Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.  
							See raw diff
- .gitattributes +1 -0
- 0tE1T4oBgHgl3EQf4wXL/content/tmp_files/2301.03505v1.pdf.txt +0 -0
- 0tE1T4oBgHgl3EQf4wXL/content/tmp_files/load_file.txt +0 -0
- 1NE0T4oBgHgl3EQfdgAR/content/tmp_files/2301.02376v1.pdf.txt +1138 -0
- 1NE0T4oBgHgl3EQfdgAR/content/tmp_files/load_file.txt +0 -0
- 2tAyT4oBgHgl3EQf1vk5/content/tmp_files/2301.00739v1.pdf.txt +351 -0
- 2tAyT4oBgHgl3EQf1vk5/content/tmp_files/load_file.txt +248 -0
- 6dE0T4oBgHgl3EQfvwHw/content/tmp_files/2301.02624v1.pdf.txt +858 -0
- 6dE0T4oBgHgl3EQfvwHw/content/tmp_files/load_file.txt +0 -0
- 79AzT4oBgHgl3EQfSPsz/content/tmp_files/2301.01228v1.pdf.txt +365 -0
- 79AzT4oBgHgl3EQfSPsz/content/tmp_files/load_file.txt +218 -0
- 9dAyT4oBgHgl3EQfdPeW/content/tmp_files/2301.00299v1.pdf.txt +1090 -0
- 9dAyT4oBgHgl3EQfdPeW/content/tmp_files/load_file.txt +0 -0
- A9AzT4oBgHgl3EQfv_5R/content/tmp_files/2301.01715v1.pdf.txt +808 -0
- A9AzT4oBgHgl3EQfv_5R/content/tmp_files/load_file.txt +0 -0
- AtE1T4oBgHgl3EQfDQOp/content/tmp_files/2301.02875v1.pdf.txt +1449 -0
- AtE1T4oBgHgl3EQfDQOp/content/tmp_files/load_file.txt +0 -0
- DdAzT4oBgHgl3EQfif0c/vector_store/index.pkl +3 -0
- F9AzT4oBgHgl3EQfi_2P/content/tmp_files/2301.01509v1.pdf.txt +1201 -0
- F9AzT4oBgHgl3EQfi_2P/content/tmp_files/load_file.txt +0 -0
- GtE1T4oBgHgl3EQf_QYB/content/tmp_files/2301.03577v1.pdf.txt +951 -0
- GtE1T4oBgHgl3EQf_QYB/content/tmp_files/load_file.txt +0 -0
- HtFIT4oBgHgl3EQfXys9/content/tmp_files/2301.11245v1.pdf.txt +1378 -0
- HtFIT4oBgHgl3EQfXys9/content/tmp_files/load_file.txt +0 -0
- IdAzT4oBgHgl3EQfU_z6/content/tmp_files/2301.01278v1.pdf.txt +1460 -0
- IdAzT4oBgHgl3EQfU_z6/content/tmp_files/load_file.txt +0 -0
- JdFAT4oBgHgl3EQfvB7v/content/tmp_files/2301.08674v1.pdf.txt +625 -0
- NdFLT4oBgHgl3EQfOC8n/content/tmp_files/2301.12022v1.pdf.txt +1399 -0
- NdFLT4oBgHgl3EQfOC8n/content/tmp_files/load_file.txt +0 -0
- TNE3T4oBgHgl3EQfzgsS/content/tmp_files/2301.04728v1.pdf.txt +1074 -0
- TNE3T4oBgHgl3EQfzgsS/content/tmp_files/load_file.txt +0 -0
- VdFJT4oBgHgl3EQfOSwV/content/tmp_files/2301.11481v1.pdf.txt +2665 -0
- VdFJT4oBgHgl3EQfOSwV/content/tmp_files/load_file.txt +0 -0
- VtE4T4oBgHgl3EQfMgzk/content/tmp_files/2301.04949v1.pdf.txt +3642 -0
- VtE4T4oBgHgl3EQfMgzk/content/tmp_files/load_file.txt +0 -0
- X9AyT4oBgHgl3EQfWfd0/content/tmp_files/2301.00164v1.pdf.txt +2493 -0
- X9AyT4oBgHgl3EQfWfd0/content/tmp_files/load_file.txt +0 -0
- X9E4T4oBgHgl3EQfNwwL/content/tmp_files/2301.04958v1.pdf.txt +0 -0
- X9E4T4oBgHgl3EQfNwwL/content/tmp_files/load_file.txt +0 -0
- YdE2T4oBgHgl3EQfEQZV/content/tmp_files/2301.03633v1.pdf.txt +0 -0
- YdE2T4oBgHgl3EQfEQZV/content/tmp_files/load_file.txt +0 -0
- Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/2301.11680v1.pdf.txt +1407 -0
- Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/load_file.txt +0 -0
- _9AyT4oBgHgl3EQfRfam/content/tmp_files/2301.00068v1.pdf.txt +488 -0
- _9AyT4oBgHgl3EQfRfam/content/tmp_files/load_file.txt +238 -0
- _dA0T4oBgHgl3EQfPf96/content/tmp_files/2301.02176v1.pdf.txt +1309 -0
- _dA0T4oBgHgl3EQfPf96/content/tmp_files/load_file.txt +0 -0
- _dAyT4oBgHgl3EQfdvdN/content/tmp_files/2301.00307v1.pdf.txt +834 -0
- _dAyT4oBgHgl3EQfdvdN/content/tmp_files/load_file.txt +0 -0
- atAyT4oBgHgl3EQf9_py/content/tmp_files/2301.00884v1.pdf.txt +889 -0
    	
        .gitattributes
    CHANGED
    
    | @@ -250,3 +250,4 @@ QdAzT4oBgHgl3EQfW_xa/content/2301.01310v1.pdf filter=lfs diff=lfs merge=lfs -tex | |
| 250 | 
             
            ptAyT4oBgHgl3EQfl_gG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
         | 
| 251 | 
             
            6dAyT4oBgHgl3EQfpfjS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
         | 
| 252 | 
             
            m9AyT4oBgHgl3EQflPjP/content/2301.00450v1.pdf filter=lfs diff=lfs merge=lfs -text
         | 
|  | 
|  | |
| 250 | 
             
            ptAyT4oBgHgl3EQfl_gG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
         | 
| 251 | 
             
            6dAyT4oBgHgl3EQfpfjS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
         | 
| 252 | 
             
            m9AyT4oBgHgl3EQflPjP/content/2301.00450v1.pdf filter=lfs diff=lfs merge=lfs -text
         | 
| 253 | 
            +
            hNE4T4oBgHgl3EQfrQ2w/content/2301.05207v1.pdf filter=lfs diff=lfs merge=lfs -text
         | 
    	
