data-intensive and domain-specific. Further, surgical data is
|
| 422 |
+
limited2, and more than a few domains exist in real life. Furthermore, extracting fundamental
|
| 423 |
+
features of what constitutes surgical skills is challenging to determine manually. Hence, for DL
|
| 424 |
+
models to be useful, they must be capable of extracting information from simulator data and
|
| 425 |
+
adapting that to operating room procedures.
|
| 426 |
+
The main contribution of this paper is to utilize meta-learning effectively to pave the way for
|
| 427 |
+
DL approaches for surgical skill assessment without the need for extensive data. The A-VBANet
|
| 428 |
+
is able to adapt to surgical simulations by seeing only one sample (Table 1). This is the first step
|
| 429 |
+
Table 2 | Adaptation accuracies on laparoscopic cholecystectomy for k = 1
|
| 430 |
+
Validation dataset
|
| 431 |
+
Accuracy
|
| 432 |
+
AUC
|
| 433 |
+
Pattern Cutting
|
| 434 |
+
0.872
|
| 435 |
+
0.818
|
| 436 |
+
Suturing (Lap.)
|
| 437 |
+
0.872
|
| 438 |
+
0.848
|
| 439 |
+
Suturing (Rob.)
|
| 440 |
+
0.821
|
| 441 |
+
0.833
|
| 442 |
+
Needle Passing
|
| 443 |
+
0.872
|
| 444 |
+
0.838
|
| 445 |
+
Knot Tying
|
| 446 |
+
0.897
|
| 447 |
+
0.864
|
| 448 |
+
Overall
|
| 449 |
+
0.867
|
| 450 |
+
0.840
|
| 451 |
+
|
| 452 |
+
35
|
| 453 |
+
Pattern cutting
|
| 454 |
+
15.0
|
| 455 |
+
Pattern cutting
|
| 456 |
+
30
|
| 457 |
+
Suturing (Lap.)
|
| 458 |
+
Suturing (Lap.)
|
| 459 |
+
ity
|
| 460 |
+
25
|
| 461 |
+
Suturing (Rob.)
|
| 462 |
+
Suturing (Rob.)
|
| 463 |
+
Needle passing
|
| 464 |
+
10.0
|
| 465 |
+
Needle passing
|
| 466 |
+
Knot tying
|
| 467 |
+
7.5
|
| 468 |
+
Knot tying
|
| 469 |
+
Trust
|
| 470 |
+
5.0
|
| 471 |
+
5
|
| 472 |
+
2.5
|
| 473 |
+
0
|
| 474 |
+
0.0
|
| 475 |
+
0.0
|
| 476 |
+
0.2
|
| 477 |
+
0.4
|
| 478 |
+
0.6
|
| 479 |
+
0.8
|
| 480 |
+
1.0
|
| 481 |
+
0.0
|
| 482 |
+
0.2
|
| 483 |
+
0.4
|
| 484 |
+
0.6
|
| 485 |
+
0.8
|
| 486 |
+
1.0
|
| 487 |
+
Softmax Distribution
|
| 488 |
+
Softmax Distribution
|
| 489 |
+
6
|
| 490 |
+
|
| 491 |
+
in the real-life deployment of such technology in surgical training2,40–42 and credentialing39,43
|
| 492 |
+
outside the operating room. Both laparoscopic pattern cutting and suturing are prerequisites for
|
| 493 |
+
board certification in general and ob/GYN surgery39. Our model’s adaptation accuracy was 0.900
|
| 494 |
+
and 0.995 in these tasks.
|
| 495 |
+
Domain-agnostic assessment in the operating room is the second goal of this paper. Assessing
|
| 496 |
+
real-life expertise is essential for lifelong learning44 and continuous certification45–47. However, it
|
| 497 |
+
is inherently difficult and time-consuming to collect and annotate data from unregulated
|
| 498 |
+
environments such as the operating room2. Companies and medical societies engaged in collecting
|
| 499 |
+
limited datasets and expensive manual annotations typically restrict free public access to those
|
| 500 |
+
annotated data. For the widespread application of DL to surgical skill evaluation, it is crucial to
|
| 501 |
+
overcome these data-related challenges. The A-VBANet, trained and validated on simulators, was
|
| 502 |
+
tested on laparoscopic cholecystectomy. We investigated the best overall performance our model
|
| 503 |
+
can attain and obtained promising adaptation accuracy (overall 0.867 up to 0.897) and AUC of the
|
| 504 |
+
ROC (0.840 up to 0.964) (Table 2) from raw video data collected in the operating room without
|
| 505 |
+
annotation. This showed for the first time that adapting to the operating room is feasible with only
|
| 506 |
+
one sample via taking advantage of simulation task data. These results are preliminary under the
|
| 507 |
+
context of given surgical tasks. By adding more diverse representation, i.e., different real-life
|
| 508 |
+
procedures and cohorts, to the source set, the performance can be further improved.
|
| 509 |
+
A critical consideration for DL model development is that the network should be trustworthy,
|
| 510 |
+
i.e., ensure consistent performance for unseen trials. Hence, we also measured the network's
|
| 511 |
+
confidence in true predictions using NTS38. In Figs. 2, 3, and 4, we observed high density
|
| 512 |
+
distribution towards high Softmax values, indicating robust NTS (>0.8) for all tasks. In other
|
| 513 |
+
words, the prediction probabilities for the actual classes were well-separable from the probabilities
|
| 514 |
+
of other classes. Thus, the adapted models were reliable and highly likely to perform consistently.
|
| 515 |
+
In addition, we investigated the few-test-shot (k>1) setting for all the tasks other than
|
| 516 |
+
laparoscopic cholecystectomy. The performance of the A-VBANet increased with k (Extended
|
| 517 |
+
Tables 1). This is expected as increasing k implies more information for the network to adapt to a
|
| 518 |
+
new domain. However, the drawback of using larger k is that it decreases the number of testing
|
| 519 |
+
samples, increasing epistemic uncertainty48. This can be seen in increasing standard deviation in
|
| 520 |
+
datasets with limited sample size, i.e., JIGSAWS tasks. On the other hand, the NTS got better in
|
| 521 |
+
laparoscopic pattern cutting and suturing but did not follow a trend for the rest of the tasks as the
|
| 522 |
+
sample size was limited (Extended Tables 2). The models need to be tested with more data before
|
| 523 |
+
a conclusive statement can be made for NTS.
|
| 524 |
+
We did not observe a linear correlation between SSF and model performance (Extended Tables
|
| 525 |
+
1 and 3). However, increased SSF led to increased NTS (Extended Tables 2 and 4). This signifies
|
| 526 |
+
that more information leads to higher confidence in true predictions. However, it decreases the
|
| 527 |
+
possibility of cross-overs, i.e., false prediction being predicted correctly and vice versa. This makes
|
| 528 |
+
the model less flexible. Thus, more prone to overfitting.
|
| 529 |
+
Another strength of our study is using videos over sensor-based kinematics, as the latter is
|
| 530 |
+
more expensive to collect and often unavailable2. On the other hand, videos are increasingly more
|
| 531 |
+
available 49. In addition, video-based assessment (VBA) is currently the main focus of national
|
| 532 |
+
institutions44,50 to replace traditional intraoperative training1,24,49. Besides, videos enabled us to
|
| 533 |
+
derive additional information from unlabeled data. For instance, even though there were 15 labeled
|
| 534 |
+
laparoscopic cholecystectomy trials, the self-supervision model corresponding to this cohort was
|
| 535 |
+
trained on 198 (183 of which were unlabeled) videos. Although we had limited data, we did not
|
| 536 |
+
implement the snippeting technique15,18,51 to augment the data size. This is because it inflates the
|
| 537 |
+
|
| 538 |
+
|
| 539 |
+
7
|
| 540 |
+
|
| 541 |
+
score prediction12,24. Moreover, it causes inconsistent labeling as it is uncertain that performance
|
| 542 |
+
is isotropic within every trial12.
|
| 543 |
+
Some limitations of our study include cohort-specific preprocessing and limited testing data
|
| 544 |
+
and tasks. In future studies, we plan to incorporate meta-learning into self-supervision to provide
|
| 545 |
+
cohort-agnostic feature extraction from videos. This allows an end-to-end pipeline for domain
|
| 546 |
+
adaptation. Further, we aim to incorporate a broader range of surgical tasks.
|
| 547 |
+
This study demonstrated for the first time that one-shot domain adaptation is feasible in
|
| 548 |
+
surgical skill assessment, and a DL model can successfully adapt to multiple domains effectively
|
| 549 |
+
and automatically. This brings DL models one step closer to real-life implementation for surgical
|
| 550 |
+
training, assessment, and credentialing.
|
| 551 |
+
|
| 552 |
+
Methods
|
| 553 |
+
Metaset generation. The pattern cutting and suturing data were collected separately by our group in collaboration
|
| 554 |
+
with the University at Buffalo. They are subtasks of the Fundamentals of Laparoscopic Surgery (FLS) program,
|
| 555 |
+
which is a prerequisite for board certification39. For both, Institutional Review Board (IRB) approval was sought at
|
| 556 |
+
Rensselaer Polytechnic Institute and University at Buffalo. Further, informed consent was collected from each
|
| 557 |
+
subject.
|
| 558 |
+
Pattern cutting enrolled 21 residents (6 males / 15 females), ages between 21 and 30 (Mean: 23.95 / Std.: 1.69),
|
| 559 |
+
with no laparoscopy background. Here, one subject was left-handed. The subjects executed the task for 12 days,
|
| 560 |
+
generating 2,055 trials. We labeled each trial Pass or Fail (Fig. 1e) based on the FLS-based cut-off threshold52. This
|
| 561 |
+
produced 1,842 Pass and 213 Fail samples. Videos were collected at 640 x 480 resolution at 30 FPS via the FLS box
|
| 562 |
+
camera.
|
| 563 |
+
Laparoscopic suturing included 10 surgeons (5 males / 5 females) and 8 residents (5 males / 3 females), with
|
| 564 |
+
ages ranging from 23 to 56 (Mean: 31 / Std.: 7.9). All the surgeons were experienced in FLS with years of
|
| 565 |
+
experience varying between 1 to 20 years, while no resident had prior expertise in laparoscopy. This totaled 63
|
| 566 |
+
suturing trials (Fig. 1e). Notably, using the same methodology as pattern cutting, we ended up with only three Fail
|
| 567 |
+
samples. Thus, instead, we labeled the trials by residents as Novice and surgeons as Expert. This generated 24
|
| 568 |
+
Novice and 39 Expert samples. The videos were recorded at 720x480 resolution at 30 FPS via the FLS box camera.
|
| 569 |
+
We also employed robotic suturing, needle passing, and knot tying from the publicly available JIGSAWS
|
| 570 |
+
dataset23. All the tasks were conducted via the Da Vinci Surgical System. For each task, 8 surgeons performed
|
| 571 |
+
approximately five times. The class labels were assigned based on the surgical expertise in robotic surgery.
|
| 572 |
+
Surgeons with less than 10 hours of experience were labeled Novices, while more than 100 hours were Experts.
|
| 573 |
+
Surgeons in between were Intermediates. This led to 4 Novice, 2 Intermediate, and 2 Expert surgeons (Fig. 1e). In
|
| 574 |
+
addition, two separate video streams were collected per task from different angles at 640x480 resolution and 30 FPS.
|
| 575 |
+
We assumed each view as a separate trial to augment the data size.
|
| 576 |
+
Laparoscopic cholecystectomy videos were collected at Kaleida Health in Buffalo, New York, totaling 198
|
| 577 |
+
trials. In this study, 15 trials were annotated as Low Performance and High Performance, based on the OSATS
|
| 578 |
+
scores, yielding 12 and 3 samples (Fig. 1e) in each category. The criterion for a trial labeled as High Performance
|
| 579 |
+
was having an OSATS score greater than 23 (out of 25) (See Extended Table 5 for the OSATS breakdown). Next,
|
| 580 |
+
the surgical videos were collected via laparoscopes of varying resolutions at 30 FPS.
|
| 581 |
+
|
| 582 |
+
Model development. Developing feature extractor. SimCLR37 is a self-supervised contrastive network used to
|
| 583 |
+
extract comprehensive spatiotemporal features. We used SimCLR to reinforce our pipeline against corrupted frames,
|
| 584 |
+
e.g., blurry frame and background interference, such as changing light conditions and jitter. SimCLR uses a
|
| 585 |
+
backbone, 𝑓𝑏(. ) ∈ ℝ𝐷, to aggregate D-dimensional feature sets, i.e., representations37 from the video frames. In this
|
| 586 |
+
study, the backbone is ResNet34, with D = 512. Then, using
|
| 587 |
+
a linear classifier, it maps the representations into K-(128-) dimensional hidden space, 𝑓ℎ(. )∈ ℝ𝐾. The aim is to
|
| 588 |
+
maximize the likelihood of the classifier finding the augmented versions of the input frame in a large batch of
|
| 589 |
+
uncorrelated frames in 𝑓ℎ(.)37. Once trained, the classifier is removed. Extended Fig. 1 illustrates the SimCLR
|
| 590 |
+
architecture and deployment.
|
| 591 |
+
Generating spatiotemporal features. To generate spatiotemporal features (𝑿), we applied the trained backbone
|
| 592 |
+
𝑓𝑏(. ) to each frame in a surgical video53 in temporal order, i.e., 𝑿𝑖 = [𝑓𝑏(𝑥𝑖1),… ,𝑓𝑏(𝑥𝑖𝑗),…, 𝑓𝑏(𝑥𝑖𝑇)] ∈ ℝ𝑇𝑥𝐷,
|
| 593 |
+
where 𝑥𝑖 ∈ ℝ𝑇𝑥3 is the list of frames of the 𝑖𝑡ℎ trial. Here, T is the temporal length and 𝑥𝑖𝑗 is the 𝑖𝑡ℎ trial’s 𝑗𝑡ℎ frame.
|
| 594 |
+
|
| 595 |
+
|
| 596 |
+
8
|
| 597 |
+
|
| 598 |
+
Finally, 𝑿𝑖 ∈ ℝ𝑇𝑥𝐷 is the spatiotemporal feature set for the 𝑖𝑡ℎ trial. In addition, we used 1D Global Average
|
| 599 |
+
Pooling (GAP)54 to downsample 𝐷-dimensional representations: 𝐺𝐴𝑃(𝑿𝑖) ∈ ℝ𝑇𝑥𝐷 → 𝑿𝒊
|
| 600 |
+
′ ∈ ℝ𝑇𝑥𝐷′ where 𝐷′ is of
|
| 601 |
+
2,4,8,16,32, and 64-dimensions.
|
| 602 |
+
The meta-learner methodology. ProtoMAML35 is the combination of Prototypical Network (ProtoNet)34 and
|
| 603 |
+
Model-agnostic meta-learning (MAML)36. ProtoNet is a metric-based55 meta-learning model, learning to learn
|
| 604 |
+
prototypical (class) centers, 𝑣𝑐, in nonlinear embedding space34. MAML, on the other hand, is a model-based55 meta-
|
| 605 |
+
learner that offers fast and flexible adaptability to the target domains by learning the "global" optimal initialization
|
| 606 |
+
parameters (𝜃)36. One shortcoming of MAML is the lack of robust initialization to the output layer35. Proto-MAML
|
| 607 |
+
addresses this by combining MAML’s flexible adaptability with the prototypical center methodology from ProtoNet
|
| 608 |
+
and reports the best overall performance in multiple image datasets35. Specifically, ProtoMAML works by splitting
|
| 609 |
+
the training and validation sets into support and query sets. The support sets were used to optimize the parameter
|
| 610 |
+
space. On the other hand, the query sets were used to compute the train and validation losses. (Supplementary
|
| 611 |
+
Information / ProtoMAML implementation).
|
| 612 |
+
Developing the backbone of the meta-learner. The backbone of the ProtoMAML was developed based on our
|
| 613 |
+
previously published state-of-the-art model, the VBA-Net12, and the residual networks proposed by He et al.53. The
|
| 614 |
+
backbone consisted of two attention-infused56 residual blocks and 1x1 convolutional layer54 in between to adjust the
|
| 615 |
+
dimension. In addition, each block had two convolutional layers and an identity shortcut12. Further, the
|
| 616 |
+
convolutional layers were diluted to expand the receptive field without losing temporal resolution57. Notably,
|
| 617 |
+
dilation proved helpful in improving model performance when working with sequential data12.
|
| 618 |
+
The residual layers were followed by a classifier adjusted to work with the meta-learner. Meta-learning models
|
| 619 |
+
are used for object classification30,34–36. In such models, the input is spatial, 𝑥 ∈ ℝ𝐵𝑥𝐻𝑥𝑊𝑥3 (B: batch size, H: height,
|
| 620 |
+
W: width). and reduced to 𝑥̂ ∈ ℝ𝐵𝑥𝐷𝑜 by a flattening layer where 𝐷𝑜 is the output dimension. However, our input is
|
| 621 |
+
spatiotemporal, 𝑥 ∈ ℝ𝐵𝑥𝑇𝑥𝐷′. Hence, the residual blocks were followed by a 1D GAP layer in our design to obtain
|
| 622 |
+
𝑥̂ ∈ ℝ𝐵𝑥𝐷𝑜. GAP also enabled us to use entire sequences. Following GAP, a fully-connected layer generated the
|
| 623 |
+
embedding space, 𝑓(𝑥̂) ∈ ℝ𝐷𝑜. Finally, a linear classifier, initialized via 𝑣𝑐, outputted predictions35. In this study,
|
| 624 |
+
𝐷𝑜 varied based on 𝐷′. (See Supplementary Information / Hyperparameter selection for more information and
|
| 625 |
+
Extended Fig. 2 for the backbone architecture).
|
| 626 |
+
|
| 627 |
+
Training. Feature extractor. When training SimCLR, we used a train/validate split of 143,287/17,373 frames in
|
| 628 |
+
pattern cutting. These values were 21,191/3,315 in laparoscopic suturing and 447,314/66,836 for the JIGSAWS
|
| 629 |
+
dataset. In laparoscopic cholecystectomy, the split was 353,168/46,310. To generate the augmented version of the
|
| 630 |
+
input frames, we used the contrastive transformations suggested by the SimCLR developers37. This included
|
| 631 |
+
horizontal flip, random resized crop, jittering, grayscaling, and Gaussian blur. All the images were normalized prior
|
| 632 |
+
to training.
|
| 633 |
+
During the training, we set the minimum number of epochs to 200. Further, we implemented early stopping
|
| 634 |
+
with the patience of 10, i.e., training is terminated when there is no improvement in accuracy for ten consequent
|
| 635 |
+
epochs. Notably, self-supervised learning benefits from high batch size37. It increases the negative samples in the
|
| 636 |
+
batch, making it harder for the network to find the augmented pairs. This encourages the network to extract salient
|
| 637 |
+
features. As a result, we set the mini-batch size to 256 for pattern cutting and 512 for the rest of the tasks.
|
| 638 |
+
Meta-learner. Before the training, we downsampled each video stream to 1 FPS. This lowers computational
|
| 639 |
+
cost20 while retaining the salient information, as shown by our recently published DL model12 that achieved state-of-
|
| 640 |
+
the-art performance for the JIGSAWS tasks at 1 FPS. In addition, training and validation sets were normalized
|
| 641 |
+
separately using min-max normalization. During the training, we set the minimum epochs to 40. Also, we used early
|
| 642 |
+
stopping with a patience of 10. The mini-batch size was 8.