        0tE1T4oBgHgl3EQf4wXL/content/tmp_files/2301.03505v1.pdf.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        0tE1T4oBgHgl3EQf4wXL/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        1NE0T4oBgHgl3EQfdgAR/content/tmp_files/2301.02376v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1138 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            Improved design and experimental
         | 
| 2 | 
            +
            demonstration of ultrahigh-Q C6-symmetric H1
         | 
| 3 | 
            +
            hexapole photonic crystal nanocavities
         | 
| 4 | 
            +
            KENTA TAKATA1,2,4, EIICHI KURAMOCHI1,2, AKIHIKO SHINYA1,2 AND
         | 
| 5 | 
            +
            MASAYA NOTOMI1,2,3,5
         | 
| 6 | 
            +
            1Nanophotonics Center, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa 243-0198, Japan
         | 
| 7 | 
            +
            2NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa
         | 
| 8 | 
            +
            243-0198, Japan
         | 
| 9 | 
            +
            3Department of Physics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551,
         | 
| 10 | 
            +
            Japan
         | 
| 11 | |
| 12 | |
| 13 | 
            +
            Abstract:
         | 
| 14 | 
            +
            An H1 photonic crystal nanocavity is based on a single point defect and has
         | 
| 15 | 
            +
            eigenmodes with a variety of symmetric features. Thus, it is a promising building block for
         | 
| 16 | 
            +
            photonic tight-binding lattice systems that can be used in studies on condensed matter, non-
         | 
| 17 | 
            +
            Hermitian and topological physics. However, improving its radiative quality (𝑄) factor has been
         | 
| 18 | 
            +
            considered challenging. Here, we report the design of a hexapole mode of an H1 nanocavity with
         | 
| 19 | 
            +
            a 𝑄 factor exceeding 108. We achieved such extremely high-𝑄 conditions by designing only four
         | 
| 20 | 
            +
            structural modulation parameters thanks to the C6 symmetry of the mode, despite the need of
         | 
| 21 | 
            +
            more complicated optimizations for many other nanocavities. The fabricated silicon photonic
         | 
| 22 | 
            +
            crystal nanocavities exhibited a systematic change in their resonant wavelengths depending on the
         | 
| 23 | 
            +
            spatial shift of the air holes in units of 1 nm. Out of 26 such samples, we found eight cavities with
         | 
| 24 | 
            +
            loaded 𝑄 factors over one million (1.2 × 106 maximum). We examined the difference between
         | 
| 25 | 
            +
            the theoretical and experimental performances by conducting a simulation of systems with input
         | 
| 26 | 
            +
            and output waveguides and with randomly distributed radii of air holes. Automated optimization
         | 
| 27 | 
            +
            using the same design parameters further increased the theoretical 𝑄 factor by up to 4.5 × 108,
         | 
| 28 | 
            +
            which is two orders of magnitude higher than in the previous studies. Our work elevates the
         | 
| 29 | 
            +
            performance of the H1 nanocavity to the ultrahigh-𝑄 level and paves the way for its large-scale
         | 
| 30 | 
            +
            arrays with unconventional functionalities.
         | 
| 31 | 
            +
            © 2023 Optica Publishing Group
         | 
| 32 | 
            +
            1.
         | 
| 33 | 
            +
            Introduction
         | 
| 34 | 
            +
            Photonic crystal nanocavities (PCNs) in dielectric slabs are a particular series of optical
         | 
| 35 | 
            +
            resonators that exhibit both strong light confinement and small modal volumes [1–12]. These
         | 
| 36 | 
            +
            features enable intense light-matter interactions, which make PCNs very useful for extremely
         | 
| 37 | 
            +
            low-power photonics [13–15], on-chip nonlinear optics [16–18] and quantum optics [19–21].
         | 
| 38 | 
            +
            Integration of PCNs also opens a route to functional nanophotonic devices, such as slow light
         | 
| 39 | 
            +
            waveguides [22–24], and all-optical switches [25–27], memories [28–30], and transistors [31],
         | 
| 40 | 
            +
            which are potential for information processing.
         | 
| 41 | 
            +
            An H1 PCN comprises a vacancy of a single lattice element [32–35]. Such a point defect
         | 
| 42 | 
            +
            structure takes over the spatial symmetry of its host system. Thus, the eigenmodes of the
         | 
| 43 | 
            +
            Maxwell equations for the H1 nanocavity are also those for the symmetry operations in the
         | 
| 44 | 
            +
            entire point group of the photonic crystal (PhC) [36]. As a result, they are analogous to atomic
         | 
| 45 | 
            +
            orbitals in terms of their symmetric properties, and hence, coupled H1 PCNs work as good
         | 
| 46 | 
            +
            photonic emulators of molecules and tight-binding lattices including basis functions [22,37].
         | 
| 47 | 
            +
            arXiv:2301.02376v1  [physics.optics]  6 Jan 2023
         | 
| 48 | 
            +
             | 
| 49 | 
            +
            Because their evanescent couplings, resonant frequencies and radiation losses can be controlled by
         | 
| 50 | 
            +
            structural modulation, PCNs can also be combined with unconventional functionalities emerging
         | 
| 51 | 
            +
            in non-Hermitian and topological physics [38–47]. In particular, arrays of H1 PCNs may pave
         | 
| 52 | 
            +
            the way for large-scale two-dimensional crystalline systems [48–53]. This potential is in stark
         | 
| 53 | 
            +
            contrast to most other PCNs based on linear defects, which are less symmetric and thus limited
         | 
| 54 | 
            +
            in their coupling profiles.
         | 
| 55 | 
            +
            However, it is generally more difficult for a smaller PCN to have an ultrahigh 𝑄 factor. Narrower
         | 
| 56 | 
            +
            field distributions in real space result in broader ones in reciprocal space. Parts of such modes
         | 
| 57 | 
            +
            tend to reside in the light cone (LC) and hence turns into radiation fields, namely losses [3].
         | 
| 58 | 
            +
            We showed two decades ago that a hexapole mode of the H1 nanocavity in a triangular-lattice
         | 
| 59 | 
            +
            PhC slab could have a theoretical 𝑄 factor up to 3 × 106, unlike the other eigenmodes [32,33].
         | 
| 60 | 
            +
            However, this record was not broken even with an algorithmic optimization [54]. Moreover, the
         | 
| 61 | 
            +
            experimental counterpart was an order of magnitude smaller, namely 3 × 105 [34]. Unfortunately,
         | 
| 62 | 
            +
            there values compared disadvantageously to those of PCNs with larger defect regions [55–59].
         | 
| 63 | 
            +
            The lack of tightest light confinement seems to be a significant obstacle to using large-scale H1
         | 
| 64 | 
            +
            nanocavity arrays, for example, to enhance light-matter interactions with bulky coupled modes,
         | 
| 65 | 
            +
            and to make robust optical circuits with topological edge states.
         | 
| 66 | 
            +
            In this article, we design, analyze and experimentally examine the hexapole mode of an H1
         | 
| 67 | 
            +
            PCN with a theoretical 𝑄 factor (𝑄th) over 108, on the basis of our latest prototype for studying
         | 
| 68 | 
            +
            non-Hermitian physics [44]. Structural modulation in the design maintains the C6v symmetry of
         | 
| 69 | 
            +
            the PCN, which the hexapole mode also respects. As a result, we find that we can dramatically
         | 
| 70 | 
            +
            increase the 𝑄 factor just with four optimization parameters. By elaborating the dependence of
         | 
| 71 | 
            +
            𝑄th on major three parameters in a simulation, we clarify that such extremely high-𝑄 conditions
         | 
| 72 | 
            +
            form a region with some width in the parameter space. Here, we obtained a hexapole mode with
         | 
| 73 | 
            +
            𝑄th = 1.4 × 108 and a modal volume (𝑉) of 0.72(𝜆/𝑛)3. We also compare its field profiles with
         | 
| 74 | 
            +
            those of another H1 PCN based on a previous study in real and reciprocal spaces.
         | 
| 75 | 
            +
            We experimentally investigated a series of silicon (Si) H1 PCNs with different spatial shifts of
         | 
| 76 | 
            +
            air holes. These samples exhibited a systematic variation in their resonant wavelengths, indicating
         | 
| 77 | 
            +
            that undesired variations in the positions of air holes were restricted. We found that eight such
         | 
| 78 | 
            +
            PCNs out of 26 had loaded 𝑄 factors (𝑄exp), which include the effects of the input and output
         | 
| 79 | 
            +
            waveguides, of over one million. The best sample had 𝑄exp = 1.2 × 106, and the cavity’s intrinsic
         | 
| 80 | 
            +
            𝑄 factor (𝑄i) was estimated to be 𝑄i = 1.5 × 106. We also performed a simulation of the system
         | 
| 81 | 
            +
            with randomly varying radii of the air holes to close the gap between 𝑄th and 𝑄exp.
         | 
| 82 | 
            +
            Finally, we performed an automated optimization to further improve 𝑄th. Here, we added the
         | 
| 83 | 
            +
            hole radius of the background PhC as a parameter and found 𝑄th = 4.5 × 108, which is more
         | 
| 84 | 
            +
            than a hundred times those in the previous design. Our results show that the highly symmetric
         | 
| 85 | 
            +
            hexapole mode can achieve both an extremely high 𝑄th and a very small 𝑉 with an inexpensive
         | 
| 86 | 
            +
            optimization. It enables ultrahigh 𝑄exp (> 106) of H1 PCNs and will open up their various
         | 
| 87 | 
            +
            applications.
         | 
| 88 | 
            +
            The remainder of this paper is organized as follows. Section 2 shows the design and modal
         | 
| 89 | 
            +
            properties of our H1 PCN. Section 3 presents experimental results, and numerically analyzes
         | 
| 90 | 
            +
            and discusses them. The automated optimization and resultant impact on the hexapole mode
         | 
| 91 | 
            +
            are summarized in Sec. 4. Section 5 discusses fundamental limitations on the 𝑄 factors of
         | 
| 92 | 
            +
            nanocavities, including ours. Section 6 concludes this study.
         | 
| 93 | 
            +
            2.
         | 
| 94 | 
            +
            Cavity design
         | 
| 95 | 
            +
            2.1.
         | 
| 96 | 
            +
            Structure and scheme
         | 
| 97 | 
            +
            Figure 1(a) depicts the design of our PCN. The system is based on a Si slab with a refractive
         | 
| 98 | 
            +
            index of 𝑛Si = 3.47 and thickness 𝑡. The PhC here is a triangular lattice of circular air holes of
         | 
| 99 | 
            +
            radius 𝑅0 and lattice constant 𝑎. Triangular-lattice PhC slabs are widely used in experiments
         | 
| 100 | 
            +
             | 
| 101 | 
            +
            (a)
         | 
| 102 | 
            +
            (b)
         | 
| 103 | 
            +
            R0
         | 
| 104 | 
            +
            R0
         | 
| 105 | 
            +
            R1
         | 
| 106 | 
            +
            s1
         | 
| 107 | 
            +
            s2
         | 
| 108 | 
            +
            x
         | 
| 109 | 
            +
            y
         | 
| 110 | 
            +
            z
         | 
| 111 | 
            +
            Fig. 1. (a) Design of H1 PCN based on structural modulation of the innermost and
         | 
| 112 | 
            +
            second innermost layers of air holes with reference to the single point defect (colored
         | 
| 113 | 
            +
            red and orange, respectively). 𝑅0 is the radius of the holes for the background PhC
         | 
| 114 | 
            +
            and the second layer, and 𝑅1 that for the innermost holes. 𝑠1 is a radial shift of the
         | 
| 115 | 
            +
            innermost layer directed outward from the lattice points, and 𝑠2 is that for the second
         | 
| 116 | 
            +
            innermost layer with its regular hexagonal alignment kept. (b) 𝐻𝑧 field distribution of
         | 
| 117 | 
            +
            hexapole mode.
         | 
| 118 | 
            +
            because they have large photonic band gaps for TE-like modes. The lack of a single hole acts as a
         | 
| 119 | 
            +
            point defect and hence forms an H1 nanocavity, which is the simplest structure of PCNs that take
         | 
| 120 | 
            +
            over the C6v symmetry of the PhC. The six holes closest to the defect, which are colored red in
         | 
| 121 | 
            +
            the figure, have a smaller radius 𝑅1 than that of the background PhC (𝑅1 < 𝑅0). This innermost
         | 
| 122 | 
            +
            layer of holes is also shifted radially away from the lattice points by a distance 𝑠1. The second
         | 
| 123 | 
            +
            innermost hole layer comprises the twelve holes located one layer outward from the innermost
         | 
| 124 | 
            +
            ones and is drawn in orange. It is also translated in the radial direction so that it keeps the regular
         | 
| 125 | 
            +
            hexagonal alignment and its half diagonal is increased by a distance 𝑠2. In addition, it’s holes are
         | 
| 126 | 
            +
            of the same radius 𝑅0 as those of the PhC.
         | 
| 127 | 
            +
            We computed the complex eigenfrequencies 𝑓 of the hexapole eigenmode for various cases by
         | 
| 128 | 
            +
            using the finite element method on a commercial solver (COMSOL Multiphysics [60]). With the
         | 
| 129 | 
            +
            defect center defined as the coordinate origin, the system had 11 and 14 layers of holes in the ±𝑥
         | 
| 130 | 
            +
            and ±𝑦 directions, respectively. A rectangular air region with a height of 3 µm was placed on
         | 
| 131 | 
            +
            each side of the slab. A scattering boundary condition for plane waves is applied to every border
         | 
| 132 | 
            +
            of the computational domain. The 𝑥-𝑦 and 𝑦-𝑧 planes were set as perfect magnetic and electrical
         | 
| 133 | 
            +
            conductors, respectively, for reducing the computational cost. Any changes to these simulation
         | 
| 134 | 
            +
            conditions are noted in what follows. The theoretical 𝑄 factor is given by 𝑄th = Re 𝑓 /(2Im 𝑓 ).
         | 
| 135 | 
            +
            Figure 1(b) shows the 𝑧 component of the magnetic fields (𝐻𝑧) of the hexapole mode along the
         | 
| 136 | 
            +
            𝑥-𝑦 plane. This mode is TE-like and thus characterized by 𝐻𝑧. It is also an eigenmode for the C6
         | 
| 137 | 
            +
            rotation operator with an eigenvalue of −1. Such an odd parity of a symmetric two-dimensional
         | 
| 138 | 
            +
            multipole contributes to destructive interference in 𝐻𝑧 along the 𝑧 direction corresponding to
         | 
| 139 | 
            +
            Γ point [5, 61]. This feature suppresses radiation loss based on the transverse electric field
         | 
| 140 | 
            +
            components (𝐸𝑥, 𝐸𝑦), as they are linked to 𝐻𝑧 through the Maxwell equations. Thus, structural
         | 
| 141 | 
            +
            modulation maintaining the lattice-matched rotational symmetry is essential to achieving an
         | 
| 142 | 
            +
            ultrahigh 𝑄 factor of the hexapole mode. The other C6-symmetric eigenmode of this cavity is
         | 
| 143 | 
            +
            the monopole mode (not shown). It has an eigenvalue of +1 for the C6 operator and a far lower
         | 
| 144 | 
            +
            𝑄th < 3000 in our simulations.
         | 
| 145 | 
            +
            As illustrated in Fig. 1(a), our design uses only four parameters (𝑅0, 𝑅1, 𝑠1, 𝑠2) to improve
         | 
| 146 | 
            +
             | 
| 147 | 
            +
            85
         | 
| 148 | 
            +
            88
         | 
| 149 | 
            +
            91
         | 
| 150 | 
            +
            94
         | 
| 151 | 
            +
            97
         | 
| 152 | 
            +
            99
         | 
| 153 | 
            +
            101
         | 
| 154 | 
            +
            103
         | 
| 155 | 
            +
            105
         | 
| 156 | 
            +
            107
         | 
| 157 | 
            +
            R1 (nm)
         | 
| 158 | 
            +
            s1 (nm)
         | 
| 159 | 
            +
            105
         | 
| 160 | 
            +
            106
         | 
| 161 | 
            +
            107
         | 
| 162 | 
            +
            108
         | 
| 163 | 
            +
            Qth
         | 
| 164 | 
            +
            85
         | 
| 165 | 
            +
            88
         | 
| 166 | 
            +
            91
         | 
| 167 | 
            +
            94
         | 
| 168 | 
            +
            97
         | 
| 169 | 
            +
            99
         | 
| 170 | 
            +
            101
         | 
| 171 | 
            +
            103
         | 
| 172 | 
            +
            105
         | 
| 173 | 
            +
            107
         | 
| 174 | 
            +
            R1 (nm)
         | 
| 175 | 
            +
            s1 (nm)
         | 
| 176 | 
            +
            1.536
         | 
| 177 | 
            +
            1.547
         | 
| 178 | 
            +
            1.557
         | 
| 179 | 
            +
            1.568
         | 
| 180 | 
            +
            1.578
         | 
| 181 | 
            +
            λ (µm)
         | 
| 182 | 
            +
            85
         | 
| 183 | 
            +
            88
         | 
| 184 | 
            +
            91
         | 
| 185 | 
            +
            94
         | 
| 186 | 
            +
            16
         | 
| 187 | 
            +
            19
         | 
| 188 | 
            +
            22
         | 
| 189 | 
            +
            25
         | 
| 190 | 
            +
            s2 (nm)
         | 
| 191 | 
            +
            s1 (nm)
         | 
| 192 | 
            +
            105
         | 
| 193 | 
            +
            106
         | 
| 194 | 
            +
            107
         | 
| 195 | 
            +
            108
         | 
| 196 | 
            +
            Qth
         | 
| 197 | 
            +
            85
         | 
| 198 | 
            +
            88
         | 
| 199 | 
            +
            91
         | 
| 200 | 
            +
            94
         | 
| 201 | 
            +
            16
         | 
| 202 | 
            +
            19
         | 
| 203 | 
            +
            22
         | 
| 204 | 
            +
            25
         | 
| 205 | 
            +
            s2 (nm)
         | 
| 206 | 
            +
            s1 (nm)
         | 
| 207 | 
            +
            1.548
         | 
| 208 | 
            +
            1.553
         | 
| 209 | 
            +
            1.558
         | 
| 210 | 
            +
            1.563
         | 
| 211 | 
            +
            1.569
         | 
| 212 | 
            +
            λ (µm)
         | 
| 213 | 
            +
            (a)
         | 
| 214 | 
            +
            (b)
         | 
| 215 | 
            +
            (d)
         | 
| 216 | 
            +
            (c)
         | 
| 217 | 
            +
            Wavelength
         | 
| 218 | 
            +
            Q factor
         | 
| 219 | 
            +
            Fig. 2. Dependence of (a) resonant wavelength (𝜆) and (b) theoretical 𝑄 factor (𝑄th) of
         | 
| 220 | 
            +
            the hexapole mode on 𝑠1 and 𝑅1 for 𝑠2 = 20.5 nm. (c) 𝜆 and (d) 𝑄th dependent on 𝑠1
         | 
| 221 | 
            +
            and 𝑠2 for 𝑅1 = 102 nm. Black dots represent sample points in the simulation. The
         | 
| 222 | 
            +
            data among the points are linearly interpolated. A band of parameter conditions for
         | 
| 223 | 
            +
            𝑄th > 108 appears. 𝑅0 = 131 nm, 𝑎 = 426 nm, and 𝑡 = 250 nm.
         | 
| 224 | 
            +
            the 𝑄 factor, unlike recent designs based on costly optimizations of many variables [62–65].
         | 
| 225 | 
            +
            𝑅0 determines the filling factor of the PhC, which is related to its photonic band gap and thus
         | 
| 226 | 
            +
            the in-plane modal confinement. 𝑅1, 𝑠1 and 𝑠2 affect the local modal properties. The lattice
         | 
| 227 | 
            +
            constant 𝑎 can be varied to adjust the resonant wavelengths of the simulated modes to telecom
         | 
| 228 | 
            +
            ones around 1.55 µm.
         | 
| 229 | 
            +
            2.2.
         | 
| 230 | 
            +
            Resonance properties versus hole shifts
         | 
| 231 | 
            +
            First, let us study the resonance characteristics of the mode for constant 𝑅0 = 131 nm, 𝑎 = 426 nm,
         | 
| 232 | 
            +
            and 𝑡 = 250 nm. Figure 2(a) and (b) are two-dimensional color plots of the resonant wavelength
         | 
| 233 | 
            +
            𝜆 = 𝑐/Re 𝑓 and 𝑄th for isolated (unloaded) H1 PCNs depending on 𝑠1 and 𝑅1. Here, 𝑐 is the
         | 
| 234 | 
            +
            speed of light in vacuum and 𝑠2 = 20.5 nm. The plot of 𝜆 indicates that a small 𝑠1 and large 𝑅1
         | 
| 235 | 
            +
            squeeze the magnetic poles in Fig. 1(b) and thus yield a short 𝜆, whereas a large 𝑠1 and small 𝑅1
         | 
| 236 | 
            +
            broaden the magnetic poles and thus increase 𝜆. Remarkably, the 𝑄th plot exhibits a sequence of
         | 
| 237 | 
            +
            optimum points with 𝑄th > 108 forming a linear band. Such a peak distribution indicates that
         | 
| 238 | 
            +
            there is an optimal polar width for every 𝜆 that suppresses local scattering-induced radiation loss.
         | 
| 239 | 
            +
            There is a margin of about ±1.5 nm in 𝑅1 and a wider one in 𝑠1 from each optimum point to have
         | 
| 240 | 
            +
            a 𝑄th > 107. The largest 𝑄 factor here is 𝑄th = 1.43 × 108 for (𝑠1, 𝑅1) = (88.75 nm, 101.75 nm).
         | 
| 241 | 
            +
            In units of 0.5 nm for the parameters, 𝑄th = 1.41 × 108 for (𝑠1, 𝑅1) = (89.5 nm, 102 nm) was
         | 
| 242 | 
            +
            obtained.
         | 
| 243 | 
            +
            Figure 2(c) and (d) depict the dependence of 𝜆 and 𝑄th on 𝑠1 and 𝑠2 for 𝑅1 = 102 nm. There
         | 
| 244 | 
            +
             | 
| 245 | 
            +
            is a notable difference between Fig. 2(a) and (c) in the directions of the iso-wavelength contours.
         | 
| 246 | 
            +
            This difference is due to negative correlation between the effect of 𝑅1 and that of 𝑠2; a larger 𝑠2
         | 
| 247 | 
            +
            results in a longer 𝜆 because of the higher effective index of the cavity region. In contrast, Fig.
         | 
| 248 | 
            +
            2(b) and (d) appear to have more or less similar properties. As the mode wavelength increases
         | 
| 249 | 
            +
            with 𝑠1, the optimal 𝑠2 also becomes larger. 𝑠2 can be used to dramatically improve 𝑄th because
         | 
| 250 | 
            +
            it introduces a gradual variation in the effective potential barrier of the PhC [7,66]. However, the
         | 
| 251 | 
            +
            trace of the extremely high 𝑄 values in Fig. 2(d) is nearly perpendicular to the contour lines in
         | 
| 252 | 
            +
            Fig. 2(c), meaning that the conditions for a much improved 𝑄th are limited for each 𝜆. The peak
         | 
| 253 | 
            +
            value of 𝑄th decreases for large and small 𝑠1 because 𝑅1 is fixed. Overall, a global optimization
         | 
| 254 | 
            +
            for (𝑅1, 𝑠1, 𝑠2) enables us to find the continuous conditions for 𝑄th > 108 in the parameter space.
         | 
| 255 | 
            +
            The best 𝑄th here is 1.46 × 108 for (𝑠1, 𝑠2) = (90.25 nm, 20.75 nm).
         | 
| 256 | 
            +
            2.3.
         | 
| 257 | 
            +
            Modal properties
         | 
| 258 | 
            +
            Next, let us compare the modal shapes in real and reciprocal spaces of the design with
         | 
| 259 | 
            +
            𝑄th > 108 and that in the previous study. Figure 3(a) and (b) show the spatial magnetic intensity
         | 
| 260 | 
            +
            distributions on a common logarithmic scale (log10(|H(r)|2)) along 𝑧 = 0 for hexapole modes
         | 
| 261 | 
            +
            with 𝑄th = 2.0 × 106 and 1.4 × 108, respectively. The PCN shown in (a) is based on Ref. [33]
         | 
| 262 | 
            +
            and does not include 𝑠2 in its design with 𝑅0 = 109 nm, 𝑅1 = 100 nm, 𝑠1 = 78 nm, 𝑎 = 435 nm,
         | 
| 263 | 
            +
            and 𝑡 = 220 nm. The other PCN in (b) corresponds to (𝑠1, 𝑅1) = (89.5 nm, 102 nm) in Fig. 2(a)
         | 
| 264 | 
            +
            and (b). A sizable portion of (a) has evanescent fields with relative intensities of about 10−4, and
         | 
| 265 | 
            +
            visible components with intensities over 10−8 reach the boundaries of the entire geometry. In
         | 
| 266 | 
            +
            comparison, the optimal mode shown in (b) obviously decays faster from the center. This means
         | 
| 267 | 
            +
            that the current design provides stronger in-plane light confinement.
         | 
| 268 | 
            +
            Figure 3(c) and (d) depict the Fourier transforms of the 𝑥 component of the electric fields on a
         | 
| 269 | 
            +
            logarithmic scale (log10(|F (𝐸𝑥(r))|)) along 𝑧 = 0 for the hexapole modes in Fig. 3(a) and (b).
         | 
| 270 | 
            +
            Transverse electric field components lying within the LC measure the magnitude of radiation loss,
         | 
| 271 | 
            +
            because they can directly couple with radiative plane waves [3,67]. As shown in Fig. 3(c), the
         | 
| 272 | 
            +
            previously designed mode has relative Fourier amplitudes of about 10−2.5 distributed in the LC
         | 
| 273 | 
            +
            defined by the black dashed circle. In stark contrast, the radiative field amplitudes are suppressed
         | 
| 274 | 
            +
            over the entire LC for the optimized mode shown in Fig. 3(d). Their maximum value is about
         | 
| 275 | 
            +
            one order of magnitude smaller than that of Fig. 3(c), confirming an improvement in the 𝑄 factor
         | 
| 276 | 
            +
            due to the reduction of the radiation flux. A similar trend is seen in the case of 𝐸𝑦. These modal
         | 
| 277 | 
            +
            properties also support the discussion on Fig. 2(b) and (d).
         | 
| 278 | 
            +
            The standard Purcell mode volume 𝑉 for PCNs is given by [2]
         | 
| 279 | 
            +
            𝑉 =
         | 
| 280 | 
            +
            ∫
         | 
| 281 | 
            +
            𝜖(r)|E(r)|2𝑑3r
         | 
| 282 | 
            +
            max{𝜖(r)|E(r)|2} .
         | 
| 283 | 
            +
            (1)
         | 
| 284 | 
            +
            This definition is accurate in estimating the Purcell effect for high-𝑄 cavities and has been used
         | 
| 285 | 
            +
            for comparison purposes in the literature. Interestingly, the effective volume 𝑉opt = 0.72(𝜆/𝑛)3
         | 
| 286 | 
            +
            for the mode with 𝑄th = 1.4 × 108 is larger by 9% than that of the previously studied one,
         | 
| 287 | 
            +
            𝑉p = 0.66(𝜆/𝑛)3. The electric energy densities of hexapole modes tend to concentrate mostly on
         | 
| 288 | 
            +
            the sides of the innermost air holes. However, the optimized mode distributes more electric energy
         | 
| 289 | 
            +
            around the point defect than the mode based on Ref. [33] because of the potential modulation by
         | 
| 290 | 
            +
            𝑠2. Thus, it has a reduced maximum energy density or denominator in Eq. (1).
         | 
| 291 | 
            +
            This result shows that we can dramatically improve 𝑄th of the hexapole mode without sacrificing
         | 
| 292 | 
            +
            its small 𝑉. 𝑉opt here is comparable with those of optimized L3 PCNs without hole radius
         | 
| 293 | 
            +
            modulation [64,67], while the hexapole mode has a larger 𝑄th. Thus, our H1 PCNs can be expected
         | 
| 294 | 
            +
            to have 𝑄exp values as high as those ones. In addition, our optimal 𝑄th/𝑉opt = 1.9 × 108(𝑛/𝜆)3 is
         | 
| 295 | 
            +
            slightly better than another L3 nanocavity with 𝑄th/𝑉 = 1.7 × 108(𝑛/𝜆)3 (𝑄th = 1.9 × 108 and
         | 
| 296 | 
            +
            𝑉 = 1.1(𝜆/𝑛)3) designed by the particle-swarm algorithm [65].
         | 
| 297 | 
            +
             | 
| 298 | 
            +
            (a)
         | 
| 299 | 
            +
            (b)
         | 
| 300 | 
            +
            (d)
         | 
| 301 | 
            +
            (c)
         | 
| 302 | 
            +
            a = 435 nm
         | 
| 303 | 
            +
            a = 426 nm
         | 
| 304 | 
            +
            0
         | 
| 305 | 
            +
            0
         | 
| 306 | 
            +
            4
         | 
| 307 | 
            +
            -4
         | 
| 308 | 
            +
            kx (units of π/a)
         | 
| 309 | 
            +
            -4
         | 
| 310 | 
            +
            4
         | 
| 311 | 
            +
            0
         | 
| 312 | 
            +
            kx (units of π/a)
         | 
| 313 | 
            +
            0
         | 
| 314 | 
            +
            -4
         | 
| 315 | 
            +
            4
         | 
| 316 | 
            +
            4
         | 
| 317 | 
            +
            -4
         | 
| 318 | 
            +
            ky (units of π/a)
         | 
| 319 | 
            +
            log10(|H|2)
         | 
| 320 | 
            +
            log10(|(Ex)|)
         | 
| 321 | 
            +
            Fig. 3. (a) Magnetic field intensity distribution in the logarithmic scale (log10(|H(r)|2))
         | 
| 322 | 
            +
            for the hexpole nanocavity based on the previous work [33] with 𝑎 = 435 nm and
         | 
| 323 | 
            +
            𝑄th = 2.0×106. (b) Same but for the hexpole mode designed in this study with 𝑎 = 435
         | 
| 324 | 
            +
            nm, 𝑠1 = 89.5 nm, 𝑅1 = 102 nm, and 𝑄th = 1.4 × 108, exhibiting more tightly confined
         | 
| 325 | 
            +
            in-plane evanescent fields than in (a). (c), (d) Absolute Fourier-space distributions of
         | 
| 326 | 
            +
            the 𝑥 components of the electric fields on a logarithmic scale (log10(|F (𝐸𝑥(r))|)) for
         | 
| 327 | 
            +
            the eigenmodes corresponding to (a) and (b), respectively. (d) has significantly reduced
         | 
| 328 | 
            +
            radiative components inside the light line that is marked by the black dashed curve.
         | 
| 329 | 
            +
            In summary, we showed designs of H1 PCNs based on a manual or brute-force search for
         | 
| 330 | 
            +
            extremely high-𝑄 hexapole modes. By focusing on the case for a constant 𝑅0, we found a series
         | 
| 331 | 
            +
            of conditions for 𝑄th > 108 with just three major optimization parameters (𝑅1, 𝑠1, 𝑠2), thanks to
         | 
| 332 | 
            +
            the C6 symmetry of the mode. Introduction of an optical potential modulation with 𝑠2 resulted
         | 
| 333 | 
            +
            in improved light confinement of the optimized mode in both the in-plane and out-of-plane
         | 
| 334 | 
            +
            directions. This point will be examined quantitatively in Sec. 4.
         | 
| 335 | 
            +
            3.
         | 
| 336 | 
            +
            Experimental result and numerical analysis
         | 
| 337 | 
            +
            3.1.
         | 
| 338 | 
            +
            Sample fabrication and measurement
         | 
| 339 | 
            +
            We fabricated Si H1 PCNs of our design for an experimental demonstration. The sample
         | 
| 340 | 
            +
            structures were patterned by electron beam (EB) lithography on a positive EB resist coated
         | 
| 341 | 
            +
            on a silicon-on-insulator (SOI) wafer. The mask pattern was projected to the Si film with a
         | 
| 342 | 
            +
             | 
| 343 | 
            +
            0
         | 
| 344 | 
            +
            -0.5
         | 
| 345 | 
            +
            -1
         | 
| 346 | 
            +
            -1.5
         | 
| 347 | 
            +
            -2
         | 
| 348 | 
            +
            -2.5
         | 
| 349 | 
            +
            -3
         | 
| 350 | 
            +
            -3.5
         | 
| 351 | 
            +
            -4
         | 
| 352 | 
            +
            -4.5
         | 
| 353 | 
            +
            -50
         | 
| 354 | 
            +
            -1
         | 
| 355 | 
            +
            -2
         | 
| 356 | 
            +
            -3
         | 
| 357 | 
            +
            -4
         | 
| 358 | 
            +
            -5
         | 
| 359 | 
            +
            -6
         | 
| 360 | 
            +
            -7
         | 
| 361 | 
            +
            -8190.4305
         | 
| 362 | 
            +
            190.4315
         | 
| 363 | 
            +
            190.4325
         | 
| 364 | 
            +
            0.0
         | 
| 365 | 
            +
            0.2
         | 
| 366 | 
            +
            0.4
         | 
| 367 | 
            +
            0.6
         | 
| 368 | 
            +
            0.8
         | 
| 369 | 
            +
            1.0
         | 
| 370 | 
            +
            Normalized power
         | 
| 371 | 
            +
            Frequency (THz)
         | 
| 372 | 
            +
            (b)
         | 
| 373 | 
            +
            (c)
         | 
| 374 | 
            +
            1 μm
         | 
| 375 | 
            +
            Qexp = 1.1×106
         | 
| 376 | 
            +
            (a)
         | 
| 377 | 
            +
            2 μm
         | 
| 378 | 
            +
            Fig. 4. (a) Laser scope image of a sample with 𝑑 = 5
         | 
| 379 | 
            +
            √
         | 
| 380 | 
            +
            3𝑎. The input and output Si
         | 
| 381 | 
            +
            waveguides are broadened and extended to both sides of the sample chip and coupled
         | 
| 382 | 
            +
            with lensed fibers. (b) Close-up SEM image of H1 PCN with 𝑎 = 434 nm. Typical radii
         | 
| 383 | 
            +
            of the small and large air holes are estimated as 𝑅1,s ≈ 106.8 nm and 𝑅0,s ≈ 133.1
         | 
| 384 | 
            +
            nm. (c) Transmission spectrum of sample with 𝑎 = 434 nm and 𝑠1 = 99.5 nm. The
         | 
| 385 | 
            +
            Lorentzian curve colored red matches the experimental data shown as blue points and
         | 
| 386 | 
            +
            indicates that the cavity has a loaded 𝑄exp of 1.1 × 106.
         | 
| 387 | 
            +
            nominal thickness of 250 nm by inductively coupled plasma etching. The buried oxide (BOX)
         | 
| 388 | 
            +
            layer beneath the PhCs was removed by wet etching with buffered hydrogen fluoride to obtain
         | 
| 389 | 
            +
            air-bridged samples. After the above device processes were completed, the wafer was cleaved so
         | 
| 390 | 
            +
            that the size of each sample chip was 5 mm × 15 mm.
         | 
| 391 | 
            +
            Figure 4(a) is a laser scope image of a PCN sample. The H1 cavity was butt-coupled (loaded)
         | 
| 392 | 
            +
            with two W1 PhC waveguides, each of which had a width of 𝑊0 =
         | 
| 393 | 
            +
            √
         | 
| 394 | 
            +
            3𝑎 based on the removal
         | 
| 395 | 
            +
            of a single row of air holes. The spatial interval 𝑑 between the cavity and them varied with the
         | 
| 396 | 
            +
            samples, and ones with 𝑑 = 5
         | 
| 397 | 
            +
            √
         | 
| 398 | 
            +
            3𝑎 exhibited ultrahigh-𝑄 resonances. Each W1 waveguide was
         | 
| 399 | 
            +
            broadened by 100 nm at either end of the PhC by shifting five pairs of air holes on the sides
         | 
| 400 | 
            +
            outward with a stepwise increment of 20 nm. Consequently, they were efficiently coupled with
         | 
| 401 | 
            +
            air-suspended wire waveguides with a width of 𝑊0. These optical channels were extended farther
         | 
| 402 | 
            +
            and connected to 8 µm-wide slab waveguides that were supported by the BOX layer and led to
         | 
| 403 | 
            +
            the edges of the chip.
         | 
| 404 | 
            +
            A close-up scanning electron microscope (SEM) image of an H1 nanocavity is shown as
         | 
| 405 | 
            +
            Fig. 4(b). Typical radii for the innermost and second innermost hole layers of the resist mask
         | 
| 406 | 
            +
            were estimated as 𝑅1,m ≈ 102.8 nm and 𝑅0,m ≈ 130.4 nm, respectively, which were close to
         | 
| 407 | 
            +
            the condition for 𝑄th > 108 found in Fig. 2. However, the radii of the fabricated samples
         | 
| 408 | 
            +
            became somewhat bigger in the etching process: 𝑅1,s ≈ 106.8 nm and 𝑅0,s ≈ 133.1 nm. We
         | 
| 409 | 
            +
            prepared PCN chips with five distinct lattice constants, 𝑎 = 418, 422, 426, 430, 434 nm. For
         | 
| 410 | 
            +
            the evaluations, we focused on the one with 𝑎 = 434 nm, because it best compensated for the
         | 
| 411 | 
            +
            discrepancies in hole radii between the design and fabrication.
         | 
| 412 | 
            +
            We performed transmission measurements on each sample chip by placing it on a metallic
         | 
| 413 | 
            +
            stage whose temperature was maintained at 25◦C by a Peltier element and a PID controller.
         | 
| 414 | 
            +
            Tapered optical fibers were carefully aligned by using three-axis nano-positioners equipped with
         | 
| 415 | 
            +
            fiber holder stages, so that they were coupled with the slab waveguides at both ends of the chip
         | 
| 416 | 
            +
            and hence formed a measurement channel. The typical coupling loss per such interface was about
         | 
| 417 | 
            +
            10 dB. A coherent transverse electric (TE) polarized light from a tunable laser was injected into
         | 
| 418 | 
            +
            each sample. The output was detected by a power meter synchronized with the wavelength sweep
         | 
| 419 | 
            +
            of the laser. The transverse magnetic (TM) field components of the input and output signals were
         | 
| 420 | 
            +
            filtered out by fiber polarizers. The entire system was based on polarization-maintaining fibers.
         | 
| 421 | 
            +
            We prepared and measured a pair of H1 nanocavity samples with nominally the same structure
         | 
| 422 | 
            +
            for each of 𝑠1; namely the shifts of the innermost holes varied from 89.5 to 101.5 nm in units
         | 
| 423 | 
            +
             | 
| 424 | 
            +
            of 1 nm. All these 26 samples had 𝑠2 = 20.5 nm and 𝑑 = 5
         | 
| 425 | 
            +
            √
         | 
| 426 | 
            +
            3𝑎. A transmission spectrum of
         | 
| 427 | 
            +
            an H1 nanocavity with 𝑠1 = 99.5 nm is plotted in Fig. 4(c). The experimental data shown as
         | 
| 428 | 
            +
            blue points match the Lorentzian curve (colored red) obtained by a least squares fitting. The
         | 
| 429 | 
            +
            peak frequency (wavelength) was 190.4315 THz (1575.370 nm), and the linewidth of the best-fit
         | 
| 430 | 
            +
            curve was 173.8 MHz. These values give an experimental loaded 𝑄 factor of 𝑄exp = 1.1 × 106.
         | 
| 431 | 
            +
            Here, we have excluded any arbitrariness in determining 𝑄exp of the measured resonance with
         | 
| 432 | 
            +
            discrete data points. The input power was attenuated so that thermal linewidth broadening and
         | 
| 433 | 
            +
            nonlinearity would be avoided. In this case, however, the detection power around resonance tails
         | 
| 434 | 
            +
            tended to be slightly reduced, as indicated by its visible drop near 190.4319 THz. This is because
         | 
| 435 | 
            +
            the power meter had a limited dynamic range with a minimum detectable power of -80 dBm.
         | 
| 436 | 
            +
            We can certainly identify this resonance to be the hexapole mode, because the other cavity
         | 
| 437 | 
            +
            modes typically have 𝑄th < 20000 in our simulations and their wavelength spacing with respect
         | 
| 438 | 
            +
            to the ultrahigh-𝑄 peak is 30 nm or larger.
         | 
| 439 | 
            +
            3.2.
         | 
| 440 | 
            +
            Measured wavelengths and quality factors of H1 PCNs
         | 
| 441 | 
            +
            Figure 5(a) presents the dependence of the measured resonance wavelengths 𝜆 of the hexapole
         | 
| 442 | 
            +
            modes on 𝑠1. To show the correspondence between the data of 𝜆 and 𝑄exp, we divided the
         | 
| 443 | 
            +
            samples into two sets according to their positions, so that each sample in set 1 is closer to the
         | 
| 444 | 
            +
            front edge of the chip than its counterpart in set 2 with the same 𝑠1. It can be clearly seen that
         | 
| 445 | 
            +
            𝜆 is positively correlated with ��1, as predicted in Fig. 2(a) and (c). The variation in 𝜆 within
         | 
| 446 | 
            +
            pairwise samples for each 𝑠1 is so weak that a linear regression of the entire data, shown by the
         | 
| 447 | 
            +
            red line, reproduces their average trend. The slope of the regression line is 1.55 ± 0.032 nm (𝜆) /
         | 
| 448 | 
            +
            nm (𝑠1), and its coefficient of determination is 𝑅2 = 0.990.
         | 
| 449 | 
            +
            Here we define the difference in resonant wavelength between set 1 and 2 as Δ𝜆(𝑠1) =
         | 
| 450 | 
            +
            𝜆1(𝑠1) − 𝜆2(𝑠1), where 𝜆1(𝑠1) and 𝜆2(𝑠1) are the wavelengths of the samples with 𝑠1 in set 1
         | 
| 451 | 
            +
            and 2, respectively. Δ𝜆 for all 𝑠1 in Fig. 5(a) are calculated, and then their standard deviation is
         | 
| 452 | 
            +
            found to be 𝜎Δ𝜆 = 0.848 nm. Because 𝜆1(𝑠1) and 𝜆2(𝑠1) ideally have the same value and their
         | 
| 453 | 
            +
            variations should stem from numerous independent and random processes during fabrication,
         | 
| 454 | 
            +
            we assume that they have no covariance. Thus, we can estimate the deviation in 𝜆 to be
         | 
| 455 | 
            +
            𝜎𝜆 = [𝜎2
         | 
| 456 | 
            +
            Δ𝜆/2]1/2 = 0.600 nm.
         | 
| 457 | 
            +
            This result implies that our nanocavities have highly accurate hole positions. Although the
         | 
| 458 | 
            +
            obtained value of 𝜎𝜆 corresponds to a change solely in 𝑠1 of 0.39 nm, in reality, there are other
         | 
| 459 | 
            +
            major factors that affect 𝜎𝜆, such as the hole radii, local Si slab thicknesses and surface roughness.
         | 
| 460 | 
            +
            In addition, the positioning accuracy of the electron beam used in patterning the resist mask is as
         | 
| 461 | 
            +
            small as 0.05 nm. Thus, undesired variations in hole positions, including those in 𝑠1 and 𝑠2, will
         | 
| 462 | 
            +
            be less significant in the actual samples.
         | 
| 463 | 
            +
            The measured loaded 𝑄 factors for the two sample sets are plotted in Fig. 5(b) as a function of
         | 
| 464 | 
            +
            𝑠1. They exhibit a gentle peak centered around 𝑠1 = 94.5 or 95.5 nm; 𝑄exp for these values of 𝑠1
         | 
| 465 | 
            +
            is significantly larger than that for 𝑠1 = 89.5 and 101.5 nm. The best sample here belongs to set
         | 
| 466 | 
            +
            2 and has 𝑠1 = 96.5 nm and 𝑄exp = 1.2 × 106 with an estimated linewidth of 160.4 MHz. Its
         | 
| 467 | 
            +
            transmission spectrum is shown in the inset of Fig. 5(b). Although the shape of the resonance is
         | 
| 468 | 
            +
            slightly asymmetric, it is still fitted by a Lorentzian function.
         | 
| 469 | 
            +
            Eight samples out of 26 had 𝑄exp > 106. Remarkably, they included ones with 𝑠1 = 90.5 and
         | 
| 470 | 
            +
            99.5 nm, namely off from the peak center. This trend implies that the 𝑄 factors for these PCNs
         | 
| 471 | 
            +
            are much larger in theory but were reduced because of fabrication imperfections. The effect of
         | 
| 472 | 
            +
            disorder is also reflected in the outlier sample with a low 𝑄exp = 3.0 × 105 and 𝑠1 = 96.5 nm in
         | 
| 473 | 
            +
            set 1.
         | 
| 474 | 
            +
             | 
| 475 | 
            +
            89.5
         | 
| 476 | 
            +
            91.5
         | 
| 477 | 
            +
            93.5
         | 
| 478 | 
            +
            95.5
         | 
| 479 | 
            +
            97.5
         | 
| 480 | 
            +
            99.5 101.5
         | 
| 481 | 
            +
            0.0
         | 
| 482 | 
            +
            0.2
         | 
| 483 | 
            +
            0.4
         | 
| 484 | 
            +
            0.6
         | 
| 485 | 
            +
            0.8
         | 
| 486 | 
            +
            1.0
         | 
| 487 | 
            +
            1.2
         | 
| 488 | 
            +
             Set 1
         | 
| 489 | 
            +
             Set 2
         | 
| 490 | 
            +
            Loaded Q factor (×106)
         | 
| 491 | 
            +
            s1 (nm)
         | 
| 492 | 
            +
            89.5
         | 
| 493 | 
            +
            91.5
         | 
| 494 | 
            +
            93.5
         | 
| 495 | 
            +
            95.5
         | 
| 496 | 
            +
            97.5
         | 
| 497 | 
            +
            99.5 101.5
         | 
| 498 | 
            +
            1.558
         | 
| 499 | 
            +
            1.562
         | 
| 500 | 
            +
            1.566
         | 
| 501 | 
            +
            1.570
         | 
| 502 | 
            +
            1.574
         | 
| 503 | 
            +
            1.578
         | 
| 504 | 
            +
            1.582
         | 
| 505 | 
            +
             Set 1
         | 
| 506 | 
            +
             Set 2
         | 
| 507 | 
            +
            Resonant wavelength (µm)
         | 
| 508 | 
            +
            s1 (nm)
         | 
| 509 | 
            +
            89.5
         | 
| 510 | 
            +
            91.5
         | 
| 511 | 
            +
            93.5
         | 
| 512 | 
            +
            95.5
         | 
| 513 | 
            +
            97.5
         | 
| 514 | 
            +
            99.5 101.5
         | 
| 515 | 
            +
            1.558
         | 
| 516 | 
            +
            1.562
         | 
| 517 | 
            +
            1.566
         | 
| 518 | 
            +
            1.570
         | 
| 519 | 
            +
            1.574
         | 
| 520 | 
            +
            1.578
         | 
| 521 | 
            +
            1.582
         | 
| 522 | 
            +
            Resonant wavelength (µm)
         | 
| 523 | 
            +
            s1 (nm)
         | 
| 524 | 
            +
            89.5
         | 
| 525 | 
            +
            91.5
         | 
| 526 | 
            +
            93.5
         | 
| 527 | 
            +
            95.5
         | 
| 528 | 
            +
            97.5
         | 
| 529 | 
            +
            99.5 101.5
         | 
| 530 | 
            +
            106
         | 
| 531 | 
            +
            107
         | 
| 532 | 
            +
            108
         | 
| 533 | 
            +
             Unloaded
         | 
| 534 | 
            +
             Loaded
         | 
| 535 | 
            +
             WG coupling
         | 
| 536 | 
            +
            Q factor
         | 
| 537 | 
            +
            s1 (nm)
         | 
| 538 | 
            +
            (a)
         | 
| 539 | 
            +
            (b)
         | 
| 540 | 
            +
            (c)
         | 
| 541 | 
            +
            (d)
         | 
| 542 | 
            +
            191.111 191.112 191.113
         | 
| 543 | 
            +
            0.0
         | 
| 544 | 
            +
            0.5
         | 
| 545 | 
            +
            1.0
         | 
| 546 | 
            +
            Normalized power
         | 
| 547 | 
            +
            Frequency (THz)
         | 
| 548 | 
            +
            Qexp = 1.2×106
         | 
| 549 | 
            +
            Fig. 5. (a) Dependence of measured 𝜆 on 𝑠1 for two nominally duplicate sets of H1 PCN
         | 
| 550 | 
            +
            samples with 𝑎 = 434 nm, 𝑠2 = 20.5 nm, and 𝑑 = 5
         | 
| 551 | 
            +
            √
         | 
| 552 | 
            +
            3𝑎. The grouping of the samples
         | 
| 553 | 
            +
            into sets is based on their positions relative to the front edge of chip (the samples in set
         | 
| 554 | 
            +
            1 are closer to the edge). The red line is a linear regression of the experimental data.
         | 
| 555 | 
            +
            (b) Loaded 𝑄 factor (𝑄exp) as a function of 𝑠1 for the two sample sets. The inset is the
         | 
| 556 | 
            +
            transmission spectrum for the best sample that had 𝑄exp = 1.2 × 106 and 𝑠1 = 96.5
         | 
| 557 | 
            +
            nm. (c) Simulated 𝜆(𝑠1) for 𝑎 = 434 nm, 𝑡 = 241 nm, 𝑅1 = 106 nm, 𝑅0 = 134 nm,
         | 
| 558 | 
            +
            and 𝑠2 = 20.5 nm, which agrees well with the experimental data. (d) Simulated 𝑄
         | 
| 559 | 
            +
            factors for the same parameters on a semi-logarithmic scale. Squares show results for
         | 
| 560 | 
            +
            unloaded samples (𝑄th), while dots are for loaded ones (𝑄th,L) including two W1 PhC
         | 
| 561 | 
            +
            waveguides with 𝑑 = 5
         | 
| 562 | 
            +
            √
         | 
| 563 | 
            +
            3𝑎 that radiate out the light. Triangles show the 𝑄 factors
         | 
| 564 | 
            +
            𝑄WG due to the losses by the waveguides.
         | 
| 565 | 
            +
            3.3.
         | 
| 566 | 
            +
            Simulation of measured samples
         | 
| 567 | 
            +
            We performed simulations by varying the structural parameters around those estimated from the
         | 
| 568 | 
            +
            SEM image. Figure 5(c) shows the theoretical 𝜆 as a function of 𝑠1 for 𝑎 = 434 nm, 𝑡 = 241
         | 
| 569 | 
            +
            nm, 𝑅1 = 106 nm, 𝑅0 = 134 nm, and 𝑠2 = 20.5 nm. The theoretical values agree well with the
         | 
| 570 | 
            +
            experimental data. Although the simulation result is slightly convex upward, its average slope
         | 
| 571 | 
            +
            (1.55 nm (𝜆) / nm (𝑠1)) coincides with that of the experimental result. We emphasize that 𝑅1
         | 
| 572 | 
            +
            and 𝑅0 here are consistent with the measured 𝑅1,s and 𝑅0,s within an error of a few nanometers,
         | 
| 573 | 
            +
            as expected for the current measurement. The value of 𝑡 is smaller than the nominal thickness
         | 
| 574 | 
            +
            250 nm of the Si film, indicating that the PhC slabs were thinned down by the etching processes
         | 
| 575 | 
            +
            and/or that 𝑛Si in the simulation is slightly smaller than that of the actual material.
         | 
| 576 | 
            +
            Moreover, as shown in Fig. 5(d), the corresponding theoretical 𝑄 factors follow the trend seen
         | 
| 577 | 
            +
             | 
| 578 | 
            +
            in the experiment. The figure compares 𝑄th for the H1 PCNs with and without two W1 PhC
         | 
| 579 | 
            +
            waveguides with 𝑑 = 5
         | 
| 580 | 
            +
            √
         | 
| 581 | 
            +
            3𝑎 extending to the right and left sides of the simulation domain where
         | 
| 582 | 
            +
            the fields are scattered out. The plots are on a semi-logarithmic scale, with the horizontal axis
         | 
| 583 | 
            +
            depicting steps of 1 nm. The loaded 𝑄 factors, 𝑄th,L, are the black dots, and the unloaded ones, 𝑄th,
         | 
| 584 | 
            +
            are the purple squares. Both plots peak at 𝑠1 = 96.5, where 𝑄th,L = 5.9×106 and 𝑄th = 5.9×107.
         | 
| 585 | 
            +
            The loaded hexapole mode for this condition has a theoretical modal volume of 𝑉 = 0.74(𝜆/𝑛)3.
         | 
| 586 | 
            +
            Thus, our best experimental sample is expected to have had 𝑄exp/𝑉 = 1.6 × 106(𝑛/𝜆)3.
         | 
| 587 | 
            +
            The difference between 𝑄th,L and 𝑄th comes from the coupling with the environment via
         | 
| 588 | 
            +
            the waveguides. The impact of this coupling, 𝑄WG, can be derived from the relation 1/𝑄th,L =
         | 
| 589 | 
            +
            1/𝑄th + 1/𝑄WG. The resultant values are plotted as the triangles in Fig. 5(d). They exhibit a
         | 
| 590 | 
            +
            moderate variation with 𝑠1 probably due to the group velocity dispersion of the waveguides
         | 
| 591 | 
            +
            and are about 𝑄WG = 6.6 × 106 around the peak of 𝑄th. As a result, the intrinsic (unloaded) 𝑄
         | 
| 592 | 
            +
            factor of the optimum sample is estimated to be 𝑄i = [1/𝑄exp − 1/𝑄WG]−1 = 1.5 × 106. The
         | 
| 593 | 
            +
            correspondent 𝑄/𝑉 amounts to 𝑄i/𝑉 = 2.0 × 106(𝑛/𝜆)3, which is comparable with those of
         | 
| 594 | 
            +
            PCNs without having their surface Si passivated with hydrogen [28,56,57,68].
         | 
| 595 | 
            +
            3.4.
         | 
| 596 | 
            +
            Impact of varying hole radii
         | 
| 597 | 
            +
            We can see that 𝑄exp is still lower than 𝑄th,L and hence it is expected to be affected by reductive
         | 
| 598 | 
            +
            factors other than 𝑄WG. A simple but realistic cause of extra loss is radiative scattering induced
         | 
| 599 | 
            +
            by random variations in the radii and positions of the air holes [55, 69]. The hole radii can
         | 
| 600 | 
            +
            change on the atomic scale order because of stochastic processes in fabrication, such as in the
         | 
| 601 | 
            +
            EB exposure, resist development, and dry and wet etching. On the other hand, the EB shots are
         | 
| 602 | 
            +
            precisely aligned in our lithography process. Thus, the positions of the hole centers are mainly
         | 
| 603 | 
            +
            affected by the small and probabilistic anisotropy of etching or distortion in the shapes of the
         | 
| 604 | 
            +
            holes, part of which is also considered to impact the radii.
         | 
| 605 | 
            +
            Here, we simulated samples with air holes just of varying radii to statistically evaluate the
         | 
| 606 | 
            +
            effect of fabrication imperfections on the 𝑄 factor. The result estimates a dominant portion of the
         | 
| 607 | 
            +
            disorder-induced scatting loss denoted as 1/𝑄scat. We used the parameters that reproduce 𝜆 of
         | 
| 608 | 
            +
            the measured samples and set 𝑠1 = 96.5 nm for 𝑄th = 5.9 × 107 without structural imperfections
         | 
| 609 | 
            +
            or PhC waveguides. The PEC boundary condition of the 𝑦-𝑧 plane was removed so that the
         | 
| 610 | 
            +
            simulation explicitly included all the holes. The small and large holes were assumed to have
         | 
| 611 | 
            +
            random radii sampled from Gaussian distributions with means 𝑅1 and 𝑅0, respectively, and a
         | 
| 612 | 
            +
            common standard deviation (SD) of 𝜎𝑟. The 𝑄 factor obtained in each run is denoted as 𝑄th,F
         | 
| 613 | 
            +
            and satisfies 1/𝑄th,F = 1/𝑄th + 1/𝑄scat.
         | 
| 614 | 
            +
            Figure 6(a) and (b) show 𝜆 and 𝑄th,F for 100 random patterns with 𝜎𝑟 = 1.0 nm. The data
         | 
| 615 | 
            +
            points of both plots look randomly scattered. The mean and SD of the resonant wavelengths are
         | 
| 616 | 
            +
            (𝜇𝜆, 𝜎𝜆) = (1.57084 µm, 1.052 nm) and those of the 𝑄 factors are (𝜇𝑄, 𝜎𝑄) = (2.3 × 106, 1.07 ×
         | 
| 617 | 
            +
            106). The wavelengths tend to be distributed symmetrically around 𝜇𝜆, while the 𝑄 factors are
         | 
| 618 | 
            +
            specifically high for some sample points, indicating distinct statistical properties.
         | 
| 619 | 
            +
            We repeated the random simulations for different 𝜎𝑟. The dependence of (𝜇𝜆, 𝜎𝜆) on 𝜎𝑟 and
         | 
| 620 | 
            +
            that of (𝜇𝑄, 𝜎𝑄) are plotted in Fig. 6(c) and (d), respectively. The mean wavelength for each
         | 
| 621 | 
            +
            𝜎𝑟 is mostly convergent at 𝜆 = 1.5710 µm, which is obtained for the case of no disorder. The
         | 
| 622 | 
            +
            deviation in 𝜆 grows proportionally with 𝜎𝑟. The variance of the radii 𝜎2
         | 
| 623 | 
            +
            𝑟 is directly related to
         | 
| 624 | 
            +
            that of the effective dielectric constant of the PhC slab via the filling fraction of the air holes.
         | 
| 625 | 
            +
            Thus, 𝜎𝑟 affects the deviation of the effective index and has an approximately linear dependence
         | 
| 626 | 
            +
            on 𝜎𝜆. Its slope is estimated as 𝜎𝜆/𝜎𝑟 = 1.11.
         | 
| 627 | 
            +
            In contrast, both 𝜇𝑄 and 𝜎𝑄 tend to be inversely proportional to 𝜎2
         | 
| 628 | 
            +
            𝑟 . As discussed in Ref. [70],
         | 
| 629 | 
            +
            local variations in the dielectric constant affect the extra scattering rate and hence the loss. By
         | 
| 630 | 
            +
             | 
| 631 | 
            +
            20
         | 
| 632 | 
            +
            40
         | 
| 633 | 
            +
            60
         | 
| 634 | 
            +
            80
         | 
| 635 | 
            +
            100
         | 
| 636 | 
            +
            1
         | 
| 637 | 
            +
            0
         | 
| 638 | 
            +
            2
         | 
| 639 | 
            +
            4
         | 
| 640 | 
            +
            6
         | 
| 641 | 
            +
            8
         | 
| 642 | 
            +
            10
         | 
| 643 | 
            +
            Q factor (×106) 
         | 
| 644 | 
            +
            Fluctuation pattern index
         | 
| 645 | 
            +
            20
         | 
| 646 | 
            +
            40
         | 
| 647 | 
            +
            60
         | 
| 648 | 
            +
            80
         | 
| 649 | 
            +
            100
         | 
| 650 | 
            +
            1
         | 
| 651 | 
            +
            1.568
         | 
| 652 | 
            +
            1.569
         | 
| 653 | 
            +
            1.570
         | 
| 654 | 
            +
            1.571
         | 
| 655 | 
            +
            1.572
         | 
| 656 | 
            +
            1.573
         | 
| 657 | 
            +
            1.574
         | 
| 658 | 
            +
            Wavelength (µm)
         | 
| 659 | 
            +
            Fluctuation pattern index
         | 
| 660 | 
            +
            0.0
         | 
| 661 | 
            +
            0.5
         | 
| 662 | 
            +
            1.0
         | 
| 663 | 
            +
            1.5
         | 
| 664 | 
            +
            2.0
         | 
| 665 | 
            +
            0
         | 
| 666 | 
            +
            2
         | 
| 667 | 
            +
            4
         | 
| 668 | 
            +
            6
         | 
| 669 | 
            +
            Mean Q factor µQ (×106)
         | 
| 670 | 
            +
            Deviation of radii σr (nm)
         | 
| 671 | 
            +
            0
         | 
| 672 | 
            +
            1
         | 
| 673 | 
            +
            2
         | 
| 674 | 
            +
            3
         | 
| 675 | 
            +
            Deviation of Q factor σQ (×106)
         | 
| 676 | 
            +
            0.0
         | 
| 677 | 
            +
            0.5
         | 
| 678 | 
            +
            1.0
         | 
| 679 | 
            +
            1.5
         | 
| 680 | 
            +
            2.0
         | 
| 681 | 
            +
            1.568
         | 
| 682 | 
            +
            1.569
         | 
| 683 | 
            +
            1.570
         | 
| 684 | 
            +
            1.571
         | 
| 685 | 
            +
            1.572
         | 
| 686 | 
            +
            1.573
         | 
| 687 | 
            +
            1.574
         | 
| 688 | 
            +
            Mean wavelength µλ(µm)
         | 
| 689 | 
            +
            Deviation of radii σr (nm)
         | 
| 690 | 
            +
            0.0
         | 
| 691 | 
            +
            0.5
         | 
| 692 | 
            +
            1.0
         | 
| 693 | 
            +
            1.5
         | 
| 694 | 
            +
            2.0
         | 
| 695 | 
            +
            2.5
         | 
| 696 | 
            +
            Deviation of wavelength σλ (nm)
         | 
| 697 | 
            +
            (a)
         | 
| 698 | 
            +
            (b)
         | 
| 699 | 
            +
            (c)
         | 
| 700 | 
            +
            (d)
         | 
| 701 | 
            +
            Fig. 6. (a) Simulated resonant wavelengths and (b) unloaded 𝑄 factors of H1 PCNs with
         | 
| 702 | 
            +
            100 different random patterns of hole radii for 𝜎𝑟 = 1.0 nm. (c) Mean and standard
         | 
| 703 | 
            +
            deviation of the resonant wavelength (𝜇𝜆, 𝜎𝜆) and (d) those of the 𝑄 factor (𝜇𝑄, 𝜎𝑄)
         | 
| 704 | 
            +
            of the random simulation for different 𝜎𝑟. 𝜇𝜆(𝜎𝑟) converges at the result without
         | 
| 705 | 
            +
            any disorder shown as the black line, while 𝜎𝜆(𝜎𝑟) grows linearly, as indicated by
         | 
| 706 | 
            +
            the regression line in red. Both 𝜇𝑄 and 𝜎𝑄 are inversely proportional to 𝜎2𝑟 . The
         | 
| 707 | 
            +
            approximate statistical properties of the scattering loss are given by Eqs. (2) and (3).
         | 
| 708 | 
            +
            The mean 𝑅0 and 𝑅1 are 134 nm and 106 nm, respectively. The other parameters are
         | 
| 709 | 
            +
            the same as those used for Fig. 5.
         | 
| 710 | 
            +
            subtracting 1/𝑄th from 1/𝑄th,F of the data, the approximate mean and SD of 1/𝑄scat are given by
         | 
| 711 | 
            +
            𝜇[1/𝑄scat] = 6.3 × 10−7𝜎2
         | 
| 712 | 
            +
            𝑟 ,
         | 
| 713 | 
            +
            (2)
         | 
| 714 | 
            +
            𝜎[1/𝑄scat] = 3.3 × 10−7𝜎2
         | 
| 715 | 
            +
            𝑟 ,
         | 
| 716 | 
            +
            (3)
         | 
| 717 | 
            +
            where 𝜎𝑟 is measured in nanometers.
         | 
| 718 | 
            +
            Similar properties have been reported in multi-
         | 
| 719 | 
            +
            heterostructure nanocavities with variations in the positions and radii of the air holes [55,69].
         | 
| 720 | 
            +
            As mentioned in the discussion of Fig. 5(a), the experimental data suggest 𝜎𝜆 = 0.600 nm.
         | 
| 721 | 
            +
            This value corresponds to 𝜎𝑟 = 0.54 nm via the proportional relation between 𝜎𝜆 and 𝜎𝑟. By
         | 
| 722 | 
            +
            substituting the value of 𝜎𝑟 into Eqs. (2) and (3), we obtain 𝜇[1/𝑄scat] = 1.8 × 10−7 and
         | 
| 723 | 
            +
            𝜎[1/𝑄scat] = 9.6 × 10−8, as the estimated statistical properties of the scattering loss for the
         | 
| 724 | 
            +
            measured samples. The resultant mean 𝑄scat is 5.4 × 106. We should emphasize that we did not
         | 
| 725 | 
            +
            underestimate 𝑄scat by neglecting inaccuracies in the hole positions. The variation in wavelength
         | 
| 726 | 
            +
            in the experiment is attributed solely to 𝜎𝑟, and its entire impact is hence taken into consideration
         | 
| 727 | 
            +
            in obtaining 𝑄scat.
         | 
| 728 | 
            +
            Because the mean 𝑄exp is 𝜇[𝑄exp] ≈ 106 around the optimal condition, this result indicates the
         | 
| 729 | 
            +
            existence of further loss in the experiment with an average 𝑄 factor of (𝜇[1/𝑄exp] − 𝜇[1/𝑄scat] −
         | 
| 730 | 
            +
             | 
| 731 | 
            +
            12
         | 
| 732 | 
            +
            14
         | 
| 733 | 
            +
            16
         | 
| 734 | 
            +
            18
         | 
| 735 | 
            +
            20
         | 
| 736 | 
            +
            22
         | 
| 737 | 
            +
            24
         | 
| 738 | 
            +
            26
         | 
| 739 | 
            +
            28
         | 
| 740 | 
            +
            0
         | 
| 741 | 
            +
            1
         | 
| 742 | 
            +
            2
         | 
| 743 | 
            +
            3
         | 
| 744 | 
            +
            4
         | 
| 745 | 
            +
            5
         | 
| 746 | 
            +
            Qth (×108)
         | 
| 747 | 
            +
            s2 (nm)
         | 
| 748 | 
            +
            12
         | 
| 749 | 
            +
            14
         | 
| 750 | 
            +
            16
         | 
| 751 | 
            +
            18
         | 
| 752 | 
            +
            20
         | 
| 753 | 
            +
            22
         | 
| 754 | 
            +
            24
         | 
| 755 | 
            +
            26
         | 
| 756 | 
            +
            28
         | 
| 757 | 
            +
            1.50
         | 
| 758 | 
            +
            1.52
         | 
| 759 | 
            +
            1.54
         | 
| 760 | 
            +
            1.56
         | 
| 761 | 
            +
            1.58
         | 
| 762 | 
            +
            1.60
         | 
| 763 | 
            +
            1.62
         | 
| 764 | 
            +
            Resonant wavelength (µm)
         | 
| 765 | 
            +
            s2 (nm)
         | 
| 766 | 
            +
            log10(|(Ex)|)
         | 
| 767 | 
            +
            0
         | 
| 768 | 
            +
            kx (units of π/a)
         | 
| 769 | 
            +
            0
         | 
| 770 | 
            +
            -4
         | 
| 771 | 
            +
            4
         | 
| 772 | 
            +
            4
         | 
| 773 | 
            +
            -4
         | 
| 774 | 
            +
            ky (units of π/a)
         | 
| 775 | 
            +
            88
         | 
| 776 | 
            +
            90
         | 
| 777 | 
            +
            92
         | 
| 778 | 
            +
            94
         | 
| 779 | 
            +
            96
         | 
| 780 | 
            +
            98
         | 
| 781 | 
            +
            94.6
         | 
| 782 | 
            +
            96.8
         | 
| 783 | 
            +
            99.0
         | 
| 784 | 
            +
            101.2
         | 
| 785 | 
            +
            103.4
         | 
| 786 | 
            +
            105.6
         | 
| 787 | 
            +
            125.0
         | 
| 788 | 
            +
            127.5
         | 
| 789 | 
            +
            130.0
         | 
| 790 | 
            +
            132.5
         | 
| 791 | 
            +
            135.0
         | 
| 792 | 
            +
            R 1 (nm)
         | 
| 793 | 
            +
            R0 (nm)
         | 
| 794 | 
            +
            s1 (nm)
         | 
| 795 | 
            +
            Start
         | 
| 796 | 
            +
            Qth = 9.2×10
         | 
| 797 | 
            +
            6
         | 
| 798 | 
            +
            Optimum
         | 
| 799 | 
            +
            Qth = 3.1×10
         | 
| 800 | 
            +
            8
         | 
| 801 | 
            +
            Qth = 1.3×10
         | 
| 802 | 
            +
            8
         | 
| 803 | 
            +
            Qth = 2.1×10
         | 
| 804 | 
            +
            8
         | 
| 805 | 
            +
            (a)
         | 
| 806 | 
            +
            (b)
         | 
| 807 | 
            +
            (c)
         | 
| 808 | 
            +
            (d)
         | 
| 809 | 
            +
            Fig. 7. (a) Evolution of (𝑅0, 𝑅1, 𝑠1) in the Nelder-Mead optimization of 𝑄th for
         | 
| 810 | 
            +
            𝑠2 = 23 nm. Blue arrows indicate the direction of the parameter variation. (b)
         | 
| 811 | 
            +
            log10(|F (𝐸𝑥(r))|) for the optimized hexapole mode for 𝑠2 = 23 nm. The radiative
         | 
| 812 | 
            +
            component lying inside the LC is reduced, compared with Fig. 3. The black dashed
         | 
| 813 | 
            +
            circle denotes the light line. (c) 𝜆 and (d) 𝑄th of the optimized H1 PCNs for different
         | 
| 814 | 
            +
            𝑠2. Both of them tend to be positively correlated with 𝑠2. We obtained 𝑄th = 4.5 × 108
         | 
| 815 | 
            +
            for the optimized variables (𝑅0, 𝑅1, 𝑠1) ≈ (115.92 nm, 90.258 nm, 85.773 nm) for
         | 
| 816 | 
            +
            𝑠2 = 26 nm. Other fixed parameters are 𝑎 = 426 nm and 𝑡 = 250 nm.
         | 
| 817 | 
            +
            1/𝑄WG)−1 ≈ 1.5 × 106. We attribute part of this loss to a slight amount of EB resist remaining
         | 
| 818 | 
            +
            on the sample. Considering that the laser scope comes into focus twice in scanning the surface,
         | 
| 819 | 
            +
            it is expected to form a very thin layer over the chip. This results in structural asymmetry in
         | 
| 820 | 
            +
            the out-of-plane direction and hence induces extra radiation loss, as is the case with samples
         | 
| 821 | 
            +
            fabricated on sacrificial layers. Its unevenness, which can be seen at the top right of Fig. 4(b) for
         | 
| 822 | 
            +
            example, could also be a source of scattering. We did not try to remove the resist layer from the
         | 
| 823 | 
            +
            chip, because such a process unavoidably thins down the Si layer and thus alters the dependence
         | 
| 824 | 
            +
            of the resonance properties on 𝑠1. The sample quality will be improved in future studies.
         | 
| 825 | 
            +
            4.
         | 
| 826 | 
            +
            Automated optimization
         | 
| 827 | 
            +
            Recent studies have used various automated optimization algorithms to achieve high theoretical
         | 
| 828 | 
            +
            𝑄 factors in PCNs [54, 56, 62–65]. We used the built-in optimization module of COMSOL
         | 
| 829 | 
            +
            Multiphysics and found that the performance of the H1 PCN can further be improved. Here, we
         | 
| 830 | 
            +
            chose the Nelder-Mead method [71], which prepares a symplex in a parameter space and repeats
         | 
| 831 | 
            +
             | 
| 832 | 
            +
            0
         | 
| 833 | 
            +
            -0.5
         | 
| 834 | 
            +
            -1
         | 
| 835 | 
            +
            -1.5
         | 
| 836 | 
            +
            -2
         | 
| 837 | 
            +
            -2.5
         | 
| 838 | 
            +
            -3
         | 
| 839 | 
            +
            -3.5
         | 
| 840 | 
            +
            -4
         | 
| 841 | 
            +
            -4.5
         | 
| 842 | 
            +
            -5its update based on the reflection, expansion, contraction, or shrink process, depending on the
         | 
| 843 | 
            +
            value of the function 𝐹 to be optimized. This scheme does not use any gradient or assume any
         | 
| 844 | 
            +
            approximate form of the function. Thus, it is expected to work regardless of the actual landscape
         | 
| 845 | 
            +
            of 𝐹. We fixed 𝑠2 and obtain a maximal 𝑄th by varying 𝑅0, 𝑅1 and 𝑠1 in each optimization run,
         | 
| 846 | 
            +
            namely 𝐹 = 𝑄th(𝑅0, 𝑅1, 𝑠1).
         | 
| 847 | 
            +
            Figure 7(a) shows the evolution of the parameters in the optimization for 𝑠2 = 23 nm, 𝑎 = 426
         | 
| 848 | 
            +
            nm, and 𝑡 = 250 nm. Here, the initial point was set as (𝑅0, 𝑅1, 𝑠1) = (128.3 nm, 99.5 nm, 89.4 nm)
         | 
| 849 | 
            +
            with 𝑄th = 9.2 × 106. The variables undergo substantial changes at steps in the early stage
         | 
| 850 | 
            +
            of the operation. The state passes through a condition for 𝑄th > 108 and is then bound in a
         | 
| 851 | 
            +
            region of suboptimal points with 𝑄th < 2 × 108. After a while, however, the algorithm finds
         | 
| 852 | 
            +
            a direction in which 𝑄th is improved beyond 2 × 108. It eventually settles at (𝑅0, 𝑅1, 𝑠1) ≈
         | 
| 853 | 
            +
            (125.18 nm, 97.421 nm, 89.024 nm) exhibiting the optimum objective, 𝑄th = 3.1 × 108. The
         | 
| 854 | 
            +
            normalized absolute Fourier amplitudes of 𝐸𝑥 for this optimal mode are depicted on a logarithmic
         | 
| 855 | 
            +
            scale in Fig. 7(b). Compared with Fig. 3(d), the domain with the relative amplitudes below 10−5
         | 
| 856 | 
            +
            in the LC is doubly extended in the 𝑘𝑥 direction. This feature confirms that the light confinement
         | 
| 857 | 
            +
            of this H1 PCN is stronger than that of the manually designed ones shown in Sec. 2.
         | 
| 858 | 
            +
            We repeated the optimization routine with different values of 𝑠2, which is the additional
         | 
| 859 | 
            +
            factor not in the former design examined in Fig. 3(a) and (c). To understand quantitatively
         | 
| 860 | 
            +
            the impact of 𝑠2, we plot the dependences of 𝜆 and 𝑄th of the optimized PCN in Fig. 7(c)
         | 
| 861 | 
            +
            and (d). The resonant wavelength is monotonically red-shifted as 𝑠2 increases. Accordingly,
         | 
| 862 | 
            +
            a larger 𝑠2 results in a higher optimal 𝑄 factor. We find that 𝑄th = 4.5 × 108 for 𝑠2 = 26 nm,
         | 
| 863 | 
            +
            which is more than a hundred-times the values in the previous reports [33, 54]. Remarkably,
         | 
| 864 | 
            +
            the optimized mode also has a small volume of 𝑉opt = 0.71(𝜆/𝑛)3, and thus its 𝑄/𝑉 is as large
         | 
| 865 | 
            +
            as 𝑄th/𝑉opt = 6.3 × 108(𝑛/𝜆)3. This result confirms the striking contribution of the gradual
         | 
| 866 | 
            +
            variation in the optical potential introduced by 𝑠2 to 𝑄th, as mentioned in Sec. 2.
         | 
| 867 | 
            +
            The optimal structural parameters vary greatly with 𝑠2.
         | 
| 868 | 
            +
            We obtained (𝑅0, 𝑅1, 𝑠1) ≈
         | 
| 869 | 
            +
            (144.23 nm, 111.61 nm, 86.020 nm) and (115.92 nm, 90.258 nm, 85.773 nm) for 𝑠2 = 13
         | 
| 870 | 
            +
            nm and 26 nm, respectively. 𝑅0 and 𝑅1 tend to be negatively correlated with 𝑠2 and 𝜆, while 𝑠1
         | 
| 871 | 
            +
            oscillates gently between 82 nm and 92 nm with respect to 𝑠2. Optimization with more parameters
         | 
| 872 | 
            +
            such as (𝑅0, 𝑅1, 𝑠1, 𝑠2, 𝑎) might result in a better 𝑄th. In that case, however, the parameter space
         | 
| 873 | 
            +
            would become larger and contain more local minima of 𝑄th. Thus, the computation would be
         | 
| 874 | 
            +
            much harder in terms of both its convergence and the probability of finding a good solution. We
         | 
| 875 | 
            +
            leave that consideration out of the scope of this study.
         | 
| 876 | 
            +
            5.
         | 
| 877 | 
            +
            Discussion
         | 
| 878 | 
            +
            Experimental 𝑄 factors of PCNs are generally limited by many kinds of defects. Discussing their
         | 
| 879 | 
            +
            impact will allow us to predict how high 𝑄exp could be made in a real PCN device.
         | 
| 880 | 
            +
            A major cause of the reduction of 𝑄 factors is structural imperfections. In our result, the
         | 
| 881 | 
            +
            variations in 𝜆 and 1/𝑄th,F were attributed to those in the hole radii, and 𝜎𝑟 = 0.54 nm and
         | 
| 882 | 
            +
            𝜇[1/𝑄scat] = 1.8 × 10−7 were obtained. A groundbreaking report by Asano et al. on multi-
         | 
| 883 | 
            +
            heterostructure PCNs [72], including one with 𝑄exp = 1.1 × 107, considered the same deviation
         | 
| 884 | 
            +
            𝜎hole in both the positions and radii of the air holes. They estimated 𝜎hole to be 0.25 nm and the
         | 
| 885 | 
            +
            corresponding 𝜇[1/𝑄scat] to be 4.7 × 10−8 for their PCN samples. A monolayer of Si is about
         | 
| 886 | 
            +
            0.135-nm-thick and an air hole has two side walls in the radial direction. Thus, 𝜎hole = 0.25 nm
         | 
| 887 | 
            +
            seems to indicate that the etching process just leaves the uncertainty at the level where a single
         | 
| 888 | 
            +
            atomic layer is removed or not at every Si surface, including the resultant hole displacement.
         | 
| 889 | 
            +
            Both Eq. (2) and the dependence of 𝜇[1/𝑄scat] on 𝜎hole in Ref. [72] are quadratic equations
         | 
| 890 | 
            +
            and have similar coefficients. Even though 𝜎𝑟 and 𝜎hole of the two PCNs can be reduced to the
         | 
| 891 | 
            +
            monolayer level (= 0.135 nm), a dimensionless loss of about 𝜇[1/𝑄scat] ≈ 10−8 remains. This
         | 
| 892 | 
            +
            implies that it is hard to achieve 𝜇[𝑄scat] > 108 for PCNs.
         | 
| 893 | 
            +
             | 
| 894 | 
            +
            Another limiting factor is the formation of surface oxidation layers on Si. Every Si/SiO𝑥
         | 
| 895 | 
            +
            interface has a few kinds of surface states whose spectral densities of states are within the band
         | 
| 896 | 
            +
            gap of Si [73]. They exhibit optical absorption at telecommunication wavelengths (≈ 0.8 eV) and
         | 
| 897 | 
            +
            are known to significantly increase loss in Si photonic devices [74]. This detrimental effect can
         | 
| 898 | 
            +
            be circumvented by passivating Si surfaces with hydrogen via HF etching [75,76]. However, the
         | 
| 899 | 
            +
            Si-H termination is not stable and the surfaces hence suffer from natural oxidation in ambient
         | 
| 900 | 
            +
            conditions. Thus, a combination of this process and subsequent measurement of the samples
         | 
| 901 | 
            +
            in an inert gas-purged chamber seems to be needed in order to achieve 𝑄exp > 107 [72]. For
         | 
| 902 | 
            +
            heterostructure PCNs with oxide layers [77], the inverse of the 𝑄 factor based on absorption
         | 
| 903 | 
            +
            (1/𝑄abs) was estimated to be about 1/(7 × 106) = 1.43 × 10−7, and a large part of it seemed
         | 
| 904 | 
            +
            to stem from the surface states. Although water molecules that adhere to sample surfaces also
         | 
| 905 | 
            +
            induce absorption loss, their impact appears to be an order of magnitude smaller. Repeating the
         | 
| 906 | 
            +
            formation and removal of SiO𝑥 layers can also reduce the surface roughness and hence suppress
         | 
| 907 | 
            +
            extra scattering loss [78,79]. Performing such a process on the bottom surface of Si may also be
         | 
| 908 | 
            +
            helpful in removing dopant contamination that could concentrate around the interface between
         | 
| 909 | 
            +
            the Si and BOX layers [72,80].
         | 
| 910 | 
            +
            Overall, the 𝑄exp achievable for practical PCNs in air seems to be limited to below 107; with
         | 
| 911 | 
            +
            the hydrogen passivation 𝑄exp may reach on the order of 107. Because PCNs can have such a
         | 
| 912 | 
            +
            high 𝑄/𝑉 coefficient, we should mention that they would also be subject to fluctuations in the
         | 
| 913 | 
            +
            refractive index caused by thermal noise, which induce their linewidth broadening [81]. Although
         | 
| 914 | 
            +
            PCNs are not so affected by ambient temperature, thermal noise may become a problem when
         | 
| 915 | 
            +
            they absorb the injected light. Our experiment showed a symptom of the linewidth broadening,
         | 
| 916 | 
            +
            when the measured transmission power exceeded 1 nW. This feature is attributed to heat, since it
         | 
| 917 | 
            +
            appears as a precursor of bistable transmission based on thermo-optic nonlinearity. A similar
         | 
| 918 | 
            +
            result was seen in a previous report [34]. PCNs with larger 𝑄exp than ours might need a smaller
         | 
| 919 | 
            +
            probe power to avoid it. In that case, a time-resolved ("ring-down") measurement with a pulsed
         | 
| 920 | 
            +
            excitation might be useful [82].
         | 
| 921 | 
            +
            6.
         | 
| 922 | 
            +
            Conclusion
         | 
| 923 | 
            +
            The theoretical and experimental 𝑄 factors of our hexapole H1 PCNs were 𝑄th > 108 and
         | 
| 924 | 
            +
            𝑄exp > 106. Thanks to the 𝐶6 symmetry of the hexapole mode, our design required optimization
         | 
| 925 | 
            +
            of only four structural modulation parameters. Bands of valid conditions for 𝑄th ⪆ 108 were
         | 
| 926 | 
            +
            found in both the (𝑠1, 𝑅1) and (𝑠1, 𝑠2) parameter spaces. The field distributions of such modes
         | 
| 927 | 
            +
            indicated stronger light confinement in both the in-plane and out-of-plane directions compared
         | 
| 928 | 
            +
            with the previous design that did not use 𝑠2. In the experimental demonstration, the Si H1 PCN
         | 
| 929 | 
            +
            samples exhibited a systematic change in their resonant wavelengths when varying the radial shift
         | 
| 930 | 
            +
            of the innermost holes 𝑠1 in steps of 1 nm. Their maximum loaded 𝑄 factor was 𝑄exp = 1.2 × 106,
         | 
| 931 | 
            +
            and the corresponding cavity’s intrinsic 𝑄 factor was 𝑄i = 1.5 × 106. Repeating an automated
         | 
| 932 | 
            +
            optimization with (𝑅0, 𝑅1, 𝑠1) for different values of the radial shift of the second innermost
         | 
| 933 | 
            +
            holes 𝑠2 resulted in 𝑄th = 4.5 × 108, a more than a hundred-fold improvement compared with
         | 
| 934 | 
            +
            the previous studies. We also discussed some of the major elements that degrade 𝑄exp in reality
         | 
| 935 | 
            +
            and estimated the order of practically obtainable 𝑄exp. Our work spotlights the power of modal
         | 
| 936 | 
            +
            symmetry for improving the performance of nanocavities. It also shows the potential of the H1
         | 
| 937 | 
            +
            PCN in various applications such as functional photonic devices, quantum information processing,
         | 
| 938 | 
            +
            and large-scale one- and two-dimensional resonator lattices for studying non-Hermitian and
         | 
| 939 | 
            +
            topological photonics and other emergent topics.
         | 
| 940 | 
            +
            Funding.
         | 
| 941 | 
            +
            JSPS KAKENHI Grant Number JP20H05641.
         | 
| 942 | 
            +
            Acknowledgements.
         | 
| 943 | 
            +
            We thank Toshiaki Tamamura, Junichi Asaoka, Osamu Moriwaki, Toshifumi
         | 
| 944 | 
            +
            Watanabe and Mizuki Ikeya for support with the sample fabrication. We are also grateful to Hideaki
         | 
| 945 | 
            +
            Taniyama for support with the complemental FDTD simulation and Shota Kita for fruitful discussion.
         | 
| 946 | 
            +
             | 
| 947 | 
            +
            Disclosures.
         | 
| 948 | 
            +
            The authors declare no conflicts of interest.
         | 
| 949 | 
            +
            Data availability.
         | 
| 950 | 
            +
            Data underlying the results presented in this paper are not publicly available at this
         | 
| 951 | 
            +
            time but may be obtained from the authors upon reasonable request.
         | 
| 952 | 
            +
            References
         | 
| 953 | 
            +
            1.
         | 
| 954 | 
            +
            J. D. Joannopoulos, S. G. Johnson, J. N. Winn, and R. D. Meade, Photonic Crystals: Molding the Flow of Light
         | 
| 955 | 
            +
            (Princeton University Press, Princeton, 2008), 2nd ed.
         | 
| 956 | 
            +
            2.
         | 
| 957 | 
            +
            O. Painter, R. K. Lee, A. Scherer, A. Yariv, J. D. O’Brien, P. D. Dapkus, and I. Kim, “Two-dimensional photonic
         | 
| 958 | 
            +
            band-gap defect mode laser,” Science 284, 1819–1821 (1999).
         | 
| 959 | 
            +
            3.
         | 
| 960 | 
            +
            K. Srinivasan and O. Painter, “Momentum space design of high-Q photonic crystal optical cavities,” Opt. Express 10,
         | 
| 961 | 
            +
            670–684 (2002).
         | 
| 962 | 
            +
            4.
         | 
| 963 | 
            +
            Y. Akahane, T. Asano, B.-S. Song, and S. Noda, “High-Q photonic nanocavity in a two-dimensional photonic crystal,”
         | 
| 964 | 
            +
            Nature 425, 944–947 (2003).
         | 
| 965 | 
            +
            5.
         | 
| 966 | 
            +
            M. Notomi, A. Shinya, S. Mitsugi, E. Kuramochi, and H.-Y. Ryu, “Waveguides, resonators and their coupled elements
         | 
| 967 | 
            +
            in photonic crystal slabs,” Opt. Express 12, 1551–1561 (2004).
         | 
| 968 | 
            +
            6.
         | 
| 969 | 
            +
            T. Yoshie, A. Scherer, J. Hendrickson, G. Khitrova, H. M. Gibbs, G. Rupper, C. Ell, O. B. Shchekin, and D. G. Deppe,
         | 
| 970 | 
            +
            “Vacuum Rabi splitting with a single quantum dot in a photonic crystal nanocavity,” Nature 432, 200–203 (2004).
         | 
| 971 | 
            +
            7.
         | 
| 972 | 
            +
            B.-S. Song, S. Noda, T. Asano, and Y. Akahane, “Ultra-high-Q photonic double-heterostructure nanocavity,” Nat.
         | 
| 973 | 
            +
            Mater. 4, 207–210 (2005).
         | 
| 974 | 
            +
            8.
         | 
| 975 | 
            +
            D. Englund, I. Fushman, and J. Vuckovic, “General recipe for designing photonic crystal cavities,” Opt. Express 13,
         | 
| 976 | 
            +
            5961–5975 (2005).
         | 
| 977 | 
            +
            9.
         | 
| 978 | 
            +
            E. Kuramochi, M. Notomi, S. Mitsugi, A. Shinya, T. Tanabe, and T. Watanabe, “Ultrahigh-Q photonic crystal
         | 
| 979 | 
            +
            nanocavities realized by the local width modulation of a line defect,” Appl. Phys. Lett. 88, 041112 (2006).
         | 
| 980 | 
            +
            10. Y. Takahashi, H. Hagino, Y. Tanaka, B.-S. Song, T. Asano, and S. Noda, “High-Q nanocavity with a 2-ns photon
         | 
| 981 | 
            +
            lifetime,” Opt. Express 15, 17206–17213 (2007).
         | 
| 982 | 
            +
            11. E. Kuramochi, H. Taniyama, T. Tanabe, A. Shinya, and M. Notomi, “Ultrahigh-Q two-dimensional photonic crystal
         | 
| 983 | 
            +
            slab nanocavities in very thin barriers,” Appl. Phys. Lett. 93, 111112 (2008).
         | 
| 984 | 
            +
            12. M. Notomi, E. Kuramochi, and H. Taniyama, “Ultrahigh-Q nanocavity with 1D photonic gap,” Opt. Express 16,
         | 
| 985 | 
            +
            11095–11102 (2008).
         | 
| 986 | 
            +
            13. S. Matsuo, A. Shinya, T. Kakitsuka, K. Nozaki, T. Segawa, T. Sato, Y. Kawaguchi, and M. Notomi, “High-speed
         | 
| 987 | 
            +
            ultracompact buried heterostructure photonic-crystal laser with 13 fJ of energy consumed per bit transmitted,” Nat.
         | 
| 988 | 
            +
            Photonics 4, 648–654 (2010).
         | 
| 989 | 
            +
            14. K. Takeda, T. Sato, A. Shinya, K. Nozaki, W. Kobayashi, H. Taniyama, M. Notomi, K. Hasebe, T. Kakitsuka,
         | 
| 990 | 
            +
            and S. Matsuo, “Few-fJ/bit data transmissions using directly modulated lambda-scale embedded active region
         | 
| 991 | 
            +
            photonic-crystal lasers,” Nat. Photonics 7, 569–575 (2013).
         | 
| 992 | 
            +
            15. A. Shakoor, K. Nozaki, E. Kuramochi, K. Nishiguchi, A. Shinya, and M. Notomi, “Compact 1D-silicon photonic
         | 
| 993 | 
            +
            crystal electro-optic modulator operating with ultra-low switching voltage and energy,” Opt. Express 22, 28623–28634
         | 
| 994 | 
            +
            (2014).
         | 
| 995 | 
            +
            16. M. Notomi, A. Shinya, S. Mitsugi, G. Kira, E. Kuramochi, and T. Tanabe, “Optical bistable switching action of si
         | 
| 996 | 
            +
            high-Q photonic-crystal nanocavities,” Opt. Express 13, 2678–2687 (2005).
         | 
| 997 | 
            +
            17. N. Matsuda, T. Kato, K. ichi Harada, H. Takesue, E. Kuramochi, H. Taniyama, and M. Notomi, “Slow light enhanced
         | 
| 998 | 
            +
            optical nonlinearity in a silicon photonic crystal coupled-resonator optical waveguide,” Opt. Express 19, 19861–19874
         | 
| 999 | 
            +
            (2011).
         | 
| 1000 | 
            +
            18. Y. Takahashi, Y. Inui, M. Chihara, T. Asano, R. Terawaki, and S. Noda, “A micrometre-scale Raman silicon laser
         | 
| 1001 | 
            +
            with a microwatt threshold,” Nature 498, 470–474 (2013).
         | 
| 1002 | 
            +
            19. D. Englund, D. Fattal, E. Waks, G. Solomon, B. Zhang, T. Nakaoka, Y. Arakawa, Y. Yamamoto, and J. Vučković,
         | 
| 1003 | 
            +
            “Controlling the spontaneous emission rate of single quantum dots in a two-dimensional photonic crystal,” Phys. Rev.
         | 
| 1004 | 
            +
            Lett. 95, 013904 (2005).
         | 
| 1005 | 
            +
            20. M. Nomura, N. Kumagai, S. Iwamoto, Y. Ota, and Y. Arakawa, “Laser oscillation in a strongly coupled single-
         | 
| 1006 | 
            +
            quantum-dot–nanocavity system,” Nat. Phys. 6, 279–283 (2010).
         | 
| 1007 | 
            +
            21. F. Liu, A. J. Brash, J. O’Hara, L. M. P. P. Martins, C. L. Phillips, R. J. Coles, B. Royall, E. Clarke, C. Bentham,
         | 
| 1008 | 
            +
            N. Prtljaga, I. E. Itskevich, L. R. Wilson, M. S. Skolnick, and A. M. Fox, “High Purcell factor generation of
         | 
| 1009 | 
            +
            indistinguishable on-chip single photons,” Nat. Nanotechnol. 13, 835–840 (2018).
         | 
| 1010 | 
            +
            22. A. Yariv, Y. Xu, R. K. Lee, and A. Scherer, “Coupled-resonator optical waveguide: a proposal and analysis,” Opt.
         | 
| 1011 | 
            +
            Lett. 24, 711–713 (1999).
         | 
| 1012 | 
            +
            23. M. Notomi, E. Kuramochi, and T. Tanabe, “Large-scale arrays of ultrahigh-Q coupled nanocavities,” Nat. Photonics
         | 
| 1013 | 
            +
            2, 741–747 (2008).
         | 
| 1014 | 
            +
            24. E. Kuramochi, N. Matsuda, K. Nozaki, A. H. K. Park, H. Takesue, and M. Notomi, “Wideband slow short-pulse
         | 
| 1015 | 
            +
            propagation in one-thousand slantingly coupled L3 photonic crystal nanocavities,” Opt. Express 26, 9552–9564
         | 
| 1016 | 
            +
            (2018).
         | 
| 1017 | 
            +
            25. T. Tanabe, M. Notomi, S. Mitsugi, A. Shinya, and E. Kuramochi, “All-optical switches on a silicon chip realized
         | 
| 1018 | 
            +
            using photonic crystal nanocavities,” Appl. Phys. Lett. 87, 151112 (2005).
         | 
| 1019 | 
            +
             | 
| 1020 | 
            +
            26. K. Nozaki, T. Tanabe, A. Shinya, S. Matsuo, T. Sato, H. Taniyama, and M. Notomi, “Sub-femtojoule all-optical
         | 
| 1021 | 
            +
            switching using a photonic-crystal nanocavity,” Nat. Photonics 4, 477–483 (2010).
         | 
| 1022 | 
            +
            27. K. Nozaki, A. Shinya, S. Matsuo, T. Sato, E. Kuramochi, and M. Notomi, “Ultralow-energy and high-contrast
         | 
| 1023 | 
            +
            all-optical switch involving Fano resonance based on coupled photonic crystal nanocavities,” Opt. Express 21,
         | 
| 1024 | 
            +
            11877–11888 (2013).
         | 
| 1025 | 
            +
            28. T. Tanabe, M. Notomi, E. Kuramochi, A. Shinya, and H. Taniyama, “Trapping and delaying photons for one
         | 
| 1026 | 
            +
            nanosecond in an ultrasmall high-Q photonic-crystal nanocavity,” Nat. Photonics 1, 49–52 (2006).
         | 
| 1027 | 
            +
            29. K. Nozaki, A. Shinya, S. Matsuo, Y. Suzaki, T. Segawa, T. Sato, Y. Kawaguchi, R. Takahashi, and M. Notomi,
         | 
| 1028 | 
            +
            “Ultralow-power all-optical RAM based on nanocavities,” Nat. Photonics 6, 248–252 (2012).
         | 
| 1029 | 
            +
            30. E. Kuramochi, K. Nozaki, A. Shinya, K. Takeda, T. Sato, S. Matsuo, H. Taniyama, H. Sumikura, and M. Notomi,
         | 
| 1030 | 
            +
            “Large-scale integration of wavelength-addressable all-optical memories on a photonic crystal chip,” Nat. Photonics
         | 
| 1031 | 
            +
            8, 474–481 (2014).
         | 
| 1032 | 
            +
            31. K. Nozaki, S. Matsuo, T. Fujii, K. Takeda, A. Shinya, E. Kuramochi, and M. Notomi, “Femtofarad optoelectronic
         | 
| 1033 | 
            +
            integration demonstrating energy-saving signal conversion and nonlinear functions,” Nat. Photonics 13, 454–459
         | 
| 1034 | 
            +
            (2019).
         | 
| 1035 | 
            +
            32. H.-Y. Ryu, M. Notomi, and Y.-H. Lee, “High-quality-factor and small-mode-volume hexapole modes in photonic-
         | 
| 1036 | 
            +
            crystal-slab nanocavities,” Appl. Phys. Lett. 83, 4294–4296 (2003).
         | 
| 1037 | 
            +
            33. G.-H. Kim, Y.-H. Lee, A. Shinya, and M. Notomi, “Coupling of small, low-loss hexapole mode with photonic crystal
         | 
| 1038 | 
            +
            slab waveguide mode,” Opt. Express 12, 6624–6631 (2004).
         | 
| 1039 | 
            +
            34. T. Tanabe, A. Shinya, E. Kuramochi, S. Kondo, H. Taniyama, and M. Notomi, “Single point defect photonic crystal
         | 
| 1040 | 
            +
            nanocavity with ultrahigh quality factor achieved by using hexapole mode,” Appl. Phys. Lett. 91, 021110 (2007).
         | 
| 1041 | 
            +
            35. H. Takagi, Y. Ota, N. Kumagai, S. Ishida, S. Iwamoto, and Y. Arakawa, “High-Q H1 photonic crystal nanocavities
         | 
| 1042 | 
            +
            with efficient vertical emission,” Opt. Express 20, 28292–28300 (2012).
         | 
| 1043 | 
            +
            36. K. Sakoda, Optical Properties of Photonic Crystals, Springer Series in Optical Sciences (Springer-Verlag, Berlin,
         | 
| 1044 | 
            +
            Heidelberg, 2005), 2nd ed.
         | 
| 1045 | 
            +
            37. H. Altug and J. Vučković, “Two-dimensional coupled photonic crystal resonator arrays,” Appl. Phys. Lett. 84,
         | 
| 1046 | 
            +
            161–163 (2004).
         | 
| 1047 | 
            +
            38. K. Takata and M. Notomi, “PT-symmetric coupled-resonator waveguide based on buried heterostructure nanocavities,”
         | 
| 1048 | 
            +
            Phys. Rev. Appl. 7, 054023 (2017).
         | 
| 1049 | 
            +
            39. K. Takata and M. Notomi, “Photonic topological insulating phase induced solely by gain and loss,” Phys. Rev. Lett.
         | 
| 1050 | 
            +
            121, 213902 (2018).
         | 
| 1051 | 
            +
            40. C. Han, M. Lee, S. Callard, C. Seassal, and H. Jeon, “Lasing at topological edge states in a photonic crystal L3
         | 
| 1052 | 
            +
            nanocavity dimer array,” Light. Sci. Appl. 8, 40 (2019).
         | 
| 1053 | 
            +
            41. R. Duggan, S. A. Mann, and A. Alù, “Nonreciprocal photonic topological order driven by uniform optical pumping,”
         | 
| 1054 | 
            +
            Phys. Rev. B 102, 100303 (2020).
         | 
| 1055 | 
            +
            42. K. Takata, K. Nozaki, E. Kuramochi, S. Matsuo, K. Takeda, T. Fujii, S. Kita, A. Shinya, and M. Notomi, “Observing
         | 
| 1056 | 
            +
            exceptional point degeneracy of radiation with electrically pumped photonic crystal coupled-nanocavity lasers,”
         | 
| 1057 | 
            +
            Optica 8, 184–192 (2021).
         | 
| 1058 | 
            +
            43. C. F. Fong, Y. Ota, Y. Arakawa, S. Iwamoto, and Y. K. Kato, “Chiral modes near exceptional points in symmetry
         | 
| 1059 | 
            +
            broken H1 photonic crystal cavities,” Phys. Rev. Res. 3, 043096 (2021).
         | 
| 1060 | 
            +
            44. K. Takata, N. Roberts, A. Shinya, and M. Notomi, “Imaginary couplings in non-Hermitian coupled-mode theory:
         | 
| 1061 | 
            +
            Effects on exceptional points of optical resonators,” Phys. Rev. A 105, 013523 (2022).
         | 
| 1062 | 
            +
            45. F. Hentinger, M. Hedir, B. Garbin, M. Marconi, L. Ge, F. Raineri, J. A. Levenson, and A. M. Yacomotti, “Direct
         | 
| 1063 | 
            +
            observation of zero modes in a non-Hermitian optical nanocavity array,” Photon. Res. 10, 574–586 (2022).
         | 
| 1064 | 
            +
            46. Ş. K. Özdemir, S. Rotter, F. Nori, and L. Yang, “Parity–time symmetry and exceptional points in photonics,” Nat.
         | 
| 1065 | 
            +
            Mater. 18, 783–798 (2019).
         | 
| 1066 | 
            +
            47. Y. Ota, K. Takata, T. Ozawa, A. Amo, Z. Jia, B. Kante, M. Notomi, Y. Arakawa, and S. Iwamoto, “Active topological
         | 
| 1067 | 
            +
            photonics,” Nanophotonics 9, 547–567 (2020).
         | 
| 1068 | 
            +
            48. A. Szameit, M. C. Rechtsman, O. Bahat-Treidel, and M. Segev, “PT-symmetry in honeycomb photonic lattices,”
         | 
| 1069 | 
            +
            Phys. Rev. A 84, 021806 (2011).
         | 
| 1070 | 
            +
            49. M. Kremer, T. Biesenthal, L. J. Maczewsky, M. Heinrich, R. Thomale, and A. Szameit, “Demonstration of a
         | 
| 1071 | 
            +
            two-dimensional PT-symmetric crystal,” Nat. Commun. 10, 435 (2019).
         | 
| 1072 | 
            +
            50. L.-H. Wu and X. Hu, “Scheme for achieving a topological photonic crystal by using dielectric material,” Phys. Rev.
         | 
| 1073 | 
            +
            Lett. 114, 223901 (2015).
         | 
| 1074 | 
            +
            51. J. Noh, W. A. Benalcazar, S. Huang, M. J. Collins, K. P. Chen, T. L. Hughes, and M. C. Rechtsman, “Topological
         | 
| 1075 | 
            +
            protection of photonic mid-gap defect modes,” Nat. Photonics 12, 408–415 (2018).
         | 
| 1076 | 
            +
            52. M. Li, D. Zhirihin, M. Gorlach, X. Ni, D. Filonov, A. Slobozhanyuk, A. Alù, and A. B. Khanikaev, “Higher-order
         | 
| 1077 | 
            +
            topological states in photonic kagome crystals with long-range interactions,” Nat. Photonics 14, 89–94 (2020).
         | 
| 1078 | 
            +
            53. A. B. Khanikaev and G. Shvets, “Two-dimensional topological photonics,” Nat. Photonics 11, 763–773 (2017).
         | 
| 1079 | 
            +
            54. M. Minkov and V. Savona, “Automated optimization of photonic crystal slab cavities,” Sci. Rep. 4, 5124 (2014).
         | 
| 1080 | 
            +
            55. Y. Taguchi, Y. Takahashi, Y. Sato, T. Asano, and S. Noda, “Statistical studies of photonic heterostructure nanocavities
         | 
| 1081 | 
            +
            with an average Q factor of three million,” Opt. Express 19, 11916–11921 (2011).
         | 
| 1082 | 
            +
            56. Y. Lai, S. Pirotta, G. Urbinati, D. Gerace, M. Minkov, V. Savona, A. Badolato, and M. Galli, “Genetically designed
         | 
| 1083 | 
            +
             | 
| 1084 | 
            +
            L3 photonic crystal nanocavities with measured quality factor exceeding one million,” Appl. Phys. Lett. 104, 241101
         | 
| 1085 | 
            +
            (2014).
         | 
| 1086 | 
            +
            57. A. Simbula, M. Schatzl, L. Zagaglia, F. Alpeggiani, L. C. Andreani, F. Schäffler, T. Fromherz, M. Galli, and D. Gerace,
         | 
| 1087 | 
            +
            “Realization of high-Q/V photonic crystal cavities defined by an effective Aubry-André-Harper bichromatic potential,”
         | 
| 1088 | 
            +
            APL Photonics 2, 056102 (2017).
         | 
| 1089 | 
            +
            58. R. Benevides, F. G. S. Santos, G. O. Luiz, G. S. Wiederhecker, and T. P. M. Alegre, “Ultrahigh-Q optomechanical
         | 
| 1090 | 
            +
            crystal cavities fabricated in a CMOS foundry,” Sci. Rep. 7, 2491 (2017).
         | 
| 1091 | 
            +
            59. K. Ashida, M. Okano, T. Yasuda, M. Ohtsuka, M. Seki, N. Yokoyama, K. Koshino, K. Yamada, and Y. Takahashi,
         | 
| 1092 | 
            +
            “Photonic crystal nanocavities with an average Q factor of 1.9 million fabricated on a 300-mm-wide SOI wafer using
         | 
| 1093 | 
            +
            a CMOS-compatible process,” J. Light. Technol. 36, 4774–4782 (2018).
         | 
| 1094 | 
            +
            60. “COMSOL Multiphysics®,” https://www.comsol.com/.
         | 
| 1095 | 
            +
            61. S. G. Johnson, S. Fan, A. Mekis, and J. D. Joannopoulos, “Multipole-cancellation mechanism for high-Q cavities in
         | 
| 1096 | 
            +
            the absence of a complete photonic band gap,” Appl. Phys. Lett. 78, 3388–3390 (2001).
         | 
| 1097 | 
            +
            62. M. Minkov, V. Savona, and D. Gerace, “Photonic crystal slab cavity simultaneously optimized for ultra-high Q/V and
         | 
| 1098 | 
            +
            vertical radiation coupling,” Appl. Phys. Lett. 111, 131104 (2017).
         | 
| 1099 | 
            +
            63. T. Asano and S. Noda, “Optimization of photonic crystal nanocavities based on deep learning,” Opt. Express 26,
         | 
| 1100 | 
            +
            32704–32717 (2018).
         | 
| 1101 | 
            +
            64. T. Shibata, T. Asano, and S. Noda, “Fabrication and characterization of an L3 nanocavity designed by an iterative
         | 
| 1102 | 
            +
            machine-learning method,” APL Photonics 6, 036113 (2021).
         | 
| 1103 | 
            +
            65. J. P. Vasco and V. Savona, “Global optimization of an encapsulated Si/SiO2 L3 cavity with a 43 million quality
         | 
| 1104 | 
            +
            factor,” Sci. Rep. 11, 10121 (2021).
         | 
| 1105 | 
            +
            66. Y. Tanaka, T. Asano, and S. Noda, “Design of photonic crystal nanocavity with Q-factor of ∼ 109,” J. Light. Technol.
         | 
| 1106 | 
            +
            26, 1532–1539 (2008).
         | 
| 1107 | 
            +
            67. T. Nakamura, Y. Takahashi, Y. Tanaka, T. Asano, and S. Noda, “Improvement in the quality factors for photonic
         | 
| 1108 | 
            +
            crystal nanocavities via visualization of the leaky components,” Opt. Express 24, 9541–9549 (2016).
         | 
| 1109 | 
            +
            68. U. P. Dharanipathy, M. Minkov, M. Tonin, V. Savona, and R. Houdré, “High-q silicon photonic crystal cavity for
         | 
| 1110 | 
            +
            enhanced optical nonlinearities,” Appl. Phys. Lett. 105, 101101 (2014).
         | 
| 1111 | 
            +
            69. H. Hagino, Y. Takahashi, Y. Tanaka, T. Asano, and S. Noda, “Effects of fluctuation in air hole radii and positions on
         | 
| 1112 | 
            +
            optical characteristics in photonic crystal heterostructure nanocavities,” Phys. Rev. B 79, 085112 (2009).
         | 
| 1113 | 
            +
            70. S. Hughes, L. Ramunno, J. F. Young, and J. E. Sipe, “Extrinsic optical scattering loss in photonic crystal waveguides:
         | 
| 1114 | 
            +
            Role of fabrication disorder and photon group velocity,” Phys. Rev. Lett. 94, 033903 (2005).
         | 
| 1115 | 
            +
            71. J. A. Nelder and R. Mead, “A Simplex Method for Function Minimization,” The Comput. J. 7, 308–313 (1965).
         | 
| 1116 | 
            +
            72. T. Asano, Y. Ochi, Y. Takahashi, K. Kishimoto, and S. Noda, “Photonic crystal nanocavity with a Q factor exceeding
         | 
| 1117 | 
            +
            eleven million,” Opt. Express 25, 1769–1777 (2017).
         | 
| 1118 | 
            +
            73. Y. Yamashita, K. Namba, Y. Nakato, Y. Nishioka, and H. Kobayashi, “Spectroscopic observation of interface states
         | 
| 1119 | 
            +
            of ultrathin silicon oxide,” J. Appl. Phys. 79, 7051–7057 (1996).
         | 
| 1120 | 
            +
            74. M. Borselli, T. J. Johnson, and O. Painter, “Measuring the role of surface chemistry in silicon microphotonics,” Appl.
         | 
| 1121 | 
            +
            Phys. Lett. 88, 131114 (2006).
         | 
| 1122 | 
            +
            75. E. Yablonovitch, D. L. Allara, C. C. Chang, T. Gmitter, and T. B. Bright, “Unusually low surface-recombination
         | 
| 1123 | 
            +
            velocity on silicon and germanium surfaces,” Phys. Rev. Lett. 57, 249–252 (1986).
         | 
| 1124 | 
            +
            76. T. Takahagi, I. Nagai, A. Ishitani, H. Kuroda, and Y. Nagasawa, “The formation of hydrogen passivated silicon
         | 
| 1125 | 
            +
            single-crystal surfaces using ultraviolet cleaning and HF etching,” J. Appl. Phys. 64, 3516–3521 (1988).
         | 
| 1126 | 
            +
            77. H. Sekoguchi, Y. Takahashi, T. Asano, and S. Noda, “Photonic crystal nanocavity with a Q-factor of 9 million,” Opt.
         | 
| 1127 | 
            +
            Express 22, 916–924 (2014).
         | 
| 1128 | 
            +
            78. K. K. Lee, D. R. Lim, L. C. Kimerling, J. Shin, and F. Cerrina, “Fabrication of ultralow-loss Si/SiO2 waveguides by
         | 
| 1129 | 
            +
            roughness reduction,” Opt. Lett. 26, 1888–1890 (2001).
         | 
| 1130 | 
            +
            79. D. K. Sparacin, S. J. Spector, and L. C. Kimerling, “Silicon waveguide sidewall smoothing by wet chemical oxidation,”
         | 
| 1131 | 
            +
            J. Light. Technol. 23, 2455 (2005).
         | 
| 1132 | 
            +
            80. L. Ling, Z. J. Radzimski, T. Abe, and F. Shimura, “The effect of bonded interface on electrical properties of bonded
         | 
| 1133 | 
            +
            silicon-on-insulator wafers,” J. Appl. Phys. 72, 3610–3616 (1992).
         | 
| 1134 | 
            +
            81. C. Panuski, D. Englund, and R. Hamerly, “Fundamental thermal noise limits for optical microcavities,” Phys. Rev. X
         | 
| 1135 | 
            +
            10, 041046 (2020).
         | 
| 1136 | 
            +
            82. T. Tanabe, M. Notomi, E. Kuramochi, and H. Taniyama, “Large pulse delay and small group velocity achieved using
         | 
| 1137 | 
            +
            ultrahigh-Q photonic crystal nanocavities,” Opt. Express 15, 7826–7839 (2007).
         | 
| 1138 | 
            +
             | 
    	
        1NE0T4oBgHgl3EQfdgAR/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        2tAyT4oBgHgl3EQf1vk5/content/tmp_files/2301.00739v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,351 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            ON THE COMPLEXITY OF SUB-TREE SCHEDULING FOR
         | 
| 2 | 
            +
            WIRELESS SENSOR NETWORKS WITH PARTIAL COVERAGE
         | 
| 3 | 
            +
            Michele Barbato∗
         | 
| 4 | 
            +
            Dipartimento di Informatica
         | 
| 5 | 
            +
            Universit`a degli Studi di Milano
         | 
| 6 | 
            +
            via Celoria 18, 20133 Milano
         | 
| 7 | |
| 8 | 
            +
            Nicola Bianchessi
         | 
| 9 | 
            +
            Dipartimento di Informatica
         | 
| 10 | 
            +
            Universit`a degli Studi di Milano
         | 
| 11 | 
            +
            via Celoria 18, 20133 Milano
         | 
| 12 | |
| 13 | 
            +
            ABSTRACT
         | 
| 14 | 
            +
            Given an undirected graph G whose edge weights change over s time slots, the sub-tree scheduling
         | 
| 15 | 
            +
            for wireless sensor networks with partial coverage asks to partition the vertices of G in s non-empty
         | 
| 16 | 
            +
            trees such that the total weight of the trees is minimized. In this note we show that the problem is NP-
         | 
| 17 | 
            +
            hard in both the cases where s (i) is part of the input and (ii) is a fixed instance parameter. In both
         | 
| 18 | 
            +
            our proofs we reduce from the cardinality Steiner tree problem. We additionally give polynomial-
         | 
| 19 | 
            +
            time algorithms for structured inputs of the problem.
         | 
| 20 | 
            +
            Keywords Wireless sensor network, Sub-tree scheduling, Partial coverage, Complexity
         | 
| 21 | 
            +
            1
         | 
| 22 | 
            +
            Introduction
         | 
| 23 | 
            +
            A central problem in the management of wireless sensor networks is to extend the lifetime of wireless sensors through
         | 
| 24 | 
            +
            operating policies ensuring energy efficiency and/or balancing. Its importance stems from the fact that even a single
         | 
| 25 | 
            +
            failure of a wireless sensor can in principle compromise the effectiveness of the whole network. From the viewpoint
         | 
| 26 | 
            +
            of energy balancing, a general approach to minimize energy consumption is to split the set of sensors into several
         | 
| 27 | 
            +
            non-empty subsets and to subdivide the planning horizon into as many slots, so that the subsets of sensors are operated
         | 
| 28 | 
            +
            sequentially, one at each time slot.
         | 
| 29 | 
            +
            The sub-tree scheduling for wireless sensor networks with partial coverage (STSWSN-PC), introduced by Adasme
         | 
| 30 | 
            +
            (2019), is a particular implementation of such an approach, with the additional requirements that the sensors operated
         | 
| 31 | 
            +
            simultaneously are mutually connected under a tree topology, and each sensor must be active in a unique time slot.
         | 
| 32 | 
            +
            Namely, the STSWSN-PC is defined on an undirected graph G = (V, E) representing the network of sensors, a
         | 
| 33 | 
            +
            number s, 1 ≤ s ≤ |V |, of time slots, and vectors w1, w2, . . . , ws ∈ RE
         | 
| 34 | 
            +
            + of edge-weights (one for each time slot). The
         | 
| 35 | 
            +
            aim is to find a set T1, T2, . . . , Ts of non-empty vertex-disjoint trees of G covering V and minimizing �s
         | 
| 36 | 
            +
            i=1 wi(Ti).
         | 
| 37 | 
            +
            In the above description, the vertices of G represent the sensors of the network, the edges represent direct links among
         | 
| 38 | 
            +
            sensors, and the weights represent the time slot-dependent power for transmitting information over the corresponding
         | 
| 39 | 
            +
            edges.
         | 
| 40 | 
            +
            The input of the STSWSN-PC is simultaneously defined by the graph G, the number of time slots s, and the values
         | 
| 41 | 
            +
            of the edge weight vectors. The STSWSN-PC may admit efficient optimization algorithms for structured inputs.
         | 
| 42 | 
            +
            For example, when the weights are constant throughout the time slots (i.e., wi ≡ wj for all i, j = 1, 2, . . . , s), the
         | 
| 43 | 
            +
            STSWSN-PC is solvable in polynomial time, e.g., by using Kruskal’s algorithm (Kruskal, 1956) and terminating it at
         | 
| 44 | 
            +
            the first iteration yielding a spanning forest with s trees; when s = 1, the STSWSN-PC boils down to the minimum
         | 
| 45 | 
            +
            spanning tree (MST) problem on general graphs and, as such, is solvable in polynomial time; when s = |V |, the
         | 
| 46 | 
            +
            optimal solution consists of arbitrarily assigning one vertex to each time slot.
         | 
| 47 | 
            +
            However, unstructured instances of the STSWSN-PC have been tackled in Adasme (2019) and Bianchessi (2022) by
         | 
| 48 | 
            +
            means of branch-and-bound and branch-and-cut algorithms, respectively. These approaches implicitly suggest that the
         | 
| 49 | 
            +
            ∗Corresponding author
         | 
| 50 | 
            +
            arXiv:2301.00739v1  [cs.CC]  2 Jan 2023
         | 
| 51 | 
            +
             | 
| 52 | 
            +
            On the complexity of STSWSN-PC
         | 
| 53 | 
            +
            1
         | 
| 54 | 
            +
            3
         | 
| 55 | 
            +
            6
         | 
| 56 | 
            +
            7
         | 
| 57 | 
            +
            2
         | 
| 58 | 
            +
            4
         | 
| 59 | 
            +
            5
         | 
| 60 | 
            +
            8
         | 
| 61 | 
            +
            (a)
         | 
| 62 | 
            +
            v1
         | 
| 63 | 
            +
            1
         | 
| 64 | 
            +
            v1
         | 
| 65 | 
            +
            2
         | 
| 66 | 
            +
            v1
         | 
| 67 | 
            +
            3
         | 
| 68 | 
            +
            v3
         | 
| 69 | 
            +
            1
         | 
| 70 | 
            +
            v3
         | 
| 71 | 
            +
            2
         | 
| 72 | 
            +
            v3
         | 
| 73 | 
            +
            3
         | 
| 74 | 
            +
            v6
         | 
| 75 | 
            +
            1
         | 
| 76 | 
            +
            v6
         | 
| 77 | 
            +
            2
         | 
| 78 | 
            +
            v6
         | 
| 79 | 
            +
            3
         | 
| 80 | 
            +
            v7
         | 
| 81 | 
            +
            1
         | 
| 82 | 
            +
            v7
         | 
| 83 | 
            +
            2
         | 
| 84 | 
            +
            v7
         | 
| 85 | 
            +
            3
         | 
| 86 | 
            +
            1
         | 
| 87 | 
            +
            3
         | 
| 88 | 
            +
            6
         | 
| 89 | 
            +
            7
         | 
| 90 | 
            +
            2
         | 
| 91 | 
            +
            4
         | 
| 92 | 
            +
            5
         | 
| 93 | 
            +
            8
         | 
| 94 | 
            +
            (b)
         | 
| 95 | 
            +
            Figure 1: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding
         | 
| 96 | 
            +
            STSWSN-PC instance for k = 5 (b), in which fictitious vertices are diamond-shaped.
         | 
| 97 | 
            +
            problem is theoretically intractable, although its computational complexity is unknown to the best of our knowledge.
         | 
| 98 | 
            +
            The purpose of this note is to fill in this gap.
         | 
| 99 | 
            +
            In Sect. 2 we study the complexity of the STSWSN-PC when s is part of the input, that is, s is not fixed in
         | 
| 100 | 
            +
            {2, 3, . . . , |V | − 1}; in Sect. 3 we study the complexity under the assumption that s is an instance parameter with
         | 
| 101 | 
            +
            a prescribed value ¯s ≥ 2. Through reductions from the (minimum weight) Steiner tree problem (Garey and Johnson,
         | 
| 102 | 
            +
            1990, p. 208), we show that the STSWSN-PC is NP-hard in both cases, thus justifying the usage of implicit enumera-
         | 
| 103 | 
            +
            tion schemes to solve it. Finally, in Sect. 4 we discuss additional structured inputs, other than those mentioned above,
         | 
| 104 | 
            +
            for which the STSWSN-PC is solvable in polynomial time.
         | 
| 105 | 
            +
            2
         | 
| 106 | 
            +
            NP-hardness when the number of time slots is not fixed
         | 
| 107 | 
            +
            Given an undirected connected graph G = (V, E) with |V | = n vertices and a subset R ⊂ V of terminal vertices, a
         | 
| 108 | 
            +
            Steiner tree is a subtree T of G such that R ⊆ V (T). Given also a weight w(e) ∈ Z+ for each e ∈ E, computing the
         | 
| 109 | 
            +
            Steiner tree of minimum total edge-weight is in general NP-hard, and the problem remains NP-hard if all weights are
         | 
| 110 | 
            +
            equal (Garey and Johnson, 1990, p. 209). In particular, given w(e) = 1 for each e ∈ E, the pair (G, R), and k ∈ Z+
         | 
| 111 | 
            +
            with |R| − 1 ≤ k ≤ n − 2, the cardinality Steiner tree (CST) problem consisting of determining the existence of a
         | 
| 112 | 
            +
            Steiner tree of G with at most k edges is NP-complete.
         | 
| 113 | 
            +
            We now show that an oracle solving the STSWSN-PC in polynomial time allows to solve the CST in polynomial time,
         | 
| 114 | 
            +
            thus obtaining that the STSWSN-PC is NP-hard. We point out the CST with at most three terminals can be solved
         | 
| 115 | 
            +
            in polynomial time (Arrighi and de Oliveira Oliveira, 2021), therefore we restrict ourselves to CST instances with
         | 
| 116 | 
            +
            |R| ≥ 4.
         | 
| 117 | 
            +
            Given k and (G, R) defining a CST instance as above, we construct a new graph ¯G = ( ¯V , ¯E) obtained from G by
         | 
| 118 | 
            +
            introducing n−k fictitious vertices vr
         | 
| 119 | 
            +
            1, vr
         | 
| 120 | 
            +
            2, . . . , vr
         | 
| 121 | 
            +
            n−k for each terminal vertex r ∈ R and defining ¯E = E ∪ER, where
         | 
| 122 | 
            +
            ER = {(vr
         | 
| 123 | 
            +
            j, r): j = 1, 2, . . . , n − k, r ∈ R}; that is, each fictitious vertex is connected precisely to the corresponding
         | 
| 124 | 
            +
            terminal vertex. An example of such a construction is given in Figure 1.
         | 
| 125 | 
            +
            Next, we define a STSWSN-PC instance I on graph ¯G and s = n−k+1 time slots. Note that, since |R|−1 ≤ k ≤ n−2
         | 
| 126 | 
            +
            and |R| ≥ 4, then 3 ≤ s ≤ n − 2 < | ¯V |, hence our definition of the number of time slots excludes the polynomially
         | 
| 127 | 
            +
            solvable cases of the STSWSN-PC.
         | 
| 128 | 
            +
            The weights of the time slots are defined as follows:
         | 
| 129 | 
            +
            w1
         | 
| 130 | 
            +
            e =
         | 
| 131 | 
            +
            �0
         | 
| 132 | 
            +
            if e ∈ ER
         | 
| 133 | 
            +
            1
         | 
| 134 | 
            +
            otherwise
         | 
| 135 | 
            +
            (1)
         | 
| 136 | 
            +
            wj
         | 
| 137 | 
            +
            e =
         | 
| 138 | 
            +
            �n
         | 
| 139 | 
            +
            if e ∈ ER
         | 
| 140 | 
            +
            1
         | 
| 141 | 
            +
            otherwise
         | 
| 142 | 
            +
            ∀j = 2, 3, . . . , n − k + 1
         | 
| 143 | 
            +
            (2)
         | 
| 144 | 
            +
            Lemma 1. Let T ⋆
         | 
| 145 | 
            +
            1 , T ⋆
         | 
| 146 | 
            +
            2 , . . . , T ⋆
         | 
| 147 | 
            +
            n−k+1 be an optimal solution to I. The restriction of T ⋆
         | 
| 148 | 
            +
            1 to the vertices in V is a Steiner
         | 
| 149 | 
            +
            tree of G.
         | 
| 150 | 
            +
            2
         | 
| 151 | 
            +
             | 
| 152 | 
            +
            On the complexity of STSWSN-PC
         | 
| 153 | 
            +
            Proof. Assume that the restriction of T ⋆
         | 
| 154 | 
            +
            1 to the vertices of G is not a Steiner tree. Then there is at least a terminal
         | 
| 155 | 
            +
            vertex r⋆ contained in a tree of a time slot after the first one. Since all trees T ⋆
         | 
| 156 | 
            +
            1 , T ⋆
         | 
| 157 | 
            +
            2 , . . . , T ⋆
         | 
| 158 | 
            +
            n−k+1 are connected, at
         | 
| 159 | 
            +
            least one edge of ER belongs to that time slot. By (2) the optimal solution to I has value at least n. Now we show the
         | 
| 160 | 
            +
            existence of a solution with better value. Namely, in the first time slot we consider the tree T1 spanning all vertices
         | 
| 161 | 
            +
            of ¯G except the n − k fictitious vertices linked to r⋆ and we set Tj = {vr⋆
         | 
| 162 | 
            +
            j−1} for j = 2, 3, . . . , n − k + 1. Then
         | 
| 163 | 
            +
            T1, T2, . . . , Tn−k+1 is a feasible solution whose value is n − 1 by (1).
         | 
| 164 | 
            +
            Now we can prove the main result. In the proof, given S ⊆ ¯V , we denote by δ(S) its cut, namely, the set of edges
         | 
| 165 | 
            +
            having one endpoint in S and the other endpoint outside S.
         | 
| 166 | 
            +
            Proposition 1. There exists a solution to the CST instance given by k and (G, R) if and only if the optimal solution to
         | 
| 167 | 
            +
            I has value at most k. Therefore the STSWSN-PC is NP-hard.
         | 
| 168 | 
            +
            Proof. For the “if” part assume that there exists an optimal solution having value at most k; denoting by T ⋆ the
         | 
| 169 | 
            +
            restriction of its tree of the first time slot to the vertices in V , the nonnegativity of the weights in (1) yields |T ⋆| ≤ k.
         | 
| 170 | 
            +
            Then the result follows from Lemma 1.
         | 
| 171 | 
            +
            Now, let us prove the “only if” part. Assume that there exists a Steiner tree T of G such that |T| ≤ k. We assume,
         | 
| 172 | 
            +
            without loss of generality, that |T| = k: otherwise we repeatedly update T by adding one edge of G belonging to
         | 
| 173 | 
            +
            δ(T), until reaching the required cardinality (this is always possible as G is connected and since the update always
         | 
| 174 | 
            +
            returns a Steiner tree). Then, let ¯v ∈ ¯V \ V be an arbitrary fictitious vertex, define ˆV = ¯V \ {V ∪ {¯v}} as the set of
         | 
| 175 | 
            +
            remaining fictitious vertices, and let V C = V \ V (T) = {v1, v2, . . . , vn−k−1} be the vertices in the complement of
         | 
| 176 | 
            +
            T in G (as |T| = k, T comprises k + 1 vertices). We consider the feasible solution for I given by T1 = T ∪ δ( ˆV ),
         | 
| 177 | 
            +
            T2 = {¯v} and Tj = {vj−2 ∈ V C} for every j = 3, 4, . . . , n − k + 1. By (1)–(2) such a solution has value k. Then the
         | 
| 178 | 
            +
            optimal solution to I has value at most k.
         | 
| 179 | 
            +
            In the above construction, ¯G is obtained from G by appending leaves to its terminal vertices. This is a minor modifi-
         | 
| 180 | 
            +
            cation of the initial graph, hence the STSWSN-PC remains difficult on those classes of graphs which are closed under
         | 
| 181 | 
            +
            such modification and on which the CST is NP-complete. It is the case of chordal bipartite graphs, that is, bipartite
         | 
| 182 | 
            +
            graphs whose cycles C of length at least 6 induce a subgraph with at least |C| + 1 edges. More precisely we have:
         | 
| 183 | 
            +
            Corollary 1. The STSWSN-PC is NP-hard on bipartite chordal graphs.
         | 
| 184 | 
            +
            Proof. Appending leaves to a subset of vertices of a bipartite chordal graph maintains the chordal bipartiteness. Then
         | 
| 185 | 
            +
            the result follows from the NP-completeness of the CST on bipartite chordal graphs proved by M¨uller and Brandst¨adt
         | 
| 186 | 
            +
            (1987).
         | 
| 187 | 
            +
            3
         | 
| 188 | 
            +
            NP-hardness when the number of time slots is fixed
         | 
| 189 | 
            +
            In this section we consider the complexity of the STSWSN-PC by assuming that we have s = ¯s time slots, with ¯s ≥ 2
         | 
| 190 | 
            +
            fixed, and we show that the problem remains NP-hard.
         | 
| 191 | 
            +
            We modify the approach of previous section as follows. Let us consider a graph G = (V, E) with |V | = n vertices
         | 
| 192 | 
            +
            and a set R ⊂ V , |R| ≥ 4, of terminal vertices defining an instance of the CST problem. We define a graph
         | 
| 193 | 
            +
            G⋆ = (V ⋆, E⋆) where V ⋆ = V ∪ V R, with V R = {vr
         | 
| 194 | 
            +
            1, vr
         | 
| 195 | 
            +
            2, . . . , vr
         | 
| 196 | 
            +
            ¯s−1 : r ∈ R} being a set of fictitious vertices
         | 
| 197 | 
            +
            associated with those in R, and where E⋆ = E ∪ EC ∪ ER, with EC = {(v, w): v, w ∈ V s.t. (v, w) ̸∈ E} and
         | 
| 198 | 
            +
            ER = {(r, vr
         | 
| 199 | 
            +
            j): r ∈ R, j = 1, 2, . . . , ¯s − 1}. That is, G⋆ is obtained by extending G to a complete graph and by
         | 
| 200 | 
            +
            linking each terminal vertex in G to the corresponding ¯s − 1 fictitious vertices (see Figure 2 for an example).
         | 
| 201 | 
            +
            For every e ∈ E⋆ we define the following edge weights:
         | 
| 202 | 
            +
            w1
         | 
| 203 | 
            +
            e =
         | 
| 204 | 
            +
            �
         | 
| 205 | 
            +
            �
         | 
| 206 | 
            +
            �
         | 
| 207 | 
            +
            0
         | 
| 208 | 
            +
            if e ∈ ER
         | 
| 209 | 
            +
            1
         | 
| 210 | 
            +
            if e ∈ E
         | 
| 211 | 
            +
            n
         | 
| 212 | 
            +
            otherwise,
         | 
| 213 | 
            +
            (3)
         | 
| 214 | 
            +
            wj
         | 
| 215 | 
            +
            e =
         | 
| 216 | 
            +
            �n
         | 
| 217 | 
            +
            if e ∈ ER
         | 
| 218 | 
            +
            0
         | 
| 219 | 
            +
            otherwise.
         | 
| 220 | 
            +
            ∀j = 2, 3, . . . , ¯s
         | 
| 221 | 
            +
            (4)
         | 
| 222 | 
            +
            Let I⋆ be the resulting STSWSN-PC instance.
         | 
| 223 | 
            +
            3
         | 
| 224 | 
            +
             | 
| 225 | 
            +
            On the complexity of STSWSN-PC
         | 
| 226 | 
            +
            1
         | 
| 227 | 
            +
            3
         | 
| 228 | 
            +
            6
         | 
| 229 | 
            +
            7
         | 
| 230 | 
            +
            2
         | 
| 231 | 
            +
            4
         | 
| 232 | 
            +
            5
         | 
| 233 | 
            +
            8
         | 
| 234 | 
            +
            (a)
         | 
| 235 | 
            +
            v1
         | 
| 236 | 
            +
            1
         | 
| 237 | 
            +
            v1
         | 
| 238 | 
            +
            2
         | 
| 239 | 
            +
            v3
         | 
| 240 | 
            +
            1
         | 
| 241 | 
            +
            v3
         | 
| 242 | 
            +
            2
         | 
| 243 | 
            +
            v6
         | 
| 244 | 
            +
            1
         | 
| 245 | 
            +
            v6
         | 
| 246 | 
            +
            2
         | 
| 247 | 
            +
            v7
         | 
| 248 | 
            +
            1
         | 
| 249 | 
            +
            v7
         | 
| 250 | 
            +
            2
         | 
| 251 | 
            +
            1
         | 
| 252 | 
            +
            3
         | 
| 253 | 
            +
            6
         | 
| 254 | 
            +
            7
         | 
| 255 | 
            +
            2
         | 
| 256 | 
            +
            4
         | 
| 257 | 
            +
            5
         | 
| 258 | 
            +
            8
         | 
| 259 | 
            +
            (b)
         | 
| 260 | 
            +
            Figure 2: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding
         | 
| 261 | 
            +
            STSWSN-PC instance for ¯s = 3 (b), in which fictitious vertices are diamond-shaped.
         | 
| 262 | 
            +
            A Steiner tree T of G with k edges corresponds to a solution T1, T2, . . . , T¯s of I⋆ having value k. We distinguish two
         | 
| 263 | 
            +
            cases:
         | 
| 264 | 
            +
            1. if T is not spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr
         | 
| 265 | 
            +
            1, vr
         | 
| 266 | 
            +
            2, . . . , vr
         | 
| 267 | 
            +
            ¯s−2 be ¯s − 2 arbitrary
         | 
| 268 | 
            +
            fictitious vertices linked to r. One obtains T1 by extending T with all vertices in V R \ {vr
         | 
| 269 | 
            +
            1, vr
         | 
| 270 | 
            +
            2, . . . , vr
         | 
| 271 | 
            +
            ¯s−2}
         | 
| 272 | 
            +
            (whose linking edges in ER have weight 0 in the first time slot, by (3)), by defining T2 as the spanning tree
         | 
| 273 | 
            +
            of the complete graph G⋆ \ V (T1) involving only edges in E ∪ EC (which have weight 0 in the second time
         | 
| 274 | 
            +
            slot, by (4)) and by defining Tj = {vr
         | 
| 275 | 
            +
            j−2} for every j = 3, 4, . . . ¯s;
         | 
| 276 | 
            +
            2. if T is spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr
         | 
| 277 | 
            +
            1, vr
         | 
| 278 | 
            +
            2, . . . , vr
         | 
| 279 | 
            +
            ¯s−1 be the ¯s − 1 fictitious
         | 
| 280 | 
            +
            vertices linked to r. One obtains T1 by extending T with all vertices in V R \ {vr
         | 
| 281 | 
            +
            1, vr
         | 
| 282 | 
            +
            2, . . . , vr
         | 
| 283 | 
            +
            ¯s−1}, and by
         | 
| 284 | 
            +
            defining Tj = {vr
         | 
| 285 | 
            +
            j−1} for every j = 2, 3, . . . , ¯s.
         | 
| 286 | 
            +
            Note that, since a spanning tree of G is also a Steiner tree, the construction in the above case 2 shows that an optimal
         | 
| 287 | 
            +
            solution to I⋆ has value at most n − 1. Then, as in Lemma 1 and Prop. 1, it is possible to state that if T ⋆
         | 
| 288 | 
            +
            1 , T ⋆
         | 
| 289 | 
            +
            2 , . . . , T ⋆
         | 
| 290 | 
            +
            ¯s
         | 
| 291 | 
            +
            is an optimal solution to I⋆, the restriction of T ⋆
         | 
| 292 | 
            +
            1 to the vertices in V is a Steiner tree of G having the same value.
         | 
| 293 | 
            +
            Indeed, we first observe that T ⋆
         | 
| 294 | 
            +
            1 has its edges in E ∪ ER, as otherwise (3) would imply that the considered solution
         | 
| 295 | 
            +
            has weight at least n, contradicting its optimality; moreover, if T ⋆
         | 
| 296 | 
            +
            1 is not a Steiner tree of G, there should be a vertex
         | 
| 297 | 
            +
            r ∈ R belonging to T ⋆
         | 
| 298 | 
            +
            j with 2 ≤ j ≤ ¯s and, since T ⋆
         | 
| 299 | 
            +
            1 , T ⋆
         | 
| 300 | 
            +
            2 , . . . , T ⋆
         | 
| 301 | 
            +
            ¯s are connected, we have that at least one edge of
         | 
| 302 | 
            +
            ER is taken outside the first time slot; then by (4), the considered solution has value at least n, again contradicting its
         | 
| 303 | 
            +
            optimality.
         | 
| 304 | 
            +
            The above arguments prove that the considered CST instance admits a solution if and only if the corresponding
         | 
| 305 | 
            +
            STSWSN-PC instance has value at most k, hence we have:
         | 
| 306 | 
            +
            Proposition 2. The STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is NP-hard.
         | 
| 307 | 
            +
            We remark that the transformation from G to G⋆ used in the above reduction does not allow to state a result similar
         | 
| 308 | 
            +
            to Cor. 1.
         | 
| 309 | 
            +
            4
         | 
| 310 | 
            +
            Structured polynomially-solvable cases
         | 
| 311 | 
            +
            The results of Prop. 1 and Prop. 2 hold without making any assumption on the structure of the STSWSN-PC instances.
         | 
| 312 | 
            +
            Here we present two polynomially-solvable cases when the input is structured. The first one generalizes the approach
         | 
| 313 | 
            +
            described in the Introduction for the case s = |V |.
         | 
| 314 | 
            +
            Observation 1. When |V | − s is constant the STSWSN-PC is solvable in polynomial time.
         | 
| 315 | 
            +
            Proof. When s = |V | − 1, a feasible solution contains one edge in a time slot and single vertices in all remaining time
         | 
| 316 | 
            +
            slots; then an optimal solution can be determined in O(|V ||E|) time by exhaustively listing all values wj
         | 
| 317 | 
            +
            e for e ∈ E
         | 
| 318 | 
            +
            and 1 ≤ j ≤ |V | − 1 and considering the minimum one. A similar algorithm (of higher time complexity) can be
         | 
| 319 | 
            +
            exhibited for any constant value of |V | − s.
         | 
| 320 | 
            +
            4
         | 
| 321 | 
            +
             | 
| 322 | 
            +
            On the complexity of STSWSN-PC
         | 
| 323 | 
            +
            The second polynomially-solvable case relates to the graph topology:
         | 
| 324 | 
            +
            Observation 2. If G = (V, E) is a tree, the STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is solvable in
         | 
| 325 | 
            +
            polynomial time.
         | 
| 326 | 
            +
            Proof. We can list in O(n¯s−1) all subsets of ¯s − 1 edges whose removal decomposes G into a forest with ¯s trees. For
         | 
| 327 | 
            +
            each such a subset we assign in polynomial time the corresponding trees to the ¯s time slots solving a perfect matching
         | 
| 328 | 
            +
            on the weighted complete bipartite graph B = (T ; S, W) where each vertex in T represents a tree, each vertex of S
         | 
| 329 | 
            +
            represents a time slot and edge eτσ ∈ W linking τ ∈ T to σ ∈ S has weight wσ(τ).
         | 
| 330 | 
            +
            Obs. 2 motivates the following questions that we leave open: (i) When the number of time slots is not fixed, which
         | 
| 331 | 
            +
            is the complexity of the STSWSN-PC defined on trees? (ii) Are there any other graph families (other than trees) for
         | 
| 332 | 
            +
            which the STSWSN-PC is solvable in polynomial time, at least when the number of time slots is fixed?
         | 
| 333 | 
            +
            Acknowledgments
         | 
| 334 | 
            +
            The authors are grateful to Alberto Ceselli and to Emiliano Lancini for their comments on the manuscript.
         | 
| 335 | 
            +
            References
         | 
| 336 | 
            +
            Adasme, P. (2019). Optimal sub-tree scheduling for wireless sensor networks with partial coverage. Computer Stan-
         | 
| 337 | 
            +
            dards & Interfaces, 61, 20–35.
         | 
| 338 | 
            +
            Arrighi, E. and de Oliveira Oliveira, M. (2021). Three Is Enough for Steiner Trees. In D. Coudert and E. Natale, ed-
         | 
| 339 | 
            +
            itors, 19th International Symposium on Experimental Algorithms (SEA 2021), volume 190 of Leibniz International
         | 
| 340 | 
            +
            Proceedings in Informatics (LIPIcs), pages 5:1–5:15, Dagstuhl, Germany. Schloss Dagstuhl – Leibniz-Zentrum f¨ur
         | 
| 341 | 
            +
            Informatik.
         | 
| 342 | 
            +
            Bianchessi, N. (2022). On optimally solving sub-tree scheduling for wireless sensor networks with partial coverage.
         | 
| 343 | 
            +
            Universit`a degli Studi di Milano, http://hdl.handle.net/2434/934107.
         | 
| 344 | 
            +
            Garey, M. R. and Johnson, D. S. (1990). Computers and Intractability; A Guide to the Theory of NP-Completeness.
         | 
| 345 | 
            +
            W. H. Freeman & Co., USA.
         | 
| 346 | 
            +
            Kruskal, J. B. (1956). On the shortest spanning subtree of a graph and the traveling salesman problem. Proceedings
         | 
| 347 | 
            +
            of the American Mathematical Society, 7(1), 48–50.
         | 
| 348 | 
            +
            M¨uller, H. and Brandst¨adt, A. (1987). The NP-completeness of Steiner tree and dominating set for chordal bipartite
         | 
| 349 | 
            +
            graphs. Theoretical Computer Science, 53(2-3), 257–265.
         | 
| 350 | 
            +
            5
         | 
| 351 | 
            +
             | 
    	
        2tAyT4oBgHgl3EQf1vk5/content/tmp_files/load_file.txt
    ADDED
    
    | @@ -0,0 +1,248 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf,len=247
         | 
| 2 | 
            +
            page_content='ON THE COMPLEXITY OF SUB-TREE SCHEDULING FOR  WIRELESS SENSOR NETWORKS WITH PARTIAL COVERAGE  Michele Barbato∗  Dipartimento di Informatica  Universit`a degli Studi di Milano  via Celoria 18, 20133 Milano  michele.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 3 | 
            +
            page_content='barbato@unimi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 4 | 
            +
            page_content='it  Nicola Bianchessi  Dipartimento di Informatica  Universit`a degli Studi di Milano  via Celoria 18, 20133 Milano  nicola.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 5 | 
            +
            page_content='bianchessi@unimi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 6 | 
            +
            page_content='it  ABSTRACT  Given an undirected graph G whose edge weights change over s time slots, the sub-tree scheduling  for wireless sensor networks with partial coverage asks to partition the vertices of G in s non-empty  trees such that the total weight of the trees is minimized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 7 | 
            +
            page_content=' In this note we show that the problem is NP-  hard in both the cases where s (i) is part of the input and (ii) is a fixed instance parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 8 | 
            +
            page_content=' In both  our proofs we reduce from the cardinality Steiner tree problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 9 | 
            +
            page_content=' We additionally give polynomial-  time algorithms for structured inputs of the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 10 | 
            +
            page_content='  Keywords Wireless sensor network, Sub-tree scheduling, Partial coverage, Complexity  1  Introduction  A central problem in the management of wireless sensor networks is to extend the lifetime of wireless sensors through  operating policies ensuring energy efficiency and/or balancing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 11 | 
            +
            page_content=' Its importance stems from the fact that even a single  failure of a wireless sensor can in principle compromise the effectiveness of the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 12 | 
            +
            page_content=' From the viewpoint  of energy balancing, a general approach to minimize energy consumption is to split the set of sensors into several  non-empty subsets and to subdivide the planning horizon into as many slots, so that the subsets of sensors are operated  sequentially, one at each time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 13 | 
            +
            page_content='  The sub-tree scheduling for wireless sensor networks with partial coverage (STSWSN-PC), introduced by Adasme  (2019), is a particular implementation of such an approach, with the additional requirements that the sensors operated  simultaneously are mutually connected under a tree topology, and each sensor must be active in a unique time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 14 | 
            +
            page_content='  Namely, the STSWSN-PC is defined on an undirected graph G = (V, E) representing the network of sensors, a  number s, 1 ≤ s ≤ |V |, of time slots, and vectors w1, w2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 15 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 16 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 17 | 
            +
            page_content=' , ws ∈ RE  + of edge-weights (one for each time slot).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 18 | 
            +
            page_content=' The  aim is to find a set T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 19 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 20 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 21 | 
            +
            page_content=' , Ts of non-empty vertex-disjoint trees of G covering V and minimizing �s  i=1 wi(Ti).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 22 | 
            +
            page_content='  In the above description, the vertices of G represent the sensors of the network, the edges represent direct links among  sensors, and the weights represent the time slot-dependent power for transmitting information over the corresponding  edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 23 | 
            +
            page_content='  The input of the STSWSN-PC is simultaneously defined by the graph G, the number of time slots s, and the values  of the edge weight vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 24 | 
            +
            page_content=' The STSWSN-PC may admit efficient optimization algorithms for structured inputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 25 | 
            +
            page_content='  For example, when the weights are constant throughout the time slots (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 26 | 
            +
            page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 27 | 
            +
            page_content=', wi ≡ wj for all i, j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 28 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 29 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 30 | 
            +
            page_content=' , s), the  STSWSN-PC is solvable in polynomial time, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 31 | 
            +
            page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 32 | 
            +
            page_content=', by using Kruskal’s algorithm (Kruskal, 1956) and terminating it at  the first iteration yielding a spanning forest with s trees;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 33 | 
            +
            page_content=' when s = 1, the STSWSN-PC boils down to the minimum  spanning tree (MST) problem on general graphs and, as such, is solvable in polynomial time;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 34 | 
            +
            page_content=' when s = |V |, the  optimal solution consists of arbitrarily assigning one vertex to each time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 35 | 
            +
            page_content='  However, unstructured instances of the STSWSN-PC have been tackled in Adasme (2019) and Bianchessi (2022) by  means of branch-and-bound and branch-and-cut algorithms, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 36 | 
            +
            page_content=' These approaches implicitly suggest that the  ∗Corresponding author  arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 37 | 
            +
            page_content='00739v1  [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 38 | 
            +
            page_content='CC]  2 Jan 2023  On the complexity of STSWSN-PC  1  3  6  7  2  4  5  8  (a)  v1  1  v1  2  v1  3  v3  1  v3  2  v3  3  v6  1  v6  2  v6  3  v7  1  v7  2  v7  3  1  3  6  7  2  4  5  8  (b)  Figure 1: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding  STSWSN-PC instance for k = 5 (b), in which fictitious vertices are diamond-shaped.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 39 | 
            +
            page_content='  problem is theoretically intractable, although its computational complexity is unknown to the best of our knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 40 | 
            +
            page_content='  The purpose of this note is to fill in this gap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 41 | 
            +
            page_content='  In Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 42 | 
            +
            page_content=' 2 we study the complexity of the STSWSN-PC when s is part of the input, that is, s is not fixed in  {2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 43 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 44 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 45 | 
            +
            page_content=' , |V | − 1};' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 46 | 
            +
            page_content=' in Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 47 | 
            +
            page_content=' 3 we study the complexity under the assumption that s is an instance parameter with  a prescribed value ¯s ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 48 | 
            +
            page_content=' Through reductions from the (minimum weight) Steiner tree problem (Garey and Johnson,  1990, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 49 | 
            +
            page_content=' 208), we show that the STSWSN-PC is NP-hard in both cases, thus justifying the usage of implicit enumera-  tion schemes to solve it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 50 | 
            +
            page_content=' Finally, in Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 51 | 
            +
            page_content=' 4 we discuss additional structured inputs, other than those mentioned above,  for which the STSWSN-PC is solvable in polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 52 | 
            +
            page_content='  2  NP-hardness when the number of time slots is not fixed  Given an undirected connected graph G = (V, E) with |V | = n vertices and a subset R ⊂ V of terminal vertices, a  Steiner tree is a subtree T of G such that R ⊆ V (T).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 53 | 
            +
            page_content=' Given also a weight w(e) ∈ Z+ for each e ∈ E, computing the  Steiner tree of minimum total edge-weight is in general NP-hard, and the problem remains NP-hard if all weights are  equal (Garey and Johnson, 1990, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 54 | 
            +
            page_content=' 209).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 55 | 
            +
            page_content=' In particular, given w(e) = 1 for each e ∈ E, the pair (G, R), and k ∈ Z+  with |R| − 1 ≤ k ≤ n − 2, the cardinality Steiner tree (CST) problem consisting of determining the existence of a  Steiner tree of G with at most k edges is NP-complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 56 | 
            +
            page_content='  We now show that an oracle solving the STSWSN-PC in polynomial time allows to solve the CST in polynomial time,  thus obtaining that the STSWSN-PC is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 57 | 
            +
            page_content=' We point out the CST with at most three terminals can be solved  in polynomial time (Arrighi and de Oliveira Oliveira, 2021), therefore we restrict ourselves to CST instances with  |R| ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 58 | 
            +
            page_content='  Given k and (G, R) defining a CST instance as above, we construct a new graph ¯G = ( ¯V , ¯E) obtained from G by  introducing n−k fictitious vertices vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 59 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 60 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 61 | 
            +
            page_content=' , vr  n−k for each terminal vertex r ∈ R and defining ¯E = E ∪ER, where  ER = {(vr  j, r): j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 62 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 63 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 64 | 
            +
            page_content=' , n − k, r ∈ R};' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 65 | 
            +
            page_content=' that is, each fictitious vertex is connected precisely to the corresponding  terminal vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 66 | 
            +
            page_content=' An example of such a construction is given in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 67 | 
            +
            page_content='  Next, we define a STSWSN-PC instance I on graph ¯G and s = n−k+1 time slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 68 | 
            +
            page_content=' Note that, since |R|−1 ≤ k ≤ n−2  and |R| ≥ 4, then 3 ≤ s ≤ n − 2 < | ¯V |, hence our definition of the number of time slots excludes the polynomially  solvable cases of the STSWSN-PC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 69 | 
            +
            page_content='  The weights of the time slots are defined as follows:  w1  e =  �0  if e ∈ ER  1  otherwise  (1)  wj  e =  �n  if e ∈ ER  1  otherwise  ∀j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 70 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 71 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 72 | 
            +
            page_content=' , n − k + 1  (2)  Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 73 | 
            +
            page_content=' Let T ⋆  1 , T ⋆  2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 74 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 75 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 76 | 
            +
            page_content=' , T ⋆  n−k+1 be an optimal solution to I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 77 | 
            +
            page_content=' The restriction of T ⋆  1 to the vertices in V is a Steiner  tree of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 78 | 
            +
            page_content='  2  On the complexity of STSWSN-PC  Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 79 | 
            +
            page_content=' Assume that the restriction of T ⋆  1 to the vertices of G is not a Steiner tree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 80 | 
            +
            page_content=' Then there is at least a terminal  vertex r⋆ contained in a tree of a time slot after the first one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 81 | 
            +
            page_content=' Since all trees T ⋆  1 , T ⋆  2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 82 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 83 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 84 | 
            +
            page_content=' , T ⋆  n−k+1 are connected, at  least one edge of ER belongs to that time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 85 | 
            +
            page_content=' By (2) the optimal solution to I has value at least n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 86 | 
            +
            page_content=' Now we show the  existence of a solution with better value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 87 | 
            +
            page_content=' Namely, in the first time slot we consider the tree T1 spanning all vertices  of ¯G except the n − k fictitious vertices linked to r⋆ and we set Tj = {vr⋆  j−1} for j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 88 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 89 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 90 | 
            +
            page_content=' , n − k + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 91 | 
            +
            page_content=' Then  T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 92 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 93 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 94 | 
            +
            page_content=' , Tn−k+1 is a feasible solution whose value is n − 1 by (1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 95 | 
            +
            page_content='  Now we can prove the main result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 96 | 
            +
            page_content=' In the proof, given S ⊆ ¯V , we denote by δ(S) its cut, namely, the set of edges  having one endpoint in S and the other endpoint outside S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 97 | 
            +
            page_content='  Proposition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 98 | 
            +
            page_content=' There exists a solution to the CST instance given by k and (G, R) if and only if the optimal solution to  I has value at most k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 99 | 
            +
            page_content=' Therefore the STSWSN-PC is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 100 | 
            +
            page_content='  Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 101 | 
            +
            page_content=' For the “if” part assume that there exists an optimal solution having value at most k;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 102 | 
            +
            page_content=' denoting by T ⋆ the  restriction of its tree of the first time slot to the vertices in V , the nonnegativity of the weights in (1) yields |T ⋆| ≤ k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 103 | 
            +
            page_content='  Then the result follows from Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 104 | 
            +
            page_content='  Now, let us prove the “only if” part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 105 | 
            +
            page_content=' Assume that there exists a Steiner tree T of G such that |T| ≤ k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 106 | 
            +
            page_content=' We assume,  without loss of generality, that |T| = k: otherwise we repeatedly update T by adding one edge of G belonging to  δ(T), until reaching the required cardinality (this is always possible as G is connected and since the update always  returns a Steiner tree).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 107 | 
            +
            page_content=' Then, let ¯v ∈ ¯V \\ V be an arbitrary fictitious vertex, define ˆV = ¯V \\ {V ∪ {¯v}} as the set of  remaining fictitious vertices, and let V C = V \\ V (T) = {v1, v2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 108 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 109 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 110 | 
            +
            page_content=' , vn−k−1} be the vertices in the complement of  T in G (as |T| = k, T comprises k + 1 vertices).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 111 | 
            +
            page_content=' We consider the feasible solution for I given by T1 = T ∪ δ( ˆV ),  T2 = {¯v} and Tj = {vj−2 ∈ V C} for every j = 3, 4, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 112 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 113 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 114 | 
            +
            page_content=' , n − k + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 115 | 
            +
            page_content=' By (1)–(2) such a solution has value k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 116 | 
            +
            page_content=' Then the  optimal solution to I has value at most k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 117 | 
            +
            page_content='  In the above construction, ¯G is obtained from G by appending leaves to its terminal vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 118 | 
            +
            page_content=' This is a minor modifi-  cation of the initial graph, hence the STSWSN-PC remains difficult on those classes of graphs which are closed under  such modification and on which the CST is NP-complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 119 | 
            +
            page_content=' It is the case of chordal bipartite graphs, that is, bipartite  graphs whose cycles C of length at least 6 induce a subgraph with at least |C| + 1 edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 120 | 
            +
            page_content=' More precisely we have:  Corollary 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 121 | 
            +
            page_content=' The STSWSN-PC is NP-hard on bipartite chordal graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 122 | 
            +
            page_content='  Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 123 | 
            +
            page_content=' Appending leaves to a subset of vertices of a bipartite chordal graph maintains the chordal bipartiteness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 124 | 
            +
            page_content=' Then  the result follows from the NP-completeness of the CST on bipartite chordal graphs proved by M¨uller and Brandst¨adt  (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 125 | 
            +
            page_content='  3  NP-hardness when the number of time slots is fixed  In this section we consider the complexity of the STSWSN-PC by assuming that we have s = ¯s time slots, with ¯s ≥ 2  fixed, and we show that the problem remains NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 126 | 
            +
            page_content='  We modify the approach of previous section as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 127 | 
            +
            page_content=' Let us consider a graph G = (V, E) with |V | = n vertices  and a set R ⊂ V , |R| ≥ 4, of terminal vertices defining an instance of the CST problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 128 | 
            +
            page_content=' We define a graph  G⋆ = (V ⋆, E⋆) where V ⋆ = V ∪ V R, with V R = {vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 129 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 130 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 131 | 
            +
            page_content=' , vr  ¯s−1 : r ∈ R} being a set of fictitious vertices  associated with those in R, and where E⋆ = E ∪ EC ∪ ER, with EC = {(v, w): v, w ∈ V s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 132 | 
            +
            page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 133 | 
            +
            page_content=' (v, w) ̸∈ E} and  ER = {(r, vr  j): r ∈ R, j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 134 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 135 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 136 | 
            +
            page_content=' , ¯s − 1}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 137 | 
            +
            page_content=' That is, G⋆ is obtained by extending G to a complete graph and by  linking each terminal vertex in G to the corresponding ¯s − 1 fictitious vertices (see Figure 2 for an example).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 138 | 
            +
            page_content='  For every e ∈ E⋆ we define the following edge weights:  w1  e =  �  �  �  0  if e ∈ ER  1  if e ∈ E  n  otherwise,  (3)  wj  e =  �n  if e ∈ ER  0  otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 139 | 
            +
            page_content='  ∀j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 140 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 141 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 142 | 
            +
            page_content=' , ¯s  (4)  Let I⋆ be the resulting STSWSN-PC instance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 143 | 
            +
            page_content='  3  On the complexity of STSWSN-PC  1  3  6  7  2  4  5  8  (a)  v1  1  v1  2  v3  1  v3  2  v6  1  v6  2  v7  1  v7  2  1  3  6  7  2  4  5  8  (b)  Figure 2: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding  STSWSN-PC instance for ¯s = 3 (b), in which fictitious vertices are diamond-shaped.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 144 | 
            +
            page_content='  A Steiner tree T of G with k edges corresponds to a solution T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 145 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 146 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 147 | 
            +
            page_content=' , T¯s of I⋆ having value k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 148 | 
            +
            page_content=' We distinguish two  cases:  1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 149 | 
            +
            page_content=' if T is not spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 150 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 151 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 152 | 
            +
            page_content=' , vr  ¯s−2 be ¯s − 2 arbitrary  fictitious vertices linked to r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 153 | 
            +
            page_content=' One obtains T1 by extending T with all vertices in V R \\ {vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 154 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 155 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 156 | 
            +
            page_content=' , vr  ¯s−2}  (whose linking edges in ER have weight 0 in the first time slot, by (3)), by defining T2 as the spanning tree  of the complete graph G⋆ \\ V (T1) involving only edges in E ∪ EC (which have weight 0 in the second time  slot, by (4)) and by defining Tj = {vr  j−2} for every j = 3, 4, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 157 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 158 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 159 | 
            +
            page_content=' ¯s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 160 | 
            +
            page_content='  2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 161 | 
            +
            page_content=' if T is spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 162 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 163 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 164 | 
            +
            page_content=' , vr  ¯s−1 be the ¯s − 1 fictitious  vertices linked to r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 165 | 
            +
            page_content=' One obtains T1 by extending T with all vertices in V R \\ {vr  1, vr  2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 166 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 167 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 168 | 
            +
            page_content=' , vr  ¯s−1}, and by  defining Tj = {vr  j−1} for every j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 169 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 170 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 171 | 
            +
            page_content=' , ¯s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 172 | 
            +
            page_content='  Note that, since a spanning tree of G is also a Steiner tree, the construction in the above case 2 shows that an optimal  solution to I⋆ has value at most n − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 173 | 
            +
            page_content=' Then, as in Lemma 1 and Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 174 | 
            +
            page_content=' 1, it is possible to state that if T ⋆  1 , T ⋆  2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 175 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 176 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 177 | 
            +
            page_content=' , T ⋆  ¯s  is an optimal solution to I⋆, the restriction of T ⋆  1 to the vertices in V is a Steiner tree of G having the same value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 178 | 
            +
            page_content='  Indeed, we first observe that T ⋆  1 has its edges in E ∪ ER, as otherwise (3) would imply that the considered solution  has weight at least n, contradicting its optimality;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 179 | 
            +
            page_content=' moreover, if T ⋆  1 is not a Steiner tree of G, there should be a vertex  r ∈ R belonging to T ⋆  j with 2 ≤ j ≤ ¯s and, since T ⋆  1 , T ⋆  2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 180 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 181 | 
            +
            page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 182 | 
            +
            page_content=' , T ⋆  ¯s are connected, we have that at least one edge of  ER is taken outside the first time slot;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 183 | 
            +
            page_content=' then by (4), the considered solution has value at least n, again contradicting its  optimality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 184 | 
            +
            page_content='  The above arguments prove that the considered CST instance admits a solution if and only if the corresponding  STSWSN-PC instance has value at most k, hence we have:  Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 185 | 
            +
            page_content=' The STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 186 | 
            +
            page_content='  We remark that the transformation from G to G⋆ used in the above reduction does not allow to state a result similar  to Cor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 187 | 
            +
            page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 188 | 
            +
            page_content='  4  Structured polynomially-solvable cases  The results of Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 189 | 
            +
            page_content=' 1 and Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 190 | 
            +
            page_content=' 2 hold without making any assumption on the structure of the STSWSN-PC instances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 191 | 
            +
            page_content='  Here we present two polynomially-solvable cases when the input is structured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 192 | 
            +
            page_content=' The first one generalizes the approach  described in the Introduction for the case s = |V |.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 193 | 
            +
            page_content='  Observation 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 194 | 
            +
            page_content=' When |V | − s is constant the STSWSN-PC is solvable in polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 195 | 
            +
            page_content='  Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 196 | 
            +
            page_content=' When s = |V | − 1, a feasible solution contains one edge in a time slot and single vertices in all remaining time  slots;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 197 | 
            +
            page_content=' then an optimal solution can be determined in O(|V ||E|) time by exhaustively listing all values wj  e for e ∈ E  and 1 ≤ j ≤ |V | − 1 and considering the minimum one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 198 | 
            +
            page_content=' A similar algorithm (of higher time complexity) can be  exhibited for any constant value of |V | − s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 199 | 
            +
            page_content='  4  On the complexity of STSWSN-PC  The second polynomially-solvable case relates to the graph topology:  Observation 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 200 | 
            +
            page_content=' If G = (V, E) is a tree, the STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is solvable in  polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 201 | 
            +
            page_content='  Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 202 | 
            +
            page_content=' We can list in O(n¯s−1) all subsets of ¯s − 1 edges whose removal decomposes G into a forest with ¯s trees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 203 | 
            +
            page_content=' For  each such a subset we assign in polynomial time the corresponding trees to the ¯s time slots solving a perfect matching  on the weighted complete bipartite graph B = (T ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 204 | 
            +
            page_content=' S, W) where each vertex in T represents a tree, each vertex of S  represents a time slot and edge eτσ ∈ W linking τ ∈ T to σ ∈ S has weight wσ(τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 205 | 
            +
            page_content='  Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 206 | 
            +
            page_content=' 2 motivates the following questions that we leave open: (i) When the number of time slots is not fixed, which  is the complexity of the STSWSN-PC defined on trees?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 207 | 
            +
            page_content=' (ii) Are there any other graph families (other than trees) for  which the STSWSN-PC is solvable in polynomial time, at least when the number of time slots is fixed?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 208 | 
            +
            page_content='  Acknowledgments  The authors are grateful to Alberto Ceselli and to Emiliano Lancini for their comments on the manuscript.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 209 | 
            +
            page_content='  References  Adasme, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 210 | 
            +
            page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 211 | 
            +
            page_content=' Optimal sub-tree scheduling for wireless sensor networks with partial coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 212 | 
            +
            page_content=' Computer Stan-  dards & Interfaces, 61, 20–35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 213 | 
            +
            page_content='  Arrighi, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 214 | 
            +
            page_content=' and de Oliveira Oliveira, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 215 | 
            +
            page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 216 | 
            +
            page_content=' Three Is Enough for Steiner Trees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 217 | 
            +
            page_content=' In D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 218 | 
            +
            page_content=' Coudert and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 219 | 
            +
            page_content=' Natale, ed-  itors, 19th International Symposium on Experimental Algorithms (SEA 2021), volume 190 of Leibniz International  Proceedings in Informatics (LIPIcs), pages 5:1–5:15, Dagstuhl, Germany.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 220 | 
            +
            page_content=' Schloss Dagstuhl – Leibniz-Zentrum f¨ur  Informatik.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 221 | 
            +
            page_content='  Bianchessi, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 222 | 
            +
            page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 223 | 
            +
            page_content=' On optimally solving sub-tree scheduling for wireless sensor networks with partial coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 224 | 
            +
            page_content='  Universit`a degli Studi di Milano, http://hdl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 225 | 
            +
            page_content='handle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 226 | 
            +
            page_content='net/2434/934107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 227 | 
            +
            page_content='  Garey, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 228 | 
            +
            page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 229 | 
            +
            page_content=' and Johnson, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 230 | 
            +
            page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 231 | 
            +
            page_content=' (1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 232 | 
            +
            page_content=' Computers and Intractability;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 233 | 
            +
            page_content=' A Guide to the Theory of NP-Completeness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 234 | 
            +
            page_content='  W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 235 | 
            +
            page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 236 | 
            +
            page_content=' Freeman & Co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 237 | 
            +
            page_content=', USA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 238 | 
            +
            page_content='  Kruskal, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 239 | 
            +
            page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 240 | 
            +
            page_content=' (1956).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 241 | 
            +
            page_content=' On the shortest spanning subtree of a graph and the traveling salesman problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 242 | 
            +
            page_content=' Proceedings  of the American Mathematical Society, 7(1), 48–50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 243 | 
            +
            page_content='  M¨uller, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 244 | 
            +
            page_content=' and Brandst¨adt, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 245 | 
            +
            page_content=' (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 246 | 
            +
            page_content=' The NP-completeness of Steiner tree and dominating set for chordal bipartite  graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 247 | 
            +
            page_content=' Theoretical Computer Science, 53(2-3), 257–265.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
| 248 | 
            +
            page_content='  5' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
         | 
    	