|
| 643 |
+
One restriction to Proto-MAML is the need for an equal number of samples per class34. The absence of this rule
|
| 644 |
+
causes an inflated representation of some classes over the others. This leads to biased, i.e., domain-specific,
|
| 645 |
+
estimations. However, in our study, each skill class had a different sample size (Fig. 1e). Therefore, we ran each
|
| 646 |
+
round 100 times with different seeds. We removed the outlier performances based on accuracies using the Tukey
|
| 647 |
+
Fences58 method. Also, for each repetition, we randomly sampled Ntrain trials from each class. Here, Ntrain is the
|
| 648 |
+
smallest sample size in a class among all the classes in the training set. For the validation set, this value was Nval.
|
| 649 |
+
Another limitation is that the model needs the same input size for each mini-batch. However, our data was
|
| 650 |
+
spatiotemporal with varying lengths, both inter- and intra-tasks. Hence, we incorporated mini-batch zero padding to
|
| 651 |
+
Proto-MAML. Here, we did not zero-pad the entire input based on the longest sequence, as some tasks were
|
| 652 |
+
considerably shorter than others. This difference would lead to an abundance of zeros in those datasets, increasing
|
| 653 |
+
computational cost.
|
| 654 |
+
|
| 655 |
+
|
| 656 |
+
9
|
| 657 |
+
|
| 658 |
+
|
| 659 |
+
Evaluation. We used the round-robin scheme to evaluate the A-VBANet. Specifically, one task was used at each
|
| 660 |
+
round to validate and test the model, while the remaining trained the network. This was repeated until every task in
|
| 661 |
+
the cohorts other than the test cohort was the target. At each round, we also tested the trained A-VBANet on
|
| 662 |
+
laparoscopic cholecystectomy. Then, after all the rounds, we averaged the results to obtain the overall adaptation
|
| 663 |
+
performance.
|
| 664 |
+
During testing, few-test-shots (k) were used to adapt to the new domain. The rest of the samples were utilized to
|
| 665 |
+
compute the performance. For multi-class tasks, the accuracies were micro-averaged.
|
| 666 |
+
In this study, the models were developed on Pytorch, and training was conducted via the IBM Artificial
|
| 667 |
+
Intelligence Multiprocessing Optimized System (AiMOS) at Rensselaer Polytechnic Institute on 8 NVIDIA Tesla
|
| 668 |
+
V100 GPUs, each with 32 GB capacity.
|
| 669 |
+
|
| 670 |
+
Data availability
|
| 671 |
+
The laparoscopic pattern cutting and suturing datasets were collected by our group under IRB regulations, and the
|
| 672 |
+
deidentified source frames and class labels will be released upon publication. The JIGSAWS dataset is available at
|
| 673 |
+
https://cirl.lcsr.jhu.edu/research/hmm/datasets/jigsaws_release/.
|
| 674 |
+
|
| 675 |
+
Code availability
|
| 676 |
+
The code for developing the models will be made public upon publication.
|
| 677 |
+
|
| 678 |
+
References
|
| 679 |
+
1.
|
| 680 |
+
Hung, A. J. et al. Deep learning to automate technical skills assessment in robotic surgery. BJU Int. 124, 487–
|
| 681 |
+
495 (2019).
|
| 682 |
+
2.
|
| 683 |
+
Yanik, E. et al. Deep neural networks for the assessment of surgical skills: A systematic review. J. Def. Model.
|
| 684 |
+
Simul. 19, 159–171 (2022).
|
| 685 |
+
3.
|
| 686 |
+
Khalid, S., Goldenberg, M., Grantcharov, T., Taati, B. & Rudzicz, F. Evaluation of deep learning models for
|
| 687 |
+
identifying surgical actions and measuring performance. JAMA Netw. open 3, e201664–e201664 (2020).
|
| 688 |
+
4.
|
| 689 |
+
Lajko, G., Elek, R. N. & Haidegger, T. Endoscopic image-based skill assessment in robot-assisted minimally
|
| 690 |
+
invasive surgery. Foot Ankle Spec. 14, 153–157 (2021).
|
| 691 |
+
5.
|
| 692 |
+
Lajkó, G., Elek, R. N. & Haidegger, T. Surgical skill assessment automation based on sparse optical flow data.
|
| 693 |
+
in IEEE 25th International Conference on Intelligent Engineering Systems (INES) 201–208 (IEEE, 2021).
|
| 694 |
+
doi:10.1109/INES52918.2021.9512917
|
| 695 |
+
6.
|
| 696 |
+
Ming, Y. et al. Surgical skills assessment from robot assisted surgery video data. in Proceedings of 2021 IEEE
|
| 697 |
+
International Conference on Power Electronics, Computer Applications (ICPECA) 392–396 (IEEE, 2021).
|
| 698 |
+
doi:10.1109/ICPECA51329.2021.9362525
|
| 699 |
+
7.
|
| 700 |
+
Nguyen, X. A., Ljuhar, D., Pacilli, M., Nataraja, R. M. & Chauhan, S. Surgical skill levels: Classification and
|
| 701 |
+
analysis using deep neural network model and motion signals. Comput. Methods Programs Biomed. 177, 1–
|
| 702 |
+
8 (2019).
|
| 703 |
+
8.
|
| 704 |
+
Soleymani, A., Li, X. & Tavakoli, M. Deep neural skill assessment and transfer: Application to robotic surgery
|
| 705 |
+
training. in IEEE International Conference on Intelligent Robots and Systems (IROS) 8822–8829 (IEEE,
|
| 706 |
+
2021). doi:10.1109/IROS51168.2021.9636627
|
| 707 |
+
9.
|
| 708 |
+
Wang, Y. et al. Evaluating robotic-assisted surgery training videos with multi-task convolutional neural
|
| 709 |
+
networks. J. Robot. Surg. 16, 917–925 (2021).
|
| 710 |
+
10.
|
| 711 |
+
Wang, Z. & Fey, A. M. SATR-DL: Improving surgical skill assessment and task recognition in robot-assisted
|
| 712 |
+
surgery with deep neural networks. in Proceedings of the Annual International Conference of the IEEE
|
| 713 |
+
Engineering
|
| 714 |
+
in
|
| 715 |
+
Medicine
|
| 716 |
+
and
|
| 717 |
+
Biology
|
| 718 |
+
Society
|
| 719 |
+
(EMBS)
|
| 720 |
+
1793–1796
|
| 721 |
+
(IEEE,
|
| 722 |
+
2018).
|
| 723 |
+
doi:10.1109/EMBC.2018.8512575
|
| 724 |
+
11.
|
| 725 |
+
Wang, Z. & Majewicz Fey, A. Deep learning with convolutional neural network for objective skill evaluation
|
| 726 |
+
in robot-assisted surgery. Int. J. Comput. Assist. Radiol. Surg. 13, 1959–1970 (2018).
|
| 727 |
+
12.
|
| 728 |
+
Yanik, E., Kruger, U., Intes, X., Rahul, R. & De, S. Video-based formative and summative assessment of
|
| 729 |
+
surgical tasks using deep learning results. (2022). doi:10.48550/arXiv.2203.09589
|
| 730 |
+
13.
|
| 731 |
+
Anh, N. X., Nataraja, R. M. & Chauhan, S. Towards near real-time assessment of surgical skills: A comparison
|
| 732 |
+
of feature extraction techniques. Comput. Methods Programs Biomed. 187, 105234 (2020).
|
| 733 |
+
14.
|
| 734 |
+
Castro, D., Pereira, D., Zanchettin, C., MacEdo, D. & Bezerra, B. L. D. Towards optimizing convolutional
|
| 735 |
+
|
| 736 |
+
|
| 737 |
+
10
|
| 738 |
+
|
| 739 |
+
neural networks for robotic surgery skill evaluation. in Proceedings of the International Joint Conference on
|
| 740 |
+
Neural Networks (IJCNN) 1–8 (IEEE, 2019). doi:10.1109/IJCNN.2019.8852341
|
| 741 |
+
15.
|
| 742 |
+
Doughty, H., Damen, D. & Mayol-Cuevas, W. Who’s better? Who’s best? Pairwise deep ranking for skill
|
| 743 |
+
determination. in IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 6057–6066 (IEEE,
|
| 744 |
+
2018).
|
| 745 |
+
16.
|
| 746 |
+
Fathollahi, M. et al. Video-based surgical skills assessment using long term tool tracking. in International
|
| 747 |
+
Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI) 541–550 (Springer,
|
| 748 |
+
Cham, 2022).
|
| 749 |
+
17.
|
| 750 |
+
Fawaz, H. I., Forestier, G., Weber, J., Idoumghar, L. & Muller, P.-A. Evaluating surgical skills from kinematic
|
| 751 |
+
data using convolutional neural networks. in International Conference on Medical Image Computing and
|
| 752 |
+
Computer-Assisted Intervention (MICCAI) 214–221 (Springer, 2018). doi:10.1007/978-3-030-00937-3
|
| 753 |
+
18.
|
| 754 |
+
Funke, I., Mees, S. T., Weitz, J. & Speidel, S. Video-based surgical skill assessment using 3D convolutional
|
| 755 |
+
neural networks. Int. J. Comput. Assist. Radiol. Surg. 14, 1217–1225 (2019).
|
| 756 |
+
19.
|
| 757 |
+
Ismail Fawaz, H., Forestier, G., Weber, J., Idoumghar, L. & Muller, P. A. Accurate and interpretable
|
| 758 |
+
evaluation of surgical skills from kinematic data using fully convolutional neural networks. Int. J. Comput.
|
| 759 |
+
Assist. Radiol. Surg. 14, 1611–1617 (2019).
|
| 760 |
+
20.
|
| 761 |
+
Jin, A. et al. Tool detection and operative skill assessment in surgical videos using region-based convolutional
|
| 762 |
+
neural networks. in Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision (WACV)
|
| 763 |
+
691–699 (IEEE, 2018). doi:10.1109/WACV.2018.00081
|
| 764 |
+
21.
|
| 765 |
+
Srivastav, V. et al. MVOR: A multi-view RGB-D operating room dataset for 2D and 3D human pose
|
| 766 |
+
estimation. (2018). doi:10.48550/arXiv.1808.08180
|
| 767 |
+
22.
|
| 768 |
+
Twinanda, A. P. et al. EndoNet: A deep architecture for recognition tasks on laparoscopic videos. IEEE Trans.
|
| 769 |
+
Med. Imaging 36, 86–97 (2017).
|
| 770 |
+
23.
|
| 771 |
+
Gao, Y. et al. JHU-ISI gesture and skill assessment working set (JIGSAWS): A surgical activity dataset for
|
| 772 |
+
human motion modeling. Model. Monit. Comput. Assist. Interv. – MICCAI Work. 3, (2014).
|
| 773 |
+
24.
|
| 774 |
+
Pugh, C. M., Hashimoto, D. A. & Korndorffer, J. R. The what? how? and who? of video based assessment.
|
| 775 |
+
Am. J. Surg. 221, 13–18 (2021).
|
| 776 |
+
25.
|
| 777 |
+
Zhang, D. et al. Automatic microsurgical skill assessment based on cross-domain transfer learning. IEEE
|
| 778 |
+
Robot. Autom. Lett. 5, 4148–4155 (2020).
|
| 779 |
+
26.
|
| 780 |
+
Gevaert, O. Meta-learning reduces the amount of data needed to build AI models in oncology. Br. J. Cancer
|
| 781 |
+
125, 309–310 (2021).
|
| 782 |
+
27.
|
| 783 |
+
Ma, J. et al. Few-shot learning creates predictive models of drug response that translate from high-throughput
|
| 784 |
+
screens to individual patients. Nat. Cancer 2, 233–244 (2021).
|
| 785 |
+
28.
|
| 786 |
+
Sun, Q., Liu, Y., Chua, T. & Schiele, B. Meta-transfer learning for few-shot learning. in Proceedings of the
|
| 787 |
+
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 403–412 (IEEE, 2019).
|
| 788 |
+
29.
|
| 789 |
+
Walsh, R., Abdelpakey, M. H., Shehata, M. S. & Mohamed, M. M. Automated human cell classification in
|
| 790 |
+
sparse datasets using few-shot learning. Sci. Rep. 12, 1–11 (2022).
|
| 791 |
+
30.
|
| 792 |
+
Zhao, Z. et al. One to many: Adaptive instrument segmentation via meta learning and dynamic online
|
| 793 |
+
adaptation in robotic surgical video. in IEEE International Conference on Robotics and Automation (ICRA)
|
| 794 |
+
13553–13559 (IEEE, 2021). doi:10.1109/ICRA48506.2021.9561690
|
| 795 |
+
31.
|
| 796 |
+
Stanley, K. O., Clune, J., Lehman, J. & Miikkulainen, R. Designing neural networks through neuroevolution.
|
| 797 |
+
Nat. Mach. Intell. 1, 24–35 (2019).
|
| 798 |
+
32.
|
| 799 |
+
Zador, A. M. A critique of pure learning and what artificial neural networks can learn from animal brains.
|
| 800 |
+
Nat. Commun. 10, 1–7 (2019).
|
| 801 |
+
33.
|
| 802 |
+
Javed, K. & White, M. Meta-learning representations for continual learning. Adv. Neural Inf. Process. Syst.
|
| 803 |
+
32, 1–11 (2019).
|
| 804 |
+
34.
|
| 805 |
+
Snell, J., Swersky, K. & Zemel, R. Prototypical networks for few-shot learning. in Advances in Neural
|
| 806 |
+
Information Processing Systems 30 (NeurIPS) 4078–4088 (NeurIPS Proceedings, 2017).
|
| 807 |
+
35.
|
| 808 |
+
Triantafillou, E. et al. Meta-dataset: A dataset of datasets for learning to learn from few examples. (2020).
|
| 809 |
+
doi:10.48550/arXiv.1903.03096
|
| 810 |
+
36.
|
| 811 |
+
Finn, C., Abbeel, P. & Levine, S. Model-agnostic meta-learning for fast adaptation of deep networks. in 34th
|
| 812 |
+
International Conference on Machine Learning (ICML) 3, 1856–1868 (PMLR, 2017).
|
| 813 |
+
37.
|
| 814 |
+
Chen, T., Kornblith, S., Norouzi, M. & Hinton, G. E. A simple framework for contrastive learning of visual
|
| 815 |
+
representations. in Proceedings of the 37th International Conference on Machine Learning (ICML) 1597–
|
| 816 |
+
1607 (PMLR, 2020).
|
| 817 |
+
38.
|
| 818 |
+
Wong, A., Wang, X. Y. & Hryniowski, A. How much can we really trust you? Towards simple, interpretable
|
| 819 |
+
|
| 820 |
+
|
| 821 |
+
11
|
| 822 |
+
|
| 823 |
+
trust quantification metrics for deep neural networks. arXiv (2020). doi:10.48550/arXiv.2009.05835
|
| 824 |
+
39.
|
| 825 |
+
Fried, G. M. FLS assessment of competency using simulated laparoscopic tasks. J. Gastrointest. Surg. 12,
|
| 826 |
+
210–212 (2008).
|
| 827 |
+
40.
|
| 828 |
+
Brinkman, W. M. et al. Da vinci skills simulator for assessing learning curve and criterion-based training of
|
| 829 |
+
robotic basic skills. Urology 81, 562–566 (2013).
|
| 830 |
+
41.
|
| 831 |
+
Korndorffer, J. R. et al. Simulator training for laparoscopic suturing using performance goals translates to the
|
| 832 |
+
operating room. J. Am. Coll. Surg. 201, 23–29 (2005).
|
| 833 |
+
42.
|
| 834 |
+
Sroka, G. et al. Fundamentals of laparoscopic surgery simulator training to proficiency improves laparoscopic
|
| 835 |
+
performance in the operating room-a randomized controlled trial. Am. J. Surg. 199, 115–120 (2010).
|
| 836 |
+
43.
|
| 837 |
+
Hafford, M. L. et al. Ensuring competency: Are fundamentals of laparoscopic surgery training and
|
| 838 |
+
certification necessary for practicing surgeons and operating room personnel? Surg. Endosc. 27, 118–126
|
| 839 |
+
(2013).
|
| 840 |
+
44.
|
| 841 |
+
Feldman, L. S. et al. SAGES Video-based assessment (VBA) program: a vision for life-long learning for
|
| 842 |
+
surgeons. Surg. Endosc. 34, 3285–3288 (2020).
|
| 843 |
+
45.
|
| 844 |
+
Pradarelli, J. C. et al. Surgical coaching to achieve the ABMS vision for the future of continuing board
|
| 845 |
+
certification. Am. J. Surg. 221, 4–10 (2021).
|
| 846 |
+
46.
|
| 847 |
+
Esposito, A. C., Coppersmith, N. A., White, E. M. & Yoo, P. S. Video coaching in surgical education: Utility,
|
| 848 |
+
opportunities, and barriers to implementation. J. Surg. Educ. 79, 717–724 (2021).
|
| 849 |
+
47.
|
| 850 |
+
Statement on continuous certification. Available at: https://www.sages.org/publications/guidelines/statement-
|
| 851 |
+
on-continuous-certification/. (Accessed: 26th January 2022)
|
| 852 |
+
48.
|
| 853 |
+
Abdar, M. et al. A review of uncertainty quantification in deep learning: Techniques, applications and
|
| 854 |
+
challenges. Inf. Fusion 76, 243–297 (2021).
|
| 855 |
+
49.
|
| 856 |
+
McQueen, S., McKinnon, V., VanderBeek, L., McCarthy, C. & Sonnadara, R. Video-Based assessment in
|
| 857 |
+
surgical education: a scoping review. J. Surg. Educ. 76, 1645–1654 (2019).
|
| 858 |
+
50.
|
| 859 |
+
ABS to explore video-based assessment in pilot program launching june 2021. Ava ilable at:
|
| 860 |
+
https://www.absurgery.org/default.jsp?news_vba04.21. (Accessed: 26th January 2022)
|
| 861 |
+
51.
|
| 862 |
+
Fathabadi, F. R., Grantner, J. L., Shebrain, S. A. & Abdel-Qader, I. Surgical skill assessment system using
|
| 863 |
+
fuzzy logic in a multi-class detection of laparoscopic box-trainer instruments. in Conference Proceedings -
|
| 864 |
+
IEEE International Conference on Systems, Man and Cybernetics (SMC) 1248–1253 (IEEE, 2021).
|
| 865 |
+
doi:10.1109/SMC52423.2021.9658766
|
| 866 |
+
52.
|
| 867 |
+
Fraser, S. A. et al. Evaluating laparoscopic skills, setting the pass/fail score for the MISTELS system. Surg.
|
| 868 |
+
Endosc. Other Interv. Tech. 17, 964–967 (2003).
|
| 869 |
+
53.
|
| 870 |
+
He, K., Zhang, X., Ren, S. & Sun, J. Deep Residual Learning for Image Recognition. in Proceedings of the
|
| 871 |
+
IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) 770–778 (IEEE,
|
| 872 |
+
2006). doi:10.1002/chin.200650130
|
| 873 |
+
54.
|
| 874 |
+
Lin, M., Chen, Q. & Yan, S. Network in network. (2014). doi:10.48550/arXiv.1312.4400
|
| 875 |
+
55.
|
| 876 |
+
Tian, Y., Zhao, X. & Huang, W. Meta-learning approaches for learning-to-learn in deep learning: A survey.
|
| 877 |
+
Neurocomputing 494, 203–223 (2022).
|
| 878 |
+
56.
|
| 879 |
+
Hu, J., Shen, L. & Sun, G. Squeeze-and-excitation networks. in Proceedings of the IEEE Computer Society
|
| 880 |
+
Conference on Computer Vision and Pattern Recognition (CVPR) 7132–7141 (IEEE, 2018).
|
| 881 |
+
57.
|
| 882 |
+
Yu, F.
|
| 883 |
+
&
|
| 884 |
+
Koltun, V.
|
| 885 |
+
Multi-scale context aggregation by dilated convolutions. (2016).
|
| 886 |
+
doi:10.48550/arXiv.1511.07122
|
| 887 |
+
58.