        6dE0T4oBgHgl3EQfvwHw/content/tmp_files/2301.02624v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,858 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.02624v1  [math.QA]  6 Jan 2023
         | 
| 2 | 
            +
            Shapovalov elements of classical and quantum groups
         | 
| 3 | 
            +
            Andrey Mudrov
         | 
| 4 | 
            +
            In memorium of Vladimir Lyachovsky
         | 
| 5 | 
            +
            Moscow Institute of Physics and Technology,
         | 
| 6 | 
            +
            9 Institutskiy per., Dolgoprudny, Moscow Region, 141701, Russia,
         | 
| 7 | 
            +
            University of Leicester,
         | 
| 8 | 
            +
            University Road, LE1 7RH Leicester, UK,
         | 
| 9 | 
            +
            e-mail: [email protected]
         | 
| 10 | 
            +
            Abstract
         | 
| 11 | 
            +
            Shapovalov elements θβ,m of the classical or quantized universal enveloping algebra of a
         | 
| 12 | 
            +
            simple Lie algebra g are parameterized by a positive root β and a positive integer m. They
         | 
| 13 | 
            +
            relate the highest vector of a reducible Verma module with highest vectors of its submodules.
         | 
| 14 | 
            +
            We obtain a factorization of θβ,m to a product of θβ,1 and calculate θβ,1 as a residue of a
         | 
| 15 | 
            +
            matrix element of the inverse Shapovalov form via a generalized Nigel-Moshinsky algorithm.
         | 
| 16 | 
            +
            This way we explicitly express θβ,m of a classical simple Lie algebra through the Cartan-Weyl
         | 
| 17 | 
            +
            basis in g. In the case of quantum groups, we give an analogous formulation through the
         | 
| 18 | 
            +
            entries of the R-matrix (quantum L-operator) in fundamental representations.
         | 
| 19 | 
            +
            Key words: Shapovalov elements, Shapovalov form, Verma modules, singular vectors, Hasse diagrams,
         | 
| 20 | 
            +
            R-matrix
         | 
| 21 | 
            +
            AMS classification codes: 17B10, 17B37
         | 
| 22 | 
            +
            1
         | 
| 23 | 
            +
             | 
| 24 | 
            +
            1
         | 
| 25 | 
            +
            Introduction
         | 
| 26 | 
            +
            Category O introduced in [1] for semi-simple Lie algebras and later defined for many other classes
         | 
| 27 | 
            +
            of algebras including quantum groups plays a fundamental role in various fields of mathematics and
         | 
| 28 | 
            +
            mathematical physics. In particular, it accommodates finite-dimensional and numerous important
         | 
| 29 | 
            +
            infinite dimensional representations like parabolic Verma modules and their generalizations [2].
         | 
| 30 | 
            +
            There are distinguished objects in O called Verma modules that feature a universality property:
         | 
| 31 | 
            +
            all simple modules in O are their quotients. The maximal proper submodule in a Verma module
         | 
| 32 | 
            +
            is generated by extremal vectors [3], which are invariants of the positive triangular subalgebra.
         | 
| 33 | 
            +
            This makes extremal vectors critically important in representation theory.
         | 
| 34 | 
            +
            Extremal vectors in a Verma module Vλ are related with the vacuum vector of highest weight
         | 
| 35 | 
            +
            λ via special elements θβ,m of the (classical or quantum) universal enveloping of the negative Borel
         | 
| 36 | 
            +
            subalgebra that are called Shapovalov elements [4, 5]. They are parameterized with a positive
         | 
| 37 | 
            +
            root β and an integer m ∈ N validating a De Concini-Kac-Kazhdan condition on λ.
         | 
| 38 | 
            +
            In the
         | 
| 39 | 
            +
            classical version, it is 2(λ + ρ, β) − m(β, β) = 0 with ρ being the half-sum of positive roots. This
         | 
| 40 | 
            +
            condition guarantees that the Verma module is reducible. In the special case when the root β is
         | 
| 41 | 
            +
            simple, the element θβ,m is a power f m
         | 
| 42 | 
            +
            β of the simple root vector fβ of weight β. For non-simple
         | 
| 43 | 
            +
            β, the Shapovalov elements are complicated polynomials in negative Chevalley generators with
         | 
| 44 | 
            +
            coefficients in the Cartan subalgebra. It can be viewed as a function θβ,m(λ) of the highest weight
         | 
| 45 | 
            +
            of a generic Verma module Vλ with values in the subalgebra generated by negative root vectors.
         | 
| 46 | 
            +
            A description of extremal vectors in Verma modules over classical Kac-Moody algebras was
         | 
| 47 | 
            +
            obtained in [6] via an interpolation procedure resulting in a calculus of polynomials with complex
         | 
| 48 | 
            +
            exponents. Another approach based on extremal projectors [7] was employed by Zhelobenko in
         | 
| 49 | 
            +
            [8]. He obtained θβ,m for simple Lie algebras as a product of m copies of θβ,1 with shifted weights.
         | 
| 50 | 
            +
            The idea of factorization was also used in a construction of Shapovalov elements for contragredient
         | 
| 51 | 
            +
            Lie superalgebras in [9].
         | 
| 52 | 
            +
            Factorization of θβ,m into a product of polynomials of lower degree is a great simplification
         | 
| 53 | 
            +
            that is convenient for their analysis. For example it is good for the study of the classical limit in
         | 
| 54 | 
            +
            the case of quantum groups, which is crucial for quantization of conjugacy classes [10].
         | 
| 55 | 
            +
            With regard to quantum groups, an inductive construction of extremal vectors in Verma mod-
         | 
| 56 | 
            +
            ules was suggested in [11]. Explicit expressions for Shapovalov elements for the A-type appeared
         | 
| 57 | 
            +
            in [12] and recently were obtained in [13] by other methods. It is worthy to note that ordered
         | 
| 58 | 
            +
            PBW-like monomials in θβ,1 deliver an orthogonal basis in generic irreducible Verma modules [12].
         | 
| 59 | 
            +
            While Zhelobenko’s factorization via extremal projectors simplifies construction of Shapovalov
         | 
| 60 | 
            +
            2
         | 
| 61 | 
            +
             | 
| 62 | 
            +
            elements in the case of classical simple Lie algebras, there remains a problem of explicit descrip-
         | 
| 63 | 
            +
            tion of the factors.
         | 
| 64 | 
            +
            In this paper, we pursue an alternative approach based on the canonical
         | 
| 65 | 
            +
            contravariant bilinear form on Verma modules. It gives expressions for all Shapovalov elements in
         | 
| 66 | 
            +
            a factorized form through root vectors in the classical case and through elements of the R-matrix
         | 
| 67 | 
            +
            in the adjoint representation in the case of quantum groups.
         | 
| 68 | 
            +
            Extremal vectors generate the kernel of the canonical contravariant form on Vλ, which is a
         | 
| 69 | 
            +
            specialization at λ of the ”universal” Shapovalov form on the Borel subalgebra [4] with values in
         | 
| 70 | 
            +
            the Cartan subalgebra. This contravariant form itself is extremely important and has numerous
         | 
| 71 | 
            +
            applications, see e.g. [14, 15, 16, 17]. For generic λ, the module Vλ is irreducible and the form
         | 
| 72 | 
            +
            is non-degenerate. The inverse form gives rise to an element S of extended tensor product of
         | 
| 73 | 
            +
            positive and negative subalgebras of the (quantized) universal enveloping algebra [18]. Sending
         | 
| 74 | 
            +
            the positive leg of S to an auxiliary representation yields a matrix with entries in the negative
         | 
| 75 | 
            +
            subalgebra which we call Shapovalov matrix.
         | 
| 76 | 
            +
            Its explicit description was obtained in [18] by
         | 
| 77 | 
            +
            generalization of Nagel-Moshinski formulas for the lowering operators of sl(n) [19]. They can also
         | 
| 78 | 
            +
            be derived (in the quantum setting) from the ABRR equation [20] on dynamical twist [14].
         | 
| 79 | 
            +
            Our method relates θβ,m with certain entries of the Shapovalov matrix. This point of view is
         | 
| 80 | 
            +
            quite natural because the kernel of the contravariant form on Vλ results in poles of S. Our approach
         | 
| 81 | 
            +
            not only provides a factorization of θβ,m to a product of θβ,1 but also an efficient description of
         | 
| 82 | 
            +
            θβ,1 in a very elementary way, by a generalized Nagel-Moshinsky rule (3.5) using a technique of
         | 
| 83 | 
            +
            Hasse diagrams. We do it by evaluating residues of matrix elements of S that go singular at a De
         | 
| 84 | 
            +
            Concini-Kac-Kazhdan ”hyperplane”.
         | 
| 85 | 
            +
            Our approach is absolutely parallel for a classical semi-simple Lie algebra g and its quantum
         | 
| 86 | 
            +
            group Uq(g). The classical case can be processed directly or obtained as the limit case q → 1 of
         | 
| 87 | 
            +
            the deformation parameter. Let us describe the method in more detail.
         | 
| 88 | 
            +
            With a module V from the category O and a pair of non-zero vectors vb, va ∈ V we associate
         | 
| 89 | 
            +
            a Shapovalov matrix element, ⟨vb|va⟩, which belongs to the negative Borel (universal enveloping)
         | 
| 90 | 
            +
            subalgebra ˆUq(b−) rationally extended over the Cartan subalgebra. Under certain assumptions
         | 
| 91 | 
            +
            on vb and va, such matrix elements deliver factors in θβ,m. These factors normalize positive root
         | 
| 92 | 
            +
            vectors of a reductive Lie subalgebra l ⊂ g whose negative counterparts annihilate vb. This way
         | 
| 93 | 
            +
            they become lowering operators in the Mickelsson algebras of the pair (g, l), [21]. When λ satisfies
         | 
| 94 | 
            +
            the De Concini-Kac-Kazhdan condition, the factors become θβ,1 shifted by certain weights.
         | 
| 95 | 
            +
            The vector vb should be highest for the minimal simple Lie subalgebra in g that accommodates
         | 
| 96 | 
            +
            the root β and and its weight should satisfy the condition (νb, β) = (β,β)
         | 
| 97 | 
            +
            2 . For finite dimensional
         | 
| 98 | 
            +
            V the latter is equivalent to saying that vb generates a 2-dimensional submodule of the sl(2)-
         | 
| 99 | 
            +
            3
         | 
| 100 | 
            +
             | 
| 101 | 
            +
            subalgebra generated by the root spaces g±β.
         | 
| 102 | 
            +
            The vector va determines a homomorphism Vλ2 → V ⊗ Vλ1, where Vλi are irreducible Verma
         | 
| 103 | 
            +
            modules of highest weights λi and λ2 − λ1 equals the weight of va. Iteration of this construction
         | 
| 104 | 
            +
            yields a chain of homomorphisms
         | 
| 105 | 
            +
            Vλm → V ⊗ Vλm−1 → . . . → V ⊗m ⊗ Vλ0,
         | 
| 106 | 
            +
            where each mapping V ⊗i ⊗ Vλm−i → V ⊗i ⊗ (V ⊗ Vλm−i−1) is identical on the factor V ⊗i. We prove
         | 
| 107 | 
            +
            factorization of ⟨v⊗m
         | 
| 108 | 
            +
            b
         | 
| 109 | 
            +
            |v⊗m
         | 
| 110 | 
            +
            a
         | 
| 111 | 
            +
            ⟩ to a product of ⟨vb|va⟩. Then we demonstrate that, under the specified
         | 
| 112 | 
            +
            conditions, that matrix element is proportional to θβ,m(λ) with λ0 = λ.
         | 
| 113 | 
            +
            As a result, we obtain θβ,m(λ) as a product �m−1
         | 
| 114 | 
            +
            i=0 θβ,1(λi). The factors θβ,1 are calculated by
         | 
| 115 | 
            +
            a general rule (3.5) specialized to the case in Section 5. Viewed as an element of ˆUq(b−), θβ,m
         | 
| 116 | 
            +
            becomes a product of θβ,1 shifted by the integer multiple weights of vb. This shift can be made
         | 
| 117 | 
            +
            trivial by a choice of V if β contains a simple root α with multiplicity 1. Then θβ,m becomes the
         | 
| 118 | 
            +
            m-th power of θβ,1.
         | 
| 119 | 
            +
            It is worthwhile mentioning that θβ,1 can be obtained via an arbitrary auxiliary module V with
         | 
| 120 | 
            +
            a pair of vectors (va, vb = eβva). They all coincide up to a scalar factor on the De Concini-Kac-
         | 
| 121 | 
            +
            Kazhdan ”hyperplane” and generally differ away from it. The problem is to use θβ,1 as a factor
         | 
| 122 | 
            +
            block for constructing θβ,m of higher m. That is why we choose (V, vb, va) in a special way as
         | 
| 123 | 
            +
            described above. On the other hand, since the left tensor leg of S is in the positive subalgebra
         | 
| 124 | 
            +
            Uq(g+) ⊂ Uq(g), it is the structure of Uq(g+)-submodule on V that determines θβ,1. A remarkable
         | 
| 125 | 
            +
            fact is that the cyclic submodule Uq(g+)va in an admissible V turns out to be isomorphic to a
         | 
| 126 | 
            +
            subquotient of the Uq(g+)-module corresponding to g/g+ in the classical limit. This means that
         | 
| 127 | 
            +
            θβ,1 in each case can be calculated via Shapovalov matrix elements from End(g/g+) ⊗ Uq(b−), by
         | 
| 128 | 
            +
            Theorem 5.3.
         | 
| 129 | 
            +
            Except for Section 5, we present only the q-version of the theory. The classical case can be
         | 
| 130 | 
            +
            obtained by sending q to 1. However the final expression for θβ,1 is greatly simplified when q = 1,
         | 
| 131 | 
            +
            so we give a special consideration to it in the Section 5.
         | 
| 132 | 
            +
            2
         | 
| 133 | 
            +
            Preliminaries
         | 
| 134 | 
            +
            Let g be a simple complex Lie algebra and h ⊂ g its Cartan subalgebra. Fix a triangular de-
         | 
| 135 | 
            +
            composition g = g− ⊕ h ⊕ g+ with maximal nilpotent Lie subalgebras g±. Denote by R ⊂ h∗ the
         | 
| 136 | 
            +
            root system of g, and by R+ the subset of positive roots with basis Π of simple roots. This basis
         | 
| 137 | 
            +
            generates a root lattice Γ ⊂ h∗ with the positive semigroup Γ+ = Z+Π ⊂ Γ.
         | 
| 138 | 
            +
            4
         | 
| 139 | 
            +
             | 
| 140 | 
            +
            For a positive root β ∈ R+ and a simple root α ∈ Π denote by ℓα,β ∈ Z+ the multiplicity with
         | 
| 141 | 
            +
            which α enters β, that is the α-coefficient in the expansion of β over the basis Π.
         | 
| 142 | 
            +
            Choose an ad-invariant form ( . , . ) on g, restrict it to h, and transfer to h∗ by duality. For
         | 
| 143 | 
            +
            every λ ∈ h∗ there is a unique element hλ ∈ h such that µ(hλ) = (µ, λ), for all µ ∈ h∗. For a
         | 
| 144 | 
            +
            non-isotropic µ ∈ h∗ set µ∨ =
         | 
| 145 | 
            +
            2
         | 
| 146 | 
            +
            (µ,µ)µ and h∨
         | 
| 147 | 
            +
            µ =
         | 
| 148 | 
            +
            2
         | 
| 149 | 
            +
            (µ,µ)hµ.
         | 
| 150 | 
            +
            Fundamental weights are denoted by ωα, α ∈ Π.
         | 
| 151 | 
            +
            They are determined by the system of
         | 
| 152 | 
            +
            equations (ωα, β∨) = δα,β, for all α, β ∈ Π.
         | 
| 153 | 
            +
            We assume that q ∈ C is not a root of unity and we understand that when saying ”all q”. By
         | 
| 154 | 
            +
            almost all q we mean all q excepting maybe a finite set of values distinct from q = 1.
         | 
| 155 | 
            +
            The standard Drinfeld-Jimbo quantum group Uq(g) is a complex Hopf algebra with the set of
         | 
| 156 | 
            +
            generators eα, fα, and q±hα labeled by simple roots α and satisfying relations [22, 23]
         | 
| 157 | 
            +
            qhαeβ = q(α,β)eβqhα,
         | 
| 158 | 
            +
            [eα, fβ] = δα,β[hα]q,
         | 
| 159 | 
            +
            qhαfβ = q−(α,β)fβqhα,
         | 
| 160 | 
            +
            α, β ∈ Π.
         | 
| 161 | 
            +
            The symbol [z]q, where z ∈ h + C, stands for
         | 
| 162 | 
            +
            qz−q−z
         | 
| 163 | 
            +
            q−q−1 .
         | 
| 164 | 
            +
            The elements qhα are invertible, with
         | 
| 165 | 
            +
            qhαq−hα = 1, while {eα}α∈Π and {fα}α∈Π also satisfy quantized Serre relations. Their exact form
         | 
| 166 | 
            +
            is not important for this presentation, see [24] for details.
         | 
| 167 | 
            +
            A Hopf algebra structure on Uq(g) is introduced by the comultiplication
         | 
| 168 | 
            +
            ∆(fα) = fα ⊗ 1 + q−hα ⊗ fα,
         | 
| 169 | 
            +
            ∆(q±hα) = q±hα ⊗ q±hα,
         | 
| 170 | 
            +
            ∆(eα) = eα ⊗ qhα + 1 ⊗ eα
         | 
| 171 | 
            +
            set up on the generators and extended as a homomorphism Uq(g) → Uq(g)⊗Uq(g). The antipode is
         | 
| 172 | 
            +
            an algebra and coalgebra anti-automorphism of Uq(g) that acts on the generators by the assignment
         | 
| 173 | 
            +
            γ(fα) = −qhαfα,
         | 
| 174 | 
            +
            γ(q±hα) = q∓hα,
         | 
| 175 | 
            +
            γ(eα) = −eαq−hα.
         | 
| 176 | 
            +
            The counit homomorphism ǫ: Uq(g) → C returns
         | 
| 177 | 
            +
            ǫ(eα) = 0,
         | 
| 178 | 
            +
            ǫ(fα) = 0,
         | 
| 179 | 
            +
            ǫ(qhα) = 1.
         | 
| 180 | 
            +
            We extend the notation fα, eα to all α ∈ R+ meaning the Lusztig root vectors with respect to
         | 
| 181 | 
            +
            some normal ordering of R+, [24]. They are known to generate a Poincare-Birkhoff-Witt (PBW)
         | 
| 182 | 
            +
            basis in Uq(g±).
         | 
| 183 | 
            +
            Denote by Uq(h), Uq(g+), and Uq(g−) subalgebras in Uq(g) generated by {q±hα}α∈Π, {eα}α∈Π,
         | 
| 184 | 
            +
            and {fα}α∈Π, respectively. The quantum Borel subgroups are defined as Uq(b±) = Uq(g±)Uq(h);
         | 
| 185 | 
            +
            they are Hopf subalgebras in Uq(g). We will also need their extended version ˆUq(b±) = Uq(g±) ˆUq(h),
         | 
| 186 | 
            +
            where ˆUq(h) is the ring of fractions of Uq(h) over the multiplicative system generated by [hα − c]q
         | 
| 187 | 
            +
            with α ∈ Γ+ and c ∈ Q.
         | 
| 188 | 
            +
            5
         | 
| 189 | 
            +
             | 
| 190 | 
            +
            Given a Uq(g)-module V , a non-zero vector v is said to be of weight µ if qhαv = q(µ,α)v for all
         | 
| 191 | 
            +
            α ∈ Π. The linear span of such vectors is denoted by V [µ]. A module V is said to be of highest
         | 
| 192 | 
            +
            weight λ if it is generated by a weight vector v ∈ V [λ] that is killed by all eα. Such vector v is
         | 
| 193 | 
            +
            called highest; it is defined up to a non-zero scalar multiplier.
         | 
| 194 | 
            +
            We define an involutive coalgebra anti-automorphism and algebra automorphism σ of Uq(g)
         | 
| 195 | 
            +
            setting it on the generators by the assignment
         | 
| 196 | 
            +
            σ: eα �→ fα,
         | 
| 197 | 
            +
            σ: fα �→ eα,
         | 
| 198 | 
            +
            σ: qhα �→ q−hα.
         | 
| 199 | 
            +
            The involution ω = γ−1 ◦ σ = σ ◦ γ is an algebra anti-automorphism of Uq(g) and preserves the
         | 
| 200 | 
            +
            comultiplication.
         | 
| 201 | 
            +
            A symmetric bilinear form (., .) on a g-module V is called contravariant if
         | 
| 202 | 
            +
            �
         | 
| 203 | 
            +
            xv, w
         | 
| 204 | 
            +
            �
         | 
| 205 | 
            +
            =
         | 
| 206 | 
            +
            �
         | 
| 207 | 
            +
            v, ω(x)w
         | 
| 208 | 
            +
            �
         | 
| 209 | 
            +
            for all x ∈ Uq(g), v, w ∈ V . A module of highest weight has a unique C-valued contravariant form
         | 
| 210 | 
            +
            such that squared norm of the highest vector is 1. We call this form canonical and extend this
         | 
| 211 | 
            +
            term to a form on tensor products that is the product of canonical forms on tensor factors. Such
         | 
| 212 | 
            +
            a form is contravariant because ω is a coalgebra map.
         | 
| 213 | 
            +
            Let us recall the definition of Uq(h)-valued Shapovalov form on the Borel subalgebra Uq(b−)
         | 
| 214 | 
            +
            that was introduced for U(g) and studied in [4]. Regard Uq(b−) as a free right Uq(h)-module gen-
         | 
| 215 | 
            +
            erated by Uq(g−). The triangular decomposition Uq(g) = Uq(g−)Uq(h)Uq(g+) facilitates projection
         | 
| 216 | 
            +
            ℘: Uq(g) → Uq(h) along the sum g−Uq(g) + Uq(g)g+, where g−Uq(g) and Uq(g)g+ are right and
         | 
| 217 | 
            +
            left ideals generated by positive and negative root vectors, respectively. Set
         | 
| 218 | 
            +
            (x, y) = ℘
         | 
| 219 | 
            +
            �
         | 
| 220 | 
            +
            ω(x)y
         | 
| 221 | 
            +
            �
         | 
| 222 | 
            +
            ,
         | 
| 223 | 
            +
            x, y ∈ Uq(g).
         | 
| 224 | 
            +
            Thus defined the form is Uq(h)-linear and contravariant. It follows that the left ideal Uq(g)g+ is in
         | 
| 225 | 
            +
            the kernel, so the form descends to a Uq(h)-linear form on the quotient Uq(g)/Uq(g)g+ ≃ Uq(b−).
         | 
| 226 | 
            +
            A Verma module Vλ = Uq(g) ⊗Uq(b+) Cλ of highest weight λ ∈ h∗ is induced from the 1-
         | 
| 227 | 
            +
            dimensional Uq(b+)-module Cλ that is trivial on Uq(g+) and returns q(λ,α) on qhα ∈ Uq(h), α ∈ Π.
         | 
| 228 | 
            +
            Its highest vector is denoted by vλ, which is also called vacuum vector. It freely generates Vλ over
         | 
| 229 | 
            +
            Uq(g−).
         | 
| 230 | 
            +
            Specialization of the Shapovalov form at λ ∈ h∗ yields the canonical contravariant C-valued
         | 
| 231 | 
            +
            form (x, y)λ = λ
         | 
| 232 | 
            +
            �
         | 
| 233 | 
            +
            ℘
         | 
| 234 | 
            +
            �
         | 
| 235 | 
            +
            ω(x)y
         | 
| 236 | 
            +
            ��
         | 
| 237 | 
            +
            on Vλ, upon a natural Uq(g−)-module isomorphism Uq(g−) ≃ Vλ
         | 
| 238 | 
            +
            extending the assignment 1 �→ vλ. Conversely, the canonical contravariant form on Vλ regarded as
         | 
| 239 | 
            +
            a function of λ descends to the Shapovalov form if one views Uq(h) as the algebra of polynomial
         | 
| 240 | 
            +
            functions on h∗. By an abuse of terminology, we also mean by Shapovalov form the canonical
         | 
| 241 | 
            +
            contravariant form on Vλ.
         | 
| 242 | 
            +
            6
         | 
| 243 | 
            +
             | 
| 244 | 
            +
            It is known from [25] that the contravariant form on Vλ module goes degenerate if and only if
         | 
| 245 | 
            +
            its highest weight is in the union of
         | 
| 246 | 
            +
            Hβ,m = {λ ∈ h∗ | q2(λ+ρ,β)−m(β,β) = 1}
         | 
| 247 | 
            +
            (2.1)
         | 
| 248 | 
            +
            over β ∈ R+ and m ∈ N, where ρ = 1
         | 
| 249 | 
            +
            2
         | 
| 250 | 
            +
            �
         | 
| 251 | 
            +
            α∈R+ α. In the classical case q = 1, Hβ,m becomes a
         | 
| 252 | 
            +
            Kac-Kazhdan hyperplane of weights satisfying 2(λ + ρ, β) = m(β, β).
         | 
| 253 | 
            +
            Recall that a vector v ∈ Vλ of weight λ−µ with µ ∈ Γ+, µ ̸= 0, is called extremal if eαv = 0 for
         | 
| 254 | 
            +
            all α ∈ Π. Extremal vectors are in the kernel of the contravariant form and generate submodules
         | 
| 255 | 
            +
            of the corresponding highest weights. We will be interested in the special case when µ = mβ with
         | 
| 256 | 
            +
            β ∈ R+ and m ∈ N. Then the highest weight λ has to be in Hβ,m. The image θβ,m of v under the
         | 
| 257 | 
            +
            isomorphism Vλ → Uq(g−) is called Shapovalov element of a positive root β and degree m.
         | 
| 258 | 
            +
            For simple β the element θβ,m is just the m-th power of the root vector, θβ,m = f m
         | 
| 259 | 
            +
            β . For
         | 
| 260 | 
            +
            non-simple β, it is a rational trigonometric function Hβ,m → Uq(g−). The goal of this work is to
         | 
| 261 | 
            +
            find explicit expressions for θβ,m with non-simple β.
         | 
| 262 | 
            +
            3
         | 
| 263 | 
            +
            Shapovalov inverse form and its matrix elements
         | 
| 264 | 
            +
            Define an opposite Verma Uq(g)-module V ′
         | 
| 265 | 
            +
            λ of lowest weight −λ as follows. The underlying vector
         | 
| 266 | 
            +
            space of V ′
         | 
| 267 | 
            +
            λ is taken to be Vλ, while the representation homomorphism π′
         | 
| 268 | 
            +
            λ is twisted by σ, that is
         | 
| 269 | 
            +
            π′
         | 
| 270 | 
            +
            λ = πλ ◦ σ. The module V ′
         | 
| 271 | 
            +
            λ is freely generated over Uq(g+) by its lowest vector v′
         | 
| 272 | 
            +
            λ.
         | 
| 273 | 
            +
            Let σλ : Vλ → V ′
         | 
| 274 | 
            +
            λ denote the isomorphism of vector spaces, xvλ �→ σ(x)v′
         | 
| 275 | 
            +
            λ,
         | 
| 276 | 
            +
            x ∈ Uq(g−). It
         | 
| 277 | 
            +
            intertwines the representations homomorphisms π′
         | 
| 278 | 
            +
            λ◦σ = σλ◦πλ. This map relates the contravariant
         | 
| 279 | 
            +
            form on Vλ with a Uq(g)-invariant pairing Vλ ⊗ V ′
         | 
| 280 | 
            +
            λ → Vλ ⊗ Vλ → C.
         | 
| 281 | 
            +
            Suppose that the module Vλ is irreducible. Then its invariant pairing is non-degenerate (as well
         | 
| 282 | 
            +
            as the contravariant form on Vλ). The inverse form belongs to a completed tensor product V ′
         | 
| 283 | 
            +
            λ ˆ⊗Vλ.
         | 
| 284 | 
            +
            Under the isomorphisms Vλ → Uq(g−), V ′
         | 
| 285 | 
            +
            λ → Uq(g+), it goes to an element that we denote by
         | 
| 286 | 
            +
            S ∈ Uq(g+)ˆ⊗Uq(g−) and call universal Shapovalov matrix. Given a Uq(g+)-locally nilpotent Uq(g)-
         | 
| 287 | 
            +
            module V with representation homomorphism π: Uq(g) → End(V ) the image S = (π ⊗ id)(S)
         | 
| 288 | 
            +
            is a matrix with entries in Uq(g−). It features a rational trigonometric (rational in the classical
         | 
| 289 | 
            +
            case) dependance on λ ∈ h∗. We will assume that V is diagonalizable with finite dimensional
         | 
| 290 | 
            +
            weight spaces. We will also assume that V is endowed with a non-degenerate contravariant form,
         | 
| 291 | 
            +
            for instance, if V is a tensor power of an irreducible module of highest weight. Using terminology
         | 
| 292 | 
            +
            adopted in the quantum inverse scattering theory, we call the module V auxiliary.
         | 
| 293 | 
            +
            7
         | 
| 294 | 
            +
             | 
| 295 | 
            +
            Varying the highest weight λ we get a rational trigonometric dependance of S. As a function of
         | 
| 296 | 
            +
            λ, S is regarded as an element of Uq(g+)ˆ⊗ ˆUq(b−), where ˆUq(b−) is viewed as a right ˆUq(h)-module
         | 
| 297 | 
            +
            freely generated by Uq(g−). This way the weight dependance is accommodated by the right tensor
         | 
| 298 | 
            +
            leg of S.
         | 
| 299 | 
            +
            An explicit expression of S in a weight basis {vi}i∈I ⊂ V , vi ∈ V [νi], can be formulated in
         | 
| 300 | 
            +
            terms of Hasse diagram, H(V ). Such a diagram is associated with any partially ordered sets. In
         | 
| 301 | 
            +
            our case the partial ordering is induced by the Uq(g+)-action on V . Nodes are elements of the
         | 
| 302 | 
            +
            basis {vi}i∈I. Arrows are simple root vectors eα connecting the nodes vi
         | 
| 303 | 
            +
            eα
         | 
| 304 | 
            +
            ←− vj whose weight
         | 
| 305 | 
            +
            difference is νi − νj = α. Then a node vi is succeeding a node vj if νi − νj ∈ Γ+\{0}. The matrix
         | 
| 306 | 
            +
            S is triangular: sii = 1 and sij = 0 if νi ̸≻ νj. The entry sij is a rational trigonometric function
         | 
| 307 | 
            +
            h∗ → Uq(g−) taking values in the subspace of weight νj − νi ∈ −Γ+. It is also convenient to
         | 
| 308 | 
            +
            introduce a stronger partial ordering as we will explain below.
         | 
| 309 | 
            +
            Clearly the matrix S depends only on the Uq(b+)-module structure on V . In order to calculate
         | 
| 310 | 
            +
            a particular element sij, we can choose a weight basis that extends a basis in the cyclic submodule
         | 
| 311 | 
            +
            Uq(g+)vj. Then, in particular, sij = 0 if vi ̸∈ Uq(g+)vj.
         | 
| 312 | 
            +
            We define a Hasse sub-diagram H(vi, vj) ⊂ H(V ) that comprises all possible routes from vj to
         | 
| 313 | 
            +
            vi. A node vk ∈ H(V ) is in H(vi, vj) if and only if vi ⪰ vk ⪰ vj. The sub-diagram H(vi, vj) is
         | 
| 314 | 
            +
            associated with a Uq(g+)-module V (vi, vj) that is the quotient of Uq(g+)vj by the sum of cyclic
         | 
| 315 | 
            +
            submodules Uq(g+)vk ⊂ Uq(g+)vj where vk ̸∈ H(vi, vj). It is the module V (vi, vj) that is needed
         | 
| 316 | 
            +
            to calculate a matrix element sij.
         | 
| 317 | 
            +
            We recall a construction of S following [18]. Let {hi}rkg
         | 
| 318 | 
            +
            i=1 ∈ h be an orthonormal basis. The
         | 
| 319 | 
            +
            element q
         | 
| 320 | 
            +
            �
         | 
| 321 | 
            +
            i hi⊗hi belongs to a completion of Uq(h)⊗Uq(h) in the ℏ = ln q-adic topology. Choose an
         | 
| 322 | 
            +
            R-matrix R of Uq(g) such that ˇR = q− �
         | 
| 323 | 
            +
            i hi⊗hiR ∈ Uq(g+)ˆ⊗Uq(g−) and set C =
         | 
| 324 | 
            +
            1
         | 
| 325 | 
            +
            q−q−1( ˇR − 1 ⊗ 1).
         | 
| 326 | 
            +
            The key identity on C that facilitates the q-version of the theory is [18]
         | 
| 327 | 
            +
            [1 ⊗ eα, C] + (eα ⊗ q−hα)C − C(eα ⊗ qhα) = eα ⊗ [hα]q,
         | 
| 328 | 
            +
            ∀α ∈ Π.
         | 
| 329 | 
            +
            (3.2)
         | 
| 330 | 
            +
            In the classical limit, C = �
         | 
| 331 | 
            +
            α∈R+ eα ⊗ fα becomes the polarized split Casimir of g without its
         | 
| 332 | 
            +
            Cartan part. One then recovers an identity
         | 
| 333 | 
            +
            [1 ⊗ eα, C] + [eα ⊗ 1, C] = eα ⊗ hα
         | 
| 334 | 
            +
            (3.3)
         | 
| 335 | 
            +
            for each simple root α.
         | 
| 336 | 
            +
            Let cij ∈ Uq(g−) denote the entries of the matrix (π ⊗ id)(C) ∈ End(V ) ⊗ Uq(g−). We rectify
         | 
| 337 | 
            +
            the partial ordering and the Hasse diagram H(V ) by removing arrows vi ← vj if cij = 0. This will
         | 
| 338 | 
            +
            not affect the formula (3.5) for matrix elements of S.
         | 
| 339 | 
            +
            8
         | 
| 340 | 
            +
             | 
| 341 | 
            +
            For each weight µ ∈ Γ+ put
         | 
| 342 | 
            +
            ηµ = hµ + (µ, ρ) − 1
         | 
| 343 | 
            +
            2(µ, µ) ∈ h ⊕ C.
         | 
| 344 | 
            +
            (3.4)
         | 
| 345 | 
            +
            Regard ηµ as an affine function on h∗ by the assignment ηµ : ζ �→ (µ, ζ + ρ) − 1
         | 
| 346 | 
            +
            2(µ, µ), ζ ∈ h∗.
         | 
| 347 | 
            +
            Observe that ηmβ = m
         | 
| 348 | 
            +
            �
         | 
| 349 | 
            +
            hβ + (β, ρ) − m
         | 
| 350 | 
            +
            2 (β, β)
         | 
| 351 | 
            +
            �
         | 
| 352 | 
            +
            . That is, [ηmβ(λ)]q vanishes on Hβ,m (and only on
         | 
| 353 | 
            +
            Hβ,m in the classical case).
         | 
| 354 | 
            +
            For a pair of non-zero vectors v, w ∈ V define a matrix element ⟨w|v⟩ = (w, S1v)S2 ∈ ˆUq(b−),
         | 
| 355 | 
            +
            where S1 ⊗ S2 stands for a Sweedler-like notation for S and the pairing is with respect to a non-
         | 
| 356 | 
            +
            degenerate contravariant form on V . Its specialization at a weight λ is denoted by ⟨w|v⟩λ, which
         | 
| 357 | 
            +
            can be determined from the equality ⟨w|v⟩λvλ = ⟨w|v⟩vλ ∈ Vλ. For each w from V , the map
         | 
| 358 | 
            +
            V → Vλ, v �→ ⟨v|w⟩vλ satisfies: eα⟨v|w⟩vλ = ⟨σ(eα)v|w⟩vλ for all α ∈ Π. This is a consequence of
         | 
| 359 | 
            +
            Uq(g+)-invariance of the tensor S(1 ⊗ vλ) ∈ Uq(g+)ˆ⊗Vλ.
         | 
| 360 | 
            +
            The matrix element ⟨vi|vj⟩ equals sij if (vi, vk) = δik for all k ∈ I. It will be always the case in
         | 
| 361 | 
            +
            what follows.
         | 
| 362 | 
            +
            Fix a ”start” node va and an ”end” node vb such that vb ≻ va. Then a re-scaled matrix element
         | 
| 363 | 
            +
            ˇsab = −sba[ηνb−νa]qq−ηνb−νa can be calculated by the formula
         | 
| 364 | 
            +
            ˇsba = cba +
         | 
| 365 | 
            +
            �
         | 
| 366 | 
            +
            k⩾1
         | 
| 367 | 
            +
            �
         | 
| 368 | 
            +
            vb≻vk≻...≻v1≻va
         | 
| 369 | 
            +
            cbk . . . c1a
         | 
| 370 | 
            +
            (−1)kqηµk . . . qηµ1
         | 
| 371 | 
            +
            [ηµk]q . . . [ηµ1]q
         | 
| 372 | 
            +
            ∈ ˆUq(b−),
         | 
| 373 | 
            +
            (3.5)
         | 
| 374 | 
            +
            where µl = νl − νa ∈ Γ+, l = 1, . . . , k. Here the summation is performed over all possible routes
         | 
| 375 | 
            +
            (sequences of ordered nodes) from va to vb, see [18] for details.
         | 
| 376 | 
            +
            It is straightforward that Uq(g+)-invariance of the tensor S(va ⊗ vλ) implies
         | 
| 377 | 
            +
            eαˇsba(λ)vλ ∝ [ηνb−νa(λ)]q
         | 
| 378 | 
            +
            �
         | 
| 379 | 
            +
            k
         | 
| 380 | 
            +
            π(eα)bkska(λ)vλ.
         | 
| 381 | 
            +
            (3.6)
         | 
| 382 | 
            +
            The matrix entries ska(λ) carry weight −(νb − νa − α). It follows that ˇsba(λ)vλ is an extremal
         | 
| 383 | 
            +
            vector in Vλ for λ satisfying [ηνb−νa(λ)]q = 0 provided
         | 
| 384 | 
            +
            1. ˇsba(λ) ̸= 0,
         | 
| 385 | 
            +
            2. λ is a regular point for all ska(λ) and all α.
         | 
| 386 | 
            +
            We aim to find an appropriate matrix element for θβ,m that satisfies these conditions.
         | 
| 387 | 
            +
            Let V be a Uq(g)-module with a pair of vectors va, vb ∈ V such that eβva = vb for β ∈ R+. We
         | 
| 388 | 
            +
            call the triple (V, vb, va) a β-representation.
         | 
| 389 | 
            +
            Proposition 3.1. Let (V, vb, va) be a β-representation for β ∈ R+. Then for generic λ ∈ Hβ,1 the
         | 
| 390 | 
            +
            vector ˇsba(λ)vλ ∈ Vλ is extremal.
         | 
| 391 | 
            +
            9
         | 
| 392 | 
            +
             | 
| 393 | 
            +
            Proof. The factors
         | 
| 394 | 
            +
            qηµk
         | 
| 395 | 
            +
            [ηµk ]q in (3.5) go singular on the union of a finite number of the null-sets
         | 
| 396 | 
            +
            {λ ∈ h∗ | [ηµk(λ)]q = 0}. None of µk is collinear to β, hence ˇsba(λ) is regular at generic λ ∈ Hβ,1.
         | 
| 397 | 
            +
            By the same reasoning, all ska(λ) in (3.6) are regular at such λ. Finally, the first term cba (and
         | 
| 398 | 
            +
            only this one) involves the Lusztig root vector fβ, a generator of a PBW basis in Uq(g−). It is
         | 
| 399 | 
            +
            therefore independent of the other terms, and ˇsba(λ) ̸= 0.
         | 
| 400 | 
            +
            Upon identification of ˆUq(b−) with rational Uq(g−)-valued functions on h∗ we conclude that ˇsba
         | 
| 401 | 
            +
            is a Shapovalov element θβ,1 and denote it by θβ. Uniqueness of extremal vector of given weight
         | 
| 402 | 
            +
            implies that all matrix elements ˇsba with vb = eβva deliver the same θβ, up to a scalar factor.
         | 
| 403 | 
            +
            However, they are generally different at λ ̸∈ Hβ,m. When we aim at θβ,m with m > 1, we have to
         | 
| 404 | 
            +
            choose matrix elements for θβ more carefully in order to use them as building blocks.
         | 
| 405 | 
            +
            Note that it was relatively easy to secure the above two conditions in the case of m = 1. For
         | 
| 406 | 
            +
            higher m we will opt a different strategy: we will satisfy the first condition by the very construction
         | 
| 407 | 
            +
            and bypass a proof of the second with different arguments.
         | 
| 408 | 
            +
            4
         | 
| 409 | 
            +
            Factorization of Shapovalov elements
         | 
| 410 | 
            +
            For a positive root β ∈ Π denote by Πβ ⊂ Π the set of simple roots entering the expansion of
         | 
| 411 | 
            +
            β over the basis Π with positive coefficients. A simple Lie subalgebra, g(β) ⊂ g, generated by
         | 
| 412 | 
            +
            eα, fα with α ∈ Πβ is called support of β. Its universal enveloping algebra is quantized as a Hopf
         | 
| 413 | 
            +
            subalgebra in Uq(g).
         | 
| 414 | 
            +
            Definition 4.1. Let β ∈ R+ be a positive root and (V, vb, va) a β-representation such that eαvb = 0
         | 
| 415 | 
            +
            for all α ∈ Π, and (νb, β∨) = 1. We call such β-representation admissible.
         | 
| 416 | 
            +
            If a triple is (V, vb, va) is admissible then vb is the highest vector of a Uq(g)-submodule in V .
         | 
| 417 | 
            +
            For finite dimensional dim V < ∞, vb generates a 2-dimensional submodule of the sl(2)-subalgebra
         | 
| 418 | 
            +
            generated by fβ, eβ. The vector vb can be included in an orthonormal basis in V , as required.
         | 
| 419 | 
            +
            Lemma 4.2. Let (V, vb, va) be an admissible β-representation. Set vm
         | 
| 420 | 
            +
            b = v⊗m
         | 
| 421 | 
            +
            b
         | 
| 422 | 
            +
            ∈ V ⊗m for m ∈ N.
         | 
| 423 | 
            +
            Pick up λ ∈ h∗ such that all Verma modules Vλk with λk = λ + kνa, k = 0, . . . , m − 1, are
         | 
| 424 | 
            +
            irreducible. Then there is vm
         | 
| 425 | 
            +
            a ∈ V ⊗m of weight mνa such that
         | 
| 426 | 
            +
            ⟨vm
         | 
| 427 | 
            +
            b |vm
         | 
| 428 | 
            +
            a ⟩λ0 = ⟨vb|va⟩λm−1 . . . ⟨vb|va⟩λ0.
         | 
| 429 | 
            +
            (4.7)
         | 
| 430 | 
            +
            Proof. Let λ satisfy the required conditions. There is an equivariant map ϕk : Vλk → V ⊗ Vλk−1
         | 
| 431 | 
            +
            sending the highest vector vλk to an extremal vector S(va ⊗ vλk−1) ∈ V ⊗ Vλk−1. Here S is the
         | 
| 432 | 
            +
            10
         | 
| 433 | 
            +
             | 
| 434 | 
            +
            universal Shapovalov matrix of Vλk−1. Consider a chain of module homomorphisms
         | 
| 435 | 
            +
            Vλm
         | 
| 436 | 
            +
            ϕm
         | 
| 437 | 
            +
            −→ V ⊗ Vλm−1
         | 
| 438 | 
            +
            id1⊗ϕm−1
         | 
| 439 | 
            +
            −→
         | 
| 440 | 
            +
            V ⊗ (V ⊗ Vλm−2) → . . .
         | 
| 441 | 
            +
            idm−1⊗ϕ1
         | 
| 442 | 
            +
            −→
         | 
| 443 | 
            +
            V ⊗(m−1) ⊗ (V ⊗ Vλ0),
         | 
| 444 | 
            +
            where idk are the identity operators on V ⊗k. The vector vλm eventually goes over to S(˜vm
         | 
| 445 | 
            +
            a ⊗ vλ0),
         | 
| 446 | 
            +
            where ˜vm
         | 
| 447 | 
            +
            a ∈ V ⊗m is of weight mνa. It is related with v⊗m
         | 
| 448 | 
            +
            a
         | 
| 449 | 
            +
            by an invertible operator from End(V ⊗m),
         | 
| 450 | 
            +
            which is m − 1-fold dynamical twist [14].
         | 
| 451 | 
            +
            Let us calculate ⟨vm
         | 
| 452 | 
            +
            b |˜vm
         | 
| 453 | 
            +
            a ⟩λ0 by pairing the tensor leg of S(˜vm
         | 
| 454 | 
            +
            a ⊗vλ0) with vm
         | 
| 455 | 
            +
            b = vb ⊗vm−1
         | 
| 456 | 
            +
            b
         | 
| 457 | 
            +
            . Using
         | 
| 458 | 
            +
            equality S(˜vm
         | 
| 459 | 
            +
            a ⊗ vλ0) = S
         | 
| 460 | 
            +
            �
         | 
| 461 | 
            +
            va ⊗ S(˜vm−1
         | 
| 462 | 
            +
            a
         | 
| 463 | 
            +
            ⊗ vλ0)
         | 
| 464 | 
            +
            �
         | 
| 465 | 
            +
            we reduce ⟨vm
         | 
| 466 | 
            +
            b |˜vm
         | 
| 467 | 
            +
            a ⟩λ0 to
         | 
| 468 | 
            +
            �
         | 
| 469 | 
            +
            vm−1
         | 
| 470 | 
            +
            b
         | 
| 471 | 
            +
            , ⟨vb|va⟩(1)
         | 
| 472 | 
            +
            λm−1S1˜vm−1
         | 
| 473 | 
            +
            a
         | 
| 474 | 
            +
            �
         | 
| 475 | 
            +
            ⟨vb|va⟩(2)
         | 
| 476 | 
            +
            λm−1 S2(λ0) = ⟨vb|va⟩(2)
         | 
| 477 | 
            +
            λm−1
         | 
| 478 | 
            +
            �
         | 
| 479 | 
            +
            ω
         | 
| 480 | 
            +
            �
         | 
| 481 | 
            +
            ⟨vb|va⟩(1)
         | 
| 482 | 
            +
            λm−1
         | 
| 483 | 
            +
            �
         | 
| 484 | 
            +
            vm−1
         | 
| 485 | 
            +
            b
         | 
| 486 | 
            +
            |˜vm−1
         | 
| 487 | 
            +
            a
         | 
| 488 | 
            +
            �
         | 
| 489 | 
            +
            λ0,
         | 
| 490 | 
            +
            where we use the Sweedler notation ∆(x) = x(1) ⊗ x(2) ∈ Uq(b−) ⊗ Uq(g−) for the coproduct of
         | 
| 491 | 
            +
            x ∈ Uq(g−). Since yqhαvb = ǫ(y)q(α,β)vb for all y ∈ Uq(g+) and α ∈ Γ+, we arrive at
         | 
| 492 | 
            +
            ⟨vm
         | 
| 493 | 
            +
            b |˜vm
         | 
| 494 | 
            +
            a ⟩λ0 = q−(β,νb)⟨vb|va⟩λm−1⟨vm−1
         | 
| 495 | 
            +
            b
         | 
| 496 | 
            +
            |˜vm−1
         | 
| 497 | 
            +
            a
         | 
| 498 | 
            +
            ⟩λ0.
         | 
| 499 | 
            +
            Proceeding by induction on m we conclude that ⟨vm
         | 
| 500 | 
            +
            b |˜vm
         | 
| 501 | 
            +
            a ⟩λ0 equals the right-hand side of (4.7), up
         | 
| 502 | 
            +
            to the factor q−m(β,νb). Finally, set vm
         | 
| 503 | 
            +
            a = qm(β,νb)˜vm
         | 
| 504 | 
            +
            a . This proves the lemma for generic and hence
         | 
| 505 | 
            +
            for all λ where the right-hand side of (4.7) makes sense.
         | 
| 506 | 
            +
            It follows from the above factorization that the least common denominator of the extremal
         | 
| 507 | 
            +
            vector u = S(vm
         | 
| 508 | 
            +
            a ⊗ vλ) ∈ V ⊗m ⊗ Vλ contains
         | 
| 509 | 
            +
            d(λ) = [ηβ(λ + (m − 1)νa)]q = [(λ + ρ, β) − m
         | 
| 510 | 
            +
            2 (β, β)]q.
         | 
| 511 | 
            +
            It comes from the leftmost factor ⟨vb|va⟩λm−1 in the right-hand side of (4.7). Denote by svm
         | 
| 512 | 
            +
            b ,vm
         | 
| 513 | 
            +
            a (λ)
         | 
| 514 | 
            +
            the matrix element ⟨vm
         | 
| 515 | 
            +
            b |vm
         | 
| 516 | 
            +
            a ⟩λ. Since d divides [ηmβ]q, the re-scaled matrix element
         | 
| 517 | 
            +
            ˇsvm
         | 
| 518 | 
            +
            b ,vm
         | 
| 519 | 
            +
            a (λ) = c(λ)d(λ)svm
         | 
| 520 | 
            +
            b ,vm
         | 
| 521 | 
            +
            a (λ) ∝
         | 
| 522 | 
            +
            m−1
         | 
| 523 | 
            +
            �
         | 
| 524 | 
            +
            k=0
         | 
| 525 | 
            +
            θ(λk),
         | 
| 526 | 
            +
            where c(λ) = −q−ηmβ(λm−1) [ηmβ(λ)]q
         | 
| 527 | 
            +
            d(λ)
         | 
| 528 | 
            +
            , is regular and does not vanish at generic λ ∈ Hβ,m because
         | 
| 529 | 
            +
            d(λ) cancels the pole in ⟨vb|va⟩λm−1. Put ˇu = dk(λ)u, where k ⩾ 1 is the maximal degree of this
         | 
| 530 | 
            +
            pole in u. It is an extremal vector in V ⊗m ⊗ Vλ that is regular at generic λ ∈ Hβ,m.
         | 
| 531 | 
            +
            Indeed, let Hµ denote the null set {λ ∈ h∗|[ηµ(λ)]q = 0} for µ ∈ Γ+. Then the Vλ-components
         | 
| 532 | 
            +
            of ˇu may have poles only at λ ∈ ∪µ<βHµ. But each µ is either not collinear to β or µ = lβ with
         | 
| 533 | 
            +
            l < m. In both cases the complement to Hβ,m ∩ Hµ is dense in Hβ,m because q is not a root of
         | 
| 534 | 
            +
            unity.
         | 
| 535 | 
            +
            11
         | 
| 536 | 
            +
             | 
| 537 | 
            +
            Proposition 4.3. For generic λ ∈ Hβ,m, θβ,m(λ) ∝ ˇsvm
         | 
| 538 | 
            +
            b ,vm
         | 
| 539 | 
            +
            a (λ).
         | 
| 540 | 
            +
            Proof. The singular vector ˇu is presentable as
         | 
| 541 | 
            +
            ˇu = vm
         | 
| 542 | 
            +
            a ⊗ dk(λ)vλ + . . . + vm
         | 
| 543 | 
            +
            b ⊗ dk−1(λ)c(λ)ˇsvm
         | 
| 544 | 
            +
            b ,vm
         | 
| 545 | 
            +
            a (λ)vλ.
         | 
| 546 | 
            +
            We argue that ˇu = vm
         | 
| 547 | 
            +
            b ⊗ c(λ)ˇsvm
         | 
| 548 | 
            +
            b ,vm
         | 
| 549 | 
            +
            a (λ)vλ for generic λ in Hβ,m, where d(λ) = 0. Indeed, the
         | 
| 550 | 
            +
            Vλ-components of ˇu span a Uq(g+)-submodule in Vλ. A vector of maximal weight in this span is
         | 
| 551 | 
            +
            extremal and distinct from vλ. But θβ,m(λ)vλ is the only, up to a factor, extremal vector in Vλ,
         | 
| 552 | 
            +
            for generic λ. Therefore k = 1 and θβ,m ∝ ˇsvm
         | 
| 553 | 
            +
            b ,vm
         | 
| 554 | 
            +
            a .
         | 
| 555 | 
            +
            An admissible β-representation can be associated with every simple root α ∈ Πβ if one sets V
         | 
| 556 | 
            +
            to be the irreducible module of highest weight
         | 
| 557 | 
            +
            (β,β)
         | 
| 558 | 
            +
            ℓ(α,α)ωα, where ℓ = ℓα,β is the multiplicity of α with
         | 
| 559 | 
            +
            which it enters β. We denote this module by Vα,β. It is finite dimensional if
         | 
| 560 | 
            +
            (β,β)
         | 
| 561 | 
            +
            ℓ(α,α) ∈ N. Otherwise
         | 
| 562 | 
            +
            it is a parabolic Verma module relative to a Levi subalgebra with the root basis Π\{α}, cf. the
         | 
| 563 | 
            +
            next section.
         | 
| 564 | 
            +
            One can pass to the ”universal form” of θβ regarding it as an element of ˆUq(b−). Then
         | 
| 565 | 
            +
            θβ,m = (τ m−1
         | 
| 566 | 
            +
            νb
         | 
| 567 | 
            +
            θβ) . . . (τνbθβ) θβ,
         | 
| 568 | 
            +
            (4.8)
         | 
| 569 | 
            +
            where τν is an automorphism of ˆUq(h) generated by the affine shift of h∗ by the weight ν, that is,
         | 
| 570 | 
            +
            (τνϕ)(µ) = ϕ(µ + ν), ϕ ∈ ˆUq(h), µ ∈ h∗. One may ask when the shift is trivial, τνbθβ = θβ, and
         | 
| 571 | 
            +
            θβ,m is just the m-th power of θβ.
         | 
| 572 | 
            +
            Proposition 4.4. Let β be a positive root. Suppose that there is α ∈ Πβ with ℓα,β = 1. Then
         | 
| 573 | 
            +
            θβ,m = θm
         | 
| 574 | 
            +
            β ∈ Uq(b−).
         | 
| 575 | 
            +
            Proof. Let s ⊂ g be a semi-simple subalgebra generated by simple root vectors fµ, eµ with µ ̸= α.
         | 
| 576 | 
            +
            Take for V the module Vα,β with highest weight φ = (β,β)
         | 
| 577 | 
            +
            (α,α)ωα. Put vb to be the highest vector and
         | 
| 578 | 
            +
            va ∝ fβvb.
         | 
| 579 | 
            +
            Both va and vb can be included in an orthonormal basis because they span their weight sub-
         | 
| 580 | 
            +
            spaces in V . Therefore ⟨vb|va⟩ = sba can be calculated by formula (3.5). We write it as
         | 
| 581 | 
            +
            θβ(λ) = cba +
         | 
| 582 | 
            +
            �
         | 
| 583 | 
            +
            vb≻vi≻va
         | 
| 584 | 
            +
            cbisia(λ).
         | 
| 585 | 
            +
            The highest vector vb is killed by s−, therefore the Hasse diagram between va and vb is
         | 
| 586 | 
            +
            vb
         | 
| 587 | 
            +
            eα
         | 
| 588 | 
            +
            ←−
         | 
| 589 | 
            +
            fαvb
         | 
| 590 | 
            +
            . . .
         | 
| 591 | 
            +
            va,
         | 
| 592 | 
            +
            12
         | 
| 593 | 
            +
             | 
| 594 | 
            +
            where arrows in the suppressed part are simple root vectors from Uq(s+). But then the only copy
         | 
| 595 | 
            +
            of fα is in cbi while all sia belong to Uq(s−) ˆUq(hs), the extended Borel subalgebra of Uq(s).
         | 
| 596 | 
            +
            Finally, since Πs is orthogonal to νb, we have (µ, νa) = −(µ, β) for all µ ∈ R+
         | 
| 597 | 
            +
            s . Therefore
         | 
| 598 | 
            +
            θβ(λk) = θβ(λ − kβ),
         | 
| 599 | 
            +
            θβ,m(λ) =
         | 
| 600 | 
            +
            m−1
         | 
| 601 | 
            +
            �
         | 
| 602 | 
            +
            k=0
         | 
| 603 | 
            +
            θβ(λ − kβ),
         | 
| 604 | 
            +
            where the product is taken in the descending order from left to right. This proves the plain power
         | 
| 605 | 
            +
            factorization because each θβ carries weight −β.
         | 
| 606 | 
            +
            Conditions of the above proposition are fulfilled for all pairs α, β in the case of sl(n).
         | 
| 607 | 
            +
            5
         | 
| 608 | 
            +
            Shapovalov elements of degree 1
         | 
| 609 | 
            +
            In this section we describe the factor θβ entering (4.8), for a particular admissible β-representation
         | 
| 610 | 
            +
            (V, vb, va). We give a complete solution to the problem in the classical case. In the case of q ̸= 1,
         | 
| 611 | 
            +
            we do it up to calculation of the entries of the matrix C in a simple finite dimensional module ˜g
         | 
| 612 | 
            +
            that is a q-deformation of the adjoint module g. Its highest weight is the maximal root, ξ ∈ R+.
         | 
| 613 | 
            +
            To achieve our goals, we need to figure out the Hasse sub-diagram H(vb, va) ⊂ H(V ) that
         | 
| 614 | 
            +
            comprises all possible routes from va to vb. We argue that H(vb, va) can be extracted from a
         | 
| 615 | 
            +
            diagram H(b−) which we introduce below, and the underlying Uq(g+)-modules are isomorphic.
         | 
| 616 | 
            +
            The Uq(g+)-module associated with H(b−) is constructed from ˜g by factoring out the span
         | 
| 617 | 
            +
            of positive weight spaces. In order to distinguish the case of q ̸= 1 from classical and to avoid
         | 
| 618 | 
            +
            confusion with root vectors, we will mark the nodes with tilde. Vectors ˜fη of weights −η ∈ −R+
         | 
| 619 | 
            +
            are defined uniquely up to a sign if we normalize them by ( ˜fη, ˜fη) = 1. We may assume that they
         | 
| 620 | 
            +
            are deformations of classical root vectors. We take ˜hα = eα ˜fα, α ∈ Π, for basis elements of zero
         | 
| 621 | 
            +
            weight.
         | 
| 622 | 
            +
            For example, the diagram H(b−) in the case of g = g2 is
         | 
| 623 | 
            +
            b−
         | 
| 624 | 
            +
            eα2
         | 
| 625 | 
            +
            eα1
         | 
| 626 | 
            +
            eα2
         | 
| 627 | 
            +
            eα2
         | 
| 628 | 
            +
            eα1
         | 
| 629 | 
            +
            ˜hα2
         | 
| 630 | 
            +
            ˜fα2
         | 
| 631 | 
            +
            ˜fα1+α2
         | 
| 632 | 
            +
            ˜fα1+2α2
         | 
| 633 | 
            +
            ˜fα1+3α2
         | 
| 634 | 
            +
            ˜f2α1+3α2
         | 
| 635 | 
            +
            ❜
         | 
| 636 | 
            +
            ❜
         | 
| 637 | 
            +
            ❜
         | 
| 638 | 
            +
            ❜
         | 
| 639 | 
            +
            ❜
         | 
| 640 | 
            +
            ❜
         | 
| 641 | 
            +
            ✛
         | 
| 642 | 
            +
            ✟
         | 
| 643 | 
            +
            ✟
         | 
| 644 | 
            +
            ✟
         | 
| 645 | 
            +
            ✟
         | 
| 646 | 
            +
            ✙
         | 
| 647 | 
            +
            ✛
         | 
| 648 | 
            +
            ✛
         | 
| 649 | 
            +
            ✛
         | 
| 650 | 
            +
            eα1
         | 
| 651 | 
            +
            eα2
         | 
| 652 | 
            +
            ˜hα1
         | 
| 653 | 
            +
            ˜fα1
         | 
| 654 | 
            +
            ❜
         | 
| 655 | 
            +
            ❜
         | 
| 656 | 
            +
            ✛
         | 
| 657 | 
            +
            ❍
         | 
| 658 | 
            +
            ❍
         | 
| 659 | 
            +
            ❍
         | 
| 660 | 
            +
            ❍
         | 
| 661 | 
            +
            ❨
         | 
| 662 | 
            +
            From now on we fix V = Vα,β with highest weight φ =
         | 
| 663 | 
            +
            (β,β)
         | 
| 664 | 
            +
            ℓα,β(α,α)ωα and highest vector vb. We
         | 
| 665 | 
            +
            denote by l ⊂ g a reductive Lie subalgebra of maximal rank whose root system is Πl = R\{α}
         | 
| 666 | 
            +
            and by p = l + g+ its parabolic extension.
         | 
| 667 | 
            +
            13
         | 
| 668 | 
            +
             | 
| 669 | 
            +
            In order to construct the start node va ∈ V , we will use the following observation. Recall that
         | 
| 670 | 
            +
            a singular vector �
         | 
| 671 | 
            +
            i wi ⊗ vi in a tensor product W ⊗ V of two irreducible modules of highest
         | 
| 672 | 
            +
            weight defines a Uq(g+)-homomorphism W ∗ → V (and respectively V ∗ → W).
         | 
| 673 | 
            +
            Here W ∗ is
         | 
| 674 | 
            +
            an irreducible Uq(g)-module of lowest weight, which is negative the highest weight of W. The
         | 
| 675 | 
            +
            dual action is defined with the help of antipode γ in the standard way: (xϕ)(w) = ϕ
         | 
| 676 | 
            +
            �
         | 
| 677 | 
            +
            γ(x)w
         | 
| 678 | 
            +
            �
         | 
| 679 | 
            +
            ,
         | 
| 680 | 
            +
            for x ∈ Uq(g+), w ∈ W, and ϕ ∈ W ∗. The homomorphism W ∗ → V is implemented via the
         | 
| 681 | 
            +
            assignment ϕ �→ �
         | 
| 682 | 
            +
            i ϕ(wi)vi. We will apply this construction to W = ˜g.
         | 
| 683 | 
            +
            Lemma 5.1. There exists a unique, up to a scalar factor, singular vector u ∈ ˜g ⊗ V of weight φ.
         | 
| 684 | 
            +
            Proof. Let J ⊂ Uq(g−) be the annihilator of the highest vector vb ∈ V . Singular vectors in ˜g ⊗ V
         | 
| 685 | 
            +
            of weight φ are in bijection with vectors ˜h ∈ ˜g of zero weight killed by the left ideal σ(J) ⊂ Uq(g+).
         | 
| 686 | 
            +
            Pick up ˜h ̸= 0 orthogonal to all µ ∈ Πl; it is unique up to a scalar factor.
         | 
| 687 | 
            +
            The ideal J is generated by elements θ ∈ Uq(g+) such that θvb are singular vectors in the
         | 
| 688 | 
            +
            Verma module Vφ covering V . By construction, ˜u is killed by eα ∈ J with α ∈ Πl. If θvφ ∈ Vφ
         | 
| 689 | 
            +
            is a singular vector of weight φ − mη with η ∈ R+\R+
         | 
| 690 | 
            +
            l , then m > 1. Indeed, since φ = lωα with
         | 
| 691 | 
            +
            positive rational l =
         | 
| 692 | 
            +
            (β,β)
         | 
| 693 | 
            +
            ℓα,β(α,α), we have an inequality l(ωα, η∨) + (ρ, η∨) > 1. Then the condition
         | 
| 694 | 
            +
            (2.1), where λ is replaced with φ and β with η, is fulfilled only if m > 1, since q is not a root of
         | 
| 695 | 
            +
            unity. Then the element σ(θ) kills ˜h because mη with m > 1 is not a weight of ˜g.
         | 
| 696 | 
            +
            Remark that V is finite dimensional if
         | 
| 697 | 
            +
            (β,β)
         | 
| 698 | 
            +
            ℓα,β(α,α) ∈ Z and a parabolic Verma module otherwise
         | 
| 699 | 
            +
            because its highest weight is away from De Concini-Kac-Kazhdan hyperplanes Hη,m with η ∈
         | 
| 700 | 
            +
            R+\R+
         | 
| 701 | 
            +
            l .
         | 
| 702 | 
            +
            Now let va ∈ V be the vector of minimal weight in the expansion u = ˜eξ ⊗ va + . . . over the
         | 
| 703 | 
            +
            chosen basis in ˜g (we have omitted the terms of lower weights in the ˜g-factor). Notice that in
         | 
| 704 | 
            +
            the classical case the vector fηvb does not vanish if η ∈ R+\R+
         | 
| 705 | 
            +
            l because (η, φ) > 0. In particular,
         | 
| 706 | 
            +
            va ∝ fξvb ̸= 0 for the maximal root ξ. For general q, va is killed by the left ideal in Uq(g+)
         | 
| 707 | 
            +
            annihilating the lowest vector ˜fξ ∈ ˜g ≃ ˜g∗, Such va is unique in V up to a scalar factor, because
         | 
| 708 | 
            +
            of Lemma 5.1.
         | 
| 709 | 
            +
            Introduce a partial order on positive roots by writing µ ≺ ν iff fµ ≻ fν in H(b−). This is in
         | 
| 710 | 
            +
            agreement with the partial order on H(g+) ⊂ H(g), which is exactly the Hasse diagram of the root
         | 
| 711 | 
            +
            system R+, [26]. Note that α ≺ β for simple α if and only if α ∈ Πβ.
         | 
| 712 | 
            +
            Proposition 5.2. Let u = ˜eξ ⊗ va + . . . be the singular vector from Lemma 5.1 with va ∈ V of
         | 
| 713 | 
            +
            minimal weight in the expansion over a weight basis in ˜g. Then the Uq(g+)-module generated by
         | 
| 714 | 
            +
            va ∈ V is isomorphic to ˜g(˜hα, ˜fξ), for almost all q.
         | 
| 715 | 
            +
            14
         | 
| 716 | 
            +
             | 
| 717 | 
            +
            Proof. The Uq(g+)-module homomorphism ˜g → V determined by the assignment ˜fξ �→ va factors
         | 
| 718 | 
            +
            through the quotient g(˜hα, ˜fξ) because the kernel includes all ˜fη with η ∈ R+
         | 
| 719 | 
            +
            l , all ˜hη = eµ ˜fη with
         | 
| 720 | 
            +
            η ∈ Πl, and all negative weight spaces. We are left to prove that it is an isomorphism on g(˜hα, ˜fξ)
         | 
| 721 | 
            +
            for almost all q. It is sufficient to check that it is injective for q = 1 because V rationally depends
         | 
| 722 | 
            +
            on q. But then for each positive root η subject to α ⪯ η ⪯ ξ the vector fηvb is in U(g+)fξvb and
         | 
| 723 | 
            +
            is not zero, because (η, φ) > 0.
         | 
| 724 | 
            +
            It follows that eβva ̸= 0 because eβ ˜fξ ̸= 0. Therefore (V, vb, va) is an admissible β-representation
         | 
| 725 | 
            +
            for almost all q.
         | 
| 726 | 
            +
            Let us consider the classical case in more detail. We choose h∨
         | 
| 727 | 
            +
            α =
         | 
| 728 | 
            +
            2
         | 
| 729 | 
            +
            (α,α)hα, α ∈ Π, as a basis
         | 
| 730 | 
            +
            in h ⊂ b−, so that α(h∨
         | 
| 731 | 
            +
            α) = 2. The root vectors fµ with µ ∈ R+ form a basis in g−. Arrows
         | 
| 732 | 
            +
            labeled by α ∈ Π are h∨
         | 
| 733 | 
            +
            α
         | 
| 734 | 
            +
            eα
         | 
| 735 | 
            +
            ←− fα and fµ
         | 
| 736 | 
            +
            eα
         | 
| 737 | 
            +
            ←− fν if µ = ν − α is a positive root. The U(g+)-module
         | 
| 738 | 
            +
            underlying H(b−) is g/g+.
         | 
| 739 | 
            +
            Specialization of the formula (3.5) for θβ requires the knowledge of matrix C = (π ⊗ id)(C) ∈
         | 
| 740 | 
            +
            End(V ) ⊗ Uq(g−), which is readily available for q = 1. For ν, γ ∈ R+, denote by Cν,γ ∈ C the
         | 
| 741 | 
            +
            scalars such that [eν, fγ] = Cν,γfγ−ν, if γ − ν ∈ R+, Cγ,γ = (β,β)
         | 
| 742 | 
            +
            2
         | 
| 743 | 
            +
            ℓα,γ
         | 
| 744 | 
            +
            ℓα,β , and Cν,γ = 0 otherwise. Then
         | 
| 745 | 
            +
            (π ⊗ id)(C)(fγvb ⊗ 1) = vb ⊗ Cγ,γfγ +
         | 
| 746 | 
            +
            �
         | 
| 747 | 
            +
            ν≺γ
         | 
| 748 | 
            +
            fγ−νvb ⊗ Cν,γfν,
         | 
| 749 | 
            +
            for all γ satisfying α ⪯ γ ⪯ β. This equality yields all entries of the matrix C needed. The
         | 
| 750 | 
            +
            formula (3.5) becomes
         | 
| 751 | 
            +
            θβ = Cβ,βfβ +
         | 
| 752 | 
            +
            �
         | 
| 753 | 
            +
            k⩾1
         | 
| 754 | 
            +
            �
         | 
| 755 | 
            +
            ν1+...+νk+1=β
         | 
| 756 | 
            +
            (Cνk+1,γk . . . Cν1,γ0)(fνk+1 . . . fν1)
         | 
| 757 | 
            +
            (−1)k
         | 
| 758 | 
            +
            ηµk . . . ηµ1
         | 
| 759 | 
            +
            .
         | 
| 760 | 
            +
            (5.9)
         | 
| 761 | 
            +
            The internal summation is performed over all partitions of β to a sum of νi ∈ R+ such that all
         | 
| 762 | 
            +
            γi = γi−1 − νi for i = 1, . . . , k with γ0 = β are in R+ and subject to α ⪯ γi. In particular,
         | 
| 763 | 
            +
            γk = νk+1. The weights µi are defined to be µi = γ0 − γi = ν1 + . . . + νi. Note that in the q ̸= 1
         | 
| 764 | 
            +
            case the corresponding sum may involve terms with entries of C whose weights are not roots.
         | 
| 765 | 
            +
            Now we summarise the results of this paper.
         | 
| 766 | 
            +
            Theorem 5.3. For each α ≺ β, the rescaled matrix element ⟨˜hα| ˜fβ⟩[ηβ]q with ˜hα, ˜fβ ∈ ˜g, is a
         | 
| 767 | 
            +
            Shapovalov element θβ,1. For general degree m > 1, θβ,m is given by the factorization formula
         | 
| 768 | 
            +
            (4.8) with θβ = θβ,1 and the shift weight νb =
         | 
| 769 | 
            +
            (β,β)
         | 
| 770 | 
            +
            ℓα,β(α,α)ωα.
         | 
| 771 | 
            +
            Proof. Observe that summation formula (3.5) involves only the structure of Uq(g+)-module deter-
         | 
| 772 | 
            +
            mined by the initial and final nodes. That is straightforward with regard to the matrix elements
         | 
| 773 | 
            +
            15
         | 
| 774 | 
            +
             | 
| 775 | 
            +
            of C and also true for the Cartan factors, which depend only on weight differences (mind that
         | 
| 776 | 
            +
            weights in a cyclic Uq(g+)-module generated by a weight vector are fixed up to a constant weight
         | 
| 777 | 
            +
            summand). Furthermore, the nodes of the sub-diagram H(va, vb) can be included in an orthonor-
         | 
| 778 | 
            +
            mal basis whence sba ∝ ⟨vb|va⟩. Now, for almost all q, the theorem follows from Proposition 5.2
         | 
| 779 | 
            +
            and Proposition 4.3 with Lemma 4.2. Therefore it is true for all q where the factors (4.8) are
         | 
| 780 | 
            +
            defined.
         | 
| 781 | 
            +
            We remark in conclusion that for fixed β ∈ R+ one can pick up α ∈ Πβ delivering the simplest
         | 
| 782 | 
            +
            Hasse diagram H(˜hα, ˜fβ), e.g. with the smallest fundamental group. Such diagrams can be found
         | 
| 783 | 
            +
            amongst subdiagrams in fundamental auxiliary modules of minimal dimension. That also applies
         | 
| 784 | 
            +
            to their associated Uq(g+)-modules. For all non-exceptional types of g, the entries of the matrix C
         | 
| 785 | 
            +
            participating in the route summation formula are calculated in [27], Proposition 2.2. That is also
         | 
| 786 | 
            +
            done for g2 in [28]. This makes the above description of Shapovalov elements for such quantum
         | 
| 787 | 
            +
            groups absolutely explicit. For exceptional g of rank > 2, the problem reduces to calculation of
         | 
| 788 | 
            +
            relevant entries of C.
         | 
| 789 | 
            +
            In the context of quantization of semi-simple conjugacy classes [10], it is crucial to make
         | 
| 790 | 
            +
            sure that θβ,m(λ) tends to f m
         | 
| 791 | 
            +
            β as q → 1. Factorization (4.8) together with the route summation
         | 
| 792 | 
            +
            formula for θβ,1 gives important information about possible singularities of θβ,m(λ) and facilitate
         | 
| 793 | 
            +
            the analysis even without knowing the matrix elements of C.
         | 
| 794 | 
            +
            Acknowledgement
         | 
| 795 | 
            +
            This work is partially supported by the Moscow Institute of Physics and Technology under the
         | 
| 796 | 
            +
            Priority 2030 Strategic Academic Leadership Program and by Russian Science Foundation grant
         | 
| 797 | 
            +
            23-21-00282. The author thanks Vadim Ostapenko and Vladimir Stukopin for stimulating discus-
         | 
| 798 | 
            +
            sions.
         | 
| 799 | 
            +
            References
         | 
| 800 | 
            +
            [1] Bernstein, J. H., Gelfand, I. M., Gelfand, S. I.: On some category of g-modules, Funct. Anal.
         | 
| 801 | 
            +
            Appl. 10 no. 2 (1976), 87–92.
         | 
| 802 | 
            +
            [2] Humphreys, J. Representations of Semisimple Lie Algebras in the BGG Category O, Graduate
         | 
| 803 | 
            +
            Studies in Mathematics 94, AMS, 2008.
         | 
| 804 | 
            +
            16
         | 
| 805 | 
            +
             | 
| 806 | 
            +
            [3] Bernstein, J. H., Gelfand, I. M., Gelfand, S. I.: Structure of representations generated by
         | 
| 807 | 
            +
            highest weight vectors, Funct. Anal. Appl. 5 no. 1 (1971), 1–9.
         | 
| 808 | 
            +
            [4] Shapovalov, N. N.: On a bilinear form on the universal enveloping algebra of a complex
         | 
| 809 | 
            +
            semisimple Lie algebra, Funkt. Anal. Appl. 6 (1972), 65–70.
         | 
| 810 | 
            +
            [5] Carlin, K. Local systems of Shapovalov elements, Comm. Alg., 23 no. 8 (1995), 3039–3049.
         | 
| 811 | 
            +
            [6] Malikov, F., Feigin, B., Fuchs, D.: Singular vectors in Verma modules over Kac–Moody alge-
         | 
| 812 | 
            +
            bras, Func. An. Appl. 20 No. 2 (1986), 103–113.
         | 
| 813 | 
            +
            [7] Asherova, R. M., Smirnov, Yu. F., and Tolstoy, V. N.: Projection operators for the simple Lie
         | 
| 814 | 
            +
            groups, Theor. Math. Phys. 8 (1971), 813–825.
         | 
| 815 | 
            +
            [8] Zhelobenko, D., P., Representations of reductive Lie algebras, Nauka, Moscow, 1994.
         | 
| 816 | 
            +
            [9] Musson, I.: Shapovalov elements and the Jantzen sum formula for contragradient Lie super-
         | 
| 817 | 
            +
            algebras, arXive:1710.10528.
         | 
| 818 | 
            +
            [10] Mudrov, A.: Vector bundles on quantum conjugacy classes, arXiv:2201.04568.
         | 
| 819 | 
            +
            [11] Kumar, Sh., Letzter, G.: Shapovalov determinant for restricted and quantized restricted en-
         | 
| 820 | 
            +
            veloping algebras, Pac.J.Math. 179, No. 1, (1991), 123–161.
         | 
| 821 | 
            +
            [12] Mudrov, A.: Orthogonal basis for the Shapovalov form on Uq(sl(n + 1)), Rev. Math. Phys,
         | 
| 822 | 
            +
            27 (2015), 1550004.
         | 
| 823 | 
            +
            [13] Catoiu, S., Musson, I.: Shapovalov elements for Uq(sl(N + 1)), arXiv:2208.05831.
         | 
| 824 | 
            +
            [14] Etingof, P., O. Schiffmann, O.: Lectures on the dynamical Yang-Baxter equation, Quantum
         | 
| 825 | 
            +
            Groups and Lie Theory, London Math. Soc. Lecture Note Ser., Durham, 1999, vol. 290,
         | 
| 826 | 
            +
            Cambridge Univ. Press (2001).
         | 
| 827 | 
            +
            [15] Etingof, P.I., Kirillov, A.A., Jr, Macdonald’s polynomials and representations of quantum
         | 
| 828 | 
            +
            groups, Math. Res. Let., 1, no.3 (1994) 279–296.
         | 
| 829 | 
            +
            [16] Felder G., Tarasov V., Varchenko A., Monodromy of solutions of the elliptic quantum
         | 
| 830 | 
            +
            Knizhnik-Zamolodchikov-Bernard difference equations, Internat. J. Math. 10, no. 8 (1999),
         | 
| 831 | 
            +
            943–975.
         | 
| 832 | 
            +
            17
         | 
| 833 | 
            +
             | 
| 834 | 
            +
            [17] Alekseev, A. Lachowska, A.: Invariant ∗-product on coadjoint orbits and the Shapovalov
         | 
| 835 | 
            +
            pairing, Comment. Math. Helv. 80 (2005), 795–810.
         | 
| 836 | 
            +
            [18] Mudrov, A.: R-matrix and inverse Shapovalov form, J. Math. Phys., 57 (2016), 051706.
         | 
| 837 | 
            +
            [19] Nagel, J. G., Moshinsky, M.: Operators that lower or raise the irreducible vector spaces of
         | 
| 838 | 
            +
            Un−1 contained in an irreducible vector space of Un, J. Math. Phys. 6 (1965), 682–694.
         | 
| 839 | 
            +
            [20] D. Arnaudon, E. Buffenoir, E. Ragoucy, and P. Roche, Universal solutions of quantum dy-
         | 
| 840 | 
            +
            namical Yang-Baxter equations, Lett. Math. Phys. 44 (1998), no. 3, 201–214.
         | 
| 841 | 
            +
            [21] Mickelsson, J.: Step algebras of semisimple Lie algebras, Rev. Mod. Phys. 4 (1973), 307–318.
         | 
| 842 | 
            +
            [22] Drinfeld, V.: Quantum Groups. In Proc. Int. Congress of Mathematicians, Berkeley 1986,
         | 
| 843 | 
            +
            Gleason, A. V. (eds) pp. 798–820, AMS, Providence (1987).
         | 
| 844 | 
            +
            [23] Jimbo, M.: A q difference analog of U(g) and the Yang-Baxter equation, Lett. Math. Phys.
         | 
| 845 | 
            +
            10 (1985), 63–69.
         | 
| 846 | 
            +
            [24] Chari, V. and Pressley, A.: A guide to quantum groups, Cambridge University Press, Cam-
         | 
| 847 | 
            +
            bridge 1994.
         | 
| 848 | 
            +
            [25] De Concini, C., Kac, V. G.: Representations of quantum groups at roots of 1, Operator
         | 
| 849 | 
            +
            algebras, unitary representations, enveloping algebras, and invariant theory (Paris, 1989),
         | 
| 850 | 
            +
            Progr. Math., 92 (1990), 471–506.
         | 
| 851 | 
            +
            [26] Panyushev, D.: The poset of positive roots and its relatives, J. Alg. Comb., 23 (2006), 79–101.
         | 
| 852 | 
            +
            [27] Ashton, T., Mudrov, A.: R-matrix and Mickelsson algebras for orthosymplectic quantum
         | 
| 853 | 
            +
            groups, J. Math. Phys., 56 (2015), 081701.
         | 
| 854 | 
            +
            [28] Baranov, A., Mudrov, A., and Ostapenko, V.:
         | 
| 855 | 
            +
            Quantum exceptional group G2 and its
         | 
| 856 | 
            +
            semisimple conjugacy classes, Alg.& Rep.Theor., 23 (2020) 1827–1848.
         | 
| 857 | 
            +
            18
         | 
| 858 | 
            +
             | 
    	