|
| 888 |
+
Hoaglin, D. C. Tukey and data analysis. Stat. Sci. 18, 311–318 (2003).
|
| 889 |
+
59.
|
| 890 |
+
Hryniowski, A., Wong, A. & Wang, X. Y. Where Does Trust Break Down? A Quantitative Trust Analysis of
|
| 891 |
+
Deep Neural Networks via Trust Matrix and Conditional Trust Densities. J. Comput. Vis. Imaging Syst. 6, 1–
|
| 892 |
+
5 (2021).
|
| 893 |
+
60.
|
| 894 |
+
Fei-Fei, L., Deng, J. & Li, K. ImageNet: Constructing a large-scale image database. J. Vis. 9, 1037–1037
|
| 895 |
+
(2010).
|
| 896 |
+
61.
|
| 897 |
+
Barz, B. & Denzler, J. Deep learning on small datasets without pre-training using cosine loss. in Proceedings
|
| 898 |
+
- 2020 IEEE Winter Conference on Applications of Computer Vision (WACV) 1360–1369 (IEEE, 2020).
|
| 899 |
+
doi:10.1109/WACV45572.2020.9093286
|
| 900 |
+
|
| 901 |
+
|
| 902 |
+
|
| 903 |
+
|
| 904 |
+
|
| 905 |
+
|
| 906 |
+
12
|
| 907 |
+
|
| 908 |
+
Acknowledgments
|
| 909 |
+
The authors graciously acknowledge Dr. Yuanyuan Gao for assisting with the pattern cutting video data collection
|
| 910 |
+
and Dr. Lora Cavuoto for spearheading the laparoscopic suturing experiments and data collection.
|
| 911 |
+
|
| 912 |
+
Author contributions
|
| 913 |
+
E.Y. and S.D. conceived the idea. E.Y. designed the analysis, developed the network architecture, trained the pipeline,
|
| 914 |
+
and drafted the manuscript. S.D. and X.I. were responsible for supervising and revising the manuscript. S.S. and G.Y.
|
| 915 |
+
collected the laparoscopic cholecystectomy videos and G.Y. provided corresponding OSATS scores.
|
| 916 |
+
|
| 917 |
+
Competing Interests
|
| 918 |
+
The authors declare no competing interests.
|
| 919 |
+
|
| 920 |
+
Additional Information
|
| 921 |
+
Supplementary information is available.
|
| 922 |
+
Supplementary figures and tables are available.
|
| 923 |
+
Correspondence and requests for materials should be addressed to S.D.
|
| 924 |
+
|
| 925 |
+
|
| 926 |
+
Supplementary Information
|
| 927 |
+
NetTrustScore (NTS). NTS is a trustworthiness estimation based on the Softmax of predictions38.
|
| 928 |
+
NTS builds around the following steps:
|
| 929 |
+
|
| 930 |
+
Question-answer trust, 𝑄𝑧(𝑥, 𝑦). It quantifies the reliability of the predicted label (𝑦) for a
|
| 931 |
+
given sample (𝑥) via model 𝑀. As seen in Eqn 1, for true predictions( 𝑅𝑦=𝑧, 𝑧 being the actual
|
| 932 |
+
label / class), the Softmax values, 𝐶(𝑦|𝑥), are aggregated via a reward coefficient (𝛼). For the
|
| 933 |
+
false predictions (𝑅𝑦≠𝑧), the Softmax values were subtracted from 1 with a penalty coefficient
|
| 934 |
+
(𝛽). In this study, both 𝛼 and 𝛽 are 1.
|
| 935 |
+
|
| 936 |
+
𝑄𝑧(𝑥,𝑦) = {
|
| 937 |
+
𝐶(𝑦|𝑥) 𝛼
|
| 938 |
+
(1 − 𝐶(𝑦|𝑥)) 𝛽
|
| 939 |
+
𝑖𝑓 𝑥 𝜖 𝑅𝑦=𝑧|𝑀
|
| 940 |
+
𝑖𝑓 𝑥 𝜖 𝑅𝑦≠𝑧|𝑀
|
| 941 |
+
(1)
|
| 942 |
+
|
| 943 |
+
|
| 944 |
+
For conditional trustworthiness59, i.e., reliability of a condition such as true predictions or
|
| 945 |
+
false predictions, we use Eqn. 2 differently than in the original paper (Eqn. 1), as the false
|
| 946 |
+
predictions are handled separately from the true ones without the need to penalize them. In Eqn.
|
| 947 |
+
2, 𝑅𝑐 is the condition space.
|
| 948 |
+
|
| 949 |
+
𝑄𝑐(𝑥,𝑦) = 𝐶(𝑦|𝑥)𝛼 𝑖𝑓 𝑥 𝜖 𝑅𝑐|𝑀
|
| 950 |
+
(2)
|
| 951 |
+
|
| 952 |
+
|
| 953 |
+
Trust Density, 𝐹(𝑄𝑐). It is the trust behavior of the model for all the samples (𝑥𝑠) in a
|
| 954 |
+
given condition. It is obtained using non-parametric density estimation through Gaussian kernel38.
|
| 955 |
+
Here, the bandwidth of the kernel is
|
| 956 |
+
𝛾
|
| 957 |
+
√𝑁 with 𝛾 = 0.5 and 𝑁 = 𝑙𝑒𝑛𝑔𝑡ℎ(𝑥).
|
| 958 |
+
|
| 959 |
+
Trust Spectrum, 𝑇𝑀(𝑐). It is the trust behavior of the network for all the conditions in a
|
| 960 |
+
dataset, as given in Eqn. 3. In the equation, 𝑇𝑀(𝑐), outputs a list of overall trustworthiness for each
|
| 961 |
+
condition.
|
| 962 |
+
|
| 963 |
+
|
| 964 |
+
13
|
| 965 |
+
|
| 966 |
+
𝑇𝑀(𝑐) = 1
|
| 967 |
+
𝑁 ∫𝑄𝑐(𝑥)𝑑𝑥
|
| 968 |
+
(3)
|
| 969 |
+
|
| 970 |
+
NetTrustScore, NTS. Based on the original proposal, NTS is the overall trustworthiness
|
| 971 |
+
score of the network via all the predictions and classes and scales from 0 to 1. However, in this
|
| 972 |
+
study, when we report NTS, it is not global but for a condition instead as governed by Eqns. 2 and
|
| 973 |
+
3.
|
| 974 |
+
|
| 975 |
+
Proto-MAML implementation. Proto-MAML35 is a meta-learner that combines Model-agnostic
|
| 976 |
+
meta-learning (MAML)36 and Prototypical Networks (ProtoNet)34.
|
| 977 |
+
|
| 978 |
+
MAML. In MAML, the model (𝑓) learns the best parameter space (𝜃) to provide fast and
|
| 979 |
+
flexible adaptability. In detail, first, 𝜃 is randomly initialized, and the input is passed forward (𝑓𝜃)
|
| 980 |
+
for task 𝑇𝑖. Then based on the computed loss (𝐿𝑇𝑖) in the embedded space, backpropagation is
|
| 981 |
+
applied to update weights (𝛻𝜃) as shown in Eqn. 4.
|
| 982 |
+
|
| 983 |
+
𝜃𝑖
|
| 984 |
+
′ = 𝜃 − 𝜶𝛻𝜃𝐿𝑇𝑖 (𝑓𝜃)
|
| 985 |
+
(4)
|
| 986 |
+
|
| 987 |
+
Ideally, 𝑓(𝜃𝑖
|
| 988 |
+
′) represents the 𝑇𝑖 robustly after several updates, i.e., 𝑁𝑤: the number of
|
| 989 |
+
updates, same as conventional training. However, in meta-learning, the objective is not to find the
|
| 990 |
+
optimal parameters for a task but to find the parameters that ensure adaptation. Therefore, we apply
|
| 991 |
+
Eqn. 4 to each task in the task distribution, 𝑃(𝑇), and obtain respective parameter spaces (𝜃′),
|
| 992 |
+
which are then passed forward, 𝑓𝜃′, to compute the new loss as seen in Eqn. 5. This way, we obtain
|
| 993 |
+
the optimal parameter space that minimizes the joint cost function. This step is called the inner
|
| 994 |
+
loop. Thus, in Eqn. 4, 𝜶 is the inner learning rate.
|
| 995 |
+
|
| 996 |
+
𝜃 = 𝑎𝑟𝑔𝑚𝑖𝑛𝜃 ∑
|
| 997 |
+
𝐿𝑇𝑖(
|
| 998 |
+
𝑇𝑖~𝑃(𝑇)
|
| 999 |
+
𝑓𝜃𝑖
|
| 1000 |
+
′)
|
| 1001 |
+
(5)
|
| 1002 |
+
|
| 1003 |
+
|
| 1004 |
+
Next, we update 𝜃 based on the optimal parameters from the inner loop, as illustrated in
|
| 1005 |
+
Eqn. 6. This step is called the outer loop, and 𝜷 is the outer learning rate.
|
| 1006 |
+
|
| 1007 |
+
𝜃 = 𝜃 − 𝜷𝛻𝜃 ∑
|
| 1008 |
+
𝐿𝑇𝑖 (
|
| 1009 |
+
𝑇𝑖~𝑃(𝑇)
|
| 1010 |
+
𝑓𝜃𝑖
|
| 1011 |
+
′)
|
| 1012 |
+
(6)
|
| 1013 |
+
|
| 1014 |
+
|
| 1015 |
+
As seen in Eqn. 6, a gradient's gradient is computed, i.e., Hessian-vector product36, which
|
| 1016 |
+
is computationally expensive. Thus, the authors of the MAML article 36 proposed first-order
|
| 1017 |
+
MAML (fo-MAML), which only uses the first-order gradients. We also followed this paradigm,
|
| 1018 |
+
hence updated Eqn. 6 as follows:
|
| 1019 |
+
𝜃 = 𝜃 − 𝜷 ∑
|
| 1020 |
+
𝛻𝜃𝑖
|
| 1021 |
+
′𝐿𝑇𝑖 (
|
| 1022 |
+
𝑇𝑖~𝑃(𝑇)
|
| 1023 |
+
𝑓𝜃𝑖
|
| 1024 |
+
′)
|
| 1025 |
+
(7)
|
| 1026 |
+
|
| 1027 |
+
|
| 1028 |
+
|
| 1029 |
+
|
| 1030 |
+
14
|
| 1031 |
+
|
| 1032 |
+
ProtoNet. The way the ProtoNet works is detailed as follows. First, the training set is split
|
| 1033 |
+
into
|
| 1034 |
+
support
|
| 1035 |
+
set,
|
| 1036 |
+
𝑆 = [(𝑥1,𝑦1),… , (𝑥𝑠,𝑦𝑠),… ,(𝑥𝑁,𝑦𝑁)]
|
| 1037 |
+
and
|
| 1038 |
+
query
|
| 1039 |
+
set,
|
| 1040 |
+
𝑄 =
|
| 1041 |
+
[(𝑥1,𝑦1), …, (𝑥𝑞,𝑦𝑞),…, (𝑥𝑁,𝑦𝑁)] with 𝑁 samples. Here, 𝑥𝑠,𝑥𝑞 ∈ ℝ𝐷 are inputs whereas 𝑦𝑠 and
|
| 1042 |
+
𝑦𝑞 are the corresponding labels in the support and query sets. Then, the model, 𝑓𝜃, embeds the
|
| 1043 |
+
inputs into 𝑀-dimensional feature set, 𝑓𝜃(. ): ℝ𝐷 → ℝ𝑀. Next, using the embedded support set
|
| 1044 |
+
samples, the prototypical center (𝑣𝑐) is computed as given in Eqn. 8. In the equation, 𝑆𝑐 is all the
|
| 1045 |
+
(𝑥𝑠,𝑦𝑠) pairs in the support set with 𝑦 = 𝑐. Here 𝑐 ∈ 𝑪 | 𝑪: all the classes represented in 𝑆.
|
| 1046 |
+
|
| 1047 |
+
𝑣𝑐 = 1
|
| 1048 |
+
|𝑆𝑐|
|
| 1049 |
+
∑
|
| 1050 |
+
𝑓𝜃(𝑥𝑠,𝑖)
|
| 1051 |
+
(𝑥𝑠,𝑖,𝑦𝑠,𝑖)∈𝑆𝑐
|
| 1052 |
+
|
| 1053 |
+
(8)
|
| 1054 |
+
|
| 1055 |
+
The query set is then used to compute the loss function (𝐿) based on the distance between
|
| 1056 |
+
the query samples, 𝑥𝑞, and 𝑣𝑐 via the distance function, 𝑑𝜑: the Euclidean Distance.
|
| 1057 |
+
|
| 1058 |
+
ProtoMAML. It follows the MAML, specifically fo-MAML, methodology to adapt35, while
|
| 1059 |
+
for the final layer, i.e., the layer that outputs for a specific task, the weights (𝑊𝑐) and bias (𝑏𝑐) are
|
| 1060 |
+
initialized based on the 𝑣𝑐 as computed in Eqn. 8, instead of random initialization as used by the
|
| 1061 |
+
vanilla fo-MAML. Particularly, the initialization occurs as follows: 𝑊𝑐 = 2𝑣𝑐 and 𝑏𝑐 = −||𝑣𝑐||2.
|
| 1062 |
+
For more information please refer to the original paper35.
|
| 1063 |
+
|
| 1064 |
+
Hyperparameter selection. The SimCLR network uses the pretrained ResNet3453 - on
|
| 1065 |
+
ImageNet60 – as its backbone. Moreover, the pipeline aims to minimize the loss function, InfoNCE
|
| 1066 |
+
(NT-Xent)37, via the Adam optimizer with a learning rate of 0.0005. Further, the non-linearity is
|
| 1067 |
+
added via ReLU.
|
| 1068 |
+
|
| 1069 |
+
The ProtoMAML minimizes Cosine Similarity Loss61 based on Euclidean distance34. The
|
| 1070 |
+
inner and outer loop optimizers are Stochastic Gradient Descent (SGD) and Adam, respectively,
|
| 1071 |
+
while the learning rates are 0.1 and 0.01. Moreover, we used a learning rate scheduler in which the
|
| 1072 |
+
rate was factored by 0.6 for every 10 epochs without improving the validation accuracy. Further,
|
| 1073 |
+
𝑁𝑤, i.e., number of inner loop weight updates, is 1 in training and 20 in testing. Finally, for self-
|
| 1074 |
+
supervised feature (SSF) sets from 2 to 32, the 𝑣𝑐 is a 512-dimensional feature vector; for the SSF
|
| 1075 |
+
set of 64, this value is 1,024.
|
| 1076 |
+
In addition, the meta-learner utilizes an in-house Residual Neural Network (RNN) as the
|
| 1077 |
+
backbone. The filter size is 5 for the convolutional layers of the first residual block. This value is
|
| 1078 |
+
3 for the second. On the other hand, the dilation rates are 1 and 2, and the stride is 1. Finally, the
|
| 1079 |
+
non-linearity is added using ReLU.
|
| 1080 |
+
|
| 1081 |
+
|
| 1082 |
+
|
| 1083 |
+
|
| 1084 |
+
|
| 1085 |
+
|
| 1086 |
+
|
| 1087 |
+
|
| 1088 |
+
|
| 1089 |
+
|
| 1090 |
+
|
| 1091 |
+
|
| 1092 |
+
15
|
| 1093 |
+
|
| 1094 |
+
Supplementary Tables
|
| 1095 |
+
Extended Table 1 | Accuracies for task adaptation. k: number of test shots. Bold values are
|
| 1096 |
+
reported in the manuscript. For needle passing, k = 16 was not investigated as it leaves no
|
| 1097 |
+
Intermediate class for the query set.
|
| 1098 |
+
Validation
|
| 1099 |
+
and
|
| 1100 |
+
Testing
|
| 1101 |
+
Dataset
|
| 1102 |
+
SSF
|
| 1103 |
+
set
|
| 1104 |
+
No. of test-shots
|
| 1105 |
+
k = 1
|
| 1106 |
+
k = 2
|
| 1107 |
+
k = 4
|
| 1108 |
+
k = 8
|
| 1109 |
+
k = 16
|
| 1110 |
+
Pattern
|
| 1111 |
+
Cutting
|
| 1112 |
+
2
|
| 1113 |
+
0.858±.045
|
| 1114 |
+
0.871±.044
|
| 1115 |
+
0.881±.039
|
| 1116 |
+
0.888±.039
|
| 1117 |
+
0.892±.037
|
| 1118 |
+
4
|
| 1119 |
+
0.889±.037
|
| 1120 |
+
0.903±.033
|
| 1121 |
+
0.910±.032
|
| 1122 |
+
0.916±.030
|
| 1123 |
+
0.918±.029
|
| 1124 |
+
8
|
| 1125 |
+
0.900±.023
|
| 1126 |
+
0.910±.022
|
| 1127 |
+
0.920±.018
|
| 1128 |
+
0.925±.019
|
| 1129 |
+
0.929±.017
|
| 1130 |
+
16
|
| 1131 |
+
0.899±.035
|
| 1132 |
+
0.910±.034
|
| 1133 |
+
0.914±.033
|
| 1134 |
+
0.915±.033
|
| 1135 |
+
0.914±.035
|
| 1136 |
+
32
|
| 1137 |
+
0.868±.042
|
| 1138 |
+
0.888±.043
|
| 1139 |
+
0.896±.039
|
| 1140 |
+
0.898±.038
|
| 1141 |
+
0.900±.038
|
| 1142 |
+
64
|
| 1143 |
+
0.821±.066
|
| 1144 |
+
0.839±.062
|
| 1145 |
+
0.847±.055
|
| 1146 |
+
0.853±.048
|
| 1147 |
+
0.853±.049
|
| 1148 |
+
Suturing
|
| 1149 |
+
(Lap.)