        6dE0T4oBgHgl3EQfvwHw/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        79AzT4oBgHgl3EQfSPsz/content/tmp_files/2301.01228v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,365 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            DMOps: Data Management Operation and Recipes
         | 
| 2 | 
            +
            Eujeong Choi1, Chanjun Park 1 †
         | 
| 3 | 
            +
            1 Upstage
         | 
| 4 | 
            +
            {eujeong, chanjun.park}@upstage.ai
         | 
| 5 | 
            +
            Abstract
         | 
| 6 | 
            +
            Data-centric AI has shed light on the signif-
         | 
| 7 | 
            +
            icance of data within the machine learning
         | 
| 8 | 
            +
            (ML) pipeline. Acknowledging its importance,
         | 
| 9 | 
            +
            various research and policies are suggested
         | 
| 10 | 
            +
            by academia, industry, and government depart-
         | 
| 11 | 
            +
            ments. Although the capability of utilizing ex-
         | 
| 12 | 
            +
            isting data is essential, the capability to build a
         | 
| 13 | 
            +
            dataset has become more important than ever.
         | 
| 14 | 
            +
            In consideration of this trend, we propose a
         | 
| 15 | 
            +
            "Data Management Operation and Recipes"
         | 
| 16 | 
            +
            that will guide the industry regardless of the
         | 
| 17 | 
            +
            task or domain. In other words, this paper
         | 
| 18 | 
            +
            presents the concept of DMOps derived from
         | 
| 19 | 
            +
            real-world experience. By offering a baseline
         | 
| 20 | 
            +
            for building data, we want to help the industry
         | 
| 21 | 
            +
            streamline its data operation optimally.
         | 
| 22 | 
            +
            1
         | 
| 23 | 
            +
            Introduction
         | 
| 24 | 
            +
            With the emergence of Data-centric AI (Polyzotis
         | 
| 25 | 
            +
            and Zaharia, 2021; Mazumder et al., 2022), various
         | 
| 26 | 
            +
            in-depth research has been introduced in academia
         | 
| 27 | 
            +
            alongside the wide range of policies from indus-
         | 
| 28 | 
            +
            try and government departments (Pencheva et al.,
         | 
| 29 | 
            +
            2020).
         | 
| 30 | 
            +
            In the case of academia, there are studies
         | 
| 31 | 
            +
            boosting model performance through large-scale
         | 
| 32 | 
            +
            datasets (Liu et al., 2021; Costa-jussà et al., 2022)
         | 
| 33 | 
            +
            along with the production of benchmark datasets
         | 
| 34 | 
            +
            for objective performance comparison between
         | 
| 35 | 
            +
            models (Wang et al., 2018; Ruder, 2021). Further-
         | 
| 36 | 
            +
            more, there are also benchmark datasets that spe-
         | 
| 37 | 
            +
            cialize in specific tasks (Rajpurkar et al., 2016; Alt
         | 
| 38 | 
            +
            et al., 2020). The government contributes to the
         | 
| 39 | 
            +
            field by implementing public data open policies
         | 
| 40 | 
            +
            and releasing datasets from the National Statistics
         | 
| 41 | 
            +
            department (Panagos et al., 2012).
         | 
| 42 | 
            +
            However, the industry frequently dives into an
         | 
| 43 | 
            +
            untapped and specialized domain, where there is
         | 
| 44 | 
            +
            rarely a ready-to-go dataset. Especially for B2B
         | 
| 45 | 
            +
            companies, there is usually an urgent demand
         | 
| 46 | 
            +
            †Corresponding author.
         | 
| 47 | 
            +
            for data that meets the requirements of their cus-
         | 
| 48 | 
            +
            tomers or their business items (Pustejovsky and
         | 
| 49 | 
            +
            Stubbs, 2012). Since the open source and bench-
         | 
| 50 | 
            +
            mark datasets are normally insufficient to meet
         | 
| 51 | 
            +
            these specific demands, additional data production
         | 
| 52 | 
            +
            is always a necessary step to specialize in a par-
         | 
| 53 | 
            +
            ticular task. As a result, the majority of the AI
         | 
| 54 | 
            +
            businesses started to build their own task-specific
         | 
| 55 | 
            +
            datasets, alongside the emergence of companies
         | 
| 56 | 
            +
            that specialize in operating crowd workers to meet
         | 
| 57 | 
            +
            these demands, and research on efficient data pro-
         | 
| 58 | 
            +
            duction on human-in-the-loop started to make ap-
         | 
| 59 | 
            +
            pearance (Doan, 2018; Wu et al., 2022).
         | 
| 60 | 
            +
            Despite its necessity, there has been a paucity of
         | 
| 61 | 
            +
            studies in the field of data production. To the best of
         | 
| 62 | 
            +
            our knowledge, there has not yet been research that
         | 
| 63 | 
            +
            proposes the entire process starting from analyz-
         | 
| 64 | 
            +
            ing the business standpoint to data annotation and
         | 
| 65 | 
            +
            evaluation. Therefore, we propose a "Data Man-
         | 
| 66 | 
            +
            agement Operation and Recipes" that will assist
         | 
| 67 | 
            +
            in building a dataset efficiently and economically
         | 
| 68 | 
            +
            regardless of task and domain. Specially, we pro-
         | 
| 69 | 
            +
            pose a DMOps that can produce high-quality data
         | 
| 70 | 
            +
            needed in manufacturing deep learning models.
         | 
| 71 | 
            +
            2
         | 
| 72 | 
            +
            Proposed Data Management Operation
         | 
| 73 | 
            +
            and Recipes (DMOps)
         | 
| 74 | 
            +
            Data management operations involve the integra-
         | 
| 75 | 
            +
            tion of human input and decision-making into a
         | 
| 76 | 
            +
            data management pipeline or system. This involves
         | 
| 77 | 
            +
            tasks such as data annotation, data quality assur-
         | 
| 78 | 
            +
            ance, and other activities that require a human
         | 
| 79 | 
            +
            touch. One way to implement a data management
         | 
| 80 | 
            +
            operation is through the use of recipes. Recipes are
         | 
| 81 | 
            +
            step-by-step instructions for performing a specific
         | 
| 82 | 
            +
            task or set of tasks, and can be used to guide human
         | 
| 83 | 
            +
            workers through the data management process.
         | 
| 84 | 
            +
            Our Data Recipes consists of 12 steps. Through
         | 
| 85 | 
            +
            these steps, we go over the entire process of data op-
         | 
| 86 | 
            +
            eration : from establishing the goal of the project to
         | 
| 87 | 
            +
            delivering the final data to the modeling team. The
         | 
| 88 | 
            +
            arXiv:2301.01228v1  [cs.DB]  2 Jan 2023
         | 
| 89 | 
            +
             | 
| 90 | 
            +
            name and explanation of each step is as follows.
         | 
| 91 | 
            +
            1. Establish the Project Goal: Analyzing the
         | 
| 92 | 
            +
            purpose and requirements of data production
         | 
| 93 | 
            +
            is the first step of the recipes. This step re-
         | 
| 94 | 
            +
            quires collaboration with ML engineer teams
         | 
| 95 | 
            +
            and business operation teams. Through com-
         | 
| 96 | 
            +
            munication, we can decide the input and out-
         | 
| 97 | 
            +
            put format of data that is suitable to the model
         | 
| 98 | 
            +
            of choice, and also set data milestones that fit
         | 
| 99 | 
            +
            the timeline of the business operation team.
         | 
| 100 | 
            +
            2. Secure Raw Data: Researching and collect-
         | 
| 101 | 
            +
            ing raw data is the second step of the recipes.
         | 
| 102 | 
            +
            Three possible cases of collecting raw data are
         | 
| 103 | 
            +
            1) the client providing the raw data, 2) using
         | 
| 104 | 
            +
            open-sourced public data, and 3) purchasing
         | 
| 105 | 
            +
            the raw data from its source platform. The
         | 
| 106 | 
            +
            key issue here is the copyright of each data
         | 
| 107 | 
            +
            source. License information must be checked
         | 
| 108 | 
            +
            thoroughly, and getting a legal review is rec-
         | 
| 109 | 
            +
            ommended before its usage.
         | 
| 110 | 
            +
            3. Data Pre-processing: The third step is im-
         | 
| 111 | 
            +
            proving the quality of the raw data through
         | 
| 112 | 
            +
            pre-processing. Basically the pre-processing
         | 
| 113 | 
            +
            consists of two main tasks: first, adjusting the
         | 
| 114 | 
            +
            format of data regarding its requirements, sec-
         | 
| 115 | 
            +
            ond, filtering non-ethical, privacy invading,
         | 
| 116 | 
            +
            and noisy data (Wiegand et al., 2018; Park
         | 
| 117 | 
            +
            et al., 2020). This step is all about practicing
         | 
| 118 | 
            +
            quality over quantity.
         | 
| 119 | 
            +
            4. Design a Data Schema: Fourth step is de-
         | 
| 120 | 
            +
            signing an annotation system that is efficient
         | 
| 121 | 
            +
            while containing all the information required.
         | 
| 122 | 
            +
            We need to come up with a label system that
         | 
| 123 | 
            +
            can represent human perception by digging
         | 
| 124 | 
            +
            through the collected data with the aid of ML
         | 
| 125 | 
            +
            methods such as unsupervised learning. Also,
         | 
| 126 | 
            +
            figuring out parts that can be somewhat auto-
         | 
| 127 | 
            +
            mated (pseudo-labeling) and parts that need
         | 
| 128 | 
            +
            human intervention (annotating) is essential
         | 
| 129 | 
            +
            in making the process efficient and moreover,
         | 
| 130 | 
            +
            accurate. With few pilot annotation iterations,
         | 
| 131 | 
            +
            the data scheme is expected to reach its opti-
         | 
| 132 | 
            +
            mal design.
         | 
| 133 | 
            +
            5. Prepare a Guideline: Fifth step is the doc-
         | 
| 134 | 
            +
            umentation of the data scheme. Its purpose
         | 
| 135 | 
            +
            is to deliver the designed labeling system to
         | 
| 136 | 
            +
            the expected annotators. The difficulty of the
         | 
| 137 | 
            +
            guideline should be monitored with caution
         | 
| 138 | 
            +
            since the clarity and detailed explanation may
         | 
| 139 | 
            +
            be in a trade-off relationship.
         | 
| 140 | 
            +
            6. Recruit Annotators: Sixth step is recruiting
         | 
| 141 | 
            +
            the annotators. The key is to select workers
         | 
| 142 | 
            +
            that are fit for the task for an efficient and
         | 
| 143 | 
            +
            accurate outcome. The best case would be se-
         | 
| 144 | 
            +
            lecting those who scored high on a test similar
         | 
| 145 | 
            +
            to the actual labeling task.
         | 
| 146 | 
            +
            7. Instruct Annotators: Seventh step is instruct-
         | 
| 147 | 
            +
            ing the annotators with the guideline made
         | 
| 148 | 
            +
            above. In this stage, two-way communication
         | 
| 149 | 
            +
            that draws out questions and debates is the key
         | 
| 150 | 
            +
            whereas one-sided communication is discour-
         | 
| 151 | 
            +
            aged.
         | 
| 152 | 
            +
            8. Data Annotation: This is the step where
         | 
| 153 | 
            +
            data annotators annotate the actual data. It
         | 
| 154 | 
            +
            is the process of transferring the linguis-
         | 
| 155 | 
            +
            tic/cognitive/visual intuition of the construc-
         | 
| 156 | 
            +
            tor into data. Therefore, the data construction
         | 
| 157 | 
            +
            manager must devise a way to unify the differ-
         | 
| 158 | 
            +
            ent intuitions of different builders in a more
         | 
| 159 | 
            +
            general line. When constructing data, it is also
         | 
| 160 | 
            +
            key to continuously respond to the QA of data
         | 
| 161 | 
            +
            builders.
         | 
| 162 | 
            +
            9. Data Inspection: This ninth step is inspecting
         | 
| 163 | 
            +
            the annotated data. During this step, inspec-
         | 
| 164 | 
            +
            tors must identify commonly occurring human
         | 
| 165 | 
            +
            errors and sort out the edge cases through
         | 
| 166 | 
            +
            discussions. Considering the nature of the
         | 
| 167 | 
            +
            Human-in-the-loop process, this step is essen-
         | 
| 168 | 
            +
            tial to ensure the fidelity of the dataset.
         | 
| 169 | 
            +
            10. Data Verification: The tenth step is verifying
         | 
| 170 | 
            +
            the data. When inspecting data, it is necessary
         | 
| 171 | 
            +
            to first determine whether the work has been
         | 
| 172 | 
            +
            completed by observing the given guideline.
         | 
| 173 | 
            +
            Also, 1) data sufficiency, 2) data diversity, 3)
         | 
| 174 | 
            +
            data trustworthiness, 4) data privacy and se-
         | 
| 175 | 
            +
            curity 5) data ethics suitability should be re-
         | 
| 176 | 
            +
            viewed (Roh et al., 2019; Koo et al., 2022). Fi-
         | 
| 177 | 
            +
            nally, data consistency can be identified based
         | 
| 178 | 
            +
            on the inter-annotator agreement (IAA) score.
         | 
| 179 | 
            +
            11. Data Evaluation: Eleventh step is verifying
         | 
| 180 | 
            +
            the quality of data through actual modeling. In
         | 
| 181 | 
            +
            order to quantitatively verify whether the data
         | 
| 182 | 
            +
            is made as planned, various experiments are
         | 
| 183 | 
            +
            conducted such as checking data efficiency by
         | 
| 184 | 
            +
            increasing the amount of data or sectioning
         | 
| 185 | 
            +
             | 
| 186 | 
            +
            the data to check the consistency of its qual-
         | 
| 187 | 
            +
            ity (Moon et al., 2021; Park et al., 2021). It is
         | 
| 188 | 
            +
            natural to find artifacts within one’s data; after
         | 
| 189 | 
            +
            identifying the repeated errors, revisiting the
         | 
| 190 | 
            +
            recipes from step 5 is frequently required to
         | 
| 191 | 
            +
            enhance the quality of data. If there are parts
         | 
| 192 | 
            +
            that do not match our purpose while proceed-
         | 
| 193 | 
            +
            ing the steps, we should return to stage 5 and
         | 
| 194 | 
            +
            revise the guideline for another iteration.
         | 
| 195 | 
            +
            12. Data Deliverables: Final step of the recipes
         | 
| 196 | 
            +
            is delivering the final data outcome. In other
         | 
| 197 | 
            +
            words, it is the process of delivering annotated
         | 
| 198 | 
            +
            data to the modeler or customer. When deliv-
         | 
| 199 | 
            +
            ering, the versioning must be adapted to the
         | 
| 200 | 
            +
            protocol, and it is important to reveal the fea-
         | 
| 201 | 
            +
            tures of the data with its sample. Furthermore,
         | 
| 202 | 
            +
            after going through the EDA process, it is rec-
         | 
| 203 | 
            +
            ommended to deliver the data analysis and the
         | 
| 204 | 
            +
            quality evaluation document together.
         | 
| 205 | 
            +
            Figure 1: Process of the Data Management Operation
         | 
| 206 | 
            +
            and Recipes (DMOps)
         | 
| 207 | 
            +
            Why DMOps?
         | 
| 208 | 
            +
            Due to the absence of a standard
         | 
| 209 | 
            +
            data-building process, there are many cases where
         | 
| 210 | 
            +
            the order of steps is mixed up or cannot be applied
         | 
| 211 | 
            +
            task-agnostically. The "DMOps" we propose offers
         | 
| 212 | 
            +
            a fixed process of data production, and at the same
         | 
| 213 | 
            +
            time can be used universally regardless of the task
         | 
| 214 | 
            +
            or domain. Therefore, our recipes can serve as a
         | 
| 215 | 
            +
            baseline for data production.
         | 
| 216 | 
            +
            Data is built through several stages. However the
         | 
| 217 | 
            +
            industry does not have a unified standard of the
         | 
| 218 | 
            +
            order to construct data, so there are many cases
         | 
| 219 | 
            +
            where the stages are scattered or mixed up. How-
         | 
| 220 | 
            +
            ever, when the proposed process is applied, it not
         | 
| 221 | 
            +
            only corrects the scattered order but is also task
         | 
| 222 | 
            +
            agnostic and can be universally applied to any do-
         | 
| 223 | 
            +
            main. In other words, our methodology can serve
         | 
| 224 | 
            +
            as a baseline for data construction.
         | 
| 225 | 
            +
            3
         | 
| 226 | 
            +
            Conclusion and Future Works
         | 
| 227 | 
            +
            In this paper, we proposed a DMOps that can effi-
         | 
| 228 | 
            +
            ciently produce high-quality data with human an-
         | 
| 229 | 
            +
            notation. The methodology is task agnostic which
         | 
| 230 | 
            +
            allows it to serve as a baseline for any data produc-
         | 
| 231 | 
            +
            tion. In the future, we plan to increase the reliability
         | 
| 232 | 
            +
            of the proposed process through quantitative verifi-
         | 
| 233 | 
            +
            cation at each stage of the process. In addition, we
         | 
| 234 | 
            +
            intend to conduct a study to verify the difference in
         | 
| 235 | 
            +
            data quality depending on whether the data recipes
         | 
| 236 | 
            +
            is applied or not.
         | 
| 237 | 
            +
            References
         | 
| 238 | 
            +
            Christoph Alt, Aleksandra Gabryszak, and Leonhard
         | 
| 239 | 
            +
            Hennig. 2020. Tacred revisited: A thorough evalu-
         | 
| 240 | 
            +
            ation of the tacred relation extraction task.
         | 
| 241 | 
            +
            arXiv
         | 
| 242 | 
            +
            preprint arXiv:2004.14855.
         | 
| 243 | 
            +
            Marta R Costa-jussà, James Cross, Onur Çelebi, Maha
         | 
| 244 | 
            +
            Elbayad, Kenneth Heafield, Kevin Heffernan, Elahe
         | 
| 245 | 
            +
            Kalbassi, Janice Lam, Daniel Licht, Jean Maillard,
         | 
| 246 | 
            +
            et al. 2022.
         | 
| 247 | 
            +
            No language left behind: Scaling
         | 
| 248 | 
            +
            human-centered machine translation. arXiv preprint
         | 
| 249 | 
            +
            arXiv:2207.04672.
         | 
| 250 | 
            +
            AnHai Doan. 2018. Human-in-the-loop data analysis:
         | 
| 251 | 
            +
            a personal perspective. In Proceedings of the work-
         | 
| 252 | 
            +
            shop on human-in-the-loop data analytics, pages 1–
         | 
| 253 | 
            +
            6.
         | 
| 254 | 
            +
            Seonmin Koo, Chanjun Park, Jaehyung Seo, Seungjun
         | 
| 255 | 
            +
            Lee, Hyeonseok Moon, Jungseob Lee, and Heuiseok
         | 
| 256 | 
            +
            Lim. 2022.
         | 
| 257 | 
            +
            K-nct: Korean neural grammatical er-
         | 
| 258 | 
            +
            ror correction gold-standard test set using novel
         | 
| 259 | 
            +
            error type classification criteria.
         | 
| 260 | 
            +
            IEEE Access,
         | 
| 261 | 
            +
            10:118167–118175.
         | 
| 262 | 
            +
            Jianbang Liu, Yuqi Fang, Delong Zhu, Nachuan Ma,
         | 
| 263 | 
            +
            Jin Pan, and Max Q-H Meng. 2021. A large-scale
         | 
| 264 | 
            +
            dataset for benchmarking elevator button segmenta-
         | 
| 265 | 
            +
            tion and character recognition.
         | 
| 266 | 
            +
            In 2021 IEEE In-
         | 
| 267 | 
            +
            ternational Conference on Robotics and Automation
         | 
| 268 | 
            +
            (ICRA), pages 14018–14024. IEEE.
         | 
| 269 | 
            +
            Mark Mazumder, Colby Banbury, Xiaozhe Yao, Bo-
         | 
| 270 | 
            +
            jan Karlaš, William Gaviria Rojas, Sudnya Diamos,
         | 
| 271 | 
            +
            Greg Diamos, Lynn He, Douwe Kiela, David Jurado,
         | 
| 272 | 
            +
            et al. 2022. Dataperf: Benchmarks for data-centric
         | 
| 273 | 
            +
            ai development. arXiv preprint arXiv:2207.10062.
         | 
| 274 | 
            +
             | 
| 275 | 
            +
            Start
         | 
| 276 | 
            +
            文
         | 
| 277 | 
            +
            1. Establish the
         | 
| 278 | 
            +
            2. Secure Raw Data
         | 
| 279 | 
            +
            3. Data
         | 
| 280 | 
            +
            Project Goal
         | 
| 281 | 
            +
            Pre-processing
         | 
| 282 | 
            +
            4. Design a Data
         | 
| 283 | 
            +
            5. Prepare a
         | 
| 284 | 
            +
            Schema
         | 
| 285 | 
            +
            6. Recruit Annotators
         | 
| 286 | 
            +
            Guideline
         | 
| 287 | 
            +
            7. Instruct Annotators
         | 
| 288 | 
            +
            8. Data Annotation
         | 
| 289 | 
            +
            9. Data Inspection
         | 
| 290 | 
            +
            10. Data Verification
         | 
| 291 | 
            +
            11. Data Evaluation
         | 
| 292 | 
            +
            Pass-
         | 
| 293 | 
            +
            12.Data Deliverables
         | 
| 294 | 
            +
            Rework
         | 
| 295 | 
            +
            Task DoneHyeonseok Moon, Chanjun Park, Sugyeong Eo, Jeong-
         | 
| 296 | 
            +
            Bae Park, and Heuiseok Lim. 2021.
         | 
| 297 | 
            +
            Filter-mbart
         | 
| 298 | 
            +
            based neural machine translation using parallel cor-
         | 
| 299 | 
            +
            pus filtering. Journal of the Korea Convergence So-
         | 
| 300 | 
            +
            ciety, 12(5):1–7.
         | 
| 301 | 
            +
            Panos Panagos, Marc Van Liedekerke, Arwyn Jones,
         | 
| 302 | 
            +
            and Luca Montanarella. 2012.
         | 
| 303 | 
            +
            European soil
         | 
| 304 | 
            +
            data centre: Response to european policy support
         | 
| 305 | 
            +
            and public data requirements.
         | 
| 306 | 
            +
            Land use policy,
         | 
| 307 | 
            +
            29(2):329–338.
         | 
| 308 | 
            +
            Chanjun Park, Seolhwa Lee, Hyeonseok Moon, Sug-
         | 
| 309 | 
            +
            yeong Eo, Jaehyung Seo, and Heuiseok Lim. 2021.
         | 
| 310 | 
            +
            How should human translation coexist with nmt? ef-
         | 
| 311 | 
            +
            ficient tool for building high quality parallel corpus.
         | 
| 312 | 
            +
            arXiv preprint arXiv:2111.00191.
         | 
| 313 | 
            +
            Chanjun
         | 
| 314 | 
            +
            Park,
         | 
| 315 | 
            +
            Yeonsu
         | 
| 316 | 
            +
            Lee,
         | 
| 317 | 
            +
            Chanhee
         | 
| 318 | 
            +
            Lee,
         | 
| 319 | 
            +
            and
         | 
| 320 | 
            +
            Heuiseok Lim. 2020. Quality, not quantity?: Effect
         | 
| 321 | 
            +
            of parallel corpus quantity and quality on neural ma-
         | 
| 322 | 
            +
            chine translation. In Annual Conference on Human
         | 
| 323 | 
            +
            and Language Technology, pages 363–368. Human
         | 
| 324 | 
            +
            and Language Technology.
         | 
| 325 | 
            +
            Irina Pencheva, Marc Esteve, and Slava Jankin
         | 
| 326 | 
            +
            Mikhaylov. 2020.
         | 
| 327 | 
            +
            Big data and ai–a transforma-
         | 
| 328 | 
            +
            tional shift for government: So, what next for re-
         | 
| 329 | 
            +
            search? Public Policy and Administration, 35(1):24–
         | 
| 330 | 
            +
            44.
         | 
| 331 | 
            +
            Neoklis Polyzotis and Matei Zaharia. 2021. What can
         | 
| 332 | 
            +
            data-centric ai learn from data and ml engineering?
         | 
| 333 | 
            +
            arXiv preprint arXiv:2112.06439.
         | 
| 334 | 
            +
            James Pustejovsky and Amber Stubbs. 2012.
         | 
| 335 | 
            +
            Nat-
         | 
| 336 | 
            +
            ural Language Annotation for Machine Learning:
         | 
| 337 | 
            +
            A guide to corpus-building for applications.
         | 
| 338 | 
            +
            "
         | 
| 339 | 
            +
            O’Reilly Media, Inc.".
         | 
| 340 | 
            +
            Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and
         | 
| 341 | 
            +
            Percy Liang. 2016. Squad: 100,000+ questions for
         | 
| 342 | 
            +
            machine comprehension of text.
         | 
| 343 | 
            +
            arXiv preprint
         | 
| 344 | 
            +
            arXiv:1606.05250.
         | 
| 345 | 
            +
            Yuji Roh, Geon Heo, and Steven Euijong Whang.
         | 
| 346 | 
            +
            2019.
         | 
| 347 | 
            +
            A survey on data collection for machine
         | 
| 348 | 
            +
            learning: a big data-ai integration perspective. IEEE
         | 
| 349 | 
            +
            Transactions on Knowledge and Data Engineering,
         | 
| 350 | 
            +
            33(4):1328–1347.
         | 
| 351 | 
            +
            Sebastian Ruder. 2021. Challenges and opportunities
         | 
| 352 | 
            +
            in nlp benchmarking.
         | 
| 353 | 
            +
            Alex Wang, Amanpreet Singh, Julian Michael, Felix
         | 
| 354 | 
            +
            Hill, Omer Levy, and Samuel R Bowman. 2018.
         | 
| 355 | 
            +
            Glue: A multi-task benchmark and analysis platform
         | 
| 356 | 
            +
            for natural language understanding. arXiv preprint
         | 
| 357 | 
            +
            arXiv:1804.07461.
         | 
| 358 | 
            +
            Michael Wiegand, Melanie Siegel, and Josef Ruppen-
         | 
| 359 | 
            +
            hofer. 2018. Overview of the germeval 2018 shared
         | 
| 360 | 
            +
            task on the identification of offensive language.
         | 
| 361 | 
            +
            Xingjiao Wu, Luwei Xiao, Yixuan Sun, Junhang
         | 
| 362 | 
            +
            Zhang, Tianlong Ma, and Liang He. 2022. A survey
         | 
| 363 | 
            +
            of human-in-the-loop for machine learning. Future
         | 
| 364 | 
            +
            Generation Computer Systems.
         | 
| 365 | 
            +
             | 
    	
        79AzT4oBgHgl3EQfSPsz/content/tmp_files/load_file.txt
    ADDED
    
    | @@ -0,0 +1,218 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf,len=217
         | 
| 2 | 
            +
            page_content='DMOps: Data Management Operation and Recipes  Eujeong Choi1, Chanjun Park 1 †  1 Upstage  {eujeong, chanjun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 3 | 
            +
            page_content='park}@upstage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 4 | 
            +
            page_content='ai  Abstract  Data-centric AI has shed light on the signif-  icance of data within the machine learning  (ML) pipeline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 5 | 
            +
            page_content=' Acknowledging its importance,  various research and policies are suggested  by academia, industry, and government depart-  ments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 6 | 
            +
            page_content=' Although the capability of utilizing ex-  isting data is essential, the capability to build a  dataset has become more important than ever.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 7 | 
            +
            page_content='  In consideration of this trend, we propose a  "Data Management Operation and Recipes"  that will guide the industry regardless of the  task or domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 8 | 
            +
            page_content=' In other words, this paper  presents the concept of DMOps derived from  real-world experience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 9 | 
            +
            page_content=' By offering a baseline  for building data, we want to help the industry  streamline its data operation optimally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 10 | 
            +
            page_content='  1  Introduction  With the emergence of Data-centric AI (Polyzotis  and Zaharia, 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 11 | 
            +
            page_content=' Mazumder et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 12 | 
            +
            page_content=', 2022), various  in-depth research has been introduced in academia  alongside the wide range of policies from indus-  try and government departments (Pencheva et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 13 | 
            +
            page_content=',  2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 14 | 
            +
            page_content='  In the case of academia, there are studies  boosting model performance through large-scale  datasets (Liu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 15 | 
            +
            page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 16 | 
            +
            page_content=' Costa-jussà et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 17 | 
            +
            page_content=', 2022)  along with the production of benchmark datasets  for objective performance comparison between  models (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 18 | 
            +
            page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 19 | 
            +
            page_content=' Ruder, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 20 | 
            +
            page_content=' Further-  more, there are also benchmark datasets that spe-  cialize in specific tasks (Rajpurkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 21 | 
            +
            page_content=', 2016;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 22 | 
            +
            page_content=' Alt  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 23 | 
            +
            page_content=', 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 24 | 
            +
            page_content=' The government contributes to the  field by implementing public data open policies  and releasing datasets from the National Statistics  department (Panagos et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 25 | 
            +
            page_content=', 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 26 | 
            +
            page_content='  However, the industry frequently dives into an  untapped and specialized domain, where there is  rarely a ready-to-go dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 27 | 
            +
            page_content=' Especially for B2B  companies, there is usually an urgent demand  †Corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 28 | 
            +
            page_content='  for data that meets the requirements of their cus-  tomers or their business items (Pustejovsky and  Stubbs, 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 29 | 
            +
            page_content=' Since the open source and bench-  mark datasets are normally insufficient to meet  these specific demands, additional data production  is always a necessary step to specialize in a par-  ticular task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 30 | 
            +
            page_content=' As a result, the majority of the AI  businesses started to build their own task-specific  datasets, alongside the emergence of companies  that specialize in operating crowd workers to meet  these demands, and research on efficient data pro-  duction on human-in-the-loop started to make ap-  pearance (Doan, 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 31 | 
            +
            page_content=' Wu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 32 | 
            +
            page_content=', 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 33 | 
            +
            page_content='  Despite its necessity, there has been a paucity of  studies in the field of data production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 34 | 
            +
            page_content=' To the best of  our knowledge, there has not yet been research that  proposes the entire process starting from analyz-  ing the business standpoint to data annotation and  evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 35 | 
            +
            page_content=' Therefore, we propose a "Data Man-  agement Operation and Recipes" that will assist  in building a dataset efficiently and economically  regardless of task and domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 36 | 
            +
            page_content=' Specially, we pro-  pose a DMOps that can produce high-quality data  needed in manufacturing deep learning models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 37 | 
            +
            page_content='  2  Proposed Data Management Operation  and Recipes (DMOps)  Data management operations involve the integra-  tion of human input and decision-making into a  data management pipeline or system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 38 | 
            +
            page_content=' This involves  tasks such as data annotation, data quality assur-  ance, and other activities that require a human  touch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 39 | 
            +
            page_content=' One way to implement a data management  operation is through the use of recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 40 | 
            +
            page_content=' Recipes are  step-by-step instructions for performing a specific  task or set of tasks, and can be used to guide human  workers through the data management process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 41 | 
            +
            page_content='  Our Data Recipes consists of 12 steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 42 | 
            +
            page_content=' Through  these steps, we go over the entire process of data op-  eration : from establishing the goal of the project to  delivering the final data to the modeling team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 43 | 
            +
            page_content=' The  arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 44 | 
            +
            page_content='01228v1  [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 45 | 
            +
            page_content='DB]  2 Jan 2023  name and explanation of each step is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 46 | 
            +
            page_content='  1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 47 | 
            +
            page_content=' Establish the Project Goal: Analyzing the  purpose and requirements of data production  is the first step of the recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 48 | 
            +
            page_content=' This step re-  quires collaboration with ML engineer teams  and business operation teams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 49 | 
            +
            page_content=' Through com-  munication, we can decide the input and out-  put format of data that is suitable to the model  of choice, and also set data milestones that fit  the timeline of the business operation team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 50 | 
            +
            page_content='  2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 51 | 
            +
            page_content=' Secure Raw Data: Researching and collect-  ing raw data is the second step of the recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 52 | 
            +
            page_content='  Three possible cases of collecting raw data are  1) the client providing the raw data, 2) using  open-sourced public data, and 3) purchasing  the raw data from its source platform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 53 | 
            +
            page_content=' The  key issue here is the copyright of each data  source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 54 | 
            +
            page_content=' License information must be checked  thoroughly, and getting a legal review is rec-  ommended before its usage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 55 | 
            +
            page_content='  3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 56 | 
            +
            page_content=' Data Pre-processing: The third step is im-  proving the quality of the raw data through  pre-processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 57 | 
            +
            page_content=' Basically the pre-processing  consists of two main tasks: first, adjusting the  format of data regarding its requirements, sec-  ond, filtering non-ethical, privacy invading,  and noisy data (Wiegand et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 58 | 
            +
            page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 59 | 
            +
            page_content=' Park  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 60 | 
            +
            page_content=', 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 61 | 
            +
            page_content=' This step is all about practicing  quality over quantity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 62 | 
            +
            page_content='  4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 63 | 
            +
            page_content=' Design a Data Schema: Fourth step is de-  signing an annotation system that is efficient  while containing all the information required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 64 | 
            +
            page_content='  We need to come up with a label system that  can represent human perception by digging  through the collected data with the aid of ML  methods such as unsupervised learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 65 | 
            +
            page_content=' Also,  figuring out parts that can be somewhat auto-  mated (pseudo-labeling) and parts that need  human intervention (annotating) is essential  in making the process efficient and moreover,  accurate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 66 | 
            +
            page_content=' With few pilot annotation iterations,  the data scheme is expected to reach its opti-  mal design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 67 | 
            +
            page_content='  5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 68 | 
            +
            page_content=' Prepare a Guideline: Fifth step is the doc-  umentation of the data scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 69 | 
            +
            page_content=' Its purpose  is to deliver the designed labeling system to  the expected annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 70 | 
            +
            page_content=' The difficulty of the  guideline should be monitored with caution  since the clarity and detailed explanation may  be in a trade-off relationship.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 71 | 
            +
            page_content='  6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 72 | 
            +
            page_content=' Recruit Annotators: Sixth step is recruiting  the annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 73 | 
            +
            page_content=' The key is to select workers  that are fit for the task for an efficient and  accurate outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 74 | 
            +
            page_content=' The best case would be se-  lecting those who scored high on a test similar  to the actual labeling task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 75 | 
            +
            page_content='  7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 76 | 
            +
            page_content=' Instruct Annotators: Seventh step is instruct-  ing the annotators with the guideline made  above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 77 | 
            +
            page_content=' In this stage, two-way communication  that draws out questions and debates is the key  whereas one-sided communication is discour-  aged.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 78 | 
            +
            page_content='  8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 79 | 
            +
            page_content=' Data Annotation: This is the step where  data annotators annotate the actual data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 80 | 
            +
            page_content=' It  is the process of transferring the linguis-  tic/cognitive/visual intuition of the construc-  tor into data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 81 | 
            +
            page_content=' Therefore, the data construction  manager must devise a way to unify the differ-  ent intuitions of different builders in a more  general line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 82 | 
            +
            page_content=' When constructing data, it is also  key to continuously respond to the QA of data  builders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 83 | 
            +
            page_content='  9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 84 | 
            +
            page_content=' Data Inspection: This ninth step is inspecting  the annotated data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 85 | 
            +
            page_content=' During this step, inspec-  tors must identify commonly occurring human  errors and sort out the edge cases through  discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 86 | 
            +
            page_content=' Considering the nature of the  Human-in-the-loop process, this step is essen-  tial to ensure the fidelity of the dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 87 | 
            +
            page_content='  10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 88 | 
            +
            page_content=' Data Verification: The tenth step is verifying  the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 89 | 
            +
            page_content=' When inspecting data, it is necessary  to first determine whether the work has been  completed by observing the given guideline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 90 | 
            +
            page_content='  Also, 1) data sufficiency, 2) data diversity, 3)  data trustworthiness, 4) data privacy and se-  curity 5) data ethics suitability should be re-  viewed (Roh et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 91 | 
            +
            page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 92 | 
            +
            page_content=' Koo et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 93 | 
            +
            page_content=', 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 94 | 
            +
            page_content=' Fi-  nally, data consistency can be identified based  on the inter-annotator agreement (IAA) score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 95 | 
            +
            page_content='  11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 96 | 
            +
            page_content=' Data Evaluation: Eleventh step is verifying  the quality of data through actual modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 97 | 
            +
            page_content=' In  order to quantitatively verify whether the data  is made as planned, various experiments are  conducted such as checking data efficiency by  increasing the amount of data or sectioning  the data to check the consistency of its qual-  ity (Moon et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 98 | 
            +
            page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 99 | 
            +
            page_content=' Park et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 100 | 
            +
            page_content=', 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 101 | 
            +
            page_content=' It is  natural to find artifacts within one’s data;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 102 | 
            +
            page_content=' after  identifying the repeated errors, revisiting the  recipes from step 5 is frequently required to  enhance the quality of data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 103 | 
            +
            page_content=' If there are parts  that do not match our purpose while proceed-  ing the steps, we should return to stage 5 and  revise the guideline for another iteration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 104 | 
            +
            page_content='  12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 105 | 
            +
            page_content=' Data Deliverables: Final step of the recipes  is delivering the final data outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 106 | 
            +
            page_content=' In other  words, it is the process of delivering annotated  data to the modeler or customer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 107 | 
            +
            page_content=' When deliv-  ering, the versioning must be adapted to the  protocol, and it is important to reveal the fea-  tures of the data with its sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 108 | 
            +
            page_content=' Furthermore,  after going through the EDA process, it is rec-  ommended to deliver the data analysis and the  quality evaluation document together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 109 | 
            +
            page_content='  Figure 1: Process of the Data Management Operation  and Recipes (DMOps)  Why DMOps?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 110 | 
            +
            page_content='  Due to the absence of a standard  data-building process, there are many cases where  the order of steps is mixed up or cannot be applied  task-agnostically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 111 | 
            +
            page_content=' The "DMOps" we propose offers  a fixed process of data production, and at the same  time can be used universally regardless of the task  or domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 112 | 
            +
            page_content=' Therefore, our recipes can serve as a  baseline for data production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 113 | 
            +
            page_content='  Data is built through several stages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 114 | 
            +
            page_content=' However the  industry does not have a unified standard of the  order to construct data, so there are many cases  where the stages are scattered or mixed up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 115 | 
            +
            page_content=' How-  ever, when the proposed process is applied, it not  only corrects the scattered order but is also task  agnostic and can be universally applied to any do-  main.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 116 | 
            +
            page_content=' In other words, our methodology can serve  as a baseline for data construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 117 | 
            +
            page_content='  3  Conclusion and Future Works  In this paper, we proposed a DMOps that can effi-  ciently produce high-quality data with human an-  notation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 118 | 
            +
            page_content=' The methodology is task agnostic which  allows it to serve as a baseline for any data produc-  tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 119 | 
            +
            page_content=' In the future, we plan to increase the reliability  of the proposed process through quantitative verifi-  cation at each stage of the process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 120 | 
            +
            page_content=' In addition, we  intend to conduct a study to verify the difference in  data quality depending on whether the data recipes  is applied or not.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 121 | 
            +
            page_content='  References  Christoph Alt, Aleksandra Gabryszak, and Leonhard  Hennig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 122 | 
            +
            page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 123 | 
            +
            page_content=' Tacred revisited: A thorough evalu-  ation of the tacred relation extraction task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 124 | 
            +
            page_content='  arXiv  preprint arXiv:2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 125 | 
            +
            page_content='14855.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 126 | 
            +
            page_content='  Marta R Costa-jussà, James Cross, Onur Çelebi, Maha  Elbayad, Kenneth Heafield, Kevin Heffernan, Elahe  Kalbassi, Janice Lam, Daniel Licht, Jean Maillard,  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 127 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 128 | 
            +
            page_content='  No language left behind: Scaling  human-centered machine translation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 129 | 
            +
            page_content=' arXiv preprint  arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 130 | 
            +
            page_content='04672.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 131 | 
            +
            page_content='  AnHai Doan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 132 | 
            +
            page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 133 | 
            +
            page_content=' Human-in-the-loop data analysis:  a personal perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 134 | 
            +
            page_content=' In Proceedings of the work-  shop on human-in-the-loop data analytics, pages 1–  6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 135 | 
            +
            page_content='  Seonmin Koo, Chanjun Park, Jaehyung Seo, Seungjun  Lee, Hyeonseok Moon, Jungseob Lee, and Heuiseok  Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 136 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 137 | 
            +
            page_content='  K-nct: Korean neural grammatical er-  ror correction gold-standard test set using novel  error type classification criteria.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 138 | 
            +
            page_content='  IEEE Access,  10:118167–118175.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 139 | 
            +
            page_content='  Jianbang Liu, Yuqi Fang, Delong Zhu, Nachuan Ma,  Jin Pan, and Max Q-H Meng.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 140 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 141 | 
            +
            page_content=' A large-scale  dataset for benchmarking elevator button segmenta-  tion and character recognition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 142 | 
            +
            page_content='  In 2021 IEEE In-  ternational Conference on Robotics and Automation  (ICRA), pages 14018–14024.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 143 | 
            +
            page_content=' IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 144 | 
            +
            page_content='  Mark Mazumder, Colby Banbury, Xiaozhe Yao, Bo-  jan Karlaš, William Gaviria Rojas, Sudnya Diamos,  Greg Diamos, Lynn He, Douwe Kiela, David Jurado,  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 145 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 146 | 
            +
            page_content=' Dataperf: Benchmarks for data-centric  ai development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 147 | 
            +
            page_content=' arXiv preprint arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 148 | 
            +
            page_content='10062.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 149 | 
            +
            page_content='  Start  文  1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 150 | 
            +
            page_content=' Establish the  2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 151 | 
            +
            page_content=' Secure Raw Data  3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 152 | 
            +
            page_content=' Data  Project Goal  Pre-processing  4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 153 | 
            +
            page_content=' Design a Data  5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 154 | 
            +
            page_content=' Prepare a  Schema  6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 155 | 
            +
            page_content=' Recruit Annotators  Guideline  7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 156 | 
            +
            page_content=' Instruct Annotators  8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 157 | 
            +
            page_content=' Data Annotation  9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 158 | 
            +
            page_content=' Data Inspection  10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 159 | 
            +
            page_content=' Data Verification  11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 160 | 
            +
            page_content=' Data Evaluation  Pass-  12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 161 | 
            +
            page_content='Data Deliverables  Rework  Task DoneHyeonseok Moon, Chanjun Park, Sugyeong Eo, Jeong-  Bae Park, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 162 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 163 | 
            +
            page_content='  Filter-mbart  based neural machine translation using parallel cor-  pus filtering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 164 | 
            +
            page_content=' Journal of the Korea Convergence So-  ciety, 12(5):1–7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 165 | 
            +
            page_content='  Panos Panagos, Marc Van Liedekerke, Arwyn Jones,  and Luca Montanarella.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 166 | 
            +
            page_content=' 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 167 | 
            +
            page_content='  European soil  data centre: Response to european policy support  and public data requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 168 | 
            +
            page_content='  Land use policy,  29(2):329–338.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 169 | 
            +
            page_content='  Chanjun Park, Seolhwa Lee, Hyeonseok Moon, Sug-  yeong Eo, Jaehyung Seo, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 170 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 171 | 
            +
            page_content='  How should human translation coexist with nmt?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 172 | 
            +
            page_content=' ef-  ficient tool for building high quality parallel corpus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 173 | 
            +
            page_content='  arXiv preprint arXiv:2111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 174 | 
            +
            page_content='00191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 175 | 
            +
            page_content='  Chanjun  Park,  Yeonsu  Lee,  Chanhee  Lee,  and  Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 176 | 
            +
            page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 177 | 
            +
            page_content=' Quality, not quantity?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 178 | 
            +
            page_content=' : Effect  of parallel corpus quantity and quality on neural ma-  chine translation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 179 | 
            +
            page_content=' In Annual Conference on Human  and Language Technology, pages 363–368.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 180 | 
            +
            page_content=' Human  and Language Technology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 181 | 
            +
            page_content='  Irina Pencheva, Marc Esteve, and Slava Jankin  Mikhaylov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 182 | 
            +
            page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 183 | 
            +
            page_content='  Big data and ai–a transforma-  tional shift for government: So, what next for re-  search?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 184 | 
            +
            page_content=' Public Policy and Administration, 35(1):24–  44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 185 | 
            +
            page_content='  Neoklis Polyzotis and Matei Zaharia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 186 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 187 | 
            +
            page_content=' What can  data-centric ai learn from data and ml engineering?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 188 | 
            +
            page_content='  arXiv preprint arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 189 | 
            +
            page_content='06439.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 190 | 
            +
            page_content='  James Pustejovsky and Amber Stubbs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 191 | 
            +
            page_content=' 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 192 | 
            +
            page_content='  Nat-  ural Language Annotation for Machine Learning:  A guide to corpus-building for applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 193 | 
            +
            page_content='  "  O’Reilly Media, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 194 | 
            +
            page_content='".' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 195 | 
            +
            page_content='  Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and  Percy Liang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 196 | 
            +
            page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 197 | 
            +
            page_content=' Squad: 100,000+ questions for  machine comprehension of text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 198 | 
            +
            page_content='  arXiv preprint  arXiv:1606.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 199 | 
            +
            page_content='05250.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 200 | 
            +
            page_content='  Yuji Roh, Geon Heo, and Steven Euijong Whang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 201 | 
            +
            page_content='  2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 202 | 
            +
            page_content='  A survey on data collection for machine  learning: a big data-ai integration perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 203 | 
            +
            page_content=' IEEE  Transactions on Knowledge and Data Engineering,  33(4):1328–1347.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 204 | 
            +
            page_content='  Sebastian Ruder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 205 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 206 | 
            +
            page_content=' Challenges and opportunities  in nlp benchmarking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 207 | 
            +
            page_content='  Alex Wang, Amanpreet Singh, Julian Michael, Felix  Hill, Omer Levy, and Samuel R Bowman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 208 | 
            +
            page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 209 | 
            +
            page_content='  Glue: A multi-task benchmark and analysis platform  for natural language understanding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 210 | 
            +
            page_content=' arXiv preprint  arXiv:1804.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 211 | 
            +
            page_content='07461.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 212 | 
            +
            page_content='  Michael Wiegand, Melanie Siegel, and Josef Ruppen-  hofer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 213 | 
            +
            page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 214 | 
            +
            page_content=' Overview of the germeval 2018 shared  task on the identification of offensive language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 215 | 
            +
            page_content='  Xingjiao Wu, Luwei Xiao, Yixuan Sun, Junhang  Zhang, Tianlong Ma, and Liang He.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 216 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 217 | 
            +
            page_content=' A survey  of human-in-the-loop for machine learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
| 218 | 
            +
            page_content=' Future  Generation Computer Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
         | 
    	
        9dAyT4oBgHgl3EQfdPeW/content/tmp_files/2301.00299v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1090 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.00299v1  [stat.AP]  31 Dec 2022
         | 
| 2 | 
            +
            Definition and clinical validation of Pain Patient
         | 
| 3 | 
            +
            States from high-dimensional mobile data:
         | 
| 4 | 
            +
            application to a chronic pain cohort
         | 
| 5 | 
            +
            1st Jenna M. Reinen
         | 
| 6 | 
            +
            Digital Health
         | 
| 7 | 
            +
            IBM Research
         | 
| 8 | 
            +
            Yorktown Heights, NY
         | 
| 9 | |
| 10 | 
            +
            2nd Carla Agurto
         | 
| 11 | 
            +
            Digital Health
         | 
| 12 | 
            +
            IBM Research
         | 
| 13 | 
            +
            Yorktown Heights, NY
         | 
| 14 | |
| 15 | 
            +
            3rd Guillermo Cecchi
         | 
| 16 | 
            +
            Digital Health
         | 
| 17 | 
            +
            IBM Research
         | 
| 18 | 
            +
            Yorktown Heights, NY
         | 
| 19 | |
| 20 | 
            +
            4th Jeffrey L. Rogers
         | 
| 21 | 
            +
            Digital Health
         | 
| 22 | 
            +
            IBM Research
         | 
| 23 | 
            +
            Yorktown Heights, NY
         | 
| 24 | |
| 25 | 
            +
            5th NAVITAS and ENVISION Studies Physician Author Group
         | 
| 26 | 
            +
            Clinical Research
         | 
| 27 | 
            +
            Boston Scientific
         | 
| 28 | 
            +
            Valencia, CA
         | 
| 29 | 
            +
            6th Boston Scientific Research Scientists Consortium
         | 
| 30 | 
            +
            Data Research and Engineering
         | 
| 31 | 
            +
            Boston Scientific
         | 
| 32 | 
            +
            Valencia, CA
         | 
| 33 | 
            +
            Abstract—The technical capacity to monitor patients with a
         | 
| 34 | 
            +
            mobile device has drastically expanded, but data produced from
         | 
| 35 | 
            +
            this approach are often difficult to interpret. We present a
         | 
| 36 | 
            +
            solution to produce a meaningful representation of patient status
         | 
| 37 | 
            +
            from large, complex data streams, leveraging both a data-driven
         | 
| 38 | 
            +
            approach, and use clinical knowledge to validate results. Data
         | 
| 39 | 
            +
            were collected from a clinical trial enrolling chronic pain patients,
         | 
| 40 | 
            +
            and included questionnaires, voice recordings, actigraphy, and
         | 
| 41 | 
            +
            standard health assessments. The data were reduced using a
         | 
| 42 | 
            +
            clustering analysis. In an initial exploratory analysis with only
         | 
| 43 | 
            +
            questionnaire data, we found up to 3 stable cluster solutions
         | 
| 44 | 
            +
            that grouped symptoms on a positive to negative spectrum.
         | 
| 45 | 
            +
            Objective features (actigraphy, speech) expanded the cluster
         | 
| 46 | 
            +
            solution granularity. Using a 5 state solution with questionnaire
         | 
| 47 | 
            +
            and actigraphy data, we found significant correlations between
         | 
| 48 | 
            +
            cluster properties and assessments of disability and quality-
         | 
| 49 | 
            +
            of-life. The correlation coefficient values showed an ordinal
         | 
| 50 | 
            +
            distinction, confirming the cluster ranking on a negative to
         | 
| 51 | 
            +
            positive spectrum. This suggests we captured novel, distinct Pain
         | 
| 52 | 
            +
            Patient States with this approach, even when multiple clusters
         | 
| 53 | 
            +
            were equated on pain magnitude. Relative to using complex time
         | 
| 54 | 
            +
            courses of many variables, Pain Patient States holds promise as
         | 
| 55 | 
            +
            an interpretable, useful, and actionable metric for a clinician or
         | 
| 56 | 
            +
            caregiver to simplify and provide timely delivery of care.
         | 
| 57 | 
            +
            Index Terms—chronic pain, digital health, clustering, medical
         | 
| 58 | 
            +
            decision making
         | 
| 59 | 
            +
            I. INTRODUCTION
         | 
| 60 | 
            +
            Recent advances in digital medicine have provided the
         | 
| 61 | 
            +
            opportunity to collect large sets of clinical data to evaluate and
         | 
| 62 | 
            +
            predict critical medical outcomes. For instance, mobile-based
         | 
| 63 | 
            +
            applications, accelerometers, and biosensors are now ubiqui-
         | 
| 64 | 
            +
            tous in phones and watches, enabling one to longitudinally
         | 
| 65 | 
            +
            track variables like mobility and speech, and facilitate patient
         | 
| 66 | 
            +
            symptom self-report. Importantly, these features may associate
         | 
| 67 | 
            +
            with clinical meaning. Large-scale studies have shown that
         | 
| 68 | 
            +
            data from mobile applications tracking daily activity may
         | 
| 69 | 
            +
            predict outcomes relevant to health and illness, such as in
         | 
| 70 | 
            +
            geriatric care and diabetes [1], [2]. Further, language can
         | 
| 71 | 
            +
            assess affective, psycholinguistic, physiological, and cognitive
         | 
| 72 | 
            +
            features can predict physiological and pharmacological [3],
         | 
| 73 | 
            +
            psychiatric [4], and cognitive disease states [5]. These types
         | 
| 74 | 
            +
            of findings have demonstrated the promise of digital health
         | 
| 75 | 
            +
            profiles in understanding patient experience and predicting
         | 
| 76 | 
            +
            important clinical outcomes.
         | 
| 77 | 
            +
            Despite these advances, the size and complexity of the
         | 
| 78 | 
            +
            clinical data generated by mobile applications is nontrivial to
         | 
| 79 | 
            +
            interpret and apply for several reasons. First, digital healthcare
         | 
| 80 | 
            +
            data can exist in multiple formats, creating the need to fuse
         | 
| 81 | 
            +
            vast amount of diverse information [6]. Second, there is a
         | 
| 82 | 
            +
            need for methods that can obtain clear data representations.
         | 
| 83 | 
            +
            These methods should provide interpretation that are manage-
         | 
| 84 | 
            +
            able in size, yet can maintain the characteristics of the raw
         | 
| 85 | 
            +
            information, allowing for patients and healthcare professionals
         | 
| 86 | 
            +
            to interpret and use the output [7]. Attempts to reduce and
         | 
| 87 | 
            +
            understand such data in a biological context have commonly
         | 
| 88 | 
            +
            used data-driven methods, especially those using machine
         | 
| 89 | 
            +
            learning algorithms. This approach offers the advantage of
         | 
| 90 | 
            +
            being able to handle large, multidimensional data sets through
         | 
| 91 | 
            +
            the ability to recognize patterns or joint representations that
         | 
| 92 | 
            +
            are otherwise difficult to identify using standard statistical
         | 
| 93 | 
            +
            approaches, providing knowledge discovery about a particular
         | 
| 94 | 
            +
            Copyright © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
         | 
| 95 | 
            +
            including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or
         | 
| 96 | 
            +
            lists, or reuse of any copyrighted component of this work in other works.
         | 
| 97 | 
            +
             | 
| 98 | 
            +
            topic that can span time, location, and scales [8]. In particular,
         | 
| 99 | 
            +
            clustering analysis offers the ability to collapse across oth-
         | 
| 100 | 
            +
            erwise incomprehensible multidimensional data and observe
         | 
| 101 | 
            +
            how features co-occur. In the case of spectrum illnesses that
         | 
| 102 | 
            +
            incorporate a range and variety of symptoms, decomposition
         | 
| 103 | 
            +
            can be helpful, with some outputs having an advantage in
         | 
| 104 | 
            +
            outcomes prediction [9]. But not all results allow for interpre-
         | 
| 105 | 
            +
            tation, and it is particularly susceptible to problems in small,
         | 
| 106 | 
            +
            unvalidated datasets which may result in overfitting and thus
         | 
| 107 | 
            +
            results that are not replicable or generalizable. Further, while
         | 
| 108 | 
            +
            results from unsupervised approaches may reveal meaningful
         | 
| 109 | 
            +
            clinical patterns, few methods exist to formally assign labels,
         | 
| 110 | 
            +
            rank, or identify qualitative aspects from the results of data-
         | 
| 111 | 
            +
            driven approaches through independent validation.
         | 
| 112 | 
            +
            A prime illustration of this problem is in chronic pain, a dis-
         | 
| 113 | 
            +
            ease affecting a substantial percentage of the population [10]
         | 
| 114 | 
            +
            that significantly impacts general function including employ-
         | 
| 115 | 
            +
            ment, mental health, and social interaction. This heterogeneous
         | 
| 116 | 
            +
            condition interacts with well-characterized facets of health,
         | 
| 117 | 
            +
            including mood, sleep, psychosocial function, medication use,
         | 
| 118 | 
            +
            and mobility. However, the current practice for most pain
         | 
| 119 | 
            +
            studies is to evaluate outcomes based on pain magnitude
         | 
| 120 | 
            +
            alone, which does not consider all of the variance shown to
         | 
| 121 | 
            +
            predict treatment success, quality-of-life (QoL), or other mea-
         | 
| 122 | 
            +
            surements of physical, psychological, and social well-being
         | 
| 123 | 
            +
            [11]. But, using all of these features as outcome variables
         | 
| 124 | 
            +
            is nontrivial to compute, conceptualize, and interpret. Few
         | 
| 125 | 
            +
            standard approaches have been developed that incorporate both
         | 
| 126 | 
            +
            the computational methodology required to complete such
         | 
| 127 | 
            +
            a task, and the ability to provide a clinically interpretable
         | 
| 128 | 
            +
            summary of the output. To date, machine learning has been
         | 
| 129 | 
            +
            used to predict pain outcomes, identify clinical subgroups
         | 
| 130 | 
            +
            [12], extract knowledge, and detect structure in biological
         | 
| 131 | 
            +
            and clinical features [13]. In chronic pain, while artificial
         | 
| 132 | 
            +
            intelligence (AI) has been applied to improve diagnoses, fewer
         | 
| 133 | 
            +
            studies apply it to the treatment and management of pain
         | 
| 134 | 
            +
            patients [14], and analyses that use longitudinal data or clinical
         | 
| 135 | 
            +
            validation are extremely limited.
         | 
| 136 | 
            +
            Given the quickly expanding capacity of digital health and
         | 
| 137 | 
            +
            learning algorithms to inform treatment outcomes in complex
         | 
| 138 | 
            +
            illnesses, there is a benefit to developing an approach to
         | 
| 139 | 
            +
            validate health states from multidimensional data. While it
         | 
| 140 | 
            +
            is known that various chronic pain symptoms can co-occur,
         | 
| 141 | 
            +
            it remains currently unknown whether symptom profiles may
         | 
| 142 | 
            +
            be successfully organized into distinct health states. Here, we
         | 
| 143 | 
            +
            propose a method by which we aim to identify clusters from
         | 
| 144 | 
            +
            high-dimensional, longitudinal data in chronic pain patients,
         | 
| 145 | 
            +
            and label them as Pain Patient States that may be operational-
         | 
| 146 | 
            +
            ized for clinical application and decision making [15] [16].
         | 
| 147 | 
            +
            To this end, we examined data from chronic pain patients in
         | 
| 148 | 
            +
            three subsets of data: 1) with questionnaires only; 2) with
         | 
| 149 | 
            +
            questionnaires plus voice data; and 3) with questionnaires
         | 
| 150 | 
            +
            plus actigraphy data. The dimensionality of each dataset
         | 
| 151 | 
            +
            was reduced into stable clusters using standard unsupervised
         | 
| 152 | 
            +
            clustering algorithms. Next, we quantitatively evaluated the
         | 
| 153 | 
            +
            clusters based on relationships to established health metrics,
         | 
| 154 | 
            +
            using standard assessments as clinical benchmarks in chronic
         | 
| 155 | 
            +
            pain to compare the data-driven results. A clear ordinal rank of
         | 
| 156 | 
            +
            states emerged, allowing us to assign unique qualitative labels
         | 
| 157 | 
            +
            even in clusters that were nearly identical in pain magnitude,
         | 
| 158 | 
            +
            so that they may be used as clinically-informed states. This
         | 
| 159 | 
            +
            system serves as an example of organizing diverse types of
         | 
| 160 | 
            +
            large datasets and anchoring them to known metrics as to
         | 
| 161 | 
            +
            evaluate treatment or assess function. Here, these formerly
         | 
| 162 | 
            +
            convoluted data patterns may now act to contextualize signal,
         | 
| 163 | 
            +
            rank results, track longitudinal health changes, and monitor
         | 
| 164 | 
            +
            meaningful medical outcomes.
         | 
| 165 | 
            +
            II. METHODS
         | 
| 166 | 
            +
            A. Participants and Data Collection
         | 
| 167 | 
            +
            Participants were recruited from pain clinics in on-going,
         | 
| 168 | 
            +
            longitudinal, multi-center, clinical studies (Clinicaltrials.gov
         | 
| 169 | 
            +
            ID: NCT01719055) aimed to understand chronic lower back
         | 
| 170 | 
            +
            and leg pain patients who are candidates for spinal cord
         | 
| 171 | 
            +
            stimulator (SCS) treatment (Boston Scientific, Valencia, CA).
         | 
| 172 | 
            +
            Participants were recruited and enrolled in the NAVITAS
         | 
| 173 | 
            +
            and/or ENVISION studies at multiple United States clinical
         | 
| 174 | 
            +
            sites if they intended to receive or had already received an
         | 
| 175 | 
            +
            SCS trial or implant, were at least 18 years old, and had
         | 
| 176 | 
            +
            been diagnosed with intractable chronic neuropathic pain.
         | 
| 177 | 
            +
            Additionally, subjects may have been previously enrolled in
         | 
| 178 | 
            +
            the RELIEF study (Clinicaltrials.gov ID: NCT01719055). Data
         | 
| 179 | 
            +
            were included in this analysis from each study a subject was
         | 
| 180 | 
            +
            enrolled in. Health-related questionnaires were administered
         | 
| 181 | 
            +
            via an at-home, custom-designed clinical study version of a
         | 
| 182 | 
            +
            digital health ecosystem (Boston Scientific, Valencia, CA) for
         | 
| 183 | 
            +
            up to 36 months. The questions chosen included pain-related
         | 
| 184 | 
            +
            subjective ratings, symptoms hypothesized to contribute to
         | 
| 185 | 
            +
            variability in pain ratings, as well as symptoms hypothesized to
         | 
| 186 | 
            +
            be impacted by pain, specifically pain magnitude, mood, sleep,
         | 
| 187 | 
            +
            alertness, medication use, and activity. Following enrollment,
         | 
| 188 | 
            +
            data were collected in separate in-clinic and at-home data
         | 
| 189 | 
            +
            streams. Mobile data analyzed here included voice recordings,
         | 
| 190 | 
            +
            as well as daily, self-reported symptom monitoring, with the
         | 
| 191 | 
            +
            option to respond more frequently if participants wished. In
         | 
| 192 | 
            +
            addition, subjects were asked to wear a smartwatch to assess
         | 
| 193 | 
            +
            mobility using accelerometer data (Galaxy Watch S2, Samsung
         | 
| 194 | 
            +
            USA, Menlo Park, CA with custom watch application, Boston
         | 
| 195 | 
            +
            Scientific, Valencia, CA). In-clinic assessments were collected
         | 
| 196 | 
            +
            at the baseline (enrollment) visit, and at 1-month, 3-month,
         | 
| 197 | 
            +
            12-month, and optionally 24-month and 36-month visits fol-
         | 
| 198 | 
            +
            lowing enrollment. In the present analysis, we used in-clinic
         | 
| 199 | 
            +
            assessments to evaluate QoL [17] and disability measured by
         | 
| 200 | 
            +
            the Oswestry Disability Index, or ODI [18] questionnaires.
         | 
| 201 | 
            +
            B. Voice data processing
         | 
| 202 | 
            +
            Voice recordings were collected from weekly recordings
         | 
| 203 | 
            +
            based on prompts aimed to understand the participant’s experi-
         | 
| 204 | 
            +
            ence with pain. Speech features for psycholinguistic, sentiment
         | 
| 205 | 
            +
            [19], and acoustic characteristics [20], [21] were extracted
         | 
| 206 | 
            +
            from the audio files using in-house and standard code. Age
         | 
| 207 | 
            +
             | 
| 208 | 
            +
            and sex were regressed from all features. Next, to reduce di-
         | 
| 209 | 
            +
            mensionality of these features, a principal components analysis
         | 
| 210 | 
            +
            (PCA) was used (var ≥ 2%) to identify the decomposed
         | 
| 211 | 
            +
            components. These components were later included in a
         | 
| 212 | 
            +
            clustering analysis alongside the 6 features derived from the
         | 
| 213 | 
            +
            questionnaires.
         | 
| 214 | 
            +
            C. Actigraphy data processing
         | 
| 215 | 
            +
            Effective mobility was derived from the watch-based actig-
         | 
| 216 | 
            +
            raphy data. It is a novel metric of physical function and activity
         | 
| 217 | 
            +
            meant to reflect the duration and type of activity a person
         | 
| 218 | 
            +
            experiences beyond steps or activities of daily life. Rates of
         | 
| 219 | 
            +
            activity were calculated into categories for each participant
         | 
| 220 | 
            +
            throughout the day. These categories ranged from Zone 0
         | 
| 221 | 
            +
            (e.g., resting, using a mobile device while seated) to Zone
         | 
| 222 | 
            +
            4 (e.g., intense or repetitive motion or vigorous exercise) and
         | 
| 223 | 
            +
            were used along with the questionnaire data in the clustering
         | 
| 224 | 
            +
            analysis.
         | 
| 225 | 
            +
            D. Data and Clustering Analysis
         | 
| 226 | 
            +
            For each participant, all available data was downloaded
         | 
| 227 | 
            +
            and selected based on days for which all subjective features
         | 
| 228 | 
            +
            from questionnaires (e.g., overall/leg/back pain, mood, sleep
         | 
| 229 | 
            +
            hours, sleep quality alertness, medication use for opioid/over-
         | 
| 230 | 
            +
            the- counter/non-opioid pain medication, activity interference
         | 
| 231 | 
            +
            due to pain, and activities of daily life), as well as actigraphy
         | 
| 232 | 
            +
            and voice data (where applicable) were present. Patients were
         | 
| 233 | 
            +
            included in the analysis regardless of time point in the study
         | 
| 234 | 
            +
            (e.g., baseline/enrollment, SCS trial period, follow-up), in the
         | 
| 235 | 
            +
            interest of observing a spectrum of pain-related variability and
         | 
| 236 | 
            +
            experience. However, the criteria for removing samples from
         | 
| 237 | 
            +
            the analysis consisted of: 1) any day missing a single data
         | 
| 238 | 
            +
            point, 2) any individual having fewer than 10 total complete
         | 
| 239 | 
            +
            data points, and when applicable 3) individuals who wore the
         | 
| 240 | 
            +
            smartwatch for less than 10 days. All question value responses
         | 
| 241 | 
            +
            were normalized prior to cluster analysis to equate the different
         | 
| 242 | 
            +
            subjective feature values across the individual question, and
         | 
| 243 | 
            +
            data distributions were inspected for abnormalities. Next, each
         | 
| 244 | 
            +
            question categorized to assess pain, sleep, and medication use
         | 
| 245 | 
            +
            were averaged to produce single composite scores for each
         | 
| 246 | 
            +
            modality; for activity, a difference score was taken between
         | 
| 247 | 
            +
            the two questions, in which we include a penalty that account
         | 
| 248 | 
            +
            with pain interferes with any overall activity. If any participant
         | 
| 249 | 
            +
            had answered more than one question on a certain day, the
         | 
| 250 | 
            +
            average of those responses was used to represent the daily
         | 
| 251 | 
            +
            value for that category. Participants were assessed for their
         | 
| 252 | 
            +
            average responses over time in order to determine the extent
         | 
| 253 | 
            +
            to which some participants responded more frequently than
         | 
| 254 | 
            +
            others, and the analysis was rerun without outliers to further
         | 
| 255 | 
            +
            ensure cluster stability.
         | 
| 256 | 
            +
            Cluster definitions were calculated using a k-means cluster-
         | 
| 257 | 
            +
            ing algorithm with Euclidean distance exploring up to cluster
         | 
| 258 | 
            +
            solutions for k = 10. Optimal k was determined using multiple
         | 
| 259 | 
            +
            methods including sum of squares distances and silhouette
         | 
| 260 | 
            +
            values, agglomerative analysis, and consensus clustering. To
         | 
| 261 | 
            +
            ensure clusters were similar across subsamples of participants
         | 
| 262 | 
            +
            exhibiting variability in number of responses included in the
         | 
| 263 | 
            +
            analysis, we repeated the analyses in varying samples of
         | 
| 264 | 
            +
            participants in which highly contributing participants (those
         | 
| 265 | 
            +
            with higher daily average responses) were excluded. Next, we
         | 
| 266 | 
            +
            employed an analogous approach to examine cluster solutions
         | 
| 267 | 
            +
            over the course of time. Generally, we expected the clusters
         | 
| 268 | 
            +
            to remain similar over time with some slight changes (e.g.,
         | 
| 269 | 
            +
            higher pain prior to therapy) that would be evident in the
         | 
| 270 | 
            +
            cluster. With this in mind, cluster solution results were then
         | 
| 271 | 
            +
            visually inspected in order to ensure similarities in qualitative
         | 
| 272 | 
            +
            characteristics and are discussed in the results section.
         | 
| 273 | 
            +
            Fig. 1. Conceptual data and methods overview. (A) Data were collected from
         | 
| 274 | 
            +
            a multi-center clinical trial recruiting participant with chronic low back and
         | 
| 275 | 
            +
            leg pain seeking spinal cord stimulator (SCS) treatment. Both in-clinic and at-
         | 
| 276 | 
            +
            home data collection were used to record 1) questionnaire-based daily reports
         | 
| 277 | 
            +
            of pain, mood, activity, medication, alertness, sleep; 2) standard assessments
         | 
| 278 | 
            +
            of QoL (EQ5D) and disability (ODI); 3) voice responses to open-ended
         | 
| 279 | 
            +
            questions about their pain; and 4) actigraphy from a smartwatch. (B) Data from
         | 
| 280 | 
            +
            questionnaires, voice, and actigraphy were subjected to a k-means clustering
         | 
| 281 | 
            +
            analysis and the (C) resulting cluster representation was examined across
         | 
| 282 | 
            +
            features. To validate these clusters, (D) centroid distance to each cluster was
         | 
| 283 | 
            +
            compared to the clinical scores for disability and QoL allowing for (E) an
         | 
| 284 | 
            +
            interpretation and label to be assigned to each cluster.
         | 
| 285 | 
            +
            III. RESULTS
         | 
| 286 | 
            +
            A. Sample demographics and data chronology
         | 
| 287 | 
            +
            In the primary analysis including questionnaires only, 121
         | 
| 288 | 
            +
            individuals with 11,763 samples of data were used (40.5%
         | 
| 289 | 
            +
            male, mean age 59.4 years old, 17.6 years since pain onset).
         | 
| 290 | 
            +
            In the analysis examining the addition of actigraphy data to
         | 
| 291 | 
            +
            the questionnaire data, 116 individuals with 11,286 samples of
         | 
| 292 | 
            +
            data were used (39.7% male, mean age 59.3 years old, 17.8
         | 
| 293 | 
            +
            years since pain onset). For the analysis including voice, 2,080
         | 
| 294 | 
            +
            samples were included.
         | 
| 295 | 
            +
            B. Clustering results and characteristics for questionnaire
         | 
| 296 | 
            +
            data only
         | 
| 297 | 
            +
            Cluster definition was examined for the questionnaire-only
         | 
| 298 | 
            +
            data for k = 2 to 10. Sum of squares distances and silhouette
         | 
| 299 | 
            +
            analyses indicated that a cluster solution of k = 2 or 3 was
         | 
| 300 | 
            +
            stable. Agglomerative hierarchical clustering was repeated to
         | 
| 301 | 
            +
            validate k with cross-methodological clustering, which also
         | 
| 302 | 
            +
            converged on a solution of k = 2 or 3. Given the relative
         | 
| 303 | 
            +
            stability of smaller cluster solutions, we first examined a
         | 
| 304 | 
            +
             | 
| 305 | 
            +
            (A)
         | 
| 306 | 
            +
            Clinic Data
         | 
| 307 | 
            +
            Day 5
         | 
| 308 | 
            +
            ay 55
         | 
| 309 | 
            +
            Mobile Data
         | 
| 310 | 
            +
            Day 1
         | 
| 311 | 
            +
            Day 60
         | 
| 312 | 
            +
            (B)
         | 
| 313 | 
            +
            Decomposed representation
         | 
| 314 | 
            +
            (C)
         | 
| 315 | 
            +
             Examine clusters
         | 
| 316 | 
            +
            (D)
         | 
| 317 | 
            +
            Compare to clinical scores
         | 
| 318 | 
            +
            (E)  Interpretation
         | 
| 319 | 
            +
            Mooc
         | 
| 320 | 
            +
            Disability Score = 27
         | 
| 321 | 
            +
            Medic
         | 
| 322 | 
            +
            Disability Score = 11
         | 
| 323 | 
            +
            Disability Score = 52
         | 
| 324 | 
            +
            Mobilitysimple and stable solution of k = 2. Feature characteristics
         | 
| 325 | 
            +
            of the cluster solution for k = 2 were examined by inspecting
         | 
| 326 | 
            +
            mean values for each feature in each cluster (Figure 2A). Re-
         | 
| 327 | 
            +
            sults indicated a clear negative-to-positive grouping of health
         | 
| 328 | 
            +
            features, such that the questionnaire responses of one cluster
         | 
| 329 | 
            +
            appeared to represent a superior health state represented by
         | 
| 330 | 
            +
            better mood, sleep, alertness and activity, and lower ratings
         | 
| 331 | 
            +
            of pain and medication use. The other cluster appeared to
         | 
| 332 | 
            +
            represent an inferior health state, characterized by higher pain
         | 
| 333 | 
            +
            and medication use, with lower ratings for alertness, mood,
         | 
| 334 | 
            +
            sleep, and activity. This analysis was repeated to exclude the
         | 
| 335 | 
            +
            high-responder group in order to ensure that the clusters were
         | 
| 336 | 
            +
            not being driven by the high-responders. Results indicated that
         | 
| 337 | 
            +
            the clusters were very similar both in all participants, and
         | 
| 338 | 
            +
            without the high-responders. Finally, the cluster solutions were
         | 
| 339 | 
            +
            re-examined over the course of time, such that the analysis
         | 
| 340 | 
            +
            was repeated in the baseline period prior to SCS activation,
         | 
| 341 | 
            +
            during the first 6 months of treatment, and the subsequent 6
         | 
| 342 | 
            +
            months of treatment. Results indicated that the cluster solution
         | 
| 343 | 
            +
            was very similar over time, with some indication of higher
         | 
| 344 | 
            +
            pain prior to treatment. An examination of a 3-cluster solution
         | 
| 345 | 
            +
            revealed a third, intermediate cluster that represented a health
         | 
| 346 | 
            +
            state similar to or in between the two states represented in
         | 
| 347 | 
            +
            the two-cluster solution (Figure 2B). This cluster showed
         | 
| 348 | 
            +
            relatively high ratings of alertness, mood, and sleep, but with
         | 
| 349 | 
            +
            intermediate values for pain, activity and medication use.
         | 
| 350 | 
            +
            A repeated analysis excluding high-responders also showed
         | 
| 351 | 
            +
            an intermediate cluster, with values for each feature with a
         | 
| 352 | 
            +
            magnitude between the previous two clusters.
         | 
| 353 | 
            +
            Fig. 2. Cluster analysis for questionnaire data reveals negative and positive
         | 
| 354 | 
            +
            symptom groups. (A) A two cluster (k = 2) solution resulting from the k-means
         | 
| 355 | 
            +
            analysis of the questionnaire data revealed two clusters of symptoms that
         | 
| 356 | 
            +
            stratified on a negative-to-positive spectrum of pain-related health, in which
         | 
| 357 | 
            +
            one cluster revealed a better health state of better mood, sleep, more reported
         | 
| 358 | 
            +
            activity and alertness, less medication usage, and lower pain. Conversely, the
         | 
| 359 | 
            +
            other cluster depicted a worse health based on the feature means. (B) A
         | 
| 360 | 
            +
            three cluster (k=3) solution also revealed a spectrum of positive to negative
         | 
| 361 | 
            +
            symptom groupings, including superior and inferior states similar to k=2, with
         | 
| 362 | 
            +
            an additional intermediate state showing moderate pain and medication use
         | 
| 363 | 
            +
            but with high mood, sleep, activity, and alertness scores.
         | 
| 364 | 
            +
            C. Decomposing and clustering questionnaire and voice data
         | 
| 365 | 
            +
            Prior to clustering, the results of the principal components
         | 
| 366 | 
            +
            analysis (PCA) of the voice features were inspected. The
         | 
| 367 | 
            +
            results showed that 7 components were present, and character-
         | 
| 368 | 
            +
            ized features such as voiced and unvoiced energy in a speech
         | 
| 369 | 
            +
            signal, negative sentiment, emotional content, and acoustic
         | 
| 370 | 
            +
            voice properties (Table 1). We repeated the clustering analysis
         | 
| 371 | 
            +
            with each of these 7 components included along with the 6
         | 
| 372 | 
            +
            questionnaire components. With the addition of the 7 compo-
         | 
| 373 | 
            +
            nents, solutions for k of 2 or 5 were possible. For the k = 2
         | 
| 374 | 
            +
            solution, results showed that in particular, component 4, which
         | 
| 375 | 
            +
            was characterized by high loadings of negative sentiment and
         | 
| 376 | 
            +
            acoustic features associated with emotion, tracked well with
         | 
| 377 | 
            +
            the inferior health cluster (Figure 3A). Further, while not all
         | 
| 378 | 
            +
            components showed the same discrimination between states as
         | 
| 379 | 
            +
            did component 4, there was evidence that the addition of the
         | 
| 380 | 
            +
            voice data expanded the granularity of the state solutions. This
         | 
| 381 | 
            +
            was illustrated by the comparison of a cluster solution with
         | 
| 382 | 
            +
            only questionnaires in which pain was stratified across 3 levels
         | 
| 383 | 
            +
            in all states (Figure 3B). When the cluster solution included
         | 
| 384 | 
            +
            both voice and questionnaires, pain across states expanded to
         | 
| 385 | 
            +
            5 levels (Figure 3C).
         | 
| 386 | 
            +
            TABLE I
         | 
| 387 | 
            +
            DECOMPOSITION OF VOICE FEATURES INTO 7 COMPONENTS
         | 
| 388 | 
            +
            Fig. 3. Adding voice features to cluster analysis improves pain granularity
         | 
| 389 | 
            +
            in state solutions. (A) Clustering analysis was run including 6 questionnaire
         | 
| 390 | 
            +
            components and 7 voice components for a 2-state solution, indicating that
         | 
| 391 | 
            +
            voice features denoting negative sentiment were associated with the poorer
         | 
| 392 | 
            +
            health cluster. (B) A 5-state cluster solution without voice features reveals
         | 
| 393 | 
            +
            three levels of pain magnitude across clusters, while the (C) addition of voice
         | 
| 394 | 
            +
            to a 5-state cluster solution adds further granularity to pain magnitude across
         | 
| 395 | 
            +
            clusters.
         | 
| 396 | 
            +
            D. Clustering results and characteristics for questionnaire
         | 
| 397 | 
            +
            and actigraphy data
         | 
| 398 | 
            +
            Actigraphy data downloaded from the watch were parsed
         | 
| 399 | 
            +
            into mobility Zones 0 - 4 of effective mobility. Inspection of
         | 
| 400 | 
            +
            results indicated that these zones indeed provided granularity
         | 
| 401 | 
            +
            that added description beyond number of steps or self-reported
         | 
| 402 | 
            +
            ADLs (Figure 4). The clustering analysis included the 6
         | 
| 403 | 
            +
            categories derived from the questionnaires along with the
         | 
| 404 | 
            +
             | 
| 405 | 
            +
            (A) 
         | 
| 406 | 
            +
            (B)
         | 
| 407 | 
            +
            (C) 
         | 
| 408 | 
            +
            MOOD
         | 
| 409 | 
            +
            MOOD
         | 
| 410 | 
            +
            MOOD
         | 
| 411 | 
            +
            ACOUSTIC 3
         | 
| 412 | 
            +
            ALERTNESS
         | 
| 413 | 
            +
            ACOUSTIC 3
         | 
| 414 | 
            +
            ALERTNESS
         | 
| 415 | 
            +
            ACOUSTIC 2
         | 
| 416 | 
            +
            SLEEP
         | 
| 417 | 
            +
            ACOUSTIC 2
         | 
| 418 | 
            +
            SLEEP
         | 
| 419 | 
            +
             ALERTNESS
         | 
| 420 | 
            +
            8337S
         | 
| 421 | 
            +
            VOICE QUAL
         | 
| 422 | 
            +
            ACTIVITY
         | 
| 423 | 
            +
             VOIGE QUAL
         | 
| 424 | 
            +
            - ACTIVITY
         | 
| 425 | 
            +
             NEGATIVE
         | 
| 426 | 
            +
             PAIN
         | 
| 427 | 
            +
            NEGATIVE
         | 
| 428 | 
            +
            PAIN
         | 
| 429 | 
            +
             EMOT
         | 
| 430 | 
            +
            MEDS USE
         | 
| 431 | 
            +
            ACTIVITY
         | 
| 432 | 
            +
             EMOT
         | 
| 433 | 
            +
            ACOUSTIC
         | 
| 434 | 
            +
            MEDS USE
         | 
| 435 | 
            +
            ACOUSTIC
         | 
| 436 | 
            +
            MEDS USE
         | 
| 437 | 
            +
            ENERGY
         | 
| 438 | 
            +
            ENERGY
         | 
| 439 | 
            +
            MFCC
         | 
| 440 | 
            +
            (ACOUSTIC 1
         | 
| 441 | 
            +
             PAIN
         | 
| 442 | 
            +
            MECC
         | 
| 443 | 
            +
            ACOUSTIC 1PCA
         | 
| 444 | 
            +
            Largest Loadings
         | 
| 445 | 
            +
            Smallest/Negative Loadings
         | 
| 446 | 
            +
            Component Name
         | 
| 447 | 
            +
            Content: typetoken/speech richness (psycholinguistic), Fisher SWB
         | 
| 448 | 
            +
            Acoustic 1
         | 
| 449 | 
            +
            Acoustic shape and characteristics of voice spectrum, RASTA #10
         | 
| 450 | 
            +
            Acoustic: energy, spectral roll off, voicing probability,
         | 
| 451 | 
            +
            Formant 1 (bandwidth)
         | 
| 452 | 
            +
            MFCC
         | 
| 453 | 
            +
            Acoustic: MFcC #2, voicing probability - may be related to how much
         | 
| 454 | 
            +
            Acoustic: MFCC #2, RASTA #2, spectral roll off/voicing probability (how
         | 
| 455 | 
            +
            speech is present (vowel voicing)
         | 
| 456 | 
            +
             much a person is talking)
         | 
| 457 | 
            +
            Acoustic: Formants 1 and 2 (modulation/harmonics of voice), energy, and
         | 
| 458 | 
            +
            Acoustic energy
         | 
| 459 | 
            +
            Acoustic: energy, spectral flux (voice timbre)
         | 
| 460 | 
            +
             RASTA #5
         | 
| 461 | 
            +
            Content: negative sentiment (VADER), negative emotion (LIWC),
         | 
| 462 | 
            +
            Content: positive sentiment (VADER), positive emotion, tone, reward
         | 
| 463 | 
            +
            Negative emot
         | 
| 464 | 
            +
            "feel" words 
         | 
| 465 | 
            +
            (LIWC), compound (positive valence/intensity)
         | 
| 466 | 
            +
            Acoustic: MFCC #3 (frequency band ~250 Hz)
         | 
| 467 | 
            +
            Acoustic voice quality/properties: MFCC #2, spectral entropy, HNR.
         | 
| 468 | 
            +
            Content: tone, compound (positive valence/intensity
         | 
| 469 | 
            +
            Voice quality
         | 
| 470 | 
            +
            unvoiced (% voice not in recording)
         | 
| 471 | 
            +
            Acoustic: jitter features (characteristic of voice time)
         | 
| 472 | 
            +
            Acoustic: formant 1 (modulation in larynx), unvoiced frames (% voice
         | 
| 473 | 
            +
            Acoustic 2
         | 
| 474 | 
            +
            Acoustic: MFCC 12, 13, 14 (higher frequencies)
         | 
| 475 | 
            +
             not in recording), formant 2 (bandwidth), frequency at max energy
         | 
| 476 | 
            +
            Acoustic: Formant 2 (indicative of emotional content),
         | 
| 477 | 
            +
            Content: tone, compound (positive valence/intensity)
         | 
| 478 | 
            +
            Acoustic 3
         | 
| 479 | 
            +
            HNR (voice quality)
         | 
| 480 | 
            +
            Acoustic: MFCC #4, slope of LTAS (avg spectrum)(A)
         | 
| 481 | 
            +
            (B)
         | 
| 482 | 
            +
            MOOD
         | 
| 483 | 
            +
            MOOD
         | 
| 484 | 
            +
            ALERTNESS
         | 
| 485 | 
            +
            SLEEP
         | 
| 486 | 
            +
            ALERTNESS
         | 
| 487 | 
            +
            SLEEP
         | 
| 488 | 
            +
            8 0102 0384 0506 07
         | 
| 489 | 
            +
            0 0.11 0.2: 0.3
         | 
| 490 | 
            +
            0.6 :0.
         | 
| 491 | 
            +
            MED.USE
         | 
| 492 | 
            +
            -ACTIVITY
         | 
| 493 | 
            +
            MED. USE
         | 
| 494 | 
            +
             ACTIVITY
         | 
| 495 | 
            +
            PAIN
         | 
| 496 | 
            +
            PAINeffective mobility. An analysis for optimal k showed that state
         | 
| 497 | 
            +
            solutions of up to 5 clusters was possible. These clusters
         | 
| 498 | 
            +
            appeared to range from a ”best” state that included low pain
         | 
| 499 | 
            +
            and medication use, and high reports of mood, sleep, alertness,
         | 
| 500 | 
            +
            and effective mobility, to an inferior state that is associated
         | 
| 501 | 
            +
            with high levels of pain and medication use, and low reports of
         | 
| 502 | 
            +
            activity, mood, sleep, alertness, and effective mobility (Figure
         | 
| 503 | 
            +
            5).
         | 
| 504 | 
            +
            Fig. 4. Description of effective mobility zones. Mobility data was parsed into
         | 
| 505 | 
            +
            zones of “effective mobility” based on rates of activity calculated at regular
         | 
| 506 | 
            +
            time window intervals throughout the day. When compared to step counts
         | 
| 507 | 
            +
            and self-reported activities of daily life (ADLs), effective mobility showed
         | 
| 508 | 
            +
            additional computational granularity of participant mobility.
         | 
| 509 | 
            +
            Fig. 5.
         | 
| 510 | 
            +
            Adding mobility features contributes to cluster dimensionality. (A)
         | 
| 511 | 
            +
            A cluster solution including effective mobility identified 5 stable clusters for
         | 
| 512 | 
            +
            which the addition of effective mobility may contribute to additional clusters
         | 
| 513 | 
            +
            relative to the questionnaire-only solutions, still ranging from a negative-to-
         | 
| 514 | 
            +
            positive spectrum and including a best and a worst state. (B) States from the
         | 
| 515 | 
            +
            5-cluster solution show further granularity as it pertains to patient experience
         | 
| 516 | 
            +
            beyond the 2- and 3-state model.
         | 
| 517 | 
            +
            E. Cluster validation and state classification
         | 
| 518 | 
            +
            For the validation analysis, we obtained pairs of metrics
         | 
| 519 | 
            +
            comprised of 1) distances from the cluster centroids on a given
         | 
| 520 | 
            +
            day; and 2) responses to standard assessments (disability, or
         | 
| 521 | 
            +
            ODI, and QoL, or EQ5D measurements focusing on Pain,
         | 
| 522 | 
            +
            Activities, and VAS Health). These two metrics were collected
         | 
| 523 | 
            +
            within one week of each other; any pairs with collection dates
         | 
| 524 | 
            +
            outside of the week window were dropped from analysis. We
         | 
| 525 | 
            +
            first calculated correlations between centroid distances of each
         | 
| 526 | 
            +
            cluster in the two-state solution, and found that the correlations
         | 
| 527 | 
            +
            were statistically significant and consistent in terms of direc-
         | 
| 528 | 
            +
            tion and magnitude for the two states, indicating a clear best
         | 
| 529 | 
            +
            and inferior state (in cluster 1 values were: disability/ODI, r =
         | 
| 530 | 
            +
            0.42, EQ5D Pain, r = 0.47, EQ5D Activities r = 0.37, EQ5D
         | 
| 531 | 
            +
            VAS Health r = −0.32; all p-values <0.001, for cluster 2
         | 
| 532 | 
            +
            values were: disability/ODI, r = −0.41, EQ5D Pain, r = −0.43,
         | 
| 533 | 
            +
            EQ5D Activities r = −0.38, EQ5D VAS Health r = 0.28; all
         | 
| 534 | 
            +
            p-values < 0.001). This indicated that larger centroid distances
         | 
| 535 | 
            +
            were associated with higher values for the outcomes. Critically,
         | 
| 536 | 
            +
            while most of the validation metric outcomes represented neg-
         | 
| 537 | 
            +
            ative health values with increasing severity including disability,
         | 
| 538 | 
            +
            EQ5D-Pain, EQ5D-Activities, etc., the EQ5D measure of VAS
         | 
| 539 | 
            +
            Health represents health on a positive scale, and as expected
         | 
| 540 | 
            +
            showed an inverse relationship to the findings above. Given
         | 
| 541 | 
            +
            that each cluster was associated with consistent directionality
         | 
| 542 | 
            +
            across all of the standard assessments, we were able to infer
         | 
| 543 | 
            +
            that each of the clusters represented distinct health states,
         | 
| 544 | 
            +
            aligned with what we would have expected to find in patients
         | 
| 545 | 
            +
            across time.
         | 
| 546 | 
            +
            F. Cluster validation with voice data
         | 
| 547 | 
            +
            A similar analysis was repeated using the k = 2 cluster solu-
         | 
| 548 | 
            +
            tion that included voice data. Results indicated that generally
         | 
| 549 | 
            +
            the directionality of the correlations was consistent relative
         | 
| 550 | 
            +
            to prior analyses. However, for several validation metrics, the
         | 
| 551 | 
            +
            magnitude of the r values increased with the addition of voice
         | 
| 552 | 
            +
            features (for disability/ODI, r = 0.47, EQ5D VAS Health r =
         | 
| 553 | 
            +
            −0.49). In particular, assessments that may take into account
         | 
| 554 | 
            +
            negative affect showed an increase in the correlation across
         | 
| 555 | 
            +
            these metrics. Notably, because voice data is collected less
         | 
| 556 | 
            +
            frequently, there was a decrease in sample size relative to
         | 
| 557 | 
            +
            the prior analysis. That said, permutation tests were used to
         | 
| 558 | 
            +
            compare across the two approaches and to ensure that there
         | 
| 559 | 
            +
            were no meaningful differences due to sample size. In all
         | 
| 560 | 
            +
            instances, permutation tests confirmed the significance of prior
         | 
| 561 | 
            +
            findings at p < 0.05.
         | 
| 562 | 
            +
            G. Cluster validation with actigraphy data
         | 
| 563 | 
            +
            Next, we aimed to determine whether correlations between
         | 
| 564 | 
            +
            centroids from a more highly dimensional state solution com-
         | 
| 565 | 
            +
            pared to the standard assessments could provide further ordinal
         | 
| 566 | 
            +
            information about the states. To do this, we ran a similar
         | 
| 567 | 
            +
            analysis using the 5-state solution that was obtained with the
         | 
| 568 | 
            +
            cluster solution including effective mobility. Here, we found
         | 
| 569 | 
            +
            that the correlations across the 5 states also provided evidence
         | 
| 570 | 
            +
            for a consistent ranking of those states from best to worst
         | 
| 571 | 
            +
            (Table 2).
         | 
| 572 | 
            +
            TABLE II
         | 
| 573 | 
            +
            CLUSTER CHARACTERISTICS INCLUDING EFFECTIVE MOBILITY
         | 
| 574 | 
            +
             | 
| 575 | 
            +
            e D
         | 
| 576 | 
            +
            State E
         | 
| 577 | 
            +
            31**
         | 
| 578 | 
            +
            r = -0.46**
         | 
| 579 | 
            +
            25**
         | 
| 580 | 
            +
            r = -0.32**
         | 
| 581 | 
            +
            24**
         | 
| 582 | 
            +
            r = -0.35**
         | 
| 583 | 
            +
            19**
         | 
| 584 | 
            +
            r = 0.23**
         | 
| 585 | 
            +
            .2**
         | 
| 586 | 
            +
            r = -0.37**Metric
         | 
| 587 | 
            +
            State A
         | 
| 588 | 
            +
            State B
         | 
| 589 | 
            +
            State C
         | 
| 590 | 
            +
            State
         | 
| 591 | 
            +
            ODI Total
         | 
| 592 | 
            +
            r = 0.46**
         | 
| 593 | 
            +
            r = 0.41**
         | 
| 594 | 
            +
            r = -0.06*
         | 
| 595 | 
            +
            r = -0.
         | 
| 596 | 
            +
            EQ5DActivities
         | 
| 597 | 
            +
            r = 0.28**
         | 
| 598 | 
            +
            r = 0.26**
         | 
| 599 | 
            +
            r = -0.09**
         | 
| 600 | 
            +
            r = -0.
         | 
| 601 | 
            +
            EQ5D Pain
         | 
| 602 | 
            +
            r = 0.42**
         | 
| 603 | 
            +
            r = 0.41**
         | 
| 604 | 
            +
            r = -0.09**
         | 
| 605 | 
            +
            r= -0.
         | 
| 606 | 
            +
            EQ5D HealthVAS
         | 
| 607 | 
            +
            r = -0.18**
         | 
| 608 | 
            +
            r = -0.13**
         | 
| 609 | 
            +
            r = 0.04 ns
         | 
| 610 | 
            +
            r= 0.
         | 
| 611 | 
            +
            EQ5D - Normed Score
         | 
| 612 | 
            +
            r = 0.4**
         | 
| 613 | 
            +
            r = 0.32**
         | 
| 614 | 
            +
            r = -0.12**
         | 
| 615 | 
            +
            r=-0Mood
         | 
| 616 | 
            +
            (A)
         | 
| 617 | 
            +
            (B)
         | 
| 618 | 
            +
            State A
         | 
| 619 | 
            +
             StateB State C State D
         | 
| 620 | 
            +
            StateE
         | 
| 621 | 
            +
             Average
         | 
| 622 | 
            +
             Better
         | 
| 623 | 
            +
            Effective
         | 
| 624 | 
            +
             State A
         | 
| 625 | 
            +
            Pain 
         | 
| 626 | 
            +
            mobility.
         | 
| 627 | 
            +
             Sleep
         | 
| 628 | 
            +
            State B
         | 
| 629 | 
            +
            State C
         | 
| 630 | 
            +
            State D
         | 
| 631 | 
            +
            Medication
         | 
| 632 | 
            +
             State E
         | 
| 633 | 
            +
            Activities of
         | 
| 634 | 
            +
            daily living
         | 
| 635 | 
            +
            Mood
         | 
| 636 | 
            +
            70) 0.1 0.2 0.3 0. 4 0.5 0.6 0.7
         | 
| 637 | 
            +
            Alertness
         | 
| 638 | 
            +
            -Activity.
         | 
| 639 | 
            +
            Sleep
         | 
| 640 | 
            +
            Alertness
         | 
| 641 | 
            +
            Effective
         | 
| 642 | 
            +
            mobility
         | 
| 643 | 
            +
            Worse
         | 
| 644 | 
            +
            Medication
         | 
| 645 | 
            +
            Average
         | 
| 646 | 
            +
            PainZone 0
         | 
| 647 | 
            +
            Resting, using a mobile phone, remote control
         | 
| 648 | 
            +
            Zone 1
         | 
| 649 | 
            +
            Dressing, moving around, slowing walking, stretching
         | 
| 650 | 
            +
            Zone 2
         | 
| 651 | 
            +
            Walking briskly, light exercise
         | 
| 652 | 
            +
            Zone 3
         | 
| 653 | 
            +
            Running, swimming or exercising
         | 
| 654 | 
            +
            Zone 4
         | 
| 655 | 
            +
            Intense or repetitive motion or vigorous exercise
         | 
| 656 | 
            +
            Number of Steps
         | 
| 657 | 
            +
            Self reported number of ADLs16.0
         | 
| 658 | 
            +
            14.3
         | 
| 659 | 
            +
            3000
         | 
| 660 | 
            +
            13.8
         | 
| 661 | 
            +
            13.1
         | 
| 662 | 
            +
            14.0
         | 
| 663 | 
            +
            12.9
         | 
| 664 | 
            +
            2425
         | 
| 665 | 
            +
            12.0
         | 
| 666 | 
            +
            2500
         | 
| 667 | 
            +
            11.4 Worn Hours
         | 
| 668 | 
            +
            11.15
         | 
| 669 | 
            +
            12.0
         | 
| 670 | 
            +
            1925
         | 
| 671 | 
            +
            9.3 1787
         | 
| 672 | 
            +
            1.2
         | 
| 673 | 
            +
            2000
         | 
| 674 | 
            +
            10.0
         | 
| 675 | 
            +
            8.26
         | 
| 676 | 
            +
            7.15 Active Hours
         | 
| 677 | 
            +
            7.01
         | 
| 678 | 
            +
            7.22
         | 
| 679 | 
            +
            8.0
         | 
| 680 | 
            +
            6.75
         | 
| 681 | 
            +
            4.0
         | 
| 682 | 
            +
            6.77
         | 
| 683 | 
            +
            1.3
         | 
| 684 | 
            +
            1500
         | 
| 685 | 
            +
            803
         | 
| 686 | 
            +
            1160
         | 
| 687 | 
            +
            1.2
         | 
| 688 | 
            +
            1.0
         | 
| 689 | 
            +
            1117
         | 
| 690 | 
            +
            1.3
         | 
| 691 | 
            +
            6.0
         | 
| 692 | 
            +
            12
         | 
| 693 | 
            +
            1.2
         | 
| 694 | 
            +
            Steps
         | 
| 695 | 
            +
            3.3
         | 
| 696 | 
            +
            1000
         | 
| 697 | 
            +
            2.5
         | 
| 698 | 
            +
            2.6
         | 
| 699 | 
            +
            4.0
         | 
| 700 | 
            +
            3.3
         | 
| 701 | 
            +
            574
         | 
| 702 | 
            +
            2.6
         | 
| 703 | 
            +
            3.0
         | 
| 704 | 
            +
            3.3
         | 
| 705 | 
            +
            1.3
         | 
| 706 | 
            +
            1.4
         | 
| 707 | 
            +
            500
         | 
| 708 | 
            +
            2.0
         | 
| 709 | 
            +
            1.1
         | 
| 710 | 
            +
            12
         | 
| 711 | 
            +
            3.4
         | 
| 712 | 
            +
            1.3
         | 
| 713 | 
            +
            1.2
         | 
| 714 | 
            +
            1.5
         | 
| 715 | 
            +
            2.2
         | 
| 716 | 
            +
            2.2
         | 
| 717 | 
            +
            1.8
         | 
| 718 | 
            +
            1.3
         | 
| 719 | 
            +
            1.5
         | 
| 720 | 
            +
            0.0
         | 
| 721 | 
            +
            0
         | 
| 722 | 
            +
            Day 1
         | 
| 723 | 
            +
            Day 2
         | 
| 724 | 
            +
            Day 3
         | 
| 725 | 
            +
            Day 4
         | 
| 726 | 
            +
            Day 5
         | 
| 727 | 
            +
            Day 6
         | 
| 728 | 
            +
            Day7H. Comparison of state timecourse to health events
         | 
| 729 | 
            +
            In an exploratory analysis, we examined the relationship
         | 
| 730 | 
            +
            between state expression change over time relative to known
         | 
| 731 | 
            +
            health events. Here (see Figure 6), we first show that states
         | 
| 732 | 
            +
            represent a more interpretable visualization of health changes
         | 
| 733 | 
            +
            across time relative to examining the timecourse of all vari-
         | 
| 734 | 
            +
            ables at once. Second, several exemplar patients show expected
         | 
| 735 | 
            +
            changes in states before and after implantation of the SCS de-
         | 
| 736 | 
            +
            vice, a procedure that involves surgery and probable eventual
         | 
| 737 | 
            +
            pain relief.
         | 
| 738 | 
            +
            Fig. 6. Examples of patient experiences show that states track with meaningful
         | 
| 739 | 
            +
            clinical events. Top time course for each patient denotes state assignment,
         | 
| 740 | 
            +
            whereas lower time course shows changes in multiple variables. Bar graphs
         | 
| 741 | 
            +
            show the dwell time change before and after a notable event, which here
         | 
| 742 | 
            +
            involves the implantation of a SCS device hypothesized to bring about eventual
         | 
| 743 | 
            +
            pain relief and improvement in QoL. (Here, data in the time courses included
         | 
| 744 | 
            +
            overall, leg, and back pain, sleep hours and quality, number of activities, pain
         | 
| 745 | 
            +
            interference, medication usage for opioid, over-the-counter, and non-opioid
         | 
| 746 | 
            +
            pain medications, alertness, mood, and effective mobility. States are ranked
         | 
| 747 | 
            +
            as A > B > C > D > E, as shown in Table 2.)
         | 
| 748 | 
            +
            IV. DISCUSSION
         | 
| 749 | 
            +
            A. High-dimensional health data can be decomposed mean-
         | 
| 750 | 
            +
            ingfully
         | 
| 751 | 
            +
            Using a unique set of longitudinal questionnaire, mobility,
         | 
| 752 | 
            +
            and speech data, we have developed a novel method to decom-
         | 
| 753 | 
            +
            pose, group, and validate large amounts of chronic pain digital
         | 
| 754 | 
            +
            health data. This study marks one of the only approaches to
         | 
| 755 | 
            +
            create clinically usable pain-related categories from complex
         | 
| 756 | 
            +
            questionnaire, mobility, and speech data across time. This
         | 
| 757 | 
            +
            approach demonstrates that high dimensional, longitudinal
         | 
| 758 | 
            +
            health data from chronic pain patients may be decomposed into
         | 
| 759 | 
            +
            clusters and used to classify patients according to a holistic
         | 
| 760 | 
            +
            status named Pain Patient States. These states have an ordinal
         | 
| 761 | 
            +
            ranking based on clinically-validated standard health assess-
         | 
| 762 | 
            +
            ments. Specifically, we demonstrated that in chronic pain,
         | 
| 763 | 
            +
            we can take multiple streams of information including sleep
         | 
| 764 | 
            +
            hours and quality, mood, pain magnitude at multiple sites,
         | 
| 765 | 
            +
            alertness, multiple types of medication use, ADLs, actigraphy,
         | 
| 766 | 
            +
            and speech in order to represent 3-5 Pain Patient States over
         | 
| 767 | 
            +
            the course of time. The stable solutions that emerged from this
         | 
| 768 | 
            +
            method suggest the discovery of distinct clinical states with
         | 
| 769 | 
            +
            non-obvious properties that may serve as new knowledge that
         | 
| 770 | 
            +
            informs biological mechanisms and clinical care. In addition
         | 
| 771 | 
            +
            to the identification of these Patient Pain States, this improves
         | 
| 772 | 
            +
            upon prior assessments and clinical trials that only use pain
         | 
| 773 | 
            +
            magnitude as an outcome evaluation by considering a much
         | 
| 774 | 
            +
            more comprehensive picture of patient experience in a way
         | 
| 775 | 
            +
            that is clinically interpretable. This approach leverages both
         | 
| 776 | 
            +
            data- and clinically-driven analyses by first using powerful
         | 
| 777 | 
            +
            learning algorithms, and then comparing the output to standard
         | 
| 778 | 
            +
            clinical metrics. Consequently, we are able to transform what
         | 
| 779 | 
            +
            was previously multiple, complex time courses for hundreds
         | 
| 780 | 
            +
            of patients into 3-5 states that are clinically contextualized,
         | 
| 781 | 
            +
            straightforward, and meaningful.
         | 
| 782 | 
            +
            B. The decomposition can be externally validated and ranked
         | 
| 783 | 
            +
            We found that the resulting clusters from our analysis strat-
         | 
| 784 | 
            +
            ified on a negative-to-positive spectrum of health in chronic
         | 
| 785 | 
            +
            pain, and that these clusters were reliable across subsets of
         | 
| 786 | 
            +
            individuals and over time. Importantly, these states provide
         | 
| 787 | 
            +
            valuable, novel information per se, representing new findings
         | 
| 788 | 
            +
            that may define patient experience. Nevertheless, because they
         | 
| 789 | 
            +
            were derived from a purely data-driven analysis, we chose
         | 
| 790 | 
            +
            to compare cluster characteristics to independent standard as-
         | 
| 791 | 
            +
            sessments of disability and QoL. We found not only that good
         | 
| 792 | 
            +
            and bad clusters associate with better and worse disability and
         | 
| 793 | 
            +
            QoL, but that more granular state solutions had a clear ordinal
         | 
| 794 | 
            +
            rank which contextualized the data-driven output (Table 2).
         | 
| 795 | 
            +
            Further, in a 5-state solution (see figure 5A), only 2 levels
         | 
| 796 | 
            +
            of discriminable pain were present for 4 states. This adds
         | 
| 797 | 
            +
            clear dimensionality beyond what pain alone may indicate
         | 
| 798 | 
            +
            about a patient’s well-being. Thus, we were able to assess
         | 
| 799 | 
            +
            5 ordinal steps of health based on multidimensional aspects,
         | 
| 800 | 
            +
            providing evidence that we can offer a more full picture of
         | 
| 801 | 
            +
            patient experience yet preserve interpretability, making these
         | 
| 802 | 
            +
            states meaningful and actionable clinical information. This can
         | 
| 803 | 
            +
            improve precision in outcomes assessments, especially as it
         | 
| 804 | 
            +
            pertains to pain research and clinical trials.
         | 
| 805 | 
            +
            C. Objective data adds granularity to state solutions
         | 
| 806 | 
            +
            In particular, raw objective metrics such as actigraphy
         | 
| 807 | 
            +
            and speech features are too complex to use without some
         | 
| 808 | 
            +
            dimension reduction. However, actigraphy and speech offer
         | 
| 809 | 
            +
            insight into patient experience both because they reflect a novel
         | 
| 810 | 
            +
            behavioral measure and because they involve limited self-
         | 
| 811 | 
            +
            assessment, which is known to be susceptible to psychological
         | 
| 812 | 
            +
            biases. Here we showed that we were able to quantify and se-
         | 
| 813 | 
            +
            lect features from these objective measures in a preprocessing
         | 
| 814 | 
            +
            step, and then incorporate them into a clustering analysis. We
         | 
| 815 | 
            +
            found that one benefit of this approach is that these types of
         | 
| 816 | 
            +
            features indeed add dimensionality to a state solution, and the
         | 
| 817 | 
            +
            preprocessing in this case allowed for the derived features to
         | 
| 818 | 
            +
            add some biological interpretation. Additionally, we identified
         | 
| 819 | 
            +
            speech features that capture negative sentiment, possibly aug-
         | 
| 820 | 
            +
            menting the ability for the states to detect disability versus
         | 
| 821 | 
            +
            wellness as indicated by higher correlation values between
         | 
| 822 | 
            +
            those states and the independent assessments.
         | 
| 823 | 
            +
             | 
| 824 | 
            +
            dynamic cnanges in states
         | 
| 825 | 
            +
            State B
         | 
| 826 | 
            +
            tateD
         | 
| 827 | 
            +
            following implant moving
         | 
| 828 | 
            +
            73.3%
         | 
| 829 | 
            +
            0.0%
         | 
| 830 | 
            +
            between multiple states.
         | 
| 831 | 
            +
            State C
         | 
| 832 | 
            +
            State D
         | 
| 833 | 
            +
            13.3% 
         | 
| 834 | 
            +
            toteE
         | 
| 835 | 
            +
            6.7%
         | 
| 836 | 
            +
            6.7%
         | 
| 837 | 
            +
            to Implant 
         | 
| 838 | 
            +
             Post-Implantt30 Days
         | 
| 839 | 
            +
            Time (Major Ticks Marked every 14 days)
         | 
| 840 | 
            +
            PATIENT 3: DE NOVO SCS PA
         | 
| 841 | 
            +
            A) Longitudinal State Plot for Patient 3
         | 
| 842 | 
            +
            C) D
         | 
| 843 | 
            +
            State A
         | 
| 844 | 
            +
            State B
         | 
| 845 | 
            +
            State :C
         | 
| 846 | 
            +
            State D
         | 
| 847 | 
            +
            State E
         | 
| 848 | 
            +
            mplar
         | 
| 849 | 
            +
            B) Health Outcomes Plot for Patient 3
         | 
| 850 | 
            +
            Normalized Values
         | 
| 851 | 
            +
            0.8
         | 
| 852 | 
            +
            0.6
         | 
| 853 | 
            +
            0.2
         | 
| 854 | 
            +
            Time (Major Ticks Markedevery 14 days)
         | 
| 855 | 
            +
            Trial EndTIENT
         | 
| 856 | 
            +
            ellTimeChange
         | 
| 857 | 
            +
            Patient 1 achieves the State A
         | 
| 858 | 
            +
            State A
         | 
| 859 | 
            +
            with SCS therapy during trial and
         | 
| 860 | 
            +
            ateC
         | 
| 861 | 
            +
            10.0%
         | 
| 862 | 
            +
            1.6%
         | 
| 863 | 
            +
            following implant eventually
         | 
| 864 | 
            +
            remaining stable in State B.
         | 
| 865 | 
            +
            StateB
         | 
| 866 | 
            +
            86.7%
         | 
| 867 | 
            +
            A marked reduction of dwell
         | 
| 868 | 
            +
            ateD
         | 
| 869 | 
            +
            time in State C and D is
         | 
| 870 | 
            +
            3.4%
         | 
| 871 | 
            +
            State D
         | 
| 872 | 
            +
            3.3%
         | 
| 873 | 
            +
            observed post-implant.
         | 
| 874 | 
            +
            + Post-implant defined as days 14 to 44 days after implant to
         | 
| 875 | 
            +
            oImplant
         | 
| 876 | 
            +
            Post-Implantt
         | 
| 877 | 
            +
            account for postsurgical healing.
         | 
| 878 | 
            +
            TIENT
         | 
| 879 | 
            +
            vellTimeChange
         | 
| 880 | 
            +
            State C
         | 
| 881 | 
            +
            Patient 2 achieves cycles
         | 
| 882 | 
            +
            10.0%
         | 
| 883 | 
            +
            State A
         | 
| 884 | 
            +
            State B
         | 
| 885 | 
            +
            13.3%
         | 
| 886 | 
            +
            between State A and State B
         | 
| 887 | 
            +
            36.7%
         | 
| 888 | 
            +
            tateD
         | 
| 889 | 
            +
            following ScS therapy.
         | 
| 890 | 
            +
            80.0%
         | 
| 891 | 
            +
            StateC
         | 
| 892 | 
            +
            20.0%
         | 
| 893 | 
            +
            State E
         | 
| 894 | 
            +
            10.0%
         | 
| 895 | 
            +
            StateD
         | 
| 896 | 
            +
            30.0%
         | 
| 897 | 
            +
            Pre-Implant
         | 
| 898 | 
            +
            Post-Implant+
         | 
| 899 | 
            +
            TIENT
         | 
| 900 | 
            +
            well TimeChange
         | 
| 901 | 
            +
            tateC
         | 
| 902 | 
            +
            State B
         | 
| 903 | 
            +
            State A
         | 
| 904 | 
            +
            Patient 3 has more
         | 
| 905 | 
            +
            13.3%
         | 
| 906 | 
            +
            10.0%
         | 
| 907 | 
            +
            6.7%PATIENT 1: DE NOVO SCS PA
         | 
| 908 | 
            +
            A) Longitudinal State Plot for Patient 1
         | 
| 909 | 
            +
            C) Dwe
         | 
| 910 | 
            +
            State A
         | 
| 911 | 
            +
            State B
         | 
| 912 | 
            +
            State C
         | 
| 913 | 
            +
            State D
         | 
| 914 | 
            +
            State E
         | 
| 915 | 
            +
            Trial
         | 
| 916 | 
            +
            Trial
         | 
| 917 | 
            +
            5.
         | 
| 918 | 
            +
            Start
         | 
| 919 | 
            +
            Normalized Values 
         | 
| 920 | 
            +
            B) Health Outcomes Plot for Patient 1
         | 
| 921 | 
            +
            Sta
         | 
| 922 | 
            +
            0.2
         | 
| 923 | 
            +
            Time (Major Ticks Marked every 14 days)
         | 
| 924 | 
            +
            Trial End to
         | 
| 925 | 
            +
            PATIENT 2: DE NOVO SCS PA
         | 
| 926 | 
            +
            Aj Longitudinal State Plot f
         | 
| 927 | 
            +
            State A.
         | 
| 928 | 
            +
            C) Dw
         | 
| 929 | 
            +
            State B
         | 
| 930 | 
            +
            State C
         | 
| 931 | 
            +
            State D
         | 
| 932 | 
            +
            State E
         | 
| 933 | 
            +
            B) Health Outcomes Plot for Patient 2
         | 
| 934 | 
            +
            0.8
         | 
| 935 | 
            +
            0.6
         | 
| 936 | 
            +
            0.4D. Conclusions
         | 
| 937 | 
            +
            Ultimately, this analysis combined AI and clinical knowl-
         | 
| 938 | 
            +
            edge to successfully reduce complex mobile data into useful
         | 
| 939 | 
            +
            health states that reflect important clinical time points and
         | 
| 940 | 
            +
            changes in patient experience (Figure 6). While all approaches
         | 
| 941 | 
            +
            should be tested and verified broadly across additional popu-
         | 
| 942 | 
            +
            lations and data sets, this approach lays a solid foundation
         | 
| 943 | 
            +
            by which complex datastreams may be reduced into and
         | 
| 944 | 
            +
            authenticated as useful wellness information. We were able to
         | 
| 945 | 
            +
            show that we could successfully use this method in patients
         | 
| 946 | 
            +
            undergoing treatment for chronic pain, with results yielding
         | 
| 947 | 
            +
            new, distinct representations of patient experience. These find-
         | 
| 948 | 
            +
            ings imply it is possible to expand this approach to other
         | 
| 949 | 
            +
            illnesses associated with heterogeneous sets of symptoms.
         | 
| 950 | 
            +
            Finally, while we were able to compare our findings to known
         | 
| 951 | 
            +
            metrics, the health states provide deep insights in and of
         | 
| 952 | 
            +
            themselves that could aid a clinician in medical decision
         | 
| 953 | 
            +
            making and patient care. Given the growing use of digital
         | 
| 954 | 
            +
            health solutions, this approach to define Pain Patient States
         | 
| 955 | 
            +
            holds great promise in harnessing AI-driven solutions to aid
         | 
| 956 | 
            +
            in the care of large groups of chronic pain patients.
         | 
| 957 | 
            +
            ACKNOWLEDGMENT
         | 
| 958 | 
            +
            The NAVITAS and ENVISION Studies Physician Author
         | 
| 959 | 
            +
            Group includes Richard Rauck (The Center for Clinical Re-
         | 
| 960 | 
            +
            search), Eric Loudermilk (PCPMG Clinical Research Unit),
         | 
| 961 | 
            +
            Julio Paez (South Lake Pain Institute), Louis Bojrab (Forest
         | 
| 962 | 
            +
            Health Medical Center), John Noles (River Cities Interven-
         | 
| 963 | 
            +
            tional Pain), Todd Turley (Hope Research Institute), Mohab
         | 
| 964 | 
            +
            Ibrahim (Banner University Medical Center), Amol Patward-
         | 
| 965 | 
            +
            han (Banner University Medical Center), James Scowcroft
         | 
| 966 | 
            +
            (KC Pain Centers), Rene Przkora (University of Florida),
         | 
| 967 | 
            +
            Nathan Miller (Coastal Pain and Spinal Diagnostics), and
         | 
| 968 | 
            +
            Gassan Chaiban (Ochsner Clinic Foundation).
         | 
| 969 | 
            +
            The Boston Scientific Research Scientists Consortium in-
         | 
| 970 | 
            +
            cludes Dat Huynh (Boston Scientific, Data Research and
         | 
| 971 | 
            +
            Engineering), Kristen Lechleiter (Clinical Research, Boston
         | 
| 972 | 
            +
            Scientific), Brad Hershey (Data Research and Engineering,
         | 
| 973 | 
            +
            Boston Scientific), Rex Woon (Data Research and Engineer-
         | 
| 974 | 
            +
            ing, Boston Scientific), and Matt McDonald (Boston Scientific,
         | 
| 975 | 
            +
            Data Research and Engineering).
         | 
| 976 | 
            +
            We wish to acknowledge work by Erhan Bilal (IBM, Digital
         | 
| 977 | 
            +
            Health) for his work on consensus clustering.
         | 
| 978 | 
            +
            REFERENCES
         | 
| 979 | 
            +
            [1] U. Ekelund, S. Brage, S. J. Griffin, and N. J. Wareham, “Objectively
         | 
| 980 | 
            +
            measured moderate- and vigorous-intensity physical activity but not
         | 
| 981 | 
            +
            sedentary time predicts insulin resistance in high-risk individuals,”
         | 
| 982 | 
            +
            Diabetes Care, vol. 32, no. 6, pp. 1081–1086, 2009.
         | 
| 983 | 
            +
            [2] E.
         | 
| 984 | 
            +
            Smirnova,
         | 
| 985 | 
            +
            A.
         | 
| 986 | 
            +
            Leroux,
         | 
| 987 | 
            +
            Q.
         | 
| 988 | 
            +
            Cao,
         | 
| 989 | 
            +
            L.
         | 
| 990 | 
            +
            Tabacu,
         | 
| 991 | 
            +
            V.
         | 
| 992 | 
            +
            Zipunnikov,
         | 
| 993 | 
            +
            C. Crainiceanu, J. K. Urbanek, and A. Newman, “The Predictive
         | 
| 994 | 
            +
            Performance of Objective Measures of Physical Activity Derived from
         | 
| 995 | 
            +
            Accelerometry Data for 5-Year All-Cause Mortality in Older Adults: Na-
         | 
| 996 | 
            +
            tional Health and Nutritional Examination Survey 2003-2006,” Journals
         | 
| 997 | 
            +
            of Gerontology - Series A Biological Sciences and Medical Sciences,
         | 
| 998 | 
            +
            vol. 75, no. 9, pp. 1779–1785, 2020.
         | 
| 999 | 
            +
            [3] C. Agurto, G. A. Cecchi, R. Norel, R. Ostrand, M. Kirkpatrick,
         | 
| 1000 | 
            +
            M.
         | 
| 1001 | 
            +
            J.
         | 
| 1002 | 
            +
            Baggott,
         | 
| 1003 | 
            +
            M.
         | 
| 1004 | 
            +
            C.
         | 
| 1005 | 
            +
            Wardle,
         | 
| 1006 | 
            +
            H.
         | 
| 1007 | 
            +
            de
         | 
| 1008 | 
            +
            Wit,
         | 
| 1009 | 
            +
            and
         | 
| 1010 | 
            +
            G.
         | 
| 1011 | 
            +
            Bedi,
         | 
| 1012 | 
            +
            “Detection of acute 3,4-methylenedioxymethamphetamine (MDMA)
         | 
| 1013 | 
            +
            effects across protocols using automated natural language processing,”
         | 
| 1014 | 
            +
            Neuropsychopharmacology, vol. 45, no. 5, pp. 823–832, apr 2020.
         | 
| 1015 | 
            +
            [Online]. Available: https://doi.org/10.1038/s41386-020-0620-4
         | 
| 1016 | 
            +
            [4] C. M. Corcoran, F. Carrillo, D. Fern´andez-Slezak, G. Bedi, C. Klim,
         | 
| 1017 | 
            +
            D. C. Javitt, C. E. Bearden, and G. A. Cecchi, “Prediction of psychosis
         | 
| 1018 | 
            +
            across protocols and risk cohorts using automated language analysis,”
         | 
| 1019 | 
            +
            World Psychiatry, vol. 17, no. 1, pp. 67–75, 2018.
         | 
| 1020 | 
            +
            [5] E. Eyigoz, S. Mathur, M. Santamaria, G. Cecchi, and M. Naylor,
         | 
| 1021 | 
            +
            “Linguistic
         | 
| 1022 | 
            +
            markers
         | 
| 1023 | 
            +
            predict
         | 
| 1024 | 
            +
            onset
         | 
| 1025 | 
            +
            of
         | 
| 1026 | 
            +
            Alzheimer’s
         | 
| 1027 | 
            +
            disease,”
         | 
| 1028 | 
            +
            EClinicalMedicine, vol. 28, p. 100583, nov 2020. [Online]. Available:
         | 
| 1029 | 
            +
            https://doi.org/10.1016/j.eclinm.2020.100583
         | 
| 1030 | 
            +
            [6] Y. Yu, M. Li, L. Liu, Y. Li, and J. Wang, “Clinical big data and deep
         | 
| 1031 | 
            +
            learning: Applications, challenges, and future outlooks,” in Big Data
         | 
| 1032 | 
            +
            Mining and Analytics, 2019, pp. 288–305.
         | 
| 1033 | 
            +
            [7] M. Ambigavathi and D. Sridharan, “Big Data Analytics in Healthcare,”
         | 
| 1034 | 
            +
            in 2018 10th International Conference on Advanced Computing, ICoAC
         | 
| 1035 | 
            +
            2018, 2018.
         | 
| 1036 | 
            +
            [8] I. D. Dinov, “Methodological challenges and analytic opportunities for
         | 
| 1037 | 
            +
            modeling and interpreting Big Healthcare Data,” GigaScience, vol. 5,
         | 
| 1038 | 
            +
            no. 1, pp. s13 742–016–0117–6, 2016.
         | 
| 1039 | 
            +
            [9] J. M. Reinen, O. Y. Chen, R. M. Hutchison, B. T. Yeo, K. M. Anderson,
         | 
| 1040 | 
            +
            M. R. Sabuncu, D. Ongur, J. L. Roffman, J. W. Smoller, J. T. Baker,
         | 
| 1041 | 
            +
            and A. J. Holmes, “The human cortex possesses a reconfigurable
         | 
| 1042 | 
            +
            dynamic network architecture that is disrupted in psychosis,” Nature
         | 
| 1043 | 
            +
            Communications, vol. 9, no. 1, pp. 1–15, 2018.
         | 
| 1044 | 
            +
            [10] C. E. Zelaya, J. M. Dahlhamer, J. W. Lucas, and E. M. Connor,
         | 
| 1045 | 
            +
            “Chronic Pain and High-impact Chronic Pain Among U.S. Adult,”
         | 
| 1046 | 
            +
            NCHS Data Brief 2020, Tech. Rep., 2019. [Online]. Available:
         | 
| 1047 | 
            +
            https://www.cdc.gov/nchs/products/index.htm.
         | 
| 1048 | 
            +
            [11] R. J. Gatchel, Y. B. Peng, M. L. Peters, P. N. Fuchs, and D. C. Turk,
         | 
| 1049 | 
            +
            “The Biopsychosocial Approach to Chronic Pain: Scientific Advances
         | 
| 1050 | 
            +
            and Future Directions,” Psychological Bulletin, vol. 133, no. 4, pp. 581–
         | 
| 1051 | 
            +
            624, 2007.
         | 
| 1052 | 
            +
            [12] S. Mullin, J. Zola, R. Lee, J. Hu, B. MacKenzie, A. Brickman, G. Anaya,
         | 
| 1053 | 
            +
            S. Sinha, A. Li, and P. L. Elkin, “Longitudinal K-means approaches
         | 
| 1054 | 
            +
            to clustering and analyzing EHR opioid use trajectories for clinical
         | 
| 1055 | 
            +
            subtypes,” Journal of Biomedical Informatics, vol. 122, p. 103889, 2021.
         | 
| 1056 | 
            +
            [13] J. L¨otsch and A. Ultsch, “Machine learning in pain research,” Pain, vol.
         | 
| 1057 | 
            +
            159, no. 4, pp. 623–630, 2018.
         | 
| 1058 | 
            +
            [14] M. D. K. Jenssen, P. A. Bakkevoll, P. D. Ngo, A. Budrionis, A. J.
         | 
| 1059 | 
            +
            Fagerlund, M. Tayefi, J. G. Bellika, and F. Godtliebsen, “Machine
         | 
| 1060 | 
            +
            learning in chronic pain research: A scoping review,” Applied Sciences
         | 
| 1061 | 
            +
            (Switzerland), vol. 11, no. 7, p. 3205, 2021.
         | 
| 1062 | 
            +
            [15] J. Reinen, S. Berger, C. Agurto, R. Ostrand, E. Loudermilk, J. Paez,
         | 
| 1063 | 
            +
            G. Cecchi, J. Rogers, K. Lechleiter, and R. Rauch, “Defining Multi-
         | 
| 1064 | 
            +
            Dimensional Dynamic States of Chronic Pain Using a Mobile Clinical
         | 
| 1065 | 
            +
            Platform,” in World Institute of Pain, 2020.
         | 
| 1066 | 
            +
            [16] M. Anitescu, A. Antony, R. Rauck, E. Loudermilk, J. Paez, L. Bojrab,
         | 
| 1067 | 
            +
            J. Noles, T. Turley, M. Ibrahim, A. Patwardhan, J. Scowcroft, R. Przkora,
         | 
| 1068 | 
            +
            N. Miller, G. Chaiban, D. Huynh, K. Lechleiter, B. Hershey, R. Woon,
         | 
| 1069 | 
            +
            J. Reinen, C. Agurto, G. Cecchi, J. Rogers, and M. McDonald, “Patient
         | 
| 1070 | 
            +
            States: Artificial Intelligence-Driven Metric Providing Comprehensive
         | 
| 1071 | 
            +
            Yet Straightforward Understanding of Chronic Pain Patients.” in North
         | 
| 1072 | 
            +
            American Neuromodulation Society, 2022.
         | 
| 1073 | 
            +
            [17] T. E. Group, “EuroQol - a new facility for the measurement of health-
         | 
| 1074 | 
            +
            related quality of life,” Health policy, vol. 16, no. 3, pp. 199–208, dec
         | 
| 1075 | 
            +
            1990.
         | 
| 1076 | 
            +
            [18] J. C. T. Fairbank and P. B. Pynsent, “The Oswestry Disability Index,”
         | 
| 1077 | 
            +
            Spine, vol. 25, no. 22, pp. 2940–2953, nov 2000. [Online]. Available:
         | 
| 1078 | 
            +
            http://journals.lww.com/00007632-200011150-00017
         | 
| 1079 | 
            +
            [19] J. W. Pennebaker, R. L. Boyd, K. Jordan, and K. Blackburn, “The
         | 
| 1080 | 
            +
            development and psychometric properties of LIWC2015,” Austin, TX:
         | 
| 1081 | 
            +
            University of Texas at Austin, 2015.
         | 
| 1082 | 
            +
            [20] F. Eyben, M. W¨ollmer, and B. Schuller, “OpenSMILE - The Munich
         | 
| 1083 | 
            +
            versatile and fast open-source audio feature extractor,” in MM’10 -
         | 
| 1084 | 
            +
            Proceedings of the ACM Multimedia 2010 International Conference.
         | 
| 1085 | 
            +
            New York, New York, USA: ACM Press, 2010, pp. 1459–1462. [Online].
         | 
| 1086 | 
            +
            Available: http://dl.acm.org/citation.cfm?doid=1873951.1874246
         | 
| 1087 | 
            +
            [21] N. H. de Jong and T. Wempe, “Praat script to detect syllable nuclei
         | 
| 1088 | 
            +
            and measure speech rate automatically,” Behavior Research Methods,
         | 
| 1089 | 
            +
            vol. 41, no. 2, pp. 385–390, 2009.
         | 
| 1090 | 
            +
             | 
    	