|
| 1150 |
+
2
|
| 1151 |
+
0.987±.012
|
| 1152 |
+
0.989±.011
|
| 1153 |
+
0.989±.011
|
| 1154 |
+
0.990±.011
|
| 1155 |
+
0.997±.009
|
| 1156 |
+
4
|
| 1157 |
+
0.991±.013
|
| 1158 |
+
0.988±.019
|
| 1159 |
+
0.993±.009
|
| 1160 |
+
0.994±.008
|
| 1161 |
+
0.999±.005
|
| 1162 |
+
8
|
| 1163 |
+
0.995±.008
|
| 1164 |
+
0.995±.008
|
| 1165 |
+
0.995±.006
|
| 1166 |
+
0.997±.006
|
| 1167 |
+
0.998±.008
|
| 1168 |
+
16
|
| 1169 |
+
0.990±.013
|
| 1170 |
+
0.992±.011
|
| 1171 |
+
0.993±.010
|
| 1172 |
+
0.992±.011
|
| 1173 |
+
0.999±.006
|
| 1174 |
+
32
|
| 1175 |
+
0.992±.011
|
| 1176 |
+
0.992±.012
|
| 1177 |
+
0.992±.011
|
| 1178 |
+
0.992±.011
|
| 1179 |
+
0.999±.005
|
| 1180 |
+
64
|
| 1181 |
+
0.966±.036
|
| 1182 |
+
0.969±.033
|
| 1183 |
+
0.971±.032
|
| 1184 |
+
0.974±.029
|
| 1185 |
+
0.964±.042
|
| 1186 |
+
Suturing
|
| 1187 |
+
(Robotic)
|
| 1188 |
+
2
|
| 1189 |
+
0.618±.014
|
| 1190 |
+
0.649±.018
|
| 1191 |
+
0.649±.029
|
| 1192 |
+
0.631±.036
|
| 1193 |
+
0.708±.058
|
| 1194 |
+
4
|
| 1195 |
+
0.625±.014
|
| 1196 |
+
0.657±.021
|
| 1197 |
+
0.669±.029
|
| 1198 |
+
0.686±.041
|
| 1199 |
+
0.692±.063
|
| 1200 |
+
8
|
| 1201 |
+
0.650±.015
|
| 1202 |
+
0.659±.018
|
| 1203 |
+
0.661±.018
|
| 1204 |
+
0.675±.024
|
| 1205 |
+
0.662±.035
|
| 1206 |
+
16
|
| 1207 |
+
0.650±.023
|
| 1208 |
+
0.664±.027
|
| 1209 |
+
0.697±.039
|
| 1210 |
+
0.716±.035
|
| 1211 |
+
0.761±.044
|
| 1212 |
+
32
|
| 1213 |
+
0.644±.022
|
| 1214 |
+
0.653±.021
|
| 1215 |
+
0.663±.026
|
| 1216 |
+
0.686±.038
|
| 1217 |
+
0.691±.050
|
| 1218 |
+
64
|
| 1219 |
+
0.651±.040
|
| 1220 |
+
0.679±.050
|
| 1221 |
+
0.692±.052
|
| 1222 |
+
0.688±.068
|
| 1223 |
+
0.740±.091
|
| 1224 |
+
Needle
|
| 1225 |
+
Passing
|
| 1226 |
+
2
|
| 1227 |
+
0.607±.021
|
| 1228 |
+
0.626±.025
|
| 1229 |
+
0.666±.033
|
| 1230 |
+
0.694±.042
|
| 1231 |
+
N/A
|
| 1232 |
+
4
|
| 1233 |
+
0.616±.018
|
| 1234 |
+
0.645±.022
|
| 1235 |
+
0.690±.033
|
| 1236 |
+
0.727±.038
|
| 1237 |
+
8
|
| 1238 |
+
0.621±.026
|
| 1239 |
+
0.637±.029
|
| 1240 |
+
0.645±.042
|
| 1241 |
+
0.697±.046
|
| 1242 |
+
16
|
| 1243 |
+
0.626±.027
|
| 1244 |
+
0.640±.034
|
| 1245 |
+
0.666±.040
|
| 1246 |
+
0.692±.042
|
| 1247 |
+
32
|
| 1248 |
+
0.614±.027
|
| 1249 |
+
0.632±.046
|
| 1250 |
+
0.639±.045
|
| 1251 |
+
0.683±.054
|
| 1252 |
+
64
|
| 1253 |
+
0.581±.019
|
| 1254 |
+
0.587±.026
|
| 1255 |
+
0.611±.038
|
| 1256 |
+
0.618±.049
|
| 1257 |
+
Knot
|
| 1258 |
+
Tying
|
| 1259 |
+
2
|
| 1260 |
+
0.676±.023
|
| 1261 |
+
0.691±.023
|
| 1262 |
+
0.698±.032
|
| 1263 |
+
0.707±.044
|
| 1264 |
+
0.707±.042
|
| 1265 |
+
4
|
| 1266 |
+
0.688±.022
|
| 1267 |
+
0.694±.020
|
| 1268 |
+
0.698±.024
|
| 1269 |
+
0.742±.036
|
| 1270 |
+
0.766±.062
|
| 1271 |
+
8
|
| 1272 |
+
0.670±.015
|
| 1273 |
+
0.686±.021
|
| 1274 |
+
0.713±.025
|
| 1275 |
+
0.730±.034
|
| 1276 |
+
0.786±.057
|
| 1277 |
+
16
|
| 1278 |
+
0.688±.028
|
| 1279 |
+
0.697±.031
|
| 1280 |
+
0.714±.042
|
| 1281 |
+
0.749±.060
|
| 1282 |
+
0.831±.064
|
| 1283 |
+
32
|
| 1284 |
+
0.673±.026
|
| 1285 |
+
0.694±.029
|
| 1286 |
+
0.708±.042
|
| 1287 |
+
0.763±.057
|
| 1288 |
+
0.835±.077
|
| 1289 |
+
64
|
| 1290 |
+
0.653±.033
|
| 1291 |
+
0.673±.043
|
| 1292 |
+
0.692±.050
|
| 1293 |
+
0.715±.060
|
| 1294 |
+
0.733±.078
|
| 1295 |
+
|
| 1296 |
+
|
| 1297 |
+
|
| 1298 |
+
|
| 1299 |
+
16
|
| 1300 |
+
|
| 1301 |
+
Extended Table 2 | NTS for true predictions in task adaptation. k: number of test shots. Bold
|
| 1302 |
+
values are reported in the manuscript, selected based on best accuracies in Extended Table 1. For
|
| 1303 |
+
needle passing, k = 16 was not investigated as it leaves no Intermediate class for the query set.
|
| 1304 |
+
Val. and
|
| 1305 |
+
Testing
|
| 1306 |
+
Dataset
|
| 1307 |
+
SSF
|
| 1308 |
+
set
|
| 1309 |
+
Classes
|
| 1310 |
+
No. of test-shots
|
| 1311 |
+
k = 1
|
| 1312 |
+
k = 2
|
| 1313 |
+
k = 4
|
| 1314 |
+
k = 8
|
| 1315 |
+
k = 16
|
| 1316 |
+
Pattern
|
| 1317 |
+
Cutting
|
| 1318 |
+
2
|
| 1319 |
+
Fail
|
| 1320 |
+
0.984±.011 0.984±.012 0.985±.012 0.986±.012 0.986±.013
|
| 1321 |
+
Pass
|
| 1322 |
+
0.988±.009 0.989±.009 0.991±.008 0.991±.008 0.991±.008
|
| 1323 |
+
4
|
| 1324 |
+
Fail
|
| 1325 |
+
0.986±.007 0.988±.007 0.988±.007 0.989±.007 0.989±.007
|
| 1326 |
+
Pass
|
| 1327 |
+
0.989±.005 0.991±.005 0.992±.005 0.992±.004 0.992±.004
|
| 1328 |
+
8
|
| 1329 |
+
Fail
|
| 1330 |
+
0.989±.007 0.990±.007 0.990±.007 0.991±.006 0.991±.006
|
| 1331 |
+
Pass
|
| 1332 |
+
0.991±.005 0.993±.004 0.994±.003 0.994±.003 0.994±.003
|
| 1333 |
+
16
|
| 1334 |
+
Fail
|
| 1335 |
+
0.998±.003 0.999±.002 0.999±.003 0.999±.002 0.999±.003
|
| 1336 |
+
Pass
|
| 1337 |
+
0.999±.002 0.999±.001 0.999±.001 0.999±.001 0.999±.002
|
| 1338 |
+
32
|
| 1339 |
+
Fail
|
| 1340 |
+
0.997±.004 0.998±.004 0.998±.004 0.998±.005 0.998±.005
|
| 1341 |
+
Pass
|
| 1342 |
+
0.998±.004 0.998±.003 0.999±.003 0.999±.003 0.999±.003
|
| 1343 |
+
64
|
| 1344 |
+
Fail
|
| 1345 |
+
1.0
|
| 1346 |
+
1.0
|
| 1347 |
+
1.0
|
| 1348 |
+
1.0
|
| 1349 |
+
1.0
|
| 1350 |
+
|
| 1351 |
+
Pass
|
| 1352 |
+
1.0
|
| 1353 |
+
1.0
|
| 1354 |
+
1.0
|
| 1355 |
+
1.0
|
| 1356 |
+
1.0
|
| 1357 |
+
Suturing
|
| 1358 |
+
(Lap.)
|
| 1359 |
+
2
|
| 1360 |
+
Novice
|
| 1361 |
+
0.968±.027 0.971±.028 0.971±.029 0.973±.027 0.979±.029
|
| 1362 |
+
Expert
|
| 1363 |
+
0.967±.043 0.968±.046 0.966±.049 0.966±.049 0.972±.044
|
| 1364 |
+
4
|
| 1365 |
+
Novice
|
| 1366 |
+
0.981±.017 0.983±.015 0.984±.014 0.986±.014 0.997±.007
|
| 1367 |
+
Expert
|
| 1368 |
+
0.989±.020 0.988±.024 0.988±.024 0.990±.022 0.990±.025
|
| 1369 |
+
8
|
| 1370 |
+
Novice
|
| 1371 |
+
0.991±.009 0.992±.010 0.993±.009 0.993±.008 0.987±.018
|
| 1372 |
+
Expert
|
| 1373 |
+
0.998±.005 0.997±.007 0.996±.010 0.996±.009 0.998±.008
|
| 1374 |
+
16
|
| 1375 |
+
Novice
|
| 1376 |
+
0.997±.005 0.997±.005 0.997±.006 0.997±.006
|
| 1377 |
+
1.0
|
| 1378 |
+
Expert
|
| 1379 |
+
0.999±.004 0.999±.003 0.999±.002 0.999±.002 0.999±.003
|
| 1380 |
+
32
|
| 1381 |
+
Novice
|
| 1382 |
+
0.998±.003 0.999±.003 0.998±.003 0.998±.004 0.999±.006
|
| 1383 |
+
Expert
|
| 1384 |
+
1.0
|
| 1385 |
+
1.0
|
| 1386 |
+
1.0
|
| 1387 |
+
1.0
|
| 1388 |
+
1.0
|
| 1389 |
+
64
|
| 1390 |
+
Novice
|
| 1391 |
+
1.0
|
| 1392 |
+
1.0
|
| 1393 |
+
1.0
|
| 1394 |
+
1.0
|
| 1395 |
+
1.0
|
| 1396 |
+
|
| 1397 |
+
Expert
|
| 1398 |
+
1.0
|
| 1399 |
+
1.0
|
| 1400 |
+
1.0
|
| 1401 |
+
1.0
|
| 1402 |
+
1.0
|
| 1403 |
+
Suturing
|
| 1404 |
+
(Robotic)
|
| 1405 |
+
2
|
| 1406 |
+
Novice
|
| 1407 |
+
0.884±.041 0.861±.046 0.888±.054 0.897±.058 0.910±.064
|
| 1408 |
+
Interm.
|
| 1409 |
+
0.818±.057 0.774±.066 0.724±.075 0.759±.096 0.562±.056
|
| 1410 |
+
Expert
|
| 1411 |
+
0.782±.063 0.693±.073 0.661±.071 0.721±.086 0.585±.070
|
| 1412 |
+
4
|
| 1413 |
+
Novice
|
| 1414 |
+
0.878±.042 0.868±.049 0.886±.054 0.891±.059 0.894±.065
|
| 1415 |
+
Interm.
|
| 1416 |
+
0.820±.058 0.753±.072 0.691±.084 0.637±.098 0.623±.110
|
| 1417 |
+
Expert
|
| 1418 |
+
0.794±.059 0.759±.067 0.692±.073 0.666±.085 0.592±.098
|
| 1419 |
+
8
|
| 1420 |
+
Novice
|
| 1421 |
+
0.897±.041 0.918±.043 0.929±.042 0.927±.043 0.938±.051
|
| 1422 |
+
Interm.
|
| 1423 |
+
0.757±.062 0.725±.076 0.681±.078 0.582±.060 0.598±.100
|
| 1424 |
+
Expert
|
| 1425 |
+
0.806±.058 0.768±.065 0.681±.073 0.607±.059 0.577±.058
|
| 1426 |
+
16
|
| 1427 |
+
Novice
|
| 1428 |
+
0.984±.022 0.986±.023 0.989±.028 0.989±.028 0.990±.030
|
| 1429 |
+
Interm.
|
| 1430 |
+
0.959±.045 0.954±.057 0.901±.110 0.881±.140 0.816±.180
|
| 1431 |
+
Expert
|
| 1432 |
+
0.959±.039 0.947±.061 0.907±.088 0.895±.110 0.855±.140
|
| 1433 |
+
|
| 1434 |
+
|
| 1435 |
+
17
|
| 1436 |
+
|
| 1437 |
+
32
|
| 1438 |
+
Novice
|
| 1439 |
+
0.977±.030 0.979±.029 0.984±.025 0.984±.027 0.985±.031
|
| 1440 |
+
Interm.
|
| 1441 |
+
0.950±.045 0.933±.067 0.919±.087 0.850±.130 0.862±.170
|
| 1442 |
+
Expert
|
| 1443 |
+
0.947±.048 0.925±.067 0.908±.092 0.817±.140 0.761±.210
|
| 1444 |
+
64
|
| 1445 |
+
Novice
|
| 1446 |
+
0.998±.003 0.999±.003 0.999±.003 0.999±.002 0.999±.006
|
| 1447 |
+
Interm.
|
| 1448 |
+
0.994±.008 0.992±.017 0.989±.023 0.992±.020 0.963±.089
|
| 1449 |
+
Expert
|
| 1450 |
+
0.994±.008 0.992±.013 0.992±.017 0.989±.024 0.965±.083
|
| 1451 |
+
Needle
|
| 1452 |
+
Passing
|
| 1453 |
+
2
|
| 1454 |
+
Novice
|
| 1455 |
+
0.907±.041 0.881±.061 0.869±.080 0.871±.110
|
| 1456 |
+
N/A
|
| 1457 |
+
Interm.
|
| 1458 |
+
0.927±.038 0.889±.054 0.894±.068 0.871±.110
|
| 1459 |
+
Expert
|
| 1460 |
+
0.878±.050 0.804±.071 0.760±.095 0.698±.110
|
| 1461 |
+
4
|
| 1462 |
+
Novice
|
| 1463 |
+
0.925±.037 0.910±.048 0.894±.078 0.903±.095
|
| 1464 |
+
Interm.
|
| 1465 |
+
0.935±.040 0.912±.054 0.893±.064 0.903±.095
|
| 1466 |
+
Expert
|
| 1467 |
+
0.885±.050 0.857±.066 0.777±.095 0.764±.120
|
| 1468 |
+
8
|
| 1469 |
+
Novice
|
| 1470 |
+
0.939±.035 0.920±.044 0.905±.057 0.894±.083
|
| 1471 |
+
Interm.
|
| 1472 |
+
0.953±.028 0.909±.048 0.906±.065 0.946±.068
|
| 1473 |
+
Expert
|
| 1474 |
+
0.896±.049 0.847±.067 0.811±.089 0.796±.120
|
| 1475 |
+
16
|
| 1476 |
+
Novice
|
| 1477 |
+
0.981±.020 0.981±.023 0.979±.026 0.984±.027
|
| 1478 |
+
Interm.
|
| 1479 |
+
0.978±.022 0.974±.031 0.969±.035 0.984±.031
|
| 1480 |
+
Expert
|
| 1481 |
+
0.965±.026 0.955±.042 0.947±.056 0.946±.070
|
| 1482 |
+
32
|
| 1483 |
+
Novice
|
| 1484 |
+
0.981±.018 0.970±.034 0.972±.034 0.977±.042
|
| 1485 |
+
Interm.
|
| 1486 |
+
0.985±.017 0.984±.021 0.983±.028 0.969±.051
|
| 1487 |
+
Expert
|
| 1488 |
+
0.970±.028 0.954±.044 0.946±.056 0.936±.075
|
| 1489 |
+
64
|
| 1490 |
+
Novice
|
| 1491 |
+
0.996±.067 0.998±.005 0.997±.009 0.997±.010
|
| 1492 |
+
Interm.
|
| 1493 |
+
0.997±.006 0.996±.006 0.993±.021 0.993±.025
|
| 1494 |
+
Expert
|
| 1495 |
+
0.994±.009 0.995±.008 0.993±.015 0.993±.015
|
| 1496 |
+
Knot
|
| 1497 |
+
Tying
|
| 1498 |
+
2
|
| 1499 |
+
Novice
|
| 1500 |
+
0.875±.053 0.871±.055 0.859±.068 0.894±.070 0.883±.080
|
| 1501 |
+
Interm.
|
| 1502 |
+
0.817±.064 0.789±.075 0.728±.091 0.720±.100 0.691±.120
|
| 1503 |
+
Expert
|
| 1504 |
+
0.776±.072 0.743±.085 0.699±.096 0.639±.097 0.629±.100
|
| 1505 |
+
4
|
| 1506 |
+
Novice
|
| 1507 |
+
0.921±.039 0.924±.040 0.907±.041 0.935±.047 0.934±.059
|
| 1508 |
+
Interm.
|
| 1509 |
+
0.868±.052 0.844±.061 0.814±.079 0.687±.120 0.666±.140
|
| 1510 |
+
Expert
|
| 1511 |
+
0.817±.065 0.806±.063 0.796±.071 0.682±.120 0.692±.120
|
| 1512 |
+
8
|
| 1513 |
+
Novice
|
| 1514 |
+
0.926±.038 0.923±.045 0.923±.043 0.928±.058 0.949±.044
|
| 1515 |
+
Interm.
|
| 1516 |
+
0.875±.064 0.831±.080 0.791±.095 0.740±.130 0.736±.110
|
| 1517 |
+
Expert
|
| 1518 |
+
0.808±.073 0.787±.079 0.774±.082 0.749±.086 0.658±.130
|
| 1519 |
+
16
|
| 1520 |
+
Novice
|
| 1521 |
+
0.970±.029 0.965±.034 0.966±.036 0.970±.041 0.977±.039
|
| 1522 |
+
Interm.
|
| 1523 |
+
0.960±.049 0.951±.057 0.943±.075 0.863±.140 0.984±.130
|
| 1524 |
+
Expert
|
| 1525 |
+
0.919±.068 0.928±.067 0.923±.075 0.892±.120 0.866±.160
|
| 1526 |
+
32
|
| 1527 |
+
Novice
|
| 1528 |
+
0.980±.020 0.982±.022 0.975±.030 0.982±.030 0.985±.034
|
| 1529 |
+
Interm.
|
| 1530 |
+
0.962±.034 0.955±.044 0.956±.049 0.891±.120 0.933±.110
|
| 1531 |
+
Expert
|
| 1532 |
+
0.930±.056 0.932±.058 0.937±.060 0.901±.120 0.894±.140
|
| 1533 |
+
64
|
| 1534 |
+
Novice
|
| 1535 |
+
0.995±.008 0.997±.006 0.997±.007 0.996±.013 0.997±.010
|
| 1536 |
+
Interm.
|
| 1537 |
+
0.992±.011 0.991±.016 0.991±.020 0.976±.062 0.981±.064
|
| 1538 |
+
|
| 1539 |
+
|
| 1540 |
+
18
|
| 1541 |
+
|
| 1542 |
+
Expert
|
| 1543 |
+
0.989±.014 0.990±.016 0.989±.020 0.974±.059 0.972±.080
|
| 1544 |
+
|
| 1545 |
+
Extended Table 3 | Accuracies and AUC in cholecystectomy. k: number of test shots. Bold values
|
| 1546 |
+
are reported in the manuscript.
|
| 1547 |
+
Validation Dataset
|
| 1548 |
+
SSF
|
| 1549 |
+
set
|
| 1550 |
+
No. of test-shots
|
| 1551 |
+
k = 1
|
| 1552 |
+
|
| 1553 |
+
|
| 1554 |
+
Accuracy
|
| 1555 |
+
AUC
|
| 1556 |
+
Pattern Cutting
|
| 1557 |
+
2
|
| 1558 |
+
0.692
|
| 1559 |
+
0.798
|
| 1560 |
+
4
|
| 1561 |
+
0.718
|
| 1562 |
+
0.803
|
| 1563 |
+
8
|
| 1564 |
+
0.795
|
| 1565 |
+
0.848
|
| 1566 |
+
16
|
| 1567 |
+
0.821
|
| 1568 |
+
0.803
|
| 1569 |
+
32
|
| 1570 |
+
0.795
|
| 1571 |
+
0.788
|
| 1572 |
+
64
|
| 1573 |
+
0.872
|
| 1574 |
+
0.818
|
| 1575 |
+
Suturing (Lap.)