        9dAyT4oBgHgl3EQfdPeW/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        A9AzT4oBgHgl3EQfv_5R/content/tmp_files/2301.01715v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,808 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            A Comparison of Fundamental Methods for Iso-surface 
         | 
| 2 | 
            +
            Extraction 
         | 
| 3 | 
            +
             
         | 
| 4 | 
            +
            JAN PATERA1, VÁCLAV SKALA2 
         | 
| 5 | 
            +
            Department of Computer Science and Engineering 
         | 
| 6 | 
            +
            Faculty of Applied Sciences, University of West Bohemia 
         | 
| 7 | 
            +
            Univerzitní 22, Plzeň 
         | 
| 8 | 
            +
            CZECH REPUBLIC 
         | 
| 9 | |
| 10 | 
            +
            http://herakles.zcu.cz 
         | 
| 11 | 
            +
             
         | 
| 12 | 
            +
            Abstract: In this paper four fundamental methods for an iso-surface extraction are compared, 
         | 
| 13 | 
            +
            based on cell decomposition to tetrahedra. The methods are compared both on mathematically 
         | 
| 14 | 
            +
            generated data sets as well as on real data sets. The comparison using mathematical data is 
         | 
| 15 | 
            +
            made from different points of view such as area approximation, volume approximation. On 
         | 
| 16 | 
            +
            the other hand, the Hausdorff distance and root mean square are used to compare methods on 
         | 
| 17 | 
            +
            real data sets. The presented comparison can be helpful when deciding among tested methods 
         | 
| 18 | 
            +
            which one to choose, as well as when we need to compare a newly developed method with 
         | 
| 19 | 
            +
            other existing approaches. 
         | 
| 20 | 
            +
             
         | 
| 21 | 
            +
            Key-Words: Comparison, Iso-surface extraction, Error, Hausdorff distance, Volume data, 
         | 
| 22 | 
            +
            Computer graphics. 
         | 
| 23 | 
            +
             
         | 
| 24 | 
            +
            1   Introduction 
         | 
| 25 | 
            +
             
         | 
| 26 | 
            +
            In the recent period of time volume data have started to play a significant role in many 
         | 
| 27 | 
            +
            scientific areas and are spread across many professions. In medical field, various devices, 
         | 
| 28 | 
            +
            such as Computed Tomography (CT) scanners, Magnetic Resonance Imaging (MRI) scanners 
         | 
| 29 | 
            +
            produce volume data. The volume data are also produced as a result of mathematical or 
         | 
| 30 | 
            +
            physical simulations and experiments and researchers need to visualize such data. 
         | 
| 31 | 
            +
                                                            
         | 
| 32 | 
            +
            1   Supported by the Ministry of Education of Czech Republic; project number MSM 
         | 
| 33 | 
            +
            235200005 (Information Systems and Technologies) 
         | 
| 34 | 
            +
            2    Supported by project NoE – 3DTV PLT 511568 
         | 
| 35 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 36 | 
            +
             | 
| 37 | 
            +
            There are two main techniques for the volume data visualization. The first approach is 
         | 
| 38 | 
            +
            based on volume rendering (ray-tracing-like methods), the second one on surface rendering 
         | 
| 39 | 
            +
            (iso-surface-extraction-like methods). The volume rendering methods are complex and work 
         | 
| 40 | 
            +
            with the whole volume data. This paper is concentrated on surface rendering methods that 
         | 
| 41 | 
            +
            visualizes surfaces stored in the volume data (so called iso-surfaces). The extracted 
         | 
| 42 | 
            +
            iso-surface is determined by a threshold value. All the points on the iso-surface have their 
         | 
| 43 | 
            +
            value equal to the threshold.  
         | 
| 44 | 
            +
            The field of the iso-surface extraction is quite large. There are many approaches used 
         | 
| 45 | 
            +
            for the iso-surface extraction such as view-dependent techniques, parallel or distributed 
         | 
| 46 | 
            +
            approaches, external memory (or sometimes called I/O) techniques, multiresolution (LOD) 
         | 
| 47 | 
            +
            based extractions and others. In general, we can describe the iso-surface generation and 
         | 
| 48 | 
            +
            visualization process with the following steps: 
         | 
| 49 | 
            +
            1. Search for all active cells (cells that are intersected by the iso-surface) 
         | 
| 50 | 
            +
            2. The iso-surface and normal vectors approximation within these cells (e.g. by a triangle 
         | 
| 51 | 
            +
            set) 
         | 
| 52 | 
            +
            3. Iso-surfaces visualization (visualization of a set of triangles; different iso-surfaces can 
         | 
| 53 | 
            +
            be visualized with different colors depending on a selected threshold value, alpha 
         | 
| 54 | 
            +
            blending, etc.) 
         | 
| 55 | 
            +
            The first phase of the iso-surface extraction can be accelerated using a wide set of speed up 
         | 
| 56 | 
            +
            algorithms [7], [9], [10], [11], [17] or [18]. However, we are interested not that much in speed 
         | 
| 57 | 
            +
            of the extraction process but in properties of the output set of triangles. 
         | 
| 58 | 
            +
            As there are many various methods for the iso-surface generation and each such a 
         | 
| 59 | 
            +
            method generates generally different approximation of a searched iso-surface for a given 
         | 
| 60 | 
            +
            threshold, there is no way how to compare the resulting iso-surfaces to each other unless we 
         | 
| 61 | 
            +
            know how the iso-surface should look like. We try to compare generated iso-surfaces 
         | 
| 62 | 
            +
            produced by different methods. 
         | 
| 63 | 
            +
             
         | 
| 64 | 
            +
            Such a comparison can be made with respect to the volume data. When we generate 
         | 
| 65 | 
            +
            the volume data using some mathematical or physical model, we are able to gain some 
         | 
| 66 | 
            +
            additional information concerning the object that is utilized to make a comparison more 
         | 
| 67 | 
            +
            informative and objective. As additional information, we assume e.g. possibility to compute 
         | 
| 68 | 
            +
            area or volume of such an object. For real data sets, when we do not have any additional 
         | 
| 69 | 
            +
            information concerning the scanned object, we can just use general approaches for 
         | 
| 70 | 
            +
            comparison, such as Hausdorff distance or root mean square (RMS) distance. 
         | 
| 71 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 72 | 
            +
             | 
| 73 | 
            +
             
         | 
| 74 | 
            +
            This paper is organized in the following way. At first, compared methods are 
         | 
| 75 | 
            +
            described. Afterwards, we will explain used approaches for the comparison and how the data 
         | 
| 76 | 
            +
            are generated. The last two sections are devoted to the error analysis, methods comparisons 
         | 
| 77 | 
            +
            and conclusion. 
         | 
| 78 | 
            +
             
         | 
| 79 | 
            +
            2   Method Description 
         | 
| 80 | 
            +
             
         | 
| 81 | 
            +
            2.1   Marching Cubes 
         | 
| 82 | 
            +
             
         | 
| 83 | 
            +
            There are many kinds of volume data. From simulations, we often get unstructured volume 
         | 
| 84 | 
            +
            data. In the other hand from medical imaging the output data is structured one. We aimed at 
         | 
| 85 | 
            +
            comparison of iso-surface generation methods that are used for structured data, especially for 
         | 
| 86 | 
            +
            regular grids. Compared methods do not differ in the kind of used interpolation but only in the 
         | 
| 87 | 
            +
            way they divide a cell into tetrahedra. The well-known method is Marching Cubes (MC) 
         | 
| 88 | 
            +
            method that was firstly published by Lorensen and Cline [12].  
         | 
| 89 | 
            +
             
         | 
| 90 | 
            +
            The input volume data consist of samples organized into a regular 3D Cartesian grid. 
         | 
| 91 | 
            +
            From such a grid, we can easily obtain a set of cells. The cell has in this case a cube shape and 
         | 
| 92 | 
            +
            consists of eight corresponding samples from two adjacent sample planes. Four samples are 
         | 
| 93 | 
            +
            from the first plane and four samples are from the second plane. MC method processes 
         | 
| 94 | 
            +
            sequentially all the cells that can be found in volume data. The iso-surface, which we are 
         | 
| 95 | 
            +
            looking for, is specified by a threshold value. 
         | 
| 96 | 
            +
             
         | 
| 97 | 
            +
            Each cell is processed separately. Firstly, the cell index is computed. The cell has eight 
         | 
| 98 | 
            +
            vertices, let us name them from A to H, and each vertex has its data value. Depending on a 
         | 
| 99 | 
            +
            selected threshold the vertex is assigned a binary value index = ABCDEFGHB. Each bit of the 
         | 
| 100 | 
            +
            index is 0 when the data value in the corresponding vertex is less than the threshold and 1 
         | 
| 101 | 
            +
            otherwise. 
         | 
| 102 | 
            +
             
         | 
| 103 | 
            +
            Based on the index, we are able to distinguish 256 cases how the iso-surface can 
         | 
| 104 | 
            +
            intersect the cell, because each vertex can be inside or outside of the iso-surface. When the 
         | 
| 105 | 
            +
            index is 0 or 255 the cell is not intersected by the iso-surface, otherwise such a cell is called 
         | 
| 106 | 
            +
            an active cell.  The purpose of the index will be described later. For an active cell, normal 
         | 
| 107 | 
            +
            vectors are computed in all its vertices using symmetric or asymmetric difference of data 
         | 
| 108 | 
            +
            samples.  
         | 
| 109 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 110 | 
            +
             | 
| 111 | 
            +
             
         | 
| 112 | 
            +
            Each index represents a different case how the iso-surface can intersect the cell. All 
         | 
| 113 | 
            +
            these cases can be tabularized and easily triangulated using linear interpolation. The triangles 
         | 
| 114 | 
            +
            vertices lay on the cell edges. Note, that triangles vertices are interpolated only on the cell 
         | 
| 115 | 
            +
            edges, this will not be true for other methods. Maximum of four triangles per the cell is 
         | 
| 116 | 
            +
            needed to approximate the iso-surface. For each triangle vertex a normal vector is computed 
         | 
| 117 | 
            +
            from normal vectors in the cell vertices, using linear interpolation as well. 
         | 
| 118 | 
            +
             
         | 
| 119 | 
            +
            Each cell face is shared by another cell. Due to such sharing, the iso-surface is 
         | 
| 120 | 
            +
            continuous among adjacent cells. Note that there can be ambiguous faces at which the 
         | 
| 121 | 
            +
            triangulation proposed by [12] will produce holes. There are few approaches how to avoid the 
         | 
| 122 | 
            +
            holes. Ambiguous cases can be detected and a special triangulation can be applied [16]. The 
         | 
| 123 | 
            +
            cells can be divided into tetrahedra and resulting simplices triangulated in a little bit different 
         | 
| 124 | 
            +
            way as we will describe in the next section. Other approaches are out of the scope of this 
         | 
| 125 | 
            +
            paper, see [2], [3], [6], [13], [14], [15].  
         | 
| 126 | 
            +
             
         | 
| 127 | 
            +
            The algorithm complexity of MC method is O(N), where N is the number of all cells. 
         | 
| 128 | 
            +
             
         | 
| 129 | 
            +
            2.1   Marching Tetrahedra 
         | 
| 130 | 
            +
             
         | 
| 131 | 
            +
            Marching Tetrahedra (MT) method is based on the same principle as MC method. The 
         | 
| 132 | 
            +
            significant difference is that the cube cell is furthermore split into tetrahedra. There are two 
         | 
| 133 | 
            +
            main splitting schemes. The cell is divided into five tetrahedra (MT5) [8], [15] or the cell is 
         | 
| 134 | 
            +
            divided into six tetrahedra (MT6) [15]. There are several ways how the cube cell can be 
         | 
| 135 | 
            +
            divided into five (e.g. Fig. 1) or six tetrahedra (e.g. Fig. 2).  
         | 
| 136 | 
            +
             
         | 
| 137 | 
            +
            For the five tetrahedra scheme, it is necessary to alternate two different splitting 
         | 
| 138 | 
            +
            schemes. Otherwise, the continuity of the extracted iso-surface will not be maintained 
         | 
| 139 | 
            +
            properly. 
         | 
| 140 | 
            +
             
         | 
| 141 | 
            +
            Fig. 1 - MT5 tetrahedra division of the cell 
         | 
| 142 | 
            +
             
         | 
| 143 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 144 | 
            +
             | 
| 145 | 
            +
             
         | 
| 146 | 
            +
            Fig. 2 - Three tetrahedra from a half of the cube, the second half is divided in similar way 
         | 
| 147 | 
            +
             
         | 
| 148 | 
            +
            After the cell is split into tetrahedra (four vertices), the index=ABCDB for each tetrahedron is 
         | 
| 149 | 
            +
            computed separately and tetrahedron is processed separately in the similar way as the cube 
         | 
| 150 | 
            +
            cell in the MC method. There are only 16 possibilities how the tetrahedron can be intersected 
         | 
| 151 | 
            +
            with iso-surface. These methods generate at most two triangles per tetrahedron. 
         | 
| 152 | 
            +
             
         | 
| 153 | 
            +
            Five or six tetrahedra decomposition introduces new edges at which the triangles 
         | 
| 154 | 
            +
            vertices are to be interpolated. For five tetrahedra the interpolation will be held on face 
         | 
| 155 | 
            +
            diagonals of the cube cell, for six tetrahedra both face and internal diagonals are used. 
         | 
| 156 | 
            +
             
         | 
| 157 | 
            +
            If we look at five tetrahedra division, there is one tetrahedron with different shape and 
         | 
| 158 | 
            +
            size. For six tetrahedra splitting, all the tetrahedra are the same. 
         | 
| 159 | 
            +
             
         | 
| 160 | 
            +
            2.3   Centered Cubic Lattice 
         | 
| 161 | 
            +
             
         | 
| 162 | 
            +
            The last method that will be compared is Centered Cubic Lattice (CCL) method, see [5]. This 
         | 
| 163 | 
            +
            method is little bit different, because it splits the cube cell into 24 tetrahedra.  
         | 
| 164 | 
            +
             
         | 
| 165 | 
            +
            The difference is that the resulting tetrahedra are partially shared between adjacent 
         | 
| 166 | 
            +
            cells and a new data value is introduced to the center of gravity of the processed cell, Fig. 3. 
         | 
| 167 | 
            +
            There are several ways how to compute the value of the central sample, e.g. the arithmetic 
         | 
| 168 | 
            +
            mean or weighted mean. 
         | 
| 169 | 
            +
             
         | 
| 170 | 
            +
            Each tetrahedron is then processed separately in the same way as in MT5 or MT6 
         | 
| 171 | 
            +
            methods. 
         | 
| 172 | 
            +
             
         | 
| 173 | 
            +
            As well as in previous methods this kind of splitting introduces new edges at which 
         | 
| 174 | 
            +
            the interpolation will be made. These are edges among adjacent central points. 
         | 
| 175 | 
            +
             
         | 
| 176 | 
            +
            In this division scheme, all the 24 tetrahedra are the same as to the dimensions 
         | 
| 177 | 
            +
            (similarly to MT6 method). 
         | 
| 178 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 179 | 
            +
             | 
| 180 | 
            +
             
         | 
| 181 | 
            +
            There are also other possible decompositions of the cube cell, e.g. [19] that 
         | 
| 182 | 
            +
            decomposes parallelepiped cell into two tetrahedra and one octahedron. These techniques 
         | 
| 183 | 
            +
            were not included into our study. 
         | 
| 184 | 
            +
             
         | 
| 185 | 
            +
             
         | 
| 186 | 
            +
            Fig. 3 - Centered Cubic Lattice division for one cell face 
         | 
| 187 | 
            +
             
         | 
| 188 | 
            +
            3   Comparison Approaches 
         | 
| 189 | 
            +
             
         | 
| 190 | 
            +
            3.1   Hausdorff Distance 
         | 
| 191 | 
            +
             
         | 
| 192 | 
            +
            As mentioned before, we use Hausdorff distance [20] for comparisons mainly for iso-surfaces 
         | 
| 193 | 
            +
            that are extracted from real data sets. At first, we define a distance between a point p (from 
         | 
| 194 | 
            +
            surface S) and a surface S’ (with points p’) as 
         | 
| 195 | 
            +
            d(p, S’)=min||p-p’||, 
         | 
| 196 | 
            +
            for all p’ from S’. Now we can define Hausdorff distance between two surfaces S and S’ as  
         | 
| 197 | 
            +
            dH(S,S’)=max d(p,S’), 
         | 
| 198 | 
            +
            for all p from S. Note important thing that Hausdorff distance is not symmetrical 
         | 
| 199 | 
            +
            d(S,S’)≠d(S’,S). When we call d(S,S’) a forward and d(S’,S) a backward distance, we can 
         | 
| 200 | 
            +
            define a symmetrical Hausdorff distance [1] as  
         | 
| 201 | 
            +
            dSH(S,S’)=max(d(S,S’), d(S’,S)). 
         | 
| 202 | 
            +
            The symmetrical difference provides better error measurement for two surfaces. We utilized a 
         | 
| 203 | 
            +
            METRO software tool (described in [4]) for accurate computation of Hausdorff distance of 
         | 
| 204 | 
            +
            two discrete surfaces (triangle meshes). The METRO tool was mainly used to compare 
         | 
| 205 | 
            +
            original mesh with its simplified (e.g. decimated) version. We use it for comparison of two 
         | 
| 206 | 
            +
            iso-surfaces, each generated with different method. 
         | 
| 207 | 
            +
             
         | 
| 208 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 209 | 
            +
             | 
| 210 | 
            +
            3.2   Root Mean Square Distance 
         | 
| 211 | 
            +
             
         | 
| 212 | 
            +
            We use also the Root Mean Square (RMS) of computed distances. RMS distance in discrete 
         | 
| 213 | 
            +
            case is defined as [20] 
         | 
| 214 | 
            +
            n
         | 
| 215 | 
            +
            x
         | 
| 216 | 
            +
            x
         | 
| 217 | 
            +
            S
         | 
| 218 | 
            +
            S
         | 
| 219 | 
            +
            RMS
         | 
| 220 | 
            +
            n
         | 
| 221 | 
            +
            2
         | 
| 222 | 
            +
            2
         | 
| 223 | 
            +
            1
         | 
| 224 | 
            +
            ...
         | 
| 225 | 
            +
            )'
         | 
| 226 | 
            +
            ,
         | 
| 227 | 
            +
            (
         | 
| 228 | 
            +
            +
         | 
| 229 | 
            +
            +
         | 
| 230 | 
            +
            =
         | 
| 231 | 
            +
            , 
         | 
| 232 | 
            +
            where n is a number of points of a mesh S’, xi (where i=1.. n) represents the distance of 
         | 
| 233 | 
            +
            corresponding point pi’ from S xi=d(pi’, S). We compare S’ to S. 
         | 
| 234 | 
            +
             
         | 
| 235 | 
            +
            Note that RMS is not symmetrical as well as Hausdorff distance. We do not use 
         | 
| 236 | 
            +
            symmetrical RMS distance in our tests, thus it is not defined here. This measurement is 
         | 
| 237 | 
            +
            computed with METRO tool as well. 
         | 
| 238 | 
            +
             
         | 
| 239 | 
            +
            Both the Hausdorff distance and the RMS distance are calculated according to some 
         | 
| 240 | 
            +
            source mesh using METRO tool. As such a mesh, we use a mesh generated with MC method. 
         | 
| 241 | 
            +
             
         | 
| 242 | 
            +
            3.3   Mathematical Data 
         | 
| 243 | 
            +
             
         | 
| 244 | 
            +
            At first, we should mention how the testing data are generated from basic mathematical 
         | 
| 245 | 
            +
            objects. For such objects we need to know an equation. Let us consider for example a sphere. 
         | 
| 246 | 
            +
            Each vertex of a regular grid has its coordinates and we have to assign it a value. The vertex 
         | 
| 247 | 
            +
            value is computed as a distance of the grid vertex (known coordinates) from the object surface 
         | 
| 248 | 
            +
            (known equation). The zero threshold then represents the object surface in volume data. 
         | 
| 249 | 
            +
             
         | 
| 250 | 
            +
            As we know the object equation and its dimensions, we are able to compute some 
         | 
| 251 | 
            +
            additional information concerning the object, such as surface area, object volume, triangles 
         | 
| 252 | 
            +
            position difference from the object surface, etc. We believe that these properties are worth to 
         | 
| 253 | 
            +
            compute, because they can help us to differentiate among the quality of methods. 
         | 
| 254 | 
            +
             
         | 
| 255 | 
            +
            Surface area – the iso-surface is generated by an extraction method in a form of a set 
         | 
| 256 | 
            +
            of triangles. We compute the total area as a sum of all triangles area. Than we can compute 
         | 
| 257 | 
            +
            the area of mathematical object and compare it with iso-surface area obtained. For special 
         | 
| 258 | 
            +
            objects such as sphere, we are able to track the error behaviour dependency on the sphere 
         | 
| 259 | 
            +
            radius. 
         | 
| 260 | 
            +
             
         | 
| 261 | 
            +
            Volume enclosed with the iso-surface – for basic objects the volume is computed 
         | 
| 262 | 
            +
            using appropriate formula. The volume enclosed with the iso-surface is computed in the 
         | 
| 263 | 
            +
            following manner (for tetrahedra only). There are three cases for a tetrahedron: 
         | 
| 264 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 265 | 
            +
             | 
| 266 | 
            +
            1. The whole tetrahedron is outside of the iso-surface – does not affect the total volume 
         | 
| 267 | 
            +
            computation. 
         | 
| 268 | 
            +
            2. The whole tetrahedron is inside – the whole tetrahedron contributes to the total 
         | 
| 269 | 
            +
            volume. The tetrahedron volume is computed easily. 
         | 
| 270 | 
            +
            3. The tetrahedron is intersected with the iso-surface – we have to compute the part of the 
         | 
| 271 | 
            +
            tetrahedron which is inside of the iso-surface. As there are at most two triangles 
         | 
| 272 | 
            +
            generated per tetrahedron, these triangles form two small tetrahedra with appropriate 
         | 
| 273 | 
            +
            tetrahedron vertex and we are able to compute the volume of the tetrahedron part 
         | 
| 274 | 
            +
            which contributes to the total volume. 
         | 
| 275 | 
            +
            Triangles position difference – we measure the difference between triangle center of gravity 
         | 
| 276 | 
            +
            and object surface. This gives us information about triangles position difference compared to 
         | 
| 277 | 
            +
            the object surface. 
         | 
| 278 | 
            +
             
         | 
| 279 | 
            +
            The three mentioned geometric properties are the main aspects that we used for 
         | 
| 280 | 
            +
            extraction methods output comparison. The obtained results are showed in the next section. 
         | 
| 281 | 
            +
             
         | 
| 282 | 
            +
            4   Results 
         | 
| 283 | 
            +
             
         | 
| 284 | 
            +
            At first, we should describe the data sets used for our comparisons and give the reasons why 
         | 
| 285 | 
            +
            we chose them. The main part of the used data set is a set of mathematically generated 
         | 
| 286 | 
            +
            objects, Fig. 4. A real data set was used to show how the Hausdorff distance is dependent on 
         | 
| 287 | 
            +
            applied iso-surface extraction method. The brief description of used data sets follows in 
         | 
| 288 | 
            +
            upcoming paragraphs. 
         | 
| 289 | 
            +
             
         | 
| 290 | 
            +
             
         | 
| 291 | 
            +
            Fig. 4 - Objects (csph, torus, sombrero, cube, sphere and noisedsph) 
         | 
| 292 | 
            +
             
         | 
| 293 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 294 | 
            +
             | 
| 295 | 
            +
            4.1   Used Objects 
         | 
| 296 | 
            +
             
         | 
| 297 | 
            +
            Sphere – sphere is an example of an object that we use to follow the error behaviour 
         | 
| 298 | 
            +
            dependency on sphere radius. The sphere equation used for data generation is a modified 
         | 
| 299 | 
            +
            implicit equation  
         | 
| 300 | 
            +
            r
         | 
| 301 | 
            +
            s
         | 
| 302 | 
            +
            z
         | 
| 303 | 
            +
            s
         | 
| 304 | 
            +
            y
         | 
| 305 | 
            +
            s
         | 
| 306 | 
            +
            x
         | 
| 307 | 
            +
            z
         | 
| 308 | 
            +
            y
         | 
| 309 | 
            +
            x
         | 
| 310 | 
            +
            F
         | 
| 311 | 
            +
            Z
         | 
| 312 | 
            +
            Y
         | 
| 313 | 
            +
            X
         | 
| 314 | 
            +
            −
         | 
| 315 | 
            +
            −
         | 
| 316 | 
            +
            +
         | 
| 317 | 
            +
            −
         | 
| 318 | 
            +
            +
         | 
| 319 | 
            +
            −
         | 
| 320 | 
            +
            =
         | 
| 321 | 
            +
            2
         | 
| 322 | 
            +
            2
         | 
| 323 | 
            +
            2
         | 
| 324 | 
            +
            )
         | 
| 325 | 
            +
            (
         | 
| 326 | 
            +
            )
         | 
| 327 | 
            +
            (
         | 
| 328 | 
            +
            )
         | 
| 329 | 
            +
            (
         | 
| 330 | 
            +
            )
         | 
| 331 | 
            +
            ,
         | 
| 332 | 
            +
            ,
         | 
| 333 | 
            +
            (
         | 
| 334 | 
            +
             
         | 
| 335 | 
            +
            where x, y and z are samples coordinates, sx, sy and sz are the sphere centre coordinates, r is 
         | 
| 336 | 
            +
            sphere radius and F(x,y,z) is a corresponding sample value. This equation assigns data value 
         | 
| 337 | 
            +
            to all the volume data samples. The sphere is then represented with a zero threshold 
         | 
| 338 | 
            +
            iso-surface. The samples that are inside of the sphere have negative value, on the sphere zero 
         | 
| 339 | 
            +
            value and samples placed out of the sphere have positive value. The sample value represents 
         | 
| 340 | 
            +
            the distance of the sample from the sphere surface. The radius was 25 in our experiments.  
         | 
| 341 | 
            +
             
         | 
| 342 | 
            +
            Cell edge has a length 1 for our purposes. The object dimensions (e.g. radius, edge 
         | 
| 343 | 
            +
            length) are then related to a cell edge length.  
         | 
| 344 | 
            +
             
         | 
| 345 | 
            +
            Noised sphere – (noisedsph) to study the influence of the noise to the shape of the 
         | 
| 346 | 
            +
            output set of triangles we generate a noised sphere. The random noise is introduced (added) to 
         | 
| 347 | 
            +
            all samples of the volume data. The size of the noise is given in percentage from the sphere 
         | 
| 348 | 
            +
            radius size. We used radius 25 and 10% noise.  
         | 
| 349 | 
            +
             
         | 
| 350 | 
            +
            Cube – this kind of an object we use to follow the behaviour and properties of the 
         | 
| 351 | 
            +
            iso-surface on edges. We will show the iso-surface difference mainly visually. Data are 
         | 
| 352 | 
            +
            generated similarly as in the previous case using the distance of sample from the closest face, 
         | 
| 353 | 
            +
            edge or vertex. The inner, on surface and outer samples have the negative, zero and positive 
         | 
| 354 | 
            +
            value respectively. Cube was generated using a=b=c=42.  
         | 
| 355 | 
            +
             
         | 
| 356 | 
            +
            Cube minus sphere – (csph) such an object was constructed to combine both 
         | 
| 357 | 
            +
            properties of the sphere (r=25) and cube (a=b=c=42). The generation of it is a little bit 
         | 
| 358 | 
            +
            complicated. At first, the cube is generated in the volume data. Afterwards, the values of all 
         | 
| 359 | 
            +
            samples that are closer to the sphere than to the cube are modified to the new distance.  
         | 
| 360 | 
            +
             
         | 
| 361 | 
            +
            Torus – is the typical mathematically generated object. Torus is defined with the 
         | 
| 362 | 
            +
            following equation [20] 
         | 
| 363 | 
            +
            a
         | 
| 364 | 
            +
            z
         | 
| 365 | 
            +
            y
         | 
| 366 | 
            +
            x
         | 
| 367 | 
            +
            c
         | 
| 368 | 
            +
            z
         | 
| 369 | 
            +
            y
         | 
| 370 | 
            +
            x
         | 
| 371 | 
            +
            F
         | 
| 372 | 
            +
            −
         | 
| 373 | 
            +
            +
         | 
| 374 | 
            +
            +
         | 
| 375 | 
            +
            −
         | 
| 376 | 
            +
            =
         | 
| 377 | 
            +
            2
         | 
| 378 | 
            +
            2
         | 
| 379 | 
            +
            2
         | 
| 380 | 
            +
            2
         | 
| 381 | 
            +
            )
         | 
| 382 | 
            +
            (
         | 
| 383 | 
            +
            )
         | 
| 384 | 
            +
            ,
         | 
| 385 | 
            +
            ,
         | 
| 386 | 
            +
            (
         | 
| 387 | 
            +
             
         | 
| 388 | 
            +
            where x, y and z are samples coordinates, c is a torus main radius, a is a torus secondary 
         | 
| 389 | 
            +
            radius and F(x,y,z) is a corresponding sample value. The samples value are negative, zero or 
         | 
| 390 | 
            +
            positive as well. Torus dimensions are c=20 and a=42 in our case.  
         | 
| 391 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 392 | 
            +
             | 
| 393 | 
            +
             
         | 
| 394 | 
            +
            Sombrero – is the last mathematically generated object we use. It is a surface defined 
         | 
| 395 | 
            +
            with the mathematical equation (taken from Derive mathematical program) 
         | 
| 396 | 
            +
             
         | 
| 397 | 
            +
            2
         | 
| 398 | 
            +
            2
         | 
| 399 | 
            +
            2
         | 
| 400 | 
            +
            2
         | 
| 401 | 
            +
            ))
         | 
| 402 | 
            +
            (
         | 
| 403 | 
            +
            cos(
         | 
| 404 | 
            +
            )
         | 
| 405 | 
            +
            ,
         | 
| 406 | 
            +
            ,
         | 
| 407 | 
            +
            (
         | 
| 408 | 
            +
            z
         | 
| 409 | 
            +
            x
         | 
| 410 | 
            +
            c
         | 
| 411 | 
            +
            z
         | 
| 412 | 
            +
            x
         | 
| 413 | 
            +
            b
         | 
| 414 | 
            +
            a
         | 
| 415 | 
            +
            y
         | 
| 416 | 
            +
            z
         | 
| 417 | 
            +
            y
         | 
| 418 | 
            +
            x
         | 
| 419 | 
            +
            F
         | 
| 420 | 
            +
            +
         | 
| 421 | 
            +
            +
         | 
| 422 | 
            +
            +
         | 
| 423 | 
            +
            ⋅
         | 
| 424 | 
            +
            ⋅
         | 
| 425 | 
            +
            −
         | 
| 426 | 
            +
            =
         | 
| 427 | 
            +
             
         | 
| 428 | 
            +
            where x, y and z are sample coordinates and F(x,y,z) is a corresponding sample value and a, b 
         | 
| 429 | 
            +
            and c are constants modifying the shape of the function. Sombrero parameters we used are 
         | 
| 430 | 
            +
            a=12, b=0.25 and c=3.  
         | 
| 431 | 
            +
             
         | 
| 432 | 
            +
            Real data sets – Samples of real data set have only positive values that represent a 
         | 
| 433 | 
            +
            density of the space in the sample position (we used engine.vol, ctmayo.vol and hplogo.vol 
         | 
| 434 | 
            +
            sets). 
         | 
| 435 | 
            +
             
         | 
| 436 | 
            +
            4.2   Tests and Results 
         | 
| 437 | 
            +
             
         | 
| 438 | 
            +
            For all our mathematically generated objects, we are able to compute the triangles position 
         | 
| 439 | 
            +
            difference compared to the mathematical object. Firstly, a triangle center of gravity is 
         | 
| 440 | 
            +
            computed. As we have the routines for point to object distance computation, we can compute 
         | 
| 441 | 
            +
            the distance of the center of gravity of the triangle from the appropriate object. The overall 
         | 
| 442 | 
            +
            position difference PERR is computed as 
         | 
| 443 | 
            +
             
         | 
| 444 | 
            +
            n
         | 
| 445 | 
            +
            objDist
         | 
| 446 | 
            +
            P
         | 
| 447 | 
            +
            n
         | 
| 448 | 
            +
            i
         | 
| 449 | 
            +
            ERR
         | 
| 450 | 
            +
            ∑
         | 
| 451 | 
            +
            =
         | 
| 452 | 
            +
            =
         | 
| 453 | 
            +
            1
         | 
| 454 | 
            +
            |)
         | 
| 455 | 
            +
            ,
         | 
| 456 | 
            +
            (
         | 
| 457 | 
            +
            |
         | 
| 458 | 
            +
            iT
         | 
| 459 | 
            +
            O
         | 
| 460 | 
            +
             
         | 
| 461 | 
            +
            where Ti (i goes from 1 to n) is the center of gravity of the i-th triangle, n is the number of 
         | 
| 462 | 
            +
            triangles and objDist(O, X) is the distance of point X from an object O surface. 
         | 
| 463 | 
            +
             
         | 
| 464 | 
            +
            Triangles Position Difference
         | 
| 465 | 
            +
            0.0
         | 
| 466 | 
            +
            0.1
         | 
| 467 | 
            +
            0.2
         | 
| 468 | 
            +
            0.3
         | 
| 469 | 
            +
            0.4
         | 
| 470 | 
            +
            0.5
         | 
| 471 | 
            +
            0.6
         | 
| 472 | 
            +
            cube
         | 
| 473 | 
            +
            csph
         | 
| 474 | 
            +
            sphere
         | 
| 475 | 
            +
            torus
         | 
| 476 | 
            +
            TPD
         | 
| 477 | 
            +
            MC
         | 
| 478 | 
            +
            MT5
         | 
| 479 | 
            +
            MT6
         | 
| 480 | 
            +
            CCL
         | 
| 481 | 
            +
             
         | 
| 482 | 
            +
            Fig. 5 - Triangles position difference comparison (edge vs. smooth object) 
         | 
| 483 | 
            +
             
         | 
| 484 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 485 | 
            +
             | 
| 486 | 
            +
            The position difference for a sombrero object was slightly smaller and similar to the results 
         | 
| 487 | 
            +
            obtained for a sphere. For a cube the CCL method gives the worst results, see Fig. 5. This is 
         | 
| 488 | 
            +
            probably due to different interpolation of the cube edges (Fig. 6). A csph object has more 
         | 
| 489 | 
            +
            edges than a cube itself. The more tetrahedra we create the worse results we get. Surprisingly 
         | 
| 490 | 
            +
            for a torus the MT6 method gives the greatest position difference. We think this is because of 
         | 
| 491 | 
            +
            the interpolation at a cell interior edge (the longest one). 
         | 
| 492 | 
            +
             
         | 
| 493 | 
            +
             
         | 
| 494 | 
            +
            Fig. 6 - Iso-surface on edges (MT5, MC, MT6, CCL) 
         | 
| 495 | 
            +
             
         | 
| 496 | 
            +
            Note that RMS distance is related to the MC method. For a sphere and a torus the obtained 
         | 
| 497 | 
            +
            results were slightly less than results for a sombrero. Again, when the object has edges the 
         | 
| 498 | 
            +
            CCL method is the worst from the view of RMS distance, see Fig. 7. For noisedsph object the 
         | 
| 499 | 
            +
            CCL method gives the best results. We suppose that the central cell sample value computation 
         | 
| 500 | 
            +
            (using arithmetic mean) filters data a little bit as well. 
         | 
| 501 | 
            +
             
         | 
| 502 | 
            +
            RMS Comparison
         | 
| 503 | 
            +
            0.00
         | 
| 504 | 
            +
            0.05
         | 
| 505 | 
            +
            0.10
         | 
| 506 | 
            +
            0.15
         | 
| 507 | 
            +
            0.20
         | 
| 508 | 
            +
            0.25
         | 
| 509 | 
            +
            cube
         | 
| 510 | 
            +
            csph
         | 
| 511 | 
            +
            noisedsph
         | 
| 512 | 
            +
            sombrero
         | 
| 513 | 
            +
            RMS
         | 
| 514 | 
            +
            MT5
         | 
| 515 | 
            +
            MT6
         | 
| 516 | 
            +
            CCL
         | 
| 517 | 
            +
             
         | 
| 518 | 
            +
            Fig. 7 - RMS distance histogram 
         | 
| 519 | 
            +
             
         | 
| 520 | 
            +
            Again, a sphere and sombrero give approximately similar results compared to torus. From the 
         | 
| 521 | 
            +
            view of Hausdorff distance the MT6 method gives the worst results for all tested objects, see 
         | 
| 522 | 
            +
            Fig. 8. As you can see for noisedsph the CCL method is the best choice. The best choice in 
         | 
| 523 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 524 | 
            +
             | 
| 525 | 
            +
            this case is probably MT5 method because it does not generate as much triangles as CCL 
         | 
| 526 | 
            +
            method. 
         | 
| 527 | 
            +
             
         | 
| 528 | 
            +
            Hausdorff Distance Comparison
         | 
| 529 | 
            +
            0.0
         | 
| 530 | 
            +
            0.2
         | 
| 531 | 
            +
            0.4
         | 
| 532 | 
            +
            0.6
         | 
| 533 | 
            +
            0.8
         | 
| 534 | 
            +
            1.0
         | 
| 535 | 
            +
            1.2
         | 
| 536 | 
            +
            1.4
         | 
| 537 | 
            +
            cube
         | 
| 538 | 
            +
            csph
         | 
| 539 | 
            +
            noisedsph
         | 
| 540 | 
            +
            torus
         | 
| 541 | 
            +
            Hausdorff dist.
         | 
| 542 | 
            +
            MT5
         | 
| 543 | 
            +
            MT6
         | 
| 544 | 
            +
            CCL
         | 
| 545 | 
            +
             
         | 
| 546 | 
            +
            Fig. 8 - Hausdorff distance histogram 
         | 
| 547 | 
            +
             
         | 
| 548 | 
            +
            The more tetrahedra is used the larger area is extracted for all tested objects that have edges, 
         | 
| 549 | 
            +
            see Fig. 9. The results in Fig. 9 and Fig. 10 are relative due to mathematical results. For 
         | 
| 550 | 
            +
            objects like torus (does not have edges) the results were approximately the same as for a 
         | 
| 551 | 
            +
            sphere. We think that for the area approximation purposes the best choice is MC method. 
         | 
| 552 | 
            +
             