|
| 1576 |
+
2
|
| 1577 |
+
0.667
|
| 1578 |
+
0.747
|
| 1579 |
+
4
|
| 1580 |
+
0.718
|
| 1581 |
+
0.841
|
| 1582 |
+
8
|
| 1583 |
+
0.821
|
| 1584 |
+
0.864
|
| 1585 |
+
16
|
| 1586 |
+
0.872
|
| 1587 |
+
0.848
|
| 1588 |
+
32
|
| 1589 |
+
0.846
|
| 1590 |
+
0.848
|
| 1591 |
+
64
|
| 1592 |
+
0.821
|
| 1593 |
+
0.818
|
| 1594 |
+
Suturing (Robotic)
|
| 1595 |
+
2
|
| 1596 |
+
0.718
|
| 1597 |
+
0.788
|
| 1598 |
+
4
|
| 1599 |
+
0.718
|
| 1600 |
+
0.788
|
| 1601 |
+
8
|
| 1602 |
+
0.769
|
| 1603 |
+
0.848
|
| 1604 |
+
16
|
| 1605 |
+
0.615
|
| 1606 |
+
0.652
|
| 1607 |
+
32
|
| 1608 |
+
0.795
|
| 1609 |
+
0.833
|
| 1610 |
+
64
|
| 1611 |
+
0.821
|
| 1612 |
+
0.833
|
| 1613 |
+
Needle Passing
|
| 1614 |
+
2
|
| 1615 |
+
0.872
|
| 1616 |
+
0.838
|
| 1617 |
+
4
|
| 1618 |
+
0.846
|
| 1619 |
+
0.859
|
| 1620 |
+
8
|
| 1621 |
+
0.846
|
| 1622 |
+
0.876
|
| 1623 |
+
16
|
| 1624 |
+
0.692
|
| 1625 |
+
0.677
|
| 1626 |
+
32
|
| 1627 |
+
0.692
|
| 1628 |
+
0.758
|
| 1629 |
+
64
|
| 1630 |
+
0.872
|
| 1631 |
+
0.818
|
| 1632 |
+
Knot Tying
|
| 1633 |
+
2
|
| 1634 |
+
0.667
|
| 1635 |
+
0.755
|
| 1636 |
+
4
|
| 1637 |
+
0.564
|
| 1638 |
+
0.621
|
| 1639 |
+
8
|
| 1640 |
+
0.795
|
| 1641 |
+
0.838
|
| 1642 |
+
16
|
| 1643 |
+
0.872
|
| 1644 |
+
0.864
|
| 1645 |
+
32
|
| 1646 |
+
0.615
|
| 1647 |
+
0.715
|
| 1648 |
+
64
|
| 1649 |
+
0.897
|
| 1650 |
+
0.864
|
| 1651 |
+
|
| 1652 |
+
|
| 1653 |
+
|
| 1654 |
+
|
| 1655 |
+
|
| 1656 |
+
19
|
| 1657 |
+
|
| 1658 |
+
Extended Table 4 | NTS for true predictions in cholecystectomy. k: number of test shots. Bold
|
| 1659 |
+
values are used to obtain average NTSs, as reported in the manuscript. They are selected based on
|
| 1660 |
+
the best accuracies in Extended Table 3.
|
| 1661 |
+
Validation
|
| 1662 |
+
Dataset
|
| 1663 |
+
SSF
|
| 1664 |
+
set
|
| 1665 |
+
Classes
|
| 1666 |
+
No. of test-shots
|
| 1667 |
+
k = 1
|
| 1668 |
+
Pattern
|
| 1669 |
+
Cutting
|
| 1670 |
+
2
|
| 1671 |
+
Low Performance
|
| 1672 |
+
1.0
|
| 1673 |
+
High Performance
|
| 1674 |
+
1.0
|
| 1675 |
+
4
|
| 1676 |
+
Low Performance
|
| 1677 |
+
1.0
|
| 1678 |
+
High Performance
|
| 1679 |
+
1.0
|
| 1680 |
+
8
|
| 1681 |
+
Low Performance
|
| 1682 |
+
1.0
|
| 1683 |
+
High Performance
|
| 1684 |
+
1.0
|
| 1685 |
+
16
|
| 1686 |
+
Low Performance
|
| 1687 |
+
1.0
|
| 1688 |
+
High Performance
|
| 1689 |
+
1.0
|
| 1690 |
+
32
|
| 1691 |
+
Low Performance
|
| 1692 |
+
1.0
|
| 1693 |
+
High Performance
|
| 1694 |
+
1.0
|
| 1695 |
+
64
|
| 1696 |
+
Low Performance
|
| 1697 |
+
1.0
|
| 1698 |
+
High Performance
|
| 1699 |
+
1.0
|
| 1700 |
+
Suturing
|
| 1701 |
+
(Lap.)
|
| 1702 |
+
2
|
| 1703 |
+
Low Performance
|
| 1704 |
+
1.0
|
| 1705 |
+
High Performance
|
| 1706 |
+
1.0
|
| 1707 |
+
4
|
| 1708 |
+
Low Performance
|
| 1709 |
+
1.0
|
| 1710 |
+
High Performance
|
| 1711 |
+
1.0
|
| 1712 |
+
8
|
| 1713 |
+
Low Performance
|
| 1714 |
+
1.0
|
| 1715 |
+
High Performance
|
| 1716 |
+
1.0
|
| 1717 |
+
16
|
| 1718 |
+
Low Performance
|
| 1719 |
+
1.0
|
| 1720 |
+
High Performance
|
| 1721 |
+
1.0
|
| 1722 |
+
32
|
| 1723 |
+
Low Performance
|
| 1724 |
+
1.0
|
| 1725 |
+
High Performance
|
| 1726 |
+
1.0
|
| 1727 |
+
64
|
| 1728 |
+
Low Performance
|
| 1729 |
+
1.0
|
| 1730 |
+
High Performance
|
| 1731 |
+
1.0
|
| 1732 |
+
Suturing
|
| 1733 |
+
(Robotic)
|
| 1734 |
+
2
|
| 1735 |
+
Low Performance
|
| 1736 |
+
1.0
|
| 1737 |
+
High Performance
|
| 1738 |
+
1.0
|
| 1739 |
+
4
|
| 1740 |
+
Low Performance
|
| 1741 |
+
1.0
|
| 1742 |
+
High Performance
|
| 1743 |
+
1.0
|
| 1744 |
+
8
|
| 1745 |
+
Low Performance
|
| 1746 |
+
1.0
|
| 1747 |
+
High Performance
|
| 1748 |
+
1.0
|
| 1749 |
+
16
|
| 1750 |
+
Low Performance
|
| 1751 |
+
1.0
|
| 1752 |
+
High Performance
|
| 1753 |
+
1.0
|
| 1754 |
+
32
|
| 1755 |
+
Low Performance
|
| 1756 |
+
1.0
|
| 1757 |
+
High Performance
|
| 1758 |
+
1.0
|
| 1759 |
+
64
|
| 1760 |
+
Low Performance
|
| 1761 |
+
1.0
|
| 1762 |
+
High Performance
|
| 1763 |
+
1.0
|
| 1764 |
+
|
| 1765 |
+
|
| 1766 |
+
20
|
| 1767 |
+
|
| 1768 |
+
Needle
|
| 1769 |
+
Passing
|
| 1770 |
+
2
|
| 1771 |
+
Low Performance
|
| 1772 |
+
1.0
|
| 1773 |
+
High Performance
|
| 1774 |
+
1.0
|
| 1775 |
+
4
|
| 1776 |
+
Low Performance
|
| 1777 |
+
1.0
|
| 1778 |
+
High Performance
|
| 1779 |
+
1.0
|
| 1780 |
+
8
|
| 1781 |
+
Low Performance
|
| 1782 |
+
1.0
|
| 1783 |
+
High Performance
|
| 1784 |
+
1.0
|
| 1785 |
+
16
|
| 1786 |
+
Low Performance
|
| 1787 |
+
1.0
|
| 1788 |
+
High Performance
|
| 1789 |
+
1.0
|
| 1790 |
+
32
|
| 1791 |
+
Low Performance
|
| 1792 |
+
1.0
|
| 1793 |
+
High Performance
|
| 1794 |
+
1.0
|
| 1795 |
+
64
|
| 1796 |
+
Low Performance
|
| 1797 |
+
1.0
|
| 1798 |
+
High Performance
|
| 1799 |
+
N/A
|
| 1800 |
+
Knot
|
| 1801 |
+
Tying
|
| 1802 |
+
2
|
| 1803 |
+
Low Performance
|
| 1804 |
+
1.0
|
| 1805 |
+
High Performance
|
| 1806 |
+
1.0
|
| 1807 |
+
4
|
| 1808 |
+
Low Performance
|
| 1809 |
+
1.0
|
| 1810 |
+
High Performance
|
| 1811 |
+
1.0
|
| 1812 |
+
8
|
| 1813 |
+
Low Performance
|
| 1814 |
+
1.0
|
| 1815 |
+
High Performance
|
| 1816 |
+
1.0
|
| 1817 |
+
16
|
| 1818 |
+
Low Performance
|
| 1819 |
+
1.0
|
| 1820 |
+
High Performance
|
| 1821 |
+
1.0
|
| 1822 |
+
32
|
| 1823 |
+
Low Performance
|
| 1824 |
+
1.0
|
| 1825 |
+
High Performance
|
| 1826 |
+
1.0
|
| 1827 |
+
64
|
| 1828 |
+
Low Performance
|
| 1829 |
+
1.0
|
| 1830 |
+
High Performance
|
| 1831 |
+
1.0
|
| 1832 |
+
Mean
|
| 1833 |
+
|
| 1834 |
+
Low Performance
|
| 1835 |
+
1.0
|
| 1836 |
+
High Performance
|
| 1837 |
+
1.0
|
| 1838 |
+
|
| 1839 |
+
Extended Table 5 | OSATS scores breakdown.
|
| 1840 |
+
OSATS score
|
| 1841 |
+
Number of trials
|
| 1842 |
+
Assigned label
|
| 1843 |
+
13
|
| 1844 |
+
1
|
| 1845 |
+
Low performance
|
| 1846 |
+
15
|
| 1847 |
+
1
|
| 1848 |
+
16
|
| 1849 |
+
2
|
| 1850 |
+
18
|
| 1851 |
+
1
|
| 1852 |
+
19
|
| 1853 |
+
1
|
| 1854 |
+
20
|
| 1855 |
+
1
|
| 1856 |
+
21
|
| 1857 |
+
2
|
| 1858 |
+
22
|
| 1859 |
+
1
|
| 1860 |
+
23
|
| 1861 |
+
2
|
| 1862 |
+
24
|
| 1863 |
+
2
|
| 1864 |
+
High performance
|
| 1865 |
+
25
|
| 1866 |
+
1
|
| 1867 |
+
|
| 1868 |
+
|
| 1869 |
+
|
| 1870 |
+
21
|
| 1871 |
+
|
| 1872 |
+
Supplementary Figures
|
| 1873 |
+
Extended Fig. 1 | SimCLR architecture and spatiotemporal feature set generation. 𝐷 represents
|
| 1874 |
+
the output dimension of the SimCLR once trained while 𝐷′ is the dimension after the 1D GAP
|
| 1875 |
+
layer. 𝑇 is the temporal length of a given sample. Pattern cutting frames were used to represent the
|
| 1876 |
+
pipeline.
|
| 1877 |
+
Extended Fig. 2 | The backbone of the pipeline. 𝐷 and 𝐾 represent the dimension of the
|
| 1878 |
+
convolutional layers. In this study, 𝐷 is equal to the output dimension of the SimCLR–. 𝐾 is 16
|
| 1879 |
+
for 𝐷 = 2,4,8 and 𝐾 is 64 for 𝐷 = 16,32, and 𝐾 is 256 for 𝐷 = 64.
|
| 1880 |
+
|
| 1881 |
+
ResNet Block1
|
| 1882 |
+
ResNet Block2
|
| 1883 |
+
D
|
| 1884 |
+
SimCLR
|
| 1885 |
+
→
|
| 1886 |
+
kernel size = 5,
|
| 1887 |
+
kernel size = 1,
|
| 1888 |
+
kernel size = 3,
|
| 1889 |
+
dilation = 1
|
| 1890 |
+
dilation=1
|
| 1891 |
+
dilation=2
|
| 1892 |
+
: 1D Conv. layer
|
| 1893 |
+
: 1D GAPlayer
|
| 1894 |
+
:Attention layer
|
| 1895 |
+
: Fully -connected layerTransform.2
|
| 1896 |
+
IdenticalResNet34s
|
| 1897 |
+
Removedaftertraining
|
| 1898 |
+
Training
|
| 1899 |
+
Maximize
|
| 1900 |
+
aggrement
|
| 1901 |
+
Transform.1
|
| 1902 |
+
D-dimensional
|
| 1903 |
+
representations
|
| 1904 |
+
1DGAP
|
| 1905 |
+
ResNet34
|
| 1906 |
+
Post-training
|
| 1907 |
+
TxD'-dimensional
|
| 1908 |
+
spatiotemporal
|
| 1909 |
+
featureset
|
ItAyT4oBgHgl3EQf5vr6/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b6c30564fa1177de641e18fb2b373d451eb1026202fa219005441d66f0f90db8
|
| 3 |
+
size 313231
|
JdE0T4oBgHgl3EQfSACX/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6d49ffb5e6bf7bb742896ed8cd9ab4653c12eaf53f8e574bb898fdcbc7605d99
|
| 3 |
+
size 185050
|
JtAyT4oBgHgl3EQfsPmi/content/tmp_files/2301.00574v1.pdf.txt
ADDED
|
@@ -0,0 +1,1006 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.00574v1 [quant-ph] 2 Jan 2023
|
| 2 |
+
Environmental-induced work extraction
|
| 3 |
+
Rasim Volga Ovali†,1, Shakir Ullah†,2, Mehmet Günay†,3, and Mehmet Emre Tasgin2,∗
|
| 4 |
+
† Contributed equally
|
| 5 |
+
∗ correspondence: metasgin@hacettepe.edu.tr and metasgin@gmail.com
|
| 6 |
+
1Department of Physics, Recep Tayyip Erdogan University, 53100, Rize, Turkey
|
| 7 |
+
2Institute of Nuclear Sciences, Hacettepe University, 06800 Ankara, Turkey and
|
| 8 |
+
3Department of Nanoscience and Nanotechnology, Faculty of Arts and Science,
|
| 9 |
+
Mehmet Akif Ersoy University, 15030 Burdur, Turkey
|
| 10 |
+
A measurement can extract work from an entangled, e.g., two-mode system. Here, we inquire
|
| 11 |
+
the extracted work when no intellectual creature, like an ancilla/daemon, is present. When the
|
| 12 |
+
monitoring is carried out by the environmental modes, that is when no measurement-apparatus is
|
| 13 |
+
present, the measurement-basis becomes the coherent states. This implies a Gaussian measurement
|
| 14 |
+
with a fixed strength λ = 1. For two-mode Gaussian states, extracted work is already independent
|
| 15 |
+
from the measurement outcome. After the strength is also fixed, this makes nature assign a particular
|
| 16 |
+
amount of work to a given entanglement degree. Extracted work becomes the entanglement-degree
|
| 17 |
+
times the entire thermal energy at low temperatures —e.g., room temperature for optical modes.
|
| 18 |
+
Environment, nature itself, converts entanglement to an ordered, macroscopic, directional (kinetic)
|
| 19 |
+
energy from a disordered, microscopic, randomized thermal energy. And the converted amount is
|
| 20 |
+
solely determined by the entanglement.
|
| 21 |
+
Quantum entanglement enables technologies which are
|
| 22 |
+
not possible without them [1].
|
| 23 |
+
Measurements below
|
| 24 |
+
the standard quantum limit [2, 3], quantum enhanced
|
| 25 |
+
imaging [4–6], quantum radars [7], quantum teleporta-
|
| 26 |
+
tion (QT) [8], and quantum computation [9] are all en-
|
| 27 |
+
abled by entangled —more generally nonclassical [10]—
|
| 28 |
+
states. Entanglement can also be utilized as a resource
|
| 29 |
+
for quantum heat engines [11–17] which makes them op-
|
| 30 |
+
erate more efficiently compared to their classical coun-
|
| 31 |
+
terparts [18]. As an example, an ancilla can utilize en-
|
| 32 |
+
tanglement for extracting a larger amount of work by
|
| 33 |
+
maximizing the efficiency [19]. It is quite intriguing that
|
| 34 |
+
entanglement can even be directly transformed into work
|
| 35 |
+
via measurements [20, 21]. The energy can be extracted
|
| 36 |
+
from a single heat bath [20, 21] [22]. This phenomenon
|
| 37 |
+
—we focus here— takes place as follows, e.g., in a two-
|
| 38 |
+
mode entangled state.
|
| 39 |
+
Work extraction as a measurement backaction.— Let
|
| 40 |
+
us assume that one of the modes (mode a) belongs to
|
| 41 |
+
an optical cavity which includes, for example, a free-to-
|
| 42 |
+
move board or a piston inside the cavity [20, 21]. The
|
| 43 |
+
second (b) mode relies somewhere outside of the cavity
|
| 44 |
+
and it is entangled with the a-mode. Both modes are
|
| 45 |
+
in thermal equilibrium with the environment at temper-
|
| 46 |
+
ature T. When a measurement is carried out on the b-
|
| 47 |
+
mode (outside), entropy of the cavity (a) mode decreases
|
| 48 |
+
to S(meas)
|
| 49 |
+
V
|
| 50 |
+
because of the measurement backaction. After
|
| 51 |
+
the measurement, the state (a-mode) thermalizes back
|
| 52 |
+
to equilibrium and assigns a higher entropy S(ther)
|
| 53 |
+
V
|
| 54 |
+
[23].
|
| 55 |
+
During the rethermalization with the heat bath the ex-
|
| 56 |
+
pansion of the a-mode pushes the board located inside
|
| 57 |
+
the cavity [20]. An amount of W = kBT (S(ther)
|
| 58 |
+
V
|
| 59 |
+
−S(meas)
|
| 60 |
+
V
|
| 61 |
+
)
|
| 62 |
+
work can be extracted from the single heat bath. That
|
| 63 |
+
is, W amount of thermal energy can be converted into
|
| 64 |
+
“directional” kinetic energy (KE) of the board. In case
|
| 65 |
+
of maximum entanglement, the state of the a-mode is
|
| 66 |
+
completely determined from the outcome of the b-mode
|
| 67 |
+
and entropy of the a-mode vanishes, i.e., S(meas)
|
| 68 |
+
V
|
| 69 |
+
= 0.
|
| 70 |
+
Thus, the extractable work becomes kBT S(ther)
|
| 71 |
+
V
|
| 72 |
+
, i.e., the
|
| 73 |
+
complete internal energy. The amount of extracted work
|
| 74 |
+
can be employed for witnessing/quantifying the entan-
|
| 75 |
+
glement [24–27].
|
| 76 |
+
In general, the extracted work depends on the nature
|
| 77 |
+
of the measurement and its outcome. Yet, interestingly,
|
| 78 |
+
the state of the a-mode (cavity field) turns out to be in-
|
| 79 |
+
dependent of the outcome of the b-mode as long as Gaus-
|
| 80 |
+
sian states and measurements are concerned [28–31]. The
|
| 81 |
+
state, into which the a-mode collapses, depends only on
|
| 82 |
+
the strength (λ) of the Gaussian measurement/operation
|
| 83 |
+
carried out on the b-mode [32].
|
| 84 |
+
Thus, also the ex-
|
| 85 |
+
tracted work depends only on λ.
|
| 86 |
+
Here, λ ∈ [0, ∞] is
|
| 87 |
+
the quadrature-noise belonging to the Gaussian opera-
|
| 88 |
+
tion [33].
|
| 89 |
+
That is, if λ (for a reason) assigns a fixed
|
| 90 |
+
value, a given degree of entanglement extracts a particu-
|
| 91 |
+
lar amount of work. This is the phenomenon we explore
|
| 92 |
+
here.
|
| 93 |
+
The observable that is measured in an experiment (this
|
| 94 |
+
can be, for example, number of photons) is determined
|
| 95 |
+
by the quantum apparatus employed in the measurement
|
| 96 |
+
of the b-mode.
|
| 97 |
+
More explicitly, monitoring of the en-
|
| 98 |
+
vironment on the apparatus (i.e., decoherence) destroys
|
| 99 |
+
the superpositions among the natural pointer states (the
|
| 100 |
+
measurement-basis). This makes us observe one of the
|
| 101 |
+
values in the measurement-basis. Refs. [34–39] provide
|
| 102 |
+
mathematical and numerical demonstrations of the mon-
|
| 103 |
+
itoring process.
|
| 104 |
+
The
|
| 105 |
+
question.—
|
| 106 |
+
Here
|
| 107 |
+
we
|
| 108 |
+
examine
|
| 109 |
+
the
|
| 110 |
+
following
|
| 111 |
+
already-answered-question in the context of work extrac-
|
| 112 |
+
tion process. What happens if no measurement appa-
|
| 113 |
+
ratus is present?
|
| 114 |
+
In other words, what is the pointer
|
| 115 |
+
(measurement) basis if no intellectual being, such as a
|
| 116 |
+
human, a daemon, or an ancilla, is present? In this case,
|
| 117 |
+
environmental monitoring sets the measurement-basis as
|
| 118 |
+
|
| 119 |
+
2
|
| 120 |
+
the the coherent states [40–47]. Measurement strength is
|
| 121 |
+
λ = 1 for any one of the coherent states.
|
| 122 |
+
Environmental monitoring.— At this stage, we better
|
| 123 |
+
re-depict the picture of the system we have in mind in a
|
| 124 |
+
more clear way. The cavity (a) mode is entangled with
|
| 125 |
+
the b-mode. It is worth noting that, in general, the a
|
| 126 |
+
and b modes do not need to be in interaction [48]. The b-
|
| 127 |
+
mode is monitored by the environment. Environment (a
|
| 128 |
+
collection of infinite number of modes) can monitor the
|
| 129 |
+
b-mode only indirectly as two light beams do not interact
|
| 130 |
+
directly. Monitoring can be performed over common in-
|
| 131 |
+
teractions with masses of particles present around which
|
| 132 |
+
induces an effective interaction between the environment
|
| 133 |
+
and the b-mode [49]. It is worth noting that pointer states
|
| 134 |
+
are still coherent states, for instance, in case a harmonic
|
| 135 |
+
chain [42] is considered. Therefore, in total, environment
|
| 136 |
+
monitors (measures) the b-mode in one of the coherent
|
| 137 |
+
states. So, the measurement is a Gaussian one.
|
| 138 |
+
It is straightforward to realize that the measurement
|
| 139 |
+
strength is fixed λ = 1. Moreover, a rotated R(φ) form
|
| 140 |
+
of the coherent state basis —R(φ) is present in the most
|
| 141 |
+
general form of a Gaussian measurement [28–31]— is also
|
| 142 |
+
a coherent state basis. Putting things together, nature
|
| 143 |
+
itself makes a Gaussian measurement on one of the two
|
| 144 |
+
entangled modes. The measurement basis is composed
|
| 145 |
+
of coherent states. As the basis possesses a fixed λ: a
|
| 146 |
+
particular amount of work (KE) becomes assigned to a
|
| 147 |
+
given degree of entanglement as long as Gaussian states
|
| 148 |
+
are concerned.
|
| 149 |
+
The thermodynamical energy, proba-
|
| 150 |
+
bilistic and disordered in nature, is converted into an
|
| 151 |
+
ordered (mechanical) form of energy now belonging to
|
| 152 |
+
the board [20, 21]. This sets an observer-independent,
|
| 153 |
+
nature-assigned, association between entanglement and
|
| 154 |
+
directional/ordered energy.
|
| 155 |
+
We call this phenomenon
|
| 156 |
+
environment-induced work extraction (EIWE).
|
| 157 |
+
One can gain a better understanding by examining the
|
| 158 |
+
phenomenon in low-T limit —such as room temperature
|
| 159 |
+
for optical resonances [50]. At this limit, a simple-looking
|
| 160 |
+
analytical result can be obtained, because the kBT term,
|
| 161 |
+
present in the W formula, cancels with a 1/kBT term
|
| 162 |
+
appearing within the entropy difference [51].
|
| 163 |
+
Please,
|
| 164 |
+
see Eqs. (S11) and (S13) in the Supplementary Mate-
|
| 165 |
+
rial (SM) [52].
|
| 166 |
+
The extracted work W = ξ(r) (¯nℏωa) depends only on
|
| 167 |
+
the degree of the entanglement ξ(r) = [1−2/(1+cosh2r)]
|
| 168 |
+
which runs from 0 to 1 as entanglement increases. ¯n is
|
| 169 |
+
the occupation of the a (cavity) mode of resonance ωa.
|
| 170 |
+
So, (¯nℏωa) is already the “entire” thermodynamical (it is
|
| 171 |
+
probabilistic) energy present inside the cavity either be-
|
| 172 |
+
fore the measurement or after the rethermalization pro-
|
| 173 |
+
cess. Here we use the von Neumann entropy SV in dif-
|
| 174 |
+
ference to Ref. [20] where Réyni entropy is employed. r
|
| 175 |
+
is the two-mode squeezing rate which is proportional to
|
| 176 |
+
the time the entanglement device is kept open [53].
|
| 177 |
+
We present the derivations in the SM [52]. In the rest
|
| 178 |
+
of the paper, we aim to put this result into words in order
|
| 179 |
+
to develop a physical understanding.
|
| 180 |
+
We observe that the extracted work (KE of the board
|
| 181 |
+
or piston) is: the degree of entanglement times “all of
|
| 182 |
+
the thermal energy” present inside the cavity [54].
|
| 183 |
+
It
|
| 184 |
+
gets closer to (¯nℏωa) in the case of maximum (max)
|
| 185 |
+
entanglement [55].
|
| 186 |
+
In other words, max entanglement
|
| 187 |
+
converts the entire thermodynamical energy of the (a)
|
| 188 |
+
photon mode into the kinetic (directional) energy of the
|
| 189 |
+
board/piston [56]. As we will see below, this is true also
|
| 190 |
+
for other max entangled states, e.g., max two-mode en-
|
| 191 |
+
tangled state (|1, 0⟩ + |0, 1⟩)/
|
| 192 |
+
√
|
| 193 |
+
2 and symmetrization en-
|
| 194 |
+
tanglement of identical particles [57]. That is, we cross-
|
| 195 |
+
check our EIWE result with other incidences.
|
| 196 |
+
What is peculiar to EIWE is that the work is extracted
|
| 197 |
+
by itself. That is, an observer-independent entanglement-
|
| 198 |
+
energy correspondence appears. The converted energy is
|
| 199 |
+
proportional to the degree of the entanglement ξ [58] and
|
| 200 |
+
depends only on the excitation spectrum.
|
| 201 |
+
Before making the comparison with other systems, we
|
| 202 |
+
would like to bring two important issues into attention.
|
| 203 |
+
First, we note that W is calculated using a density ma-
|
| 204 |
+
trix which involves classical (thermodynamical) probabil-
|
| 205 |
+
ities —grand canonical ensemble. It is a result weighted
|
| 206 |
+
over classical probabilities. For this reason, we prefer to
|
| 207 |
+
use the words “all of the thermal energy” present inside
|
| 208 |
+
the cavity is converted into the KE of the board/piston.
|
| 209 |
+
The energy present inside the cavity after the rether-
|
| 210 |
+
malization is also probabilistic. Conservation of energy,
|
| 211 |
+
however, tells us the following. If the energy realized in-
|
| 212 |
+
side the cavity after the rethermalization assigns one of
|
| 213 |
+
the classically probable ones, the extracted work needs
|
| 214 |
+
to be equal to that value.
|
| 215 |
+
Second, we note that al-
|
| 216 |
+
most all of the notion (e.g., entanglement-work conver-
|
| 217 |
+
sion and entanglement-energy analogy [59]) and the cal-
|
| 218 |
+
culations carried out here are already discussed in other
|
| 219 |
+
studies [20, 21].
|
| 220 |
+
Here, in difference, we introduce the
|
| 221 |
+
notion of entanglement-work correspondence due to the
|
| 222 |
+
presence of nature-originated measurement.
|
| 223 |
+
Comparison with other work extraction phenomena.—
|
| 224 |
+
We first compare the (i) EIWE result with the one
|
| 225 |
+
for another (max) entangled state (ii) |e⟩ = (|1, 0⟩ +
|
| 226 |
+
|0, 1⟩)/
|
| 227 |
+
√
|
| 228 |
+
2 in thermal equilibrium ˆρ = P(|0, 0⟩⟨0, 0| +
|
| 229 |
+
e−ℏωa/kBT |e⟩⟨e|) [60]. When one measures the number
|
| 230 |
+
of photons and the outcome the b-mode is |1⟩, W =
|
| 231 |
+
xℏωa work is extracted in the cavity a-mode.
|
| 232 |
+
Here,
|
| 233 |
+
x = e−ℏωa/kBT is the classical probability for realizing
|
| 234 |
+
the two-mode system in the excited state |e⟩ and it is
|
| 235 |
+
equal to the occupation ¯n at low T , i.e., ¯n = x. This re-
|
| 236 |
+
sult is the same with the max entanglement (ξ = 1) case
|
| 237 |
+
of EIWE. In this example, too, all thermodynamical en-
|
| 238 |
+
ergy present in the a-mode is converted into directional
|
| 239 |
+
energy (work). In this case, however, the work extrac-
|
| 240 |
+
tion (the same amount) is subject to the measurement of
|
| 241 |
+
the b-mode in the excited state. In EIWE, in difference,
|
| 242 |
+
any measurement outcome extracts this amount of work.
|
| 243 |
+
We also examine the work associated to the (iii) sym-
|
| 244 |
+
metrization (max) entanglement [57] as a third exam-
|
| 245 |
+
ple.
|
| 246 |
+
In a recent study, we investigate the work ex-
|
| 247 |
+
tracted by identical particles in a system of N total
|
| 248 |
+
number of symmetrized bosons. The extracted work by
|
| 249 |
+
|
| 250 |
+
3
|
| 251 |
+
(N − 1) particles is calculated when one of the (ran-
|
| 252 |
+
dom) particles is measured in the excited state, of en-
|
| 253 |
+
ergy ωeg [61]. In parallel with the previous cases, (i) and
|
| 254 |
+
(ii), the extracted work, by pushing the board located
|
| 255 |
+
within the condensate region, comes out as W3 = xℏωeg
|
| 256 |
+
at low T . Here, x = e−ℏωeg/kBT is the probability for
|
| 257 |
+
one of the N particles to occupy the excited state ei-
|
| 258 |
+
ther before the measurement or after the rethermaliza-
|
| 259 |
+
tion of the condensate.
|
| 260 |
+
Similarly, (xℏωeg) is the en-
|
| 261 |
+
tire thermal energy of the condensate at equilibrium.
|
| 262 |
+
The lowermost excited state of such a condensate is
|
| 263 |
+
the Dicke state |N, 1⟩ [62], where a single-particle ex-
|
| 264 |
+
citation is symmetrically distributed among N bosons,
|
| 265 |
+
|N, 1⟩ = (|e, g, g, ...⟩+|g, e, g, ...⟩...+|g, ...g, e⟩)/
|
| 266 |
+
√
|
| 267 |
+
N. This
|
| 268 |
+
is a maximally entangled state with respect to any one of
|
| 269 |
+
the particles. ωeg is the level-spacing between the excited
|
| 270 |
+
|e⟩ and ground |g⟩ states of a single particle.
|
| 271 |
+
We observe that the amount of extracted work, one
|
| 272 |
+
more time, is equal to the complete thermal energy of the
|
| 273 |
+
condensate (system) at thermal equilibrium. This takes
|
| 274 |
+
place again for a max entangled state, |N, 1⟩. We can take
|
| 275 |
+
the excited state, e.g., as the motional states of a Bose-
|
| 276 |
+
Einstein condensate with ℏωeg = h2/2mL2 [63]. Then,
|
| 277 |
+
the thermal energy of the condensate can be converted
|
| 278 |
+
into the directional (kinetic) energy of a board placed in
|
| 279 |
+
the condensate region. Here, again, the presented value
|
| 280 |
+
of the extracted work is subject to the realization of the
|
| 281 |
+
measured-particle in the excited state. The investigation
|
| 282 |
+
of this symmetrization problem has further importance
|
| 283 |
+
as entanglement of symmetrized many-body states and
|
| 284 |
+
nonclassicality of photonic states are intimately related.
|
| 285 |
+
A Dicke (many-body) state becomes a Fock (photon)
|
| 286 |
+
state when N → ∞ [64–66]. Similarly, separable coher-
|
| 287 |
+
ent atomic states become the photonic coherent states in
|
| 288 |
+
the same limit.
|
| 289 |
+
Summary and Discussions
|
| 290 |
+
Summary.— We reinvestigate an already studied phe-
|
| 291 |
+
nomenon –work extraction from an entangled system via
|
| 292 |
+
measurement backaction [20, 21]– when nature itself per-
|
| 293 |
+
forms the measurements. This is when there is no intel-
|
| 294 |
+
lectual being (such as a human, daemon, or an ancilla) is
|
| 295 |
+
present for the measurement; but the monitoring is con-
|
| 296 |
+
ducted by the environment/nature itself. In this case,
|
| 297 |
+
measurement-basis becomes the coherent states [40–47].
|
| 298 |
+
This fixes the measurement strength to λ = 1. The state
|
| 299 |
+
of the a-mode, in which work-extraction is carried out, is
|
| 300 |
+
already independent from the outcome of the b-mode [28–
|
| 301 |
+
31] as long as Gaussian states and measurements are con-
|
| 302 |
+
cerned [28–31]. (The measurement performed by the en-
|
| 303 |
+
vironment is a Gaussian one as the measurement-basis
|
| 304 |
+
is coherent states.) Therefore, in total, the nature itself
|
| 305 |
+
assigns a particular amount of work/energy to a given
|
| 306 |
+
degree of entanglement.
|
| 307 |
+
Entanglement converts a disordered (randomly moving
|
| 308 |
+
particles, microscopic) form of energy into an ordered
|
| 309 |
+
form where the molecules of the board move along the
|
| 310 |
+
same direction, i.e., macroscopic motion. The letter is
|
| 311 |
+
referred as the mechanical energy, or we can tell that it
|
| 312 |
+
is the KE.
|
| 313 |
+
We find that at low T , the directional energy associated
|
| 314 |
+
with the entanglement is the “total thermal energy” times
|
| 315 |
+
the degree of the entanglement for a two-mode Gaussian
|
| 316 |
+
state: W = ξ(r)Uther. Here, ξ(r) = [1 − 2/(1 + cosh 2r)]
|
| 317 |
+
increases with the entanglement and gets closer to ξ =
|
| 318 |
+
1 around the max entanglement.
|
| 319 |
+
r is the squeezing
|
| 320 |
+
strength. That is, all thermal energy can be converted
|
| 321 |
+
into directional energy for a maximally entangled Gaus-
|
| 322 |
+
sian state. Similarly, the entire thermal energy can be
|
| 323 |
+
converted into directional energy also for (ii) max entan-
|
| 324 |
+
gled number state (|0, 1⟩ + |1, 0⟩)/
|
| 325 |
+
√
|
| 326 |
+
2 and for (iii) sym-
|
| 327 |
+
metrization entanglement of identical bosons [57]. How-
|
| 328 |
+
ever, the conversion in (ii) and (iii) is subject to the re-
|
| 329 |
+
alization of the measured mode/particle in the excited
|
| 330 |
+
state; while in (i) EIWE any measurement outcome ex-
|
| 331 |
+
tract that amount of work.
|
| 332 |
+
Squeezing and potential energy.— In this section, we
|
| 333 |
+
would like to introduce a correspondence also between
|
| 334 |
+
potential mechanical energy and single-mode nonclassi-
|
| 335 |
+
cality, SMNc, (e.g., squeezing). Entanglement and SMNc
|
| 336 |
+
are two different types of nonclassicalities (quantumness).
|
| 337 |
+
The two not only can be converted into each other via
|
| 338 |
+
passive optical elements, such as a beam splitter (BS),
|
| 339 |
+
but they also satisfy a conservation-like relations [67–
|
| 340 |
+
69]. When a cavity mode is squeezed, it cannot be con-
|
| 341 |
+
verted into work directly.
|
| 342 |
+
This is because, squeezing
|
| 343 |
+
keeps the entropy unchanged.
|
| 344 |
+
However, the situation
|
| 345 |
+
changes when the squeezed cavity field leaks out through
|
| 346 |
+
the mirror(s). The interaction between the cavity and the
|
| 347 |
+
output modes �
|
| 348 |
+
k(gkˆb†
|
| 349 |
+
kˆa + H.c.) is in the form of a BS
|
| 350 |
+
interaction. Thus, the cavity and the output modes get
|
| 351 |
+
entangled [70]. Environmental monitoring on the output
|
| 352 |
+
modes ˆbk [71] makes the cavity extract work. We can also
|
| 353 |
+
view the process as the potential mechanical energy (as-
|
| 354 |
+
sociated with squeezing) transforms into the kinetic me-
|
| 355 |
+
chanical energy (associated with entanglement).
|
| 356 |
+
Connection with a recent study.— As a final but impor-
|
| 357 |
+
tant point, we indicate that the present research actually
|
| 358 |
+
investigates the results of a recent study [72]. Rigorous
|
| 359 |
+
calculations, employing the standard methods, clearly
|
| 360 |
+
show an intriguing phenomenon in an optical cavity. On-
|
| 361 |
+
set of entanglement exhibits itself in the response func-
|
| 362 |
+
tions of the optical cavity. At this point, nonanalytic-
|
| 363 |
+
ity of the response function moves into the upper-half of
|
| 364 |
+
the complex frequency plane (UH-CFP). One needs to
|
| 365 |
+
avoid this incident from implying the violation of causal-
|
| 366 |
+
ity.
|
| 367 |
+
Fortunately, surveys [73–75] show that a nonana-
|
| 368 |
+
lyticity in the UH-CFP does not imply the violation of
|
| 369 |
+
causality if there exists a small curvature in the back-
|
| 370 |
+
ground. In the present study, the total curvature of the
|
| 371 |
+
cavity (a-mode) increases as the disordered thermal en-
|
| 372 |
+
ergy is converted into ordered directional kinetic energy
|
| 373 |
+
of the board. That is, it indeed increases with the amount
|
| 374 |
+
of entanglement.
|
| 375 |
+
|
| 376 |
+
4
|
| 377 |
+
Acknowledgements
|
| 378 |
+
We gratefully thank Vural Gökmen for the motiva-
|
| 379 |
+
tional support, Bayram Tekin for the scientific support,
|
| 380 |
+
Wojciech H. Zurek for letting us know his influential
|
| 381 |
+
work [40] and Alessio Serafini for his support on the
|
| 382 |
+
continuous-variable quantum information. We acknowl-
|
| 383 |
+
edge the fund TUBITAK-1001 Grant No. 121F141.
|
| 384 |
+
[1] A. Acín, I. Bloch, H. Buhrman, T. Calarco, C. Eichler,
|
| 385 |
+
J. Eisert, D. Esteve, N. Gisin, S. J. Glaser, F. Jelezko,
|
| 386 |
+
et al., The quantum technologies roadmap: a european
|
| 387 |
+
community view, New Journal of Physics 20, 080201
|
| 388 |
+
(2018).
|
| 389 |
+
[2] J. Aasi, J. Abadie, B. Abbott, R. Abbott, T. Abbott,
|
| 390 |
+
M. Abernathy, C. Adams, T. Adams, P. Addesso, R. Ad-
|
| 391 |
+
hikari, et al., Enhanced sensitivity of the ligo gravita-
|
| 392 |
+
tional wave detector by using squeezed states of light,
|
| 393 |
+
Nature Photonics 7, 613 (2013).
|
| 394 |
+
[3] L. Pezze, A. Smerzi, M. K. Oberthaler, R. Schmied,
|
| 395 |
+
and P. Treutlein, Quantum metrology with nonclassical
|
| 396 |
+
states of atomic ensembles, Reviews of Modern Physics
|
| 397 |
+
90, 035005 (2018).
|
| 398 |
+
[4] L.
|
| 399 |
+
A.
|
| 400 |
+
Lugiato,
|
| 401 |
+
A.
|
| 402 |
+
Gatti,
|
| 403 |
+
and
|
| 404 |
+
E.
|
| 405 |
+
Brambilla,
|
| 406 |
+
Quantum
|
| 407 |
+
imaging,
|
| 408 |
+
Journal of Optics B: Quantum and Semiclassical Optics 4, S176 (2002).
|
| 409 |
+
[5] C. A. Casacio, L. S. Madsen, A. Terrasson, M. Waleed,
|
| 410 |
+
K. Barnscheidt, B. Hage, M. A. Taylor, and W. P. Bowen,
|
| 411 |
+
Quantum-enhanced nonlinear microscopy, Nature 594,
|
| 412 |
+
201 (2021).
|
| 413 |
+
[6] S. Pirandola, B. R. Bardhan, T. Gehring, C. Weedbrook,
|
| 414 |
+
and S. Lloyd, Advances in photonic quantum sensing,
|
| 415 |
+
Nature Photonics 12, 724 (2018).
|
| 416 |
+
[7] L. Maccone and C. Ren, Quantum radar, Physical Re-
|
| 417 |
+
view Letters 124, 200503 (2020).
|
| 418 |
+
[8] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa,
|
| 419 |
+
A. Peres, and W. K. Wootters, Teleporting an unknown
|
| 420 |
+
quantum state via dual classical and einstein-podolsky-
|
| 421 |
+
rosen channels, Physical Review Letters 70, 1895 (1993).
|
| 422 |
+
[9] K. Wright, K. M. Beck, S. Debnath, J. Amini, Y. Nam,
|
| 423 |
+
N. Grzesiak, J.-S. Chen, N. Pisenti, M. Chmielewski,
|
| 424 |
+
C. Collins, et al., Benchmarking an 11-qubit quantum
|
| 425 |
+
computer, Nature Communications 10, 1 (2019).
|
| 426 |
+
[10] V. Dodonov, Nonclassical’states
|
| 427 |
+
in quantum optics:
|
| 428 |
+
asqueezed’review of the first 75 years, Journal of Optics
|
| 429 |
+
B: Quantum and Semiclassical Optics 4, R1 (2002).
|
| 430 |
+
[11] L. Bresque, P. A. Camati, S. Rogers, K. Murch, A. N.
|
| 431 |
+
Jordan, and A. Auffèves, Two-qubit engine fueled by
|
| 432 |
+
entanglement and local measurements, Physical Review
|
| 433 |
+
Letters 126, 120605 (2021).
|
| 434 |
+
[12] M. Josefsson and M. Leijnse, Double quantum-dot engine
|
| 435 |
+
fueled by entanglement between electron spins, Physical
|
| 436 |
+
Review B 101, 081408 (2020).
|
| 437 |
+
[13] A. Hewgill, A. Ferraro, and G. De Chiara, Quantum cor-
|
| 438 |
+
relations and thermodynamic performances of two-qubit
|
| 439 |
+
engines with local and common baths, Physical Review
|
| 440 |
+
A 98, 042102 (2018).
|
| 441 |
+
[14] T. Zhang, W.-T. Liu, P.-X. Chen, and C.-Z. Li, Four-
|
| 442 |
+
level entangled quantum heat engines, Physical Review
|
| 443 |
+
A 75, 062102 (2007).
|
| 444 |
+
[15] J. Roßnagel, O. Abah, F. Schmidt-Kaler, K. Singer, and
|
| 445 |
+
E. Lutz, Nanoscale heat engine beyond the carnot limit,
|
| 446 |
+
Physical review letters 112, 030602 (2014).
|
| 447 |
+
[16] R. Dillenschneider and E. Lutz, Energetics of quan-
|
| 448 |
+
tum correlations, EPL (Europhysics Letters) 88, 50003
|
| 449 |
+
(2009).
|
| 450 |
+
[17] M. O. Scully, M. S. Zubairy,
|
| 451 |
+
G. S. Agarwal, and
|
| 452 |
+
H. Walther, Extracting work from a single heat bath via
|
| 453 |
+
vanishing quantum coherence, Science 299, 862 (2003).
|
| 454 |
+
[18] T. D. Kieu, The second law, maxwell’s demon, and work
|
| 455 |
+
derivable from quantum heat engines, Physical review
|
| 456 |
+
letters 93, 140403 (2004).
|
| 457 |
+
[19] G. Francica, J. Goold, F. Plastina, and M. Paternos-
|
| 458 |
+
tro, Daemonic ergotropy: enhanced work extraction from
|
| 459 |
+
quantum correlations, npj Quantum Information 3, 1
|
| 460 |
+
(2017).
|
| 461 |
+
[20] M. Brunelli, M. G. Genoni, M. Barbieri, and M. Pater-
|
| 462 |
+
nostro, Detecting gaussian entanglement via extractable
|
| 463 |
+
work, Physical Review A 96, 062311 (2017).
|
| 464 |
+
[21] M. Cuzminschi, A. Zubarev, and A. Isar, Extractable
|
| 465 |
+
quantum work from a two-mode gaussian state in a noisy
|
| 466 |
+
channel, Scientific Reports 11, 1 (2021).
|
| 467 |
+
[22] Work extraction via a measurement can be performed
|
| 468 |
+
also from the internal energy of the measurement appa-
|
| 469 |
+
ratus [77, 78]. However, here we are interested in the con-
|
| 470 |
+
version of the microscopic energy (heat) present in a sin-
|
| 471 |
+
gle heat bath into directional mechanical energy [20, 21].
|
| 472 |
+
[23] The entropy after the rethermalization is equal to the one
|
| 473 |
+
before the measurement. More accurately, S(ther)
|
| 474 |
+
V
|
| 475 |
+
is also
|
| 476 |
+
the half of the entropy belonging to the two-mode state
|
| 477 |
+
before the measurement.
|
| 478 |
+
[24] J.
|
| 479 |
+
Oppenheim,
|
| 480 |
+
M.
|
| 481 |
+
Horodecki,
|
| 482 |
+
P.
|
| 483 |
+
Horodecki,
|
| 484 |
+
and
|
| 485 |
+
R. Horodecki, Thermodynamical approach to quantify-
|
| 486 |
+
ing quantum correlations, Physical Review Letters 89,
|
| 487 |
+
180402 (2002).
|
| 488 |
+
[25] K. Maruyama, F. Morikoshi, and V. Vedral, Thermody-
|
| 489 |
+
namical detection of entanglement by maxwell’s demons,
|
| 490 |
+
Physical Review A 71, 012108 (2005).
|
| 491 |
+
[26] M. A. Ciampini, L. Mancino, A. Orieux, C. Vigliar,
|
| 492 |
+
P. Mataloni, M. Paternostro, and M. Barbieri, Experi-
|
| 493 |
+
mental extractable work-based multipartite separability
|
| 494 |
+
criteria, npj Quantum Information 3, 1 (2017).
|
| 495 |
+
[27] K. Maruyama, F. Nori, and V. Vedral, Colloquium: The
|
| 496 |
+
physics of maxwell’s demon and information, Reviews of
|
| 497 |
+
Modern Physics 81, 1 (2009).
|
| 498 |
+
[28] J. Fiurášek, Gaussian transformations and distillation of
|
| 499 |
+
entangled gaussian states, Physical Review Letters 89,
|
| 500 |
+
137904 (2002).
|
| 501 |
+
[29] G. Giedke and J. I. Cirac, Characterization of gaussian
|
| 502 |
+
operations and distillation of gaussian states, Physical
|
| 503 |
+
Review A 66, 032316 (2002).
|
| 504 |
+
[30] J. Fiurášek and L. Mišta Jr, Gaussian localizable entan-
|
| 505 |
+
glement, Physical Review A 75, 060302 (2007).
|
| 506 |
+
[31] P. Giorda and M. G. Paris, Gaussian quantum discord,
|
| 507 |
+
Physical Review Letters 105, 020503 (2010).
|
| 508 |
+
[32] It also depends on the rotation angle φ belonging to the
|
| 509 |
+
Gaussian operation. But this will not be our concern as
|
| 510 |
+
will become apparent in the following text.
|
| 511 |
+
|
| 512 |
+
5
|
| 513 |
+
[33] J. Eisert, S. Scheel, and M. B. Plenio, Distilling gaussian
|
| 514 |
+
states with gaussian operations is impossible, Physical
|
| 515 |
+
Review Letters 89, 137903 (2002).
|
| 516 |
+
[34] W. H. Zurek, Decoherence, einselection, and the quan-
|
| 517 |
+
tum origins of the classical, Reviews of Modern physics
|
| 518 |
+
75, 715 (2003).
|
| 519 |
+
[35] M. Schlosshauer, Quantum decoherence, Physics Reports
|
| 520 |
+
831, 1 (2019).
|
| 521 |
+
[36] W. H. Zurek, Environment-induced superselection rules,
|
| 522 |
+
Physical Review D 26, 1862 (1982).
|
| 523 |
+
[37] W. Unruh and W. H. Zurek, Reduction of a wave packet
|
| 524 |
+
in quantum brownian motion, Physical Review D 40,
|
| 525 |
+
1071 (1989).
|
| 526 |
+
[38] W. H. Zurek, Pointer basis of quantum apparatus: Into
|
| 527 |
+
what mixture does the wave packet collapse?, Physical
|
| 528 |
+
Review D 24, 1516 (1981).
|
| 529 |
+
[39] W. H. Zurek, Quantum darwinism, Nature physics 5, 181
|
| 530 |
+
(2009).
|
| 531 |
+
[40] W. H. Zurek, S. Habib, and J. P. Paz, Coherent states via
|
| 532 |
+
decoherence, Physical Review Letters 70, 1187 (1993).
|
| 533 |
+
[41] M. R. Gallis, Emergence of classicality via decoherence
|
| 534 |
+
described by lindblad operators, Physical Review A 53,
|
| 535 |
+
655 (1996).
|
| 536 |
+
[42] M. Tegmark and H. S. Shapiro, Decoherence produces
|
| 537 |
+
coherent states: An explicit proof for harmonic chains,
|
| 538 |
+
Physical Review E 50, 2538 (1994).
|
| 539 |
+
[43] H. Wiseman and J. Vaccaro, Maximally robust unrav-
|
| 540 |
+
elings of quantum master equations, Physics Letters A
|
| 541 |
+
250, 241 (1998).
|
| 542 |
+
[44] W. H. Zurek and J. P. Paz, Decoherence, chaos, and the
|
| 543 |
+
second law, Physical Review Letters 72, 2508 (1994).
|
| 544 |
+
[45] W. Zurek and J. Paz, Decoherence, chaos, the quantum
|
| 545 |
+
and the classical, Il Nuovo Cimento B (1971-1996) 110,
|
| 546 |
+
611 (1995).
|
| 547 |
+
[46] G.-S. Paraoanu, Selection of squeezed states via decoher-
|
| 548 |
+
ence, EPL (Europhysics Letters) 47, 279 (1999).
|
| 549 |
+
[47] W. H. Zurek, Preferred states, predictability, classicality
|
| 550 |
+
and the environment-induced decoherence, Progress of
|
| 551 |
+
Theoretical Physics 89, 281 (1993).
|
| 552 |
+
[48] J.-W.
|
| 553 |
+
Pan,
|
| 554 |
+
D.
|
| 555 |
+
Bouwmeester,
|
| 556 |
+
H.
|
| 557 |
+
Weinfurter,
|
| 558 |
+
and
|
| 559 |
+
A. Zeilinger, Experimental entanglement swapping: en-
|
| 560 |
+
tangling photons that never interacted, Physical Review
|
| 561 |
+
Letters 80, 3891 (1998).
|
| 562 |
+
[49] Coupling of a cavity field/mode to the input/output (vac-
|
| 563 |
+
uum) modes already employs exactly the same mecha-
|
| 564 |
+
nism [79].
|
| 565 |
+
[50] Or for a Swinger pair creation (mass-energy conversion)
|
| 566 |
+
process taking place over a critical electric field.
|
| 567 |
+
[51] We can tell that the result is T -independent except a
|
| 568 |
+
factor ¯n = 1/(eℏωa/kBT − 1) → e−ℏωa/kBT which stands
|
| 569 |
+
for the probability of finding one of the two modes in the
|
| 570 |
+
excited state. (¯nℏωa) is already the energy present in the
|
| 571 |
+
a-mode.
|
| 572 |
+
[52] See Supplemental Material.
|
| 573 |
+
[53] M. O. Scully and M. S. Zubairy, Quantum optics, Cam-
|
| 574 |
+
bridge Univ. Press (1997).
|
| 575 |
+
[54] Here, we prefer to use the words “all of the thermal en-
|
| 576 |
+
ergy” at equilibrium, because this is the grand canonical
|
| 577 |
+
mean energy which is (classical) probabilistic. The en-
|
| 578 |
+
ergy present inside the cavity after the rethermalization
|
| 579 |
+
is also probabilistic. Conservation of energy tells us the
|
| 580 |
+
following. If the energy realized inside the cavity after
|
| 581 |
+
the rethermalization assigns one of the classical probable
|
| 582 |
+
ones, the extracted work needs to be equal to that value.
|
| 583 |
+
[55] Please note that energy of a maximum entangled two-
|
| 584 |
+
mode Gaussian state approaches to infinite. Here, we
|
| 585 |
+
confine ourselves to a regime where squeezing rate r ≪
|
| 586 |
+
ℏωa/kBT . The latter is typically ∼ 100 for optical modes
|
| 587 |
+
at room temperature. See the discussion above Eq. (S11)
|
| 588 |
+
in the SM [52].
|
| 589 |
+
[56] Please note that this statement is valid at any tempera-
|
| 590 |
+
ture.
|
| 591 |
+
[57] M. E. Tasgin, Energy of the symmterization entangle-
|
| 592 |
+
ment, will be available in Researchgate (2023).
|
| 593 |
+
[58] It should be noted that one can quantify entanglement
|
| 594 |
+
in various alternative ways such as entropy of the re-
|
| 595 |
+
duced state [80], symplectic spectrum [81] or via nonclas-
|
| 596 |
+
sical depth [82] when single-mode nonclassicality is wiped
|
| 597 |
+
out [83]. They, all, display parallel behavior to the mea-
|
| 598 |
+
sure logarithmic negativity EN for Gaussian states [84].
|
| 599 |
+
[59] R. Horodecki, M. Horodecki, and P. Horodecki, Balance
|
| 600 |
+
of information in bipartite quantum-communication sys-
|
| 601 |
+
tems: Entanglement-energy analogy, Physical Review A
|
| 602 |
+
63, 022310 (2001).
|
| 603 |
+
[60] We ignore other excited states, such as |0, 1⟩ and |1, 0⟩,
|
| 604 |
+
which actually have the same energy. We do this for the
|
| 605 |
+
sake of a reasonable comparison only.
|
| 606 |
+
[61] One should note that measuring the quantum state of
|
| 607 |
+
a single particle in a condensate of N identical particles
|
| 608 |
+
is not a straightforward process. It necessitates certain
|
| 609 |
+
rules/conditions which is studied experimentally [85–87]
|
| 610 |
+
and theoretically [66, 88]. Please see Ref. [57] for a de-
|
| 611 |
+
tailed analysis.
|
| 612 |
+
[62] L. Mandel and E. Wolf, Optical coherence and Quantum
|
| 613 |
+
optics (Cambridge University Press, 1995).
|
| 614 |
+
[63] M. Moore, O. Zobay, and P. Meystre, Quantum optics of
|
| 615 |
+
a bose-einstein condensate coupled to a quantized light
|
| 616 |
+
field, Physical Review A 60, 1491 (1999).
|
| 617 |
+
[64] J. Radcliffe, Some properties of coherent spin states,
|
| 618 |
+
Journal of Physics A: General Physics 4, 313 (1971).
|
| 619 |
+
[65] J. R. Klauder and B.-S. Skagerstam, Coherent states: ap-
|
| 620 |
+
plications in physics and mathematical physics (World
|
| 621 |
+
scientific, 1985).
|
| 622 |
+
[66] M. E. Tasgin, Many-particle entanglement criterion for
|
| 623 |
+
superradiantlike states, Physical Review Letters 119,
|
| 624 |
+
033601 (2017).
|
| 625 |
+
[67] W. Ge, M. E. Tasgin, and M. S. Zubairy, Conservation
|
| 626 |
+
relation of nonclassicality and entanglement for gaussian
|
| 627 |
+
states in a beam splitter, Physical Review A 92, 052328
|
| 628 |
+
(2015).
|
| 629 |
+
[68] I. I. Arkhipov, J. Peřina Jr, J. Svozilík, and A. Miranow-
|
| 630 |
+
icz, Nonclassicality invariant of general two-mode gaus-
|
| 631 |
+
sian states, Scientific reports 6, 1 (2016).
|
| 632 |
+
[69] I. I. Arkhipov, J. Peřina Jr, J. Peřina, and A. Miranow-
|
| 633 |
+
icz, Interplay of nonclassicality and entanglement of two-
|
| 634 |
+
mode gaussian fields generated in optical parametric pro-
|
| 635 |
+
cesses, Physical Review A 94, 013807 (2016).
|
| 636 |
+
[70] We note that such a study should employ the entangle-
|
| 637 |
+
ment quantifications for wave-packets [89] which calcu-
|
| 638 |
+
lates entanglement of the cavity mode with all of the
|
| 639 |
+
vacuum modes. This can be performed using the input-
|
| 640 |
+
output formalism developed for the wave-packets [90].
|
| 641 |
+
[71] One may keep the quality of the optical cavity very high,
|
| 642 |
+
e.g., 105 Hz [91], so that environment monitors the out-
|
| 643 |
+
put modes in a much shorter decoherence time over the
|
| 644 |
+
mass of particles present around.
|
| 645 |
+
|
| 646 |
+
6
|
| 647 |
+
[72] M.E.
|
| 648 |
+
Tasgin,
|
| 649 |
+
Entanglement
|
| 650 |
+
and
|
| 651 |
+
Viola-
|
| 652 |
+
tion
|
| 653 |
+
of
|
| 654 |
+
Kramers-Kronic
|
| 655 |
+
relations,
|
| 656 |
+
(2022),
|
| 657 |
+
https://www.researchgate.net/publication/361662995_Entanglement_and_violation_of_Kramers-Kronig_relations.
|
| 658 |
+
[73] T. J. Hollowood and G. M. Shore, The refractive index
|
| 659 |
+
of curved spacetime: the fate of causality in qed, Nuclear
|
| 660 |
+
Physics B 795, 138 (2008).
|
| 661 |
+
[74] T. J. Hollowood and G. M. Shore, Causality and micro-
|
| 662 |
+
causality in curved spacetime, Physics Letters B 655, 67
|
| 663 |
+
(2007).
|
| 664 |
+
[75] T. J. Hollowood and G. M. Shore, The causal structure
|
| 665 |
+
of qed in curved spacetime: analyticity and the refractive
|
| 666 |
+
index, Journal of High Energy Physics 2008, 091 (2008).
|
| 667 |
+
[76] A. Serafini, F. Illuminati, and S. De Siena, Symplectic
|
| 668 |
+
invariants, entropic measures and correlations of gaus-
|
| 669 |
+
sian states, Journal of Physics B: Atomic, Molecular and
|
| 670 |
+
Optical Physics 37, L21 (2003).
|
| 671 |
+
[77] C. Elouard and A. N. Jordan, Efficient quantum mea-
|
| 672 |
+
surement engines, Physical Review Letters 120, 260601
|
| 673 |
+
(2018).
|
| 674 |
+
[78] C. Elouard, D. Herrera-Martí, B. Huard, and A. Auf-
|
| 675 |
+
feves, Extracting work from quantum measurement in
|
| 676 |
+
maxwell’s demon engines, Physical Review Letters 118,
|
| 677 |
+
260603 (2017).
|
| 678 |
+
[79] C. Gardiner, P. Zoller, and P. Zoller, Quantum noise:
|
| 679 |
+
a handbook of Markovian and non-Markovian quantum
|
| 680 |
+
stochastic methods with applications to quantum optics
|
| 681 |
+
(Springer Science & Business Media, 2004).
|
| 682 |
+
[80] Entropy
|
| 683 |
+
of
|
| 684 |
+
Entanglement,
|
| 685 |
+
https://en.wikipedia.org/wiki/Entropy_of_entanglement.
|
| 686 |
+
[81] G. Adesso, A. Serafini, and F. Illuminati, Extremal en-
|
| 687 |
+
tanglement and mixedness in continuous variable sys-
|
| 688 |
+
tems, Physical Review A 70, 022318 (2004).
|
| 689 |
+
[82] C. T. Lee, Measure of the nonclassicality of nonclassical
|
| 690 |
+
states, Physical Review A 44, R2775 (1991).
|
| 691 |
+
[83] M. E. Tasgin and M. S. Zubairy, Quantifications for mul-
|
| 692 |
+
timode entanglement, Physical Review A 101, 012324
|
| 693 |
+
(2020).
|
| 694 |
+
[84] M.
|
| 695 |
+
B.
|
| 696 |
+
Plenio,
|
| 697 |
+
Logarithmic
|
| 698 |
+
negativity:
|
| 699 |
+
A
|
| 700 |
+
full
|
| 701 |
+
entanglement
|
| 702 |
+
monotone
|
| 703 |
+
that
|
| 704 |
+
is
|
| 705 |
+
not
|
| 706 |
+
convex,
|
| 707 |
+
Phys. Rev. Lett. 95, 090503 (2005).
|
| 708 |
+
[85] D. Stamper-Kurn, A. Chikkatur, A. Görlitz, S. Inouye,
|
| 709 |
+
S. Gupta, D. Pritchard, and W. Ketterle, Excitation of
|
| 710 |
+
phonons in a bose-einstein condensate by light scattering,
|
| 711 |
+
Physical Review Letters 83, 2876 (1999).
|
| 712 |
+
[86] J. Stenger, S. Inouye, A. P. Chikkatur, D. Stamper-Kurn,
|
| 713 |
+
D. Pritchard, and W. Ketterle, Bragg spectroscopy of
|
| 714 |
+
a bose-einstein condensate, Physical Review Letters 82,
|
| 715 |
+
4569 (1999).
|
| 716 |
+
[87] M. Andersen, C. Ryu, P. Cladé, V. Natarajan, A. Vaziri,
|
| 717 |
+
K. Helmerson, and W. D. Phillips, Quantized rotation
|
| 718 |
+
of atoms from photons with orbital angular momentum,
|
| 719 |
+
Physical review letters 97, 170406 (2006).
|
| 720 |
+
[88] M. E. Taşgın, Ö. Müstecaplıoglu, and L. You, Creation
|
| 721 |
+
of a vortex in a bose-einstein condensate by superradiant
|
| 722 |
+
scattering, Physical Review A 84, 063628 (2011).
|
| 723 |
+
[89] M. E. Tasgin, M. Gunay, and M. S. Zubairy, Nonclassical-
|
| 724 |
+
ity and entanglement for wave packets, Physical Review
|
| 725 |
+
A 101, 062316 (2020).
|
| 726 |
+
[90] S. Ullah, M. Gunay, R. V. Ovali, and M. E. Tasgin, Input
|
| 727 |
+
output formalism for wave packets, in preperation, will
|
| 728 |
+
be available on Researgate (2023).
|
| 729 |
+
[91] J. Thompson, B. Zwickl, A. Jayich, F. Marquardt,
|
| 730 |
+
S. Girvin, and J. Harris, Strong dispersive coupling of a
|
| 731 |
+
high-finesse cavity to a micromechanical membrane, Na-
|
| 732 |
+
ture 452, 72 (2008).
|
| 733 |
+
|
| 734 |
+
7
|
| 735 |
+
I.
|
| 736 |
+
SUPPLEMENTARY MATERIAL
|
| 737 |
+
FOR
|
| 738 |
+
ENVIRONMENTAL-INDUCED WORK
|
| 739 |
+
EXTRACTION (EIWE)
|
| 740 |
+
In this supplementary material (SM), we first ob-
|
| 741 |
+
tain the environmentally extracted in a two-mode (TM)
|
| 742 |
+
squeezed thermal (Gaussian) state in Sec. 1. We show
|
| 743 |
+
that it is in the form W
|
| 744 |
+
= ξ(r) × (¯nℏω) at low-
|
| 745 |
+
temperatures (T ) —e.g., room temperature for optical
|
| 746 |
+
modes.
|
| 747 |
+
Here, ξ(r), given in Eq. (??), quantifies the
|
| 748 |
+
strength of the entanglement. We use von Neumann en-
|
| 749 |
+
tropy (SV ) in our calculations, in difference to Ref. [20].
|
| 750 |
+
Second, in Sec. 2, we show that the same form for the
|
| 751 |
+
work extraction, i.e., W = ξ(r) × (¯nℏω), appears also for
|
| 752 |
+
other TM Gaussian states.
|
| 753 |
+
1. EIWE for two-mode squeezed thermal state
|
| 754 |
+
Initially, before the measurement, both modes, a and b,
|
| 755 |
+
are in thermal equilibrium with an environment at tem-
|
| 756 |
+
perature T . When one carries out a Gaussian measure-
|
| 757 |
+
ment on the b-mode, the enropy of the b-mode reduces
|
| 758 |
+
below the one for the thermal equilibrium. When the a-
|
| 759 |
+
mode re-thermalizes with the environment it performs a
|
| 760 |
+
work in the amount of [27]
|
| 761 |
+
W = kBT (S(ther)
|
| 762 |
+
V
|
| 763 |
+
− S(meas)
|
| 764 |
+
V
|
| 765 |
+
).
|
| 766 |
+
(1)
|
| 767 |
+
Here, S(meas)
|
| 768 |
+
V
|
| 769 |
+
is the reduced entropy of the a-mode after
|
| 770 |
+
the measurement in the b-mode is carried out. S(ther)
|
| 771 |
+
V
|
| 772 |
+
is
|
| 773 |
+
the entropy of the a-mode after the rethermalization of
|
| 774 |
+
the mode.
|
| 775 |
+
Entropy of a Gaussian state can be determined by its
|
| 776 |
+
covariance matrix, which includes the noise elements of
|
| 777 |
+
the modes. Covariance matrix of a biparitite Gaussian
|
| 778 |
+
state can be cast in the form [? ]
|
| 779 |
+
σab =
|
| 780 |
+
�σa cab
|
| 781 |
+
cT
|
| 782 |
+
ab σb
|
| 783 |
+
�
|
| 784 |
+
(2)
|
| 785 |
+
via local symplectic transformation Sp(2, R) ⊕ Sp(2, R)-
|
| 786 |
+
i.e., transformations altering neither of the entropy or
|
| 787 |
+
entanglement. Here, σa = diag(a, a) and σb = diag(b, b)
|
| 788 |
+
are the reduced covariance matrices of the a and b
|
| 789 |
+
modes, respectively. cab = diag(c1, c2) refers to corre-
|
| 790 |
+
lations/entanglement between the two mode. For a sym-
|
| 791 |
+
metrically squeezed two-mode thermal state, i.e., both
|
| 792 |
+
modes used to be in thermal equilibrium with the same
|
| 793 |
+
T in the squeezing process, b = a and c2 = −c1 = −c.
|
| 794 |
+
The state into which the a-mode collapses is indepen-
|
| 795 |
+
dent from the outcome of the b-mode measurement as
|
| 796 |
+
long as a Gaussian measurement is carried out [28–31].
|
| 797 |
+
The covariance matrix of the a-mode after the measure-
|
| 798 |
+
ment becomes
|
| 799 |
+
σπb
|
| 800 |
+
a = σa − cab (σb + γπb)−1 cT
|
| 801 |
+
ab.
|
| 802 |
+
(3)
|
| 803 |
+
Here, γπb = R(φ) diag(λ/2, λ−1/2) R(φ)T refers to the
|
| 804 |
+
covariance matrix associated with a Gaussian operation
|
| 805 |
+
(measurment) [28–31]. λ is the measurement strength.
|
| 806 |
+
For a Gaussian measurement having the coherent states
|
| 807 |
+
as a basis, λ = 1 and γπb = diag(1/2, 1/2) independent
|
| 808 |
+
of the rotations R(φ) in the a-mode, i.e., ˆa → ˆaeiφ.
|
| 809 |
+
The entropy of a Gaussian state is determined solely
|
| 810 |
+
by purity, µ =
|
| 811 |
+
1
|
| 812 |
+
2n√
|
| 813 |
+
Detσ, which takes the form
|
| 814 |
+
SV = 1 − µ
|
| 815 |
+
2µ
|
| 816 |
+
ln
|
| 817 |
+
�1 + µ
|
| 818 |
+
1 − µ
|
| 819 |
+
�
|
| 820 |
+
− ln
|
| 821 |
+
� 2µ
|
| 822 |
+
1 + µ
|
| 823 |
+
�
|
| 824 |
+
(4)
|
| 825 |
+
for a single-mode state [? ].
|
| 826 |
+
The purity of the a-mode, after the b-mode measure-
|
| 827 |
+
ment, can be obtained as
|
| 828 |
+
µ1 ≡ µ(meas) =
|
| 829 |
+
a + 1/2
|
| 830 |
+
2(a2 − c2 + a/2).
|
| 831 |
+
(5)
|
| 832 |
+
For a TM squeezed thermal state,
|
| 833 |
+
a = (¯n + 1
|
| 834 |
+
2) cosh(2r),
|
| 835 |
+
(6)
|
| 836 |
+
c = (¯n + 1
|
| 837 |
+
2) sinh(2r),
|
| 838 |
+
(7)
|
| 839 |
+
the purity becomes
|
| 840 |
+
µ1 =
|
| 841 |
+
a + 1/2
|
| 842 |
+
2(¯n + 1/2)2 + a,
|
| 843 |
+
(8)
|
| 844 |
+
where ¯n = (eℏωa/kBT − 1)−1 is the occupation of the a-
|
| 845 |
+
mode, which becomes ¯n → e−ℏωa/kBT at low T— e.g.,
|
| 846 |
+
the room temperature for optical modes of resonance ωa.
|
| 847 |
+
r is the two-mode squeezing strength with which entan-
|
| 848 |
+
glement increases [53].
|
| 849 |
+
¯n is extremely small at low T regime. So, it is
|
| 850 |
+
µ1 ∼= 1 −
|
| 851 |
+
2¯n
|
| 852 |
+
a + 1/2.
|
| 853 |
+
(9)
|
| 854 |
+
Then, the entropy can be approximately written as,
|
| 855 |
+
S(meas)
|
| 856 |
+
V
|
| 857 |
+
∼=
|
| 858 |
+
¯n
|
| 859 |
+
a + 1/2[ln(2) − ln(2¯n) + ln(a + 1
|
| 860 |
+
2)]
|
| 861 |
+
(10)
|
| 862 |
+
−
|
| 863 |
+
2¯n
|
| 864 |
+
a + 1/2,
|
| 865 |
+
where a = (¯n + 1/2) cosh(2r). The last term originates
|
| 866 |
+
from the ln
|
| 867 |
+
�
|
| 868 |
+
2µ
|
| 869 |
+
1+µ
|
| 870 |
+
�
|
| 871 |
+
term given in Eq. (S4).
|
| 872 |
+
In the square brackets, in Eq. (S10), ln(¯n) = ℏωa
|
| 873 |
+
kBT ≫ 1
|
| 874 |
+
and ln(a + 1/2) ∼= ln(cosh(2r)). Assuming that the squ-
|
| 875 |
+
uezing rate is much smaller than
|
| 876 |
+
ℏωa
|
| 877 |
+
kBT , which is about
|
| 878 |
+
∼100 at the room temperatures, i.e., r ≪
|
| 879 |
+
ℏωa
|
| 880 |
+
kBT , the en-
|
| 881 |
+
tropy takes the form
|
| 882 |
+
S(meas)
|
| 883 |
+
V
|
| 884 |
+
∼=
|
| 885 |
+
2¯n
|
| 886 |
+
1 + cosh(2r)
|
| 887 |
+
ℏωa
|
| 888 |
+
kBT ,
|
| 889 |
+
(11)
|
| 890 |
+
where the last term in Eq. (S10) is also neglected.
|
| 891 |
+
|
| 892 |
+
8
|
| 893 |
+
Some time after the measurement, a-mode rethermal-
|
| 894 |
+
izes with the enviroment and at equilibrium its purity
|
| 895 |
+
becomes
|
| 896 |
+
µ2 ≡ µ(ther) =
|
| 897 |
+
1
|
| 898 |
+
1 + 2¯n.
|
| 899 |
+
(12)
|
| 900 |
+
The entropy at equilibrium can similarly calculated as
|
| 901 |
+
S(ther)
|
| 902 |
+
V
|
| 903 |
+
∼= ¯n ℏωa
|
| 904 |
+
kBT .
|
| 905 |
+
(13)
|
| 906 |
+
Therefore, the extracted work becomes
|
| 907 |
+
W =
|
| 908 |
+
�
|
| 909 |
+
1 −
|
| 910 |
+
2
|
| 911 |
+
1 + cosh(2r)
|
| 912 |
+
�
|
| 913 |
+
¯nℏωa,
|
| 914 |
+
(14)
|
| 915 |
+
where the kBT term in Eq. (S1) is canceled by 1/kBT
|
| 916 |
+
appearing in (S11) and (S13).
|
| 917 |
+
2. EIWE for other Gaussian states
|
| 918 |
+
We derived the simple form for the extracted work
|
| 919 |
+
W = ξ(r)(¯nℏωa) for the TM squeezed thermal states.
|
| 920 |
+
Now, we aim to show that a similar form appears also for
|
| 921 |
+
other Gassian states given by the covariance matrix (S2).
|
| 922 |
+
When the b-mode is measured by the enviroment, the
|
| 923 |
+
a-mode collapses to a covariance matrix with determi-
|
| 924 |
+
nant
|
| 925 |
+
detσπb
|
| 926 |
+
a = (a2 − c2
|
| 927 |
+
1 + a/2)(a2 − c2
|
| 928 |
+
2 + a/2)
|
| 929 |
+
(a + 1/2)2
|
| 930 |
+
.
|
| 931 |
+
(15)
|
| 932 |
+
The entropy after the measurement is similarly µ(meas) =
|
| 933 |
+
1
|
| 934 |
+
2√
|
| 935 |
+
detσ
|
| 936 |
+
πb
|
| 937 |
+
a
|
| 938 |
+
[76]. For c1 = −c2 = c, µ(meas) becomes the
|
| 939 |
+
purity given in Eq. (S5).
|
| 940 |
+
As we aim to show that the extracted work has a “form”
|
| 941 |
+
similar to W = ξ · (¯nℏωa) also for other Gaussian states,
|
| 942 |
+
we express Eq. (S15) in terms of Sp(4, R) invariants
|
| 943 |
+
detσ = (a2 − c2
|
| 944 |
+
1)(a2 − c2
|
| 945 |
+
2),
|
| 946 |
+
(16)
|
| 947 |
+
∆ = 2(a2 + c1c2),
|
| 948 |
+
(17)
|
| 949 |
+
where detσ is the determinant of the two-mode state
|
| 950 |
+
before the measurement.
|
| 951 |
+
We do this because any one
|
| 952 |
+
of the two-mode Gaussian states, Eq. (S2), can be ob-
|
| 953 |
+
tained from Sp(4, R) transformations of the TM squeezed
|
| 954 |
+
thermal state Eq. (15) of Ref. [76]. The determinant in
|
| 955 |
+
Eq. (S15) can be expressed as
|
| 956 |
+
detσπb
|
| 957 |
+
a
|
| 958 |
+
= (a2 − c2
|
| 959 |
+
1)(a2 − c2
|
| 960 |
+
2) + a
|
| 961 |
+
2 (2a2 − c2
|
| 962 |
+
1 − c2
|
| 963 |
+
2)
|
| 964 |
+
( 1
|
| 965 |
+
2 + a)2
|
| 966 |
+
,
|
| 967 |
+
(18)
|
| 968 |
+
where the first term is the Sp(4, R) invariant detσ. In
|
| 969 |
+
the second term, I = 2a2 − c2
|
| 970 |
+
1 − c2
|
| 971 |
+
2 can be expressed in
|
| 972 |
+
terms of Sp(4, R) invariants (Please note that a is only
|
| 973 |
+
local Sp(2, R) invariant) as
|
| 974 |
+
detσπb = (a2I + ∆2/4 − ∆a2)
|
| 975 |
+
(a + 1
|
| 976 |
+
2)2
|
| 977 |
+
.
|
| 978 |
+
(19)
|
| 979 |
+
We note that detσ = (˜a2
|
| 980 |
+
TMS − ˜c2)2 and ∆ = 2(˜a2 − ˜c2)
|
| 981 |
+
for the TM squeezed thermal states and they are Sp(4, R)
|
| 982 |
+
invariant. Thus, Eq. (S19) can be recast as
|
| 983 |
+
(˜a2 − ˜c2)2 = a2I + (˜a2 − ˜c2)2 − ∆a2.
|
| 984 |
+
(20)
|
| 985 |
+
Please note that, in this section, we use tilde symbol for
|
| 986 |
+
the covariance matrix elements of the TM squeezed ther-
|
| 987 |
+
mal states in order to distinguish them from the variable
|
| 988 |
+
a given in the general matrix given in Eq. (S2).
|
| 989 |
+
Cancellation in Eq. (S20) results
|
| 990 |
+
I = 2a2 − c2
|
| 991 |
+
1 − c2 = ∆.
|
| 992 |
+
(21)
|
| 993 |
+
Using this in Eq. (S19), we obtain the expression
|
| 994 |
+
µ(meas) =
|
| 995 |
+
a + 1/2
|
| 996 |
+
2(z + a/2),
|
| 997 |
+
(22)
|
| 998 |
+
where z = ˜a2−˜c2 = (¯n+1/2)2. Please note that Eq. (S22)
|
| 999 |
+
is in the same form with Eq. (S5) from which we obtain
|
| 1000 |
+
the extracted work
|
| 1001 |
+
W = ξ (��nℏωc).
|
| 1002 |
+
(23)
|
| 1003 |
+
Thus, above we showed that Eq. (S23) is a general form
|
| 1004 |
+
for the extracted work from a symmetric TM Gaussian
|
| 1005 |
+
state.
|
| 1006 |
+
|
K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d3bd5d610f9dc6faebb2679cddea0f6b0a40a990ff6be80fd80031764b365b7c
|
| 3 |
+
size 523909
|
K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:5dd9c78bba91c243afe191efc05e06567c89721518c6cd67d4a6b8fb9fdba94e
|
| 3 |
+
size 3080237
|