         | 
| 553 | 
            +
            Area Comparison
         | 
| 554 | 
            +
            0.0
         | 
| 555 | 
            +
            0.2
         | 
| 556 | 
            +
            0.4
         | 
| 557 | 
            +
            0.6
         | 
| 558 | 
            +
            0.8
         | 
| 559 | 
            +
            1.0
         | 
| 560 | 
            +
            1.2
         | 
| 561 | 
            +
            1.4
         | 
| 562 | 
            +
            1.6
         | 
| 563 | 
            +
            1.8
         | 
| 564 | 
            +
            cube
         | 
| 565 | 
            +
            csph
         | 
| 566 | 
            +
            sphere
         | 
| 567 | 
            +
            Area
         | 
| 568 | 
            +
            Math
         | 
| 569 | 
            +
            MC
         | 
| 570 | 
            +
            MT5
         | 
| 571 | 
            +
            MT6
         | 
| 572 | 
            +
            CCL
         | 
| 573 | 
            +
             
         | 
| 574 | 
            +
            Fig. 9 - Area comparison (relative to mathematical volume) 
         | 
| 575 | 
            +
             
         | 
| 576 | 
            +
            The MT5 method is in most cases slightly better than MT6 method and both methods are 
         | 
| 577 | 
            +
            approaching to the original volume from below, see Fig. 10. The CCL method in the other 
         | 
| 578 | 
            +
            hand is in most cases approaching mathematically computed volume from above. MC method 
         | 
| 579 | 
            +
            is not included because it is hard to compute the volume enclosed with the iso-surface (due to 
         | 
| 580 | 
            +
            256 cases). 
         | 
| 581 | 
            +
             
         | 
| 582 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 583 | 
            +
             | 
| 584 | 
            +
            Volume Comparison
         | 
| 585 | 
            +
            0.0
         | 
| 586 | 
            +
            0.2
         | 
| 587 | 
            +
            0.4
         | 
| 588 | 
            +
            0.6
         | 
| 589 | 
            +
            0.8
         | 
| 590 | 
            +
            1.0
         | 
| 591 | 
            +
            1.2
         | 
| 592 | 
            +
            cube
         | 
| 593 | 
            +
            csph
         | 
| 594 | 
            +
            sphere
         | 
| 595 | 
            +
            torus
         | 
| 596 | 
            +
            Volume
         | 
| 597 | 
            +
            Math
         | 
| 598 | 
            +
            MT5
         | 
| 599 | 
            +
            MT6
         | 
| 600 | 
            +
            CCL
         | 
| 601 | 
            +
             
         | 
| 602 | 
            +
            Fig. 10 - Volume comparison (relative to mathematical volume) 
         | 
| 603 | 
            +
             
         | 
| 604 | 
            +
            4.3   Sphere Additional Test 
         | 
| 605 | 
            +
             
         | 
| 606 | 
            +
            A relative volume error is defined in a following way 
         | 
| 607 | 
            +
            V
         | 
| 608 | 
            +
            V
         | 
| 609 | 
            +
            V
         | 
| 610 | 
            +
            Error
         | 
| 611 | 
            +
            TR −
         | 
| 612 | 
            +
            =
         | 
| 613 | 
            +
             
         | 
| 614 | 
            +
            where VTR is a volume enclosed with iso-surface triangles, V is mathematically computed 
         | 
| 615 | 
            +
            volume of the sphere. 
         | 
| 616 | 
            +
             
         | 
| 617 | 
            +
            The CCL method is the best choice for the volume approximation, see Fig. 11. We 
         | 
| 618 | 
            +
            assume that it is due to high number of tetrahedra. The CCL method error oscillates about 
         | 
| 619 | 
            +
            zero value. MT5 gives slightly better results than MT6 method. The progress of error is 
         | 
| 620 | 
            +
            similar. Both methods are approaching the zero error from below. Another thing we compare 
         | 
| 621 | 
            +
            is a number of extracted triangles. 
         | 
| 622 | 
            +
             
         | 
| 623 | 
            +
            Error of Volume Approximation (Sphere, r=10 to 100)
         | 
| 624 | 
            +
            -0.06
         | 
| 625 | 
            +
            -0.05
         | 
| 626 | 
            +
            -0.04
         | 
| 627 | 
            +
            -0.03
         | 
| 628 | 
            +
            -0.02
         | 
| 629 | 
            +
            -0.01
         | 
| 630 | 
            +
            0.00
         | 
| 631 | 
            +
            0.01
         | 
| 632 | 
            +
            0.02
         | 
| 633 | 
            +
            0.03
         | 
| 634 | 
            +
            0
         | 
| 635 | 
            +
            20
         | 
| 636 | 
            +
            40
         | 
| 637 | 
            +
            60
         | 
| 638 | 
            +
            80
         | 
| 639 | 
            +
            100
         | 
| 640 | 
            +
            120
         | 
| 641 | 
            +
            Radius
         | 
| 642 | 
            +
            Error[%]
         | 
| 643 | 
            +
            MT5
         | 
| 644 | 
            +
            MT6
         | 
| 645 | 
            +
            CCL  
         | 
| 646 | 
            +
            Fig. 11 - Sphere volume error graph 
         | 
| 647 | 
            +
             
         | 
| 648 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 649 | 
            +
             | 
| 650 | 
            +
            It is a known fact that a number of generated triangles is mainly dependent on the type of the 
         | 
| 651 | 
            +
            cell division, see Fig. 12. MC works with a cube cell (at most four triangles per cell) and it 
         | 
| 652 | 
            +
            does not divide it into tetrahedral (at most two triangles per tetrahedron). MT5 divides the 
         | 
| 653 | 
            +
            cube cell into 5 tetrahedra, MT6 into 6 tetrahedra. In fact, CCL divides the cube cell into 24 
         | 
| 654 | 
            +
            tetrahedra, but these tetrahedra also contain parts of adjacent cube cells. When we sum the 
         | 
| 655 | 
            +
            volume of all 24 tetrahedra, we obtain two cube cells volume, so on average 12 tetrahedra per 
         | 
| 656 | 
            +
            cube cell. 
         | 
| 657 | 
            +
             
         | 
| 658 | 
            +
            Number of Extracted Triangles
         | 
| 659 | 
            +
            0
         | 
| 660 | 
            +
            200000
         | 
| 661 | 
            +
            400000
         | 
| 662 | 
            +
            600000
         | 
| 663 | 
            +
            800000
         | 
| 664 | 
            +
            1000000
         | 
| 665 | 
            +
            1200000
         | 
| 666 | 
            +
            1400000
         | 
| 667 | 
            +
            1600000
         | 
| 668 | 
            +
            1800000
         | 
| 669 | 
            +
            0
         | 
| 670 | 
            +
            20
         | 
| 671 | 
            +
            40
         | 
| 672 | 
            +
            60
         | 
| 673 | 
            +
            80
         | 
| 674 | 
            +
            100
         | 
| 675 | 
            +
            Radius
         | 
| 676 | 
            +
            Triangles
         | 
| 677 | 
            +
            MC
         | 
| 678 | 
            +
            MT5
         | 
| 679 | 
            +
            MT6
         | 
| 680 | 
            +
            CCL
         | 
| 681 | 
            +
             
         | 
| 682 | 
            +
            Fig. 12 - Number of extracted triangles 
         | 
| 683 | 
            +
             
         | 
| 684 | 
            +
            4   Conclusions 
         | 
| 685 | 
            +
             
         | 
| 686 | 
            +
            We compared fundamental methods for the iso-surface extraction evaluating Hausdorff 
         | 
| 687 | 
            +
            distance, RMS distance, triangles position difference and iso-surface area and volume. 
         | 
| 688 | 
            +
             
         | 
| 689 | 
            +
            Hausdorff distance is in fact the biggest distance between two compared surfaces 
         | 
| 690 | 
            +
            (extreme distance). In general, we are more interested in average distance between two 
         | 
| 691 | 
            +
            surfaces (the RMS distance). In this case, the CCL method generally gives worse results 
         | 
| 692 | 
            +
            compared to other methods. If we look at a position difference, the MC method seems to be 
         | 
| 693 | 
            +
            generally the best one.  The quality of the extracted set of triangles for noised sphere was in 
         | 
| 694 | 
            +
            general bad. Interesting is that a volume of objects is approximated with the similar difference 
         | 
| 695 | 
            +
            no matter of method used except for csph object. 
         | 
| 696 | 
            +
             
         | 
| 697 | 
            +
            It is important to realize that for real data we do not know the exact area or volume of 
         | 
| 698 | 
            +
            the object. Hence, the speculations such that the Hausdorff distance is bigger or lower are not 
         | 
| 699 | 
            +
            completely correct.  
         | 
| 700 | 
            +
             
         | 
| 701 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 702 | 
            +
             | 
| 703 | 
            +
            Acknowledgements 
         | 
| 704 | 
            +
             
         | 
| 705 | 
            +
            We want to thank to Dr. Ivana Kolingerová for her help and support during preparation of this 
         | 
| 706 | 
            +
            paper. 
         | 
| 707 | 
            +
             
         | 
| 708 | 
            +
            References 
         | 
| 709 | 
            +
             
         | 
| 710 | 
            +
            [1] 
         | 
| 711 | 
            +
            Aspert,N., Santa-Cruz,D., Ebrahimi,T.: Mesh Measuring Errors Between Surfaces 
         | 
| 712 | 
            +
            Using The Hausdorff Distance, In Proceedings of the IEEE International Conference in 
         | 
| 713 | 
            +
            Multimedia and Expo (ICME) 2002, Vol. 1, pages 705-708, Lausanne, Switzerland, 
         | 
| 714 | 
            +
            August 26-29, 2002 
         | 
| 715 | 
            +
            [2] 
         | 
| 716 | 
            +
            Bonnel,K.S., Duchaineau,M.A., Schikore,D.R., Hamann,B., Joy,K.I.: Material Interface 
         | 
| 717 | 
            +
            Reconstruction, IEEE Transactions on Visualization and Computer Graphics, Vol. 9, 
         | 
| 718 | 
            +
            No. 4, pages 500-511, 2003 
         | 
| 719 | 
            +
            [3] 
         | 
| 720 | 
            +
            Cignoni,P., Ganovelli,F., Montani,C., Scopigno,R.: Reconstruction of Topologically 
         | 
| 721 | 
            +
            Correct and Adaptive Trilinear Isosurfaces, Computers & Graphics, Vol. 24, No. 3, 
         | 
| 722 | 
            +
            pages 399-418, 2000 
         | 
| 723 | 
            +
            [4] 
         | 
| 724 | 
            +
            Cignoni,P., Rocchini,C., Scopigno,R.: Metro: Measuring Error on Simplified Surfaces, 
         | 
| 725 | 
            +
            Computer Graphics Forum, Blackwell Publishers, Vol. 17, No. 2, pages 167-174, June 
         | 
| 726 | 
            +
            1998 
         | 
| 727 | 
            +
            [5] 
         | 
| 728 | 
            +
            Chan,S.L., Purisima,E.O.: A New Tetrahedral Scheme for Iso-surface Generation, 
         | 
| 729 | 
            +
            Computers & Graphics, Vol. 22, No. 1, pages 82-90, Elsevier Science Limited, 1998 
         | 
| 730 | 
            +
            [6] 
         | 
| 731 | 
            +
            Chernyaev,E.V.: Marching Cubes 33: Construction of Topologically Correct 
         | 
| 732 | 
            +
            Isosurfaces, Institute for High Energy Physics, Moscow, Russia, Report CN/95-17, 
         | 
| 733 | 
            +
            1995 
         | 
| 734 | 
            +
            [7] 
         | 
| 735 | 
            +
            Giles,M., Haimes,R.: Advanced Interactive Visualization for CFD, Computing Systems 
         | 
| 736 | 
            +
            in Engineering, Vol. 1, No.1, pages 51-62, 1990 
         | 
| 737 | 
            +
            [8] 
         | 
| 738 | 
            +
            Hall,M. Warren,J.: Adaptive Polygonalization of Implicitly Defined Surfaces, IEEE 
         | 
| 739 | 
            +
            Computer Graphics and Applications, Vol. 10, No. 6, pages 33-42, November 1990 
         | 
| 740 | 
            +
            [9] 
         | 
| 741 | 
            +
            Itoh,T., Yamaguchi,Y., Koyamada,K.: Fast Isosurface Generation Using the Volume 
         | 
| 742 | 
            +
            Thinning Algorithm, IEEE Transactions on Visualization and Computer Graphics, Vol.  
         | 
| 743 | 
            +
            7, No. 1, pages 32-46, 2001 
         | 
| 744 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 745 | 
            +
             | 
| 746 | 
            +
            [10] Van Kreveld,M., van Oostrum,R., Bajaj,C., Pascucci,V., Schikore,D: Contour Trees 
         | 
| 747 | 
            +
            and Small Seed Sets for Iso-surface Traversal, In Proceedings 13th Annual Symposium 
         | 
| 748 | 
            +
            Computational Geometry, pages 212-220, 1997 
         | 
| 749 | 
            +
            [11] Livnat,Y., Parker,S.G., Johnson,C.R.: Fast Iso-surface Extraction Methods for Large 
         | 
| 750 | 
            +
            Imaging Data Sets, Center for Scientific Computing and Imaging, Department of 
         | 
| 751 | 
            +
            Computer Science, University of Utah, Salt Lake City, USA, 1999 
         | 
| 752 | 
            +
            [12] Lorensen,W.E., Cline,H.E.: Marching Cubes: A High Resolution 3D Surface 
         | 
| 753 | 
            +
            Construction Algorithm, Computer Graphics, Vol. 21, No. 4, July 1987 
         | 
| 754 | 
            +
            [13] Lopez,A., Brodlie,K.: Improving the Robustness and Accuracy of the Marching Cubes 
         | 
| 755 | 
            +
            Algorithm for Isosurfacing, IEEE Transactions on Visualization and Computer 
         | 
| 756 | 
            +
            Graphics, Vol. 9, No. 1, January-March 2003 
         | 
| 757 | 
            +
            [14] Natarajan,B.K.: On Generating Topologically Consistent Isosurfaces from Uniform 
         | 
| 758 | 
            +
            Samples, The Visual Computer, Vol. 11, pages 52-62, 1994 
         | 
| 759 | 
            +
            [15] Ning, P. and Bloomenthal, J.: An Evaluation of Implicit Surface Tilers, Computer 
         | 
| 760 | 
            +
            Graphics and Applications 13(6), pages 33-41, November 1993 
         | 
| 761 | 
            +
            [16] Schroeder,W., Martin,K., Lorensen,B.: The Visualization Toolkit, 2nd Edition, Prentice 
         | 
| 762 | 
            +
            Hall PTR, ISBN 0-13-954694-4, 1998 
         | 
| 763 | 
            +
            [17] Shen,H.-W., Hansen,C.D.,  Livnat,Y.,  Johnson,C.R: Isosurfacing in Span Space with 
         | 
| 764 | 
            +
            Utmost Efficiency (ISSUE), IEEE Visualization 96, pages 287-294, 1996 
         | 
| 765 | 
            +
            [18] Shen,H., Johnson,C.R.: Sweeping Simplicies: A Fast Iso-surface Extraction Algorithm 
         | 
| 766 | 
            +
            for Unstructured Grids, Proceedings of Visualisation '95, IEEE Computer Society 
         | 
| 767 | 
            +
            Press, Los Alamos, CA, 1995 
         | 
| 768 | 
            +
            [19] Takahashi,T., Yonekura,T.: Isosurface Construction From a Data Set Sampled On a 
         | 
| 769 | 
            +
            Face-Centered-Cubic Lattice, Proceedings of  ICCVG 2002, No. 2, pages 754-763, 
         | 
| 770 | 
            +
            September 2002 
         | 
| 771 | 
            +
            [20] Weisstein,E.W.: MathWorld, A Wolfram Web Resource, 
         | 
| 772 | 
            +
             
         | 
| 773 | 
            +
            http://mathworld.wolfram.com 
         | 
| 774 | 
            +
             
         | 
| 775 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 776 | 
            +
             | 
| 777 | 
            +
             
         | 
| 778 | 
            +
            Ing. Jan Patera (http://zcu.cz/~hopatera) is a PhD student and a part-time 
         | 
| 779 | 
            +
            tutor at the Department of Computer Sciences at the University of West 
         | 
| 780 | 
            +
            Bohemia in Plzeň in Czech Republic. He graduated in the field of computer 
         | 
| 781 | 
            +
            graphics at the University of West Bohemia in 2002. He is a member of the 
         | 
| 782 | 
            +
            Center of Computer Graphics and Data Visualization (CGDV). His research 
         | 
| 783 | 
            +
            activities concern volume data, iso-surface extraction, algorithms and data 
         | 
| 784 | 
            +
            visualization.  
         | 
| 785 | 
            +
             
         | 
| 786 | 
            +
             
         | 
| 787 | 
            +
            Vaclav Skala is a full professor of Computer Science at the Faculty of 
         | 
| 788 | 
            +
            Applied Sciences at the University of West Bohemia in Plzen, Czech 
         | 
| 789 | 
            +
            Republic. He is responsible for courses on Computer Graphics, Algorithms 
         | 
| 790 | 
            +
            for Computer Graphics, Visualization, Multimedia Systems, Programming 
         | 
| 791 | 
            +
            in Windows, .NET Technologies at the Department of Computer Science. 
         | 
| 792 | 
            +
            He is a member of The Visual Computer and Computers&Graphics 
         | 
| 793 | 
            +
            editorial boards, Eurographics Executive Committee and member of 
         | 
| 794 | 
            +
            program committees of established international conferences. He has been a 
         | 
| 795 | 
            +
            research fellow or lecturing at the Brunel University (London, U.K.), 
         | 
| 796 | 
            +
            Moscow Technical University (Russia), Gavle University (Sweden) and 
         | 
| 797 | 
            +
            others institutions in Europe. He organizes the WSCG International 
         | 
| 798 | 
            +
            Conferences in Central Europe on Computer Graphics, Visualization and 
         | 
| 799 | 
            +
            Computer Vision (http://wscg.zcu.cz) held annually since 1992 and .NET 
         | 
| 800 | 
            +
            Technologies conferences (http://dotnet.zcu.cz).  He is interested in 
         | 
| 801 | 
            +
            algorithms, data structures, mathematics, computer graphics, computer 
         | 
| 802 | 
            +
            vision and visualization.  He has been responsible for several research 
         | 
| 803 | 
            +
            projects as well. Currently he is a director of the Center of Computer 
         | 
| 804 | 
            +
            Graphics and Visualization (http://herakles.zcu.cz).  
         | 
| 805 | 
            +
             
         | 
| 806 | 
            +
             
         | 
| 807 | 
            +
            Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
         | 
| 808 | 
            +
             | 
    	
        A9AzT4oBgHgl3EQfv_5R/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        AtE1T4oBgHgl3EQfDQOp/content/tmp_files/2301.02875v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1449 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.02875v1  [math.NA]  7 Jan 2023
         | 
| 2 | 
            +
            SCIENCE CHINA Mathematics
         | 
| 3 | 
            +
            1
         | 
| 4 | 
            +
            XXXX Vol. XX No. XX XX–XX
         | 
| 5 | 
            +
            www.SciChina.com
         | 
| 6 | 
            +
            www.springerlink.com
         | 
| 7 | 
            +
            An iterative two-grid method for strongly non-
         | 
| 8 | 
            +
            linear elliptic boundary value problems
         | 
| 9 | 
            +
            Jiajun Zhan1, Lei Yang1, Xiaoqing Xing2,†, Liuqiang Zhong2
         | 
| 10 | 
            +
            1 School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science
         | 
| 11 | 
            +
            and Technology, Macao SAR 999078, China;
         | 
| 12 | 
            +
            2 School of Mathematical Sciences, South China Normal University, Guangzhou 510631, China
         | 
| 13 | |
| 14 | 
            +
            Abstract
         | 
| 15 | 
            +
            We design and analyze an iterative two-grid algorithm for the finite element discretizations
         | 
| 16 | 
            +
            of strongly nonlinear elliptic boundary value problems in this paper. We propose an iterative two-grid
         | 
| 17 | 
            +
            algorithm, in which a nonlinear problem is first solved on the coarse space, and then a symmetric positive
         | 
| 18 | 
            +
            definite problem is solved on the fine space. The innovation of this paper lies in the establishment
         | 
| 19 | 
            +
            of a first convergence analysis, which requires simultaneous estimation of four interconnected error
         | 
| 20 | 
            +
            estimates.
         | 
| 21 | 
            +
            We also present some numerical experiments to confirm the efficiency of the proposed
         | 
| 22 | 
            +
            algorithm.
         | 
| 23 | 
            +
            Keywords:
         | 
| 24 | 
            +
            iterative two-grid method, convergence, strongly nonlinear elliptic problems.
         | 
| 25 | 
            +
            MSC(2020):
         | 
| 26 | 
            +
            65N30, 65M12, 35J60
         | 
| 27 | 
            +
            1
         | 
| 28 | 
            +
            Introduction
         | 
| 29 | 
            +
            The two-grid methods are first proposed for nonselfadjoint problems and indefinite elliptic
         | 
| 30 | 
            +
            problems [6, 10]. Then, the two-grid methods are extended to solve semiliinear elliptic problems
         | 
| 31 | 
            +
            [7], quasi-linear and nonlinear elliptic problems [8, 9], respectively. Especially, for nonlinear
         | 
| 32 | 
            +
            elliptic problems, the basic idea of two-grid methods is to first obtain a rough solution by
         | 
| 33 | 
            +
            solving the original problem in a “coarse mesh” with mesh size H, and then correct the rough
         | 
| 34 | 
            +
            solution by solving a symmetric positive definite (SPD) system in a “fine mesh” with mesh size
         | 
| 35 | 
            +
            h. Noticing the mesh size of “coarse mesh” is much smaller than that of “fine mesh”, it is not
         | 
| 36 | 
            +
            difficult to solve an original problem in “coarse mesh”. Therefore, two-grid methods reduce
         | 
| 37 | 
            +
            the computational complexity of solving the original problem to solving a SPD problem and
         | 
| 38 | 
            +
            dramatically improve the computational speed. Recently, Bi, Wang and Lin [1] presented a
         | 
| 39 | 
            +
            two-grid algorithm to solve the strongly nonlinear elliptic problems and provided a posteriori
         | 
| 40 | 
            +
            error estimator for the two-grid methods. It’s noted that the literature mentioned above is all
         | 
| 41 | 
            +
            about non-iterative two-grid methods.
         | 
| 42 | 
            +
            As is well-known, the mesh size H of “coarse mesh” and h of “fine mesh” should satisfy a
         | 
| 43 | 
            +
            certain relationship for the optimal convergence order in non-iterative two-grid methods. The
         | 
| 44 | 
            +
            iterative two-grid methods have the advantage over the non-iterative two-grid methods in that,
         | 
| 45 | 
            +
            the distance between the mesh sizes H and h can be enlarged by increasing the iteration counts
         | 
| 46 | 
            +
            † Corresponding author
         | 
| 47 | 
            +
             | 
| 48 | 
            +
            2
         | 
| 49 | 
            +
            Jiajun Zhan & et al.
         | 
| 50 | 
            +
            with the same accuracy. However, there is only a small amount of literature on iterative two-grid
         | 
| 51 | 
            +
            methods of conforming finite element discretization for elliptic problems. Xu [9] first proposed
         | 
| 52 | 
            +
            and analyzed an iterative two-grid method for non-symmetric positive definite elliptic problems.
         | 
| 53 | 
            +
            Zhang, Fan and Zhong [11] designed some iterative two-grid algorithms for semilinear elliptic
         | 
| 54 | 
            +
            problems and provided the corresponding convergence analysis. To our knowledge, there is
         | 
| 55 | 
            +
            not any published literature on the iterative two-grid algorithm of conforming finite element
         | 
| 56 | 
            +
            discretization for strongly nonlinear elliptic boundary value problems.
         | 
| 57 | 
            +
            In this paper, an iterative two-grid algorithm for solving strongly nonlinear elliptic problems
         | 
| 58 | 
            +
            is studied. The discrete system of strongly nonlinear elliptic problems is presented at first. And
         | 
| 59 | 
            +
            then, an iterative two-grid algorithm is proposed for the discrete system, which is obtained by
         | 
| 60 | 
            +
            applying a non-iterative two-grid algorithm of [8] in a successive fashion. Finally, a challenging
         | 
| 61 | 
            +
            convergence analysis of the proposed algorithm is provided. Despite the fact that our algorithm
         | 
| 62 | 
            +
            is simply obtained by [8], the convergence analysis of the non-iterative two-grid algorithm could
         | 
| 63 | 
            +
            not be directly applied to the iterative two-grid algorithm. Here we complete this challenging
         | 
| 64 | 
            +
            convergence analysis by mathematical induction which can also be used in solving semilinear
         | 
| 65 | 
            +
            elliptic problems by iterative two-grid algorithms in [11]. However, we must emphasize that the
         | 
| 66 | 
            +
            convergence analysis of our algorithm is significantly different from the one of [11]. Compared
         | 
| 67 | 
            +
            with the current work [11], our convergence analysis is far more difficult and complex, and
         | 
| 68 | 
            +
            specific challenges could be reflected in: (1) the higher order derivative component of our model
         | 
| 69 | 
            +
            problem is still nonlinear; (2) the interconnectedness of the error estimates causes formidable
         | 
| 70 | 
            +
            obstacle for the convergence analysis (See the proof of Lemma 4.7).
         | 
| 71 | 
            +
            To avoid the repeated use of generic but unspecified constants, x ≲ y is used to denote x ⩽
         | 
| 72 | 
            +
            Cy, where C are some positive constants which do not depend on the mesh size. Furthermore
         | 
| 73 | 
            +
            the constants C may denote different values under different circumstances. For some specific
         | 
| 74 | 
            +
            constants, we use the constant C with some subscript to denote.
         | 
| 75 | 
            +
            2
         | 
| 76 | 
            +
            Model problems and discrete systems
         | 
| 77 | 
            +
            In this section, we present the continuous and discrete variational problems of strongly nonlinear
         | 
| 78 | 
            +
            elliptic problems, and provide the corresponding well-posedness and priori error estimates.
         | 
| 79 | 
            +
            Given a bounded convex polygonal domain Ω ⊂ R2 with the boundary ∂Ω. We denote
         | 
| 80 | 
            +
            W m,p(Ω) as the standard Sobolev space with norm ∥ · ∥m,p,Ω and seminorm | · |m,p,Ω, where the
         | 
| 81 | 
            +
            integers m ⩾ 0 and p ⩾ 1. For convenience, we also denote Hm(Ω) = W m,2(Ω), ∥·∥m = ∥·∥m,2,Ω
         | 
| 82 | 
            +
            and H1
         | 
| 83 | 
            +
            0(Ω) := {u ∈ H1(Ω) : u|∂Ω = 0}.
         | 
| 84 | 
            +
            We consider the following strongly nonlinear elliptic problems:
         | 
| 85 | 
            +
            �
         | 
| 86 | 
            +
            −∇ · a(x, u, ∇u) + f(x, u, ∇u) = 0, in Ω,
         | 
| 87 | 
            +
            u = 0, on ∂Ω,
         | 
| 88 | 
            +
            (2.1)
         | 
| 89 | 
            +
            where a(x, y, z) : ¯Ω × R × R2 → R2 and f(x, y, z) : ¯Ω × R × R2 → R. When a(x, u, ∇u) and
         | 
| 90 | 
            +
            f(x, u, ∇u) take different functions, different problems are available, such as mean curvature
         | 
| 91 | 
            +
            flow, Bratu’s problem and so on(See [3]).
         | 
| 92 | 
            +
            We assume that a(x, y, z) and f(x, y, z) are second order continuous differentiable functions.
         | 
| 93 | 
            +
            For simplicity, we denote that ay(w) = Dya(x, w, ∇w), az(w) = Dza(x, w, ∇w), fy(w) =
         | 
| 94 | 
            +
            Dyf(x, w, ∇w) and fz(w) = Dzf(x, w, ∇w), and similar notations are applied to the second
         | 
| 95 | 
            +
            order derivatives of a(x, y, z) and f(x, y, z).
         | 
| 96 | 
            +
             | 
| 97 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 98 | 
            +
            3
         | 
| 99 | 
            +
            Remark 2.1
         | 
| 100 | 
            +
            Since a(x, y, z) and f(x, y, z) are second order continuous differentiable func-
         | 
| 101 | 
            +
            tions, there exists a positive constant ˜C as upper bound with respect to all the first and second
         | 
| 102 | 
            +
            order derivatives of a(·, ·, ·) and f(·, ·, ·).
         | 
| 103 | 
            +
            We denote
         | 
| 104 | 
            +
            A(v, ϕ) = (a(x, v, ∇v), ∇ϕ) + (f(x, v, ∇v), ϕ),
         | 
| 105 | 
            +
            ∀v, ϕ ∈ H1
         | 
| 106 | 
            +
            0(Ω).
         | 
| 107 | 
            +
            (2.2)
         | 
| 108 | 
            +
            By Green formula, it’s easy to see that the solution u ∈ H1
         | 
| 109 | 
            +
            0(Ω) of (2.1) satisfies
         | 
| 110 | 
            +
            A(u, v) = 0,
         | 
| 111 | 
            +
            ∀v ∈ H1
         | 
| 112 | 
            +
            0(Ω).
         | 
| 113 | 
            +
            (2.3)
         | 
| 114 | 
            +
            The Fr´echet derivative L′ of (2.1) at w is given by
         | 
| 115 | 
            +
            L′(w)v = −∇ · (ay(w)v + az(w)∇v) + fy(w)v + fz(w)∇v.
         | 
| 116 | 
            +
            In the following, we gives some of our basic assumptions (Similar assumptions also could be
         | 
| 117 | 
            +
            found in [9] or [3]). Firstly, the problem (2.3) has a solution u ∈ H1
         | 
| 118 | 
            +
            0(Ω)∩Hr+1(Ω)∩W 2,2+ε(Ω)
         | 
| 119 | 
            +
            (ε > 0 and integer r ⩾ 1). Secondly, for the solution u of (2.3), there exists a positive constant
         | 
| 120 | 
            +
            α0 such that
         | 
| 121 | 
            +
            ξT az(u)ξ ⩾ α0|ξ|2,
         | 
| 122 | 
            +
            ∀ξ ∈ R2, x ∈ ¯Ω.
         | 
| 123 | 
            +
            (2.4)
         | 
| 124 | 
            +
            Finally, L′(u) : H1
         | 
| 125 | 
            +
            0(Ω) → H−1(Ω) is an isomorphism. These assumptions guarantee that u is
         | 
| 126 | 
            +
            an isolated solution of (2.3).
         | 
| 127 | 
            +
            Let Th be a conforming quasi-uniform triangulation on Ω, where the mesh size h denotes
         | 
| 128 | 
            +
            the maximum of the circumscribed circle diameters of element K ∈ Th. By this, any element
         | 
| 129 | 
            +
            K ∈ Th is contained in (contains) a circle of radius ˆC1h (respectively, ˆC2h), where the constant
         | 
| 130 | 
            +
            ˆC1 and ˆC2 do not depend on mesh size h, and there is no hanging node on Th.
         | 
| 131 | 
            +
            The finite element space Vh on Th is defined as
         | 
| 132 | 
            +
            Vh = {vh ∈ H1
         | 
| 133 | 
            +
            0(Ω) : vh|K ∈ Pr(K), ∀ K ∈ Th},
         | 
| 134 | 
            +
            where Pr(K) is the set of polynomials of degree at most integer r on K.
         | 
| 135 | 
            +
            Here is the discrete system of (2.3): Find uh ∈ Vh such that
         | 
| 136 | 
            +
            A (uh, vh) = 0,
         | 
| 137 | 
            +
            ∀vh ∈ Vh.
         | 
| 138 | 
            +
            (2.5)
         | 
| 139 | 
            +
            The following lemma presents the well-posedness of the variational problem (2.5) and its
         | 
| 140 | 
            +
            priori error estimates, which can be found in Lemma 3.2 and Theorem 3.4 of [9], respectively.
         | 
| 141 | 
            +
            Lemma 2.2
         | 
| 142 | 
            +
            Assume u is the solution of problem (2.3), then when h is small enough, the
         | 
| 143 | 
            +
            discrete variational problem (2.5) exists a unique solution uh ∈ Vh, and the following priori
         | 
| 144 | 
            +
            error estimate holds
         | 
| 145 | 
            +
            ∥u − uh∥1,p ≲ hr,
         | 
| 146 | 
            +
            if u ∈ W r+1,p(Ω), 2 ⩽ p ⩽ ∞.
         | 
| 147 | 
            +
            (2.6)
         | 
| 148 | 
            +
            3
         | 
| 149 | 
            +
            Iterative two-grid algorithms
         | 
| 150 | 
            +
             | 
| 151 | 
            +
            4
         | 
| 152 | 
            +
            Jiajun Zhan & et al.
         | 
| 153 | 
            +
            In this section, we present an iterative two-grid algorithm for the variational problems (2.3).
         | 
| 154 | 
            +
            Let Th and TH be two quasi-uniform, conforming and nested mesh in Ω. Furthermore the
         | 
| 155 | 
            +
            mesh size h of Th and H of TH satisfy, for some 0 < λ < 1,
         | 
| 156 | 
            +
            H = O(hλ)
         | 
| 157 | 
            +
            and
         | 
| 158 | 
            +
            h < H < 1.
         | 
| 159 | 
            +
            For present the iterative two-grid algorithm, we introduce the form B(w; v, χ) (induced by
         | 
| 160 | 
            +
            L′) by , for a fixed w and any v, χ ∈ H1
         | 
| 161 | 
            +
            0(Ω),
         | 
| 162 | 
            +
            B(w; v, χ) = (ay(w)v, ∇χ) + (az(w)∇v, ∇χ) + (fy(w)v, χ) + (fz(w)∇v, χ).
         | 
| 163 | 
            +
            (3.1)
         | 
| 164 | 
            +
            Remark 3.1
         | 
| 165 | 
            +
            The form B(w; ·, ·) is a bilinear form for fixed w.
         | 
| 166 | 
            +
            To our knowledge, the two-grid algorithms of strongly nonlinear problems are firstly pro-
         | 
| 167 | 
            +
            posed in [8]. Here one of two-grid algorithms from Algorithm 3.3 of [8] is given.
         | 
| 168 | 
            +
            Algorithm 3.1
         | 
| 169 | 
            +
            1. Find uH ∈ VH, such that
         | 
| 170 | 
            +
            A(uH, vH) = 0,
         | 
| 171 | 
            +
            ∀vH ∈ VH.
         | 
| 172 | 
            +
            2. Find uh ∈ Vh, such that
         | 
| 173 | 
            +
            B(uH; uh, vh) = B(uH; uH, vh) − A(uH, vh),
         | 
| 174 | 
            +
            ∀vh ∈ Vh.
         | 
| 175 | 
            +
            Remark 3.2
         | 
| 176 | 
            +
            In the Algorithm 3.1, we first solve a nonlinear problem in a coarse space
         | 
| 177 | 
            +
            VH. However, because dim(VH) is relatively small, the calculated amount of solving a nonlinear
         | 
| 178 | 
            +
            problem in VH is not excessive. As for the second step of Algorithm 3.1, noticing that B(uH; ·, ·)
         | 
| 179 | 
            +
            is a bilinear form with given uH, we simply need to solve a linear problem in Vh, for which there
         | 
| 180 | 
            +
            are numerous concerning fast algorithms.
         | 
| 181 | 
            +
            In [8], Xu had showed that the solution uh of Algorithm 3.1 could be a good approximation
         | 
| 182 | 
            +
            with respect to finite element solution uh at a low cost, namely,
         | 
| 183 | 
            +
            ∥uh − uh∥1 ≲ H2.
         | 
| 184 | 
            +
            (3.2)
         | 
| 185 | 
            +
            Using triangle inequality, (2.6) with r = 1 and (3.2), we obtain the error estimate of Algorithm
         | 
| 186 | 
            +
            3.1,
         | 
| 187 | 
            +
            ∥u − uh∥1 ⩽ ∥u − uh∥1 + ∥uh − uh∥1 ≲ h + H2.
         | 
| 188 | 
            +
            (3.3)
         | 
| 189 | 
            +
            Next, putting the Algorithm 3.1 into a successive fashion, we obtain our iterative two-grid
         | 
| 190 | 
            +
            algorithm.
         | 
| 191 | 
            +
            Algorithm 3.2
         | 
| 192 | 
            +
            Let u0
         | 
| 193 | 
            +
            h = uH be the solution of (2.5) in VH. Assume that uk
         | 
| 194 | 
            +
            h ∈ Vh has been
         | 
| 195 | 
            +
            obtained, then uk+1
         | 
| 196 | 
            +
            h
         | 
| 197 | 
            +
            ∈ Vh can be obtained by the following two steps.
         | 
| 198 | 
            +
            Step 1. Find ek
         | 
| 199 | 
            +
            H ∈ VH such that, for any vH ∈ VH,
         | 
| 200 | 
            +
            A(uk
         | 
| 201 | 
            +
            h + ek
         | 
| 202 | 
            +
            H, vH) = 0.
         | 
| 203 | 
            +
            (3.4)
         | 
| 204 | 
            +
            Step 2. Find uk+1
         | 
| 205 | 
            +
            h
         | 
| 206 | 
            +
            ∈ Vh such that, for any vh ∈ Vh,
         | 
| 207 | 
            +
            B(uk
         | 
| 208 | 
            +
            h + ek
         | 
| 209 | 
            +
            H; uk+1
         | 
| 210 | 
            +
            h
         | 
| 211 | 
            +
            , vh) = B(uk
         | 
| 212 | 
            +
            h + ek
         | 
| 213 | 
            +
            H; uk
         | 
| 214 | 
            +
            h + ek
         | 
| 215 | 
            +
            H, vh) − A(uk
         | 
| 216 | 
            +
            h + ek
         | 
| 217 | 
            +
            H, vh).
         | 
| 218 | 
            +
            (3.5)
         | 
| 219 | 
            +
             | 
| 220 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 221 | 
            +
            5
         | 
| 222 | 
            +
            Remark 3.3
         | 
| 223 | 
            +
            Noticing the uniqueness of finite element solution (See Lemma 2.2), (2.5),
         | 
| 224 | 
            +
            u0
         | 
| 225 | 
            +
            h = uH and (3.4) with k = 0, we can see that e0
         | 
| 226 | 
            +
            H = 0, which means u0
         | 
| 227 | 
            +
            h + e0
         | 
| 228 | 
            +
            H = uH. By
         | 
| 229 | 
            +
            observing the the Step 2 of Algorithm 3.2 and the second step of Algorithm 3.1, the conclusion
         | 
| 230 | 
            +
            is that Algorithm 3.2 is same with Algorithm 3.1 when k = 0.
         | 
| 231 | 
            +
            In comparison to [8], our method is still valid for high order conforming finite elements,
         | 
| 232 | 
            +
            whereas [8] only considered piecewise linear finite element space. Here gives the error estimate
         | 
| 233 | 
            +
            of our algorithm (See Theorem 4.9),
         | 
| 234 | 
            +
            ∥u − uk
         | 
| 235 | 
            +
            h∥1 ≲ hr + Hr+k.
         | 
| 236 | 
            +
            (3.6)
         | 
| 237 | 
            +
            Specially, if we choose finite element space Vh as piecewise linear finite element space, i.e. r = 1,
         | 
| 238 | 
            +
            the error estimate (3.6) of Algorithm 3.2 could be written as
         | 
| 239 | 
            +
            ∥u − uk
         | 
| 240 | 
            +
            h∥1 ≲ h + H1+k.
         | 
| 241 | 
            +
            To achieve the optimal convergence order, the relationship h = H2 should be satisfied in
         | 
| 242 | 
            +
            Algorithm 3.1 (See (3.3)). But in Algorithm 3.2, we could expand the distance between the
         | 
| 243 | 
            +
            mesh size H and h by increasing the iteration counts k.
         | 
| 244 | 
            +
            4
         | 
| 245 | 
            +
            Convergence analysis
         | 
| 246 | 
            +
            In this section, we provide the corresponding convergence analysis of Algorithm 3.2. To this
         | 
| 247 | 
            +
            end, we need to introduce some preliminaries based on form B(w; v, χ) at first.
         | 
| 248 | 
            +
            4.1
         | 
| 249 | 
            +
            Some preliminaries based on form B(w; v, χ)
         | 
| 250 | 
            +
            In this subsection, we present some properties of form B(w; v, χ) and introduce two discrete
         | 
| 251 | 
            +
            Green function.
         | 
| 252 | 
            +
            Firstly, with fixed w, by Remark 2.1 and Cauchy-Schwarz inequality, it’s easy to obtain
         | 
| 253 | 
            +
            that the form B(w; ·, ·) is continuous, i.e.,
         | 
| 254 | 
            +
            B(w; v, χ) ≲ ∥v∥1∥χ∥1,
         | 
| 255 | 
            +
            ∀ v, χ ∈ H1
         | 
| 256 | 
            +
            0(Ω).
         | 
| 257 | 
            +
            (4.1)
         | 
| 258 | 
            +
            Secondly, we present a lemma which provides the Babuˇska-Brezzi(BB) conditions of form
         | 
| 259 | 
            +
            B(·; ·, ·) in Vh. And this lemma can be proved using similar arguments in Lemma 2.2 of [9].
         | 
| 260 | 
            +
            Lemma 4.1
         | 
| 261 | 
            +
            Assume u is the solution of problem (2.3), then when h is small enough, we
         | 
| 262 | 
            +
            have, for any wh ∈ Vh,
         | 
| 263 | 
            +
            ∥wh∥1 ≲ sup
         | 
| 264 | 
            +
            vh∈Vh
         | 
| 265 | 
            +
            B (u; wh, vh)
         | 
| 266 | 
            +
            ∥vh∥1
         | 
| 267 | 
            +
            and
         | 
| 268 | 
            +
            ∥wh∥1 ≲ sup
         | 
| 269 | 
            +
            vh∈Vh
         | 
| 270 | 
            +
            B (u; vh, wh)
         | 
| 271 | 
            +
            ∥vh∥1
         | 
| 272 | 
            +
            .
         | 
| 273 | 
            +
            (4.2)
         | 
| 274 | 
            +
            Proof.
         | 
| 275 | 
            +
            For the solution u of (2.3), a projection operator Ph : H1
         | 
| 276 | 
            +
            0(Ω) → Vh is defined by
         | 
| 277 | 
            +
            (az(u)∇Phv, ∇χh) = (az(u)∇v, ∇χh),
         | 
| 278 | 
            +
            ∀v ∈ H1
         | 
| 279 | 
            +
            0(Ω), χh ∈ Vh.
         | 
| 280 | 
            +
            (4.3)
         | 
| 281 | 
            +
            By (2.4), we can know that the projection operator Ph is well-defined. Taking v = vh ∈ Vh ⊂
         | 
| 282 | 
            +
            H1
         | 
| 283 | 
            +
            0(Ω) and χh = Phvh − vh, and using (2.4), we could prove that the projection operator Ph
         | 
| 284 | 
            +
            is identity operator for space Vh. Substituting χh = Phv into (4.3), and using (2.4), Poincar´e
         | 
| 285 | 
            +
            inequality, Remark 2.1 and Cauchy–Schwarz inequality, it holds that
         | 
| 286 | 
            +
            ∥Phv∥1 ≲ ∥v∥1,
         | 
| 287 | 
            +
            ∀v ∈ H1
         | 
| 288 | 
            +
            0(Ω).
         | 
| 289 | 
            +
            (4.4)
         | 
| 290 | 
            +
             | 
| 291 | 
            +
            6
         | 
| 292 | 
            +
            Jiajun Zhan & et al.
         | 
| 293 | 
            +
            By (2.4), duality argument and (4.4), we can obtain (See Theorem 3.2.5 in [2])
         | 
| 294 | 
            +
            ∥v − Phv∥0 ≲ h∥v∥1,
         | 
| 295 | 
            +
            ∀v ∈ H1
         | 
| 296 | 
            +
            0(Ω).
         | 
| 297 | 
            +
            (4.5)
         | 
| 298 | 
            +
            For any wh ∈ Vh, v ∈ H1
         | 
| 299 | 
            +
            0(Ω), by (3.1), Green formula, (4.3), Remark 2.1, Cauchy-Schwarz
         | 
| 300 | 
            +
            inequality and (4.5), we have
         | 
| 301 | 
            +
            B(u; wh, v − Phv)
         | 
| 302 | 
            +
            =
         | 
| 303 | 
            +
            (ay(u)wh, ∇(v − Phv)) + (az(u)∇wh, ∇(v − Phv))
         | 
| 304 | 
            +
            +(fy(u)wh, v − Phv) + (fz(u)∇wh, v − Phv)
         | 
| 305 | 
            +
            =
         | 
| 306 | 
            +
            ((∇ · ay(u))wh, v − Phv) + (ay(u) · ∇wh, v − Phv)
         | 
| 307 | 
            +
            +(fy(u)wh, v − Phv) + (fz(u)∇wh, v − Phv)
         | 
| 308 | 
            +
            ≲
         | 
| 309 | 
            +
            ∥wh∥1∥v − Phv∥0
         | 
| 310 | 
            +
            ≲
         | 
| 311 | 
            +
            h∥wh∥1∥v∥1.
         | 
| 312 | 
            +
            (4.6)
         | 
| 313 | 
            +
            Noticing that L′(u) : H1
         | 
| 314 | 
            +
            0(Ω) → H−1(Ω) is an isomorphism, using (4.6) and (4.4), we obtain
         | 
| 315 | 
            +
            that
         | 
| 316 | 
            +
            ∥wh∥1
         | 
| 317 | 
            +
            ≲
         | 
| 318 | 
            +
            sup
         | 
| 319 | 
            +
            v∈H1
         | 
| 320 | 
            +
            0 (Ω)
         | 
| 321 | 
            +
            B(u; wh, v)
         | 
| 322 | 
            +
            ∥v∥1
         | 
| 323 | 
            +
            ≲
         | 
| 324 | 
            +
            sup
         | 
| 325 | 
            +
            v∈H1
         | 
| 326 | 
            +
            0 (Ω)
         | 
| 327 | 
            +
            B(u; wh, v − Phv)
         | 
| 328 | 
            +
            ∥v∥1
         | 
| 329 | 
            +
            + sup
         | 
| 330 | 
            +
            v∈H1
         | 
| 331 | 
            +
            0 Ω
         | 
| 332 | 
            +
            B(u; wh, Phv)
         | 
| 333 | 
            +
            ∥v∥1
         | 
| 334 | 
            +
            ≲
         | 
| 335 | 
            +
            h∥wh∥1 +
         | 
| 336 | 
            +
            sup
         | 
| 337 | 
            +
            v∈H1
         | 
| 338 | 
            +
            0 (Ω)
         | 
| 339 | 
            +
            B(u; wh, Phv)
         | 
| 340 | 
            +
            ∥Phv∥1
         | 
| 341 | 
            +
            .
         | 
| 342 | 
            +
            Taking h sufficiently small in the above inequality with projection operator Ph being identity
         | 
| 343 | 
            +
            operator for Vh, we could obtain the first estimate of (4.2). The proof of the second estimate
         | 
| 344 | 
            +
            of (4.2) is similar.
         | 
| 345 | 
            +
            Next, we provide another BB condition of the form B(·; ·, ·).
         | 
| 346 | 
            +
            Lemma 4.2
         | 
| 347 | 
            +
            Assume u is the solution of (2.3) and Ψ satisfying ∥u − Ψ∥1,∞ ≲ H, then when
         | 
| 348 | 
            +
            H is small enough, for any wh ∈ Vh, it holds that
         | 
| 349 | 
            +
            ∥wh∥1 ≲ sup
         | 
| 350 | 
            +
            vh∈Vh
         | 
| 351 | 
            +
            B (Ψ; wh, vh)
         | 
| 352 | 
            +
            ∥vh∥1
         | 
| 353 | 
            +
            and
         | 
| 354 | 
            +
            ∥wh∥1 ≲ sup
         | 
| 355 | 
            +
            vh∈Vh
         | 
| 356 | 
            +
            B (Ψ; vh, wh)
         | 
| 357 | 
            +
            ∥vh∥1
         | 
| 358 | 
            +
            .
         | 
| 359 | 
            +
            (4.7)
         | 
| 360 | 
            +
            Proof.
         | 
| 361 | 
            +
            Using the definition (3.1) of form B, Taylor expansion h(y, z) = h(y0, z0)+∂yh(˜θ1, ˜θ2)(y−
         | 
| 362 | 
            +
            y0) + ∂zh(˜θ1, ˜θ2)(z − z0), where ˜θ1 is between y and y0 and ˜θ2 is between z and z0, Remark 2.1,
         | 
| 363 | 
            +
            and H¨older inequality, we obtain
         | 
| 364 | 
            +
            B(u; wh, vh) − B(Ψ; wh, vh)
         | 
| 365 | 
            +
            =
         | 
| 366 | 
            +
            ((ay(u) − ay(Ψ))wh, ∇vh) + ((az(u) − az(Ψ))∇wh, ∇vh)
         | 
| 367 | 
            +
            +((fy(u) − fy(Ψ))wh, vh) + ((fz(u) − fz(Ψ))∇wh, vh)
         | 
| 368 | 
            +
            =
         | 
| 369 | 
            +
            (ayy(θ1)(u − Ψ)wh, ∇vh) + (ayz(θ1)∇(u − Ψ)wh, ∇vh)
         | 
| 370 | 
            +
            +(azy(θ2)(u − Ψ)∇wh, ∇vh) + (∇(u − Ψ)T azz(θ2)∇wh, ∇vh)
         | 
| 371 | 
            +
            +(fyy(θ3)(u − Ψ)wh, vh) + (fyz(θ3) · ∇(u − Ψ)wh, vh)
         | 
| 372 | 
            +
            +(fzy(θ4) · ∇wh(u − Ψ), vh) + (∇(u − Ψ)T fzz(θ4)∇wh, vh)
         | 
| 373 | 
            +
            ≲
         | 
| 374 | 
            +
            ∥u − Ψ∥1,∞∥wh∥1∥vh∥1,
         | 
| 375 | 
            +
            (4.8)
         | 
| 376 | 
            +
             | 
| 377 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 378 | 
            +
            7
         | 
| 379 | 
            +
            where θi (i = 1, 2, 3, 4) are between u and Ψ.
         | 
| 380 | 
            +
            By Lemma 4.1, (4.8) and ∥u − Ψ∥1,∞ ≲ H, it is obtained that
         | 
| 381 | 
            +
            ∥wh∥1
         | 
| 382 | 
            +
            ≲
         | 
| 383 | 
            +
            sup
         | 
| 384 | 
            +
            vh∈Vh
         | 
| 385 | 
            +
            B(u; wh, vh) − B (Ψ; wh, vh)
         | 
| 386 | 
            +
            ∥vh∥1
         | 
| 387 | 
            +
            + sup
         | 
| 388 | 
            +
            vh∈Vh
         | 
| 389 | 
            +
            B (Ψ; wh, vh)
         | 
| 390 | 
            +
            ∥vh∥1
         | 
| 391 | 
            +
            ≲
         | 
| 392 | 
            +
            ∥u − Ψ∥1,∞∥wh∥1 + sup
         | 
| 393 | 
            +
            vh∈Vh
         | 
| 394 | 
            +
            B (Ψ; wh, vh)
         | 
| 395 | 
            +
            ∥vh∥1
         | 
| 396 | 
            +
            ≲
         | 
| 397 | 
            +
            H∥wh∥1 + sup
         | 
| 398 | 
            +
            vh∈Vh
         | 
| 399 | 
            +
            B (Ψ; wh, vh)
         | 
| 400 | 
            +
            ∥vh∥1
         | 
| 401 | 
            +
            .
         | 
| 402 | 
            +
            Taking H sufficiently small into the above inequality, we can derive the first estimate of (4.7).
         | 
| 403 | 
            +
            The proof of the second estimate of (4.7) is similar.
         | 
| 404 | 
            +
            Remark 4.3
         | 
| 405 | 
            +
            According to (2.6), Lemma 4.2 still holds with replacing Ψ by the finite element
         | 
| 406 | 
            +
            solution uh of (2.5).
         | 
| 407 | 
            +
            For more concise notations and the subsequent analysis, we denote
         | 
| 408 | 
            +
            Ek = uh − uk
         | 
| 409 | 
            +
            h,
         | 
| 410 | 
            +
            (4.9)
         | 
| 411 | 
            +
            uk,1
         | 
| 412 | 
            +
            h
         | 
| 413 | 
            +
            = uk
         | 
| 414 | 
            +
            h + ek
         | 
| 415 | 
            +
            H,
         | 
| 416 | 
            +
            (4.10)
         | 
| 417 | 
            +
            where uh is the solution of problem (2.5) and, uk
         | 
| 418 | 
            +
            h and ek
         | 
| 419 | 
            +
            H are given by Algorithm 3.2. It’s noted
         | 
| 420 | 
            +
            that these notation will be used frequently in the rest of this paper.
         | 
| 421 | 
            +
            Remark 4.4
         | 
| 422 | 
            +
            For k ⩾ 0, assume that Ek, uk,1
         | 
| 423 | 
            +
            h
         | 
| 424 | 
            +
            and ek
         | 
| 425 | 
            +
            H are given by (4.9), (4.10) and Algorithm
         | 
| 426 | 
            +
            3.2, respectively. If both ∥Ek∥1,∞ ≲ H and ∥ek
         | 
| 427 | 
            +
            H∥1,∞ ≲ H are provided, the Lemma 4.2 still
         | 
| 428 | 
            +
            holds with replacing Ψ by uk,1
         | 
| 429 | 
            +
            h . In fact, using (4.10), (4.9), triangle inequality, (2.6) with r ⩾ 1
         | 
| 430 | 
            +
            and h < H, ∥Ek∥1,∞ ≲ H and ∥ek
         | 
| 431 | 
            +
            H∥1,∞ ≲ H, we derive that
         | 
| 432 | 
            +
            ∥u − uk,1
         | 
| 433 | 
            +
            h ∥1,∞ ⩽ ∥u − uh∥1,∞ + ∥Ek∥1,∞ + ∥ek
         | 
| 434 | 
            +
            H∥1,∞ ≲ H.
         | 
| 435 | 
            +
            Therefore, the Lemma 4.2 still holds with Ψ = uk,1
         | 
| 436 | 
            +
            h .
         | 
| 437 | 
            +
            And then, for the finite element solution uh of (2.5) and any fixed x ∈ Ω, we introduce the
         | 
| 438 | 
            +
            Green functions gx
         | 
| 439 | 
            +
            H ∈ VH, which be defined by
         | 
| 440 | 
            +
            B(uh; vH, gx
         | 
| 441 | 
            +
            H) = ∂vH(x),
         | 
| 442 | 
            +
            ∀vH ∈ VH,
         | 
| 443 | 
            +
            (4.11)
         | 
| 444 | 
            +
            where ∂ denotes either
         | 
| 445 | 
            +
            ∂
         | 
| 446 | 
            +
            ∂x1 or
         | 
| 447 | 
            +
            ∂
         | 
| 448 | 
            +
            ∂x2 . It’s easy to see that the Green function gx
         | 
| 449 | 
            +
            H is well-defined
         | 
| 450 | 
            +
            by Remark 4.3.
         | 
| 451 | 
            +
            Assume uk,1
         | 
| 452 | 
            +
            h
         | 
| 453 | 
            +
            is given by (4.10), similarly, for any fixed x ∈ Ω, we introduce the Green
         | 
| 454 | 
            +
            functions gk,x
         | 
| 455 | 
            +
            h
         | 
| 456 | 
            +
            ∈ Vh by
         | 
| 457 | 
            +
            B(uk,1
         | 
| 458 | 
            +
            h ; vh, gk,x
         | 
| 459 | 
            +
            h
         | 
| 460 | 
            +
            ) = ∂vh(x),
         | 
| 461 | 
            +
            ∀vh ∈ Vh.
         | 
| 462 | 
            +
            (4.12)
         | 
| 463 | 
            +
            By Remark 4.4, we also can see that Green function gk,x
         | 
| 464 | 
            +
            h
         | 
| 465 | 
            +
            is well-defined.
         | 
| 466 | 
            +
            Here give some estimates of the above two Green functions gx
         | 
| 467 | 
            +
            H and gk,x
         | 
| 468 | 
            +
            h
         | 
| 469 | 
            +
            (See Lemma 3.3 of
         | 
| 470 | 
            +
            [4], or (2.10) and (2.11) of [9])
         | 
| 471 | 
            +
            ∥gx
         | 
| 472 | 
            +
            H∥1,1 ≲ | log H|
         | 
| 473 | 
            +
            and
         | 
| 474 | 
            +
            ∥gk,x
         | 
| 475 | 
            +
            h
         | 
| 476 | 
            +
            ∥1,1 ≲ | log h|.
         | 
| 477 | 
            +
            (4.13)
         | 
| 478 | 
            +
             | 
| 479 | 
            +
            8
         | 
| 480 | 
            +
            Jiajun Zhan & et al.
         | 
| 481 | 
            +
            At last, for any v ∈ H1
         | 
| 482 | 
            +
            0(Ω) ∩ W 1,∞(Ω), using (3.1.11) of [2], it could be obtained that
         | 
| 483 | 
            +
            ∥v∥1,∞ ≲ |v|1,∞.
         | 
| 484 | 
            +
            (4.14)
         | 
| 485 | 
            +
            4.2
         | 
| 486 | 
            +
            Error estimate
         | 
| 487 | 
            +
            In this subsection, we present the convergence analysis of Algorithm 3.2 by a series of lemmas.
         | 
| 488 | 
            +
            Lemma 4.5
         | 
| 489 | 
            +
            Assume uk,1
         | 
| 490 | 
            +
            h , Ek and ek
         | 
| 491 | 
            +
            H are given by (4.10), (4.9) and Algorithm 3.2, respec-
         | 
| 492 | 
            +
            tively, then we have, for any vh ∈ Vh,
         | 
| 493 | 
            +
            B(uk,1
         | 
| 494 | 
            +
            h ; Ek+1, vh) ≲ (∥Ek∥1,∞ + ∥ek
         | 
| 495 | 
            +
            H∥1,∞)(∥Ek∥1 + ∥ek
         | 
| 496 | 
            +
            H∥1)∥vh∥1,
         | 
| 497 | 
            +
            (4.15)
         | 
| 498 | 
            +
            B(uk,1
         | 
| 499 | 
            +
            h ; Ek+1, vh) ≲ (∥Ek∥2
         | 
| 500 | 
            +
            1,∞ + ∥ek
         | 
| 501 | 
            +
            H∥2
         | 
| 502 | 
            +
            1,∞)∥vh∥1,1.
         | 
| 503 | 
            +
            (4.16)
         | 
| 504 | 
            +
            Proof.
         | 
| 505 | 
            +
            Using (4.9), Remark 3.1, (3.5), (2.5) and (2.2), it is obtained that
         | 
| 506 | 
            +
            B(uk,1
         | 
| 507 | 
            +
            h ; Ek+1, vh)
         | 
| 508 | 
            +
            =
         | 
| 509 | 
            +
            B(uk,1
         | 
| 510 | 
            +
            h ; uh, vh) − B(uk,1
         | 
| 511 | 
            +
            h ; uk+1
         | 
| 512 | 
            +
            h
         | 
| 513 | 
            +
            , vh)
         | 
| 514 | 
            +
            =
         | 
| 515 | 
            +
            B(uk,1
         | 
| 516 | 
            +
            h ; uh, vh) − B(uk,1
         | 
| 517 | 
            +
            h ; uk
         | 
| 518 | 
            +
            h + ek
         | 
| 519 | 
            +
            H, vh)
         | 
| 520 | 
            +
            +A(uk,1
         | 
| 521 | 
            +
            h , vh) − A(uh, vh).
         | 
| 522 | 
            +
            =
         | 
| 523 | 
            +
            B(uk,1
         | 
| 524 | 
            +
            h ; Ek − ek
         | 
| 525 | 
            +
            H, vh) + (a(uk,1
         | 
| 526 | 
            +
            h , ∇uk,1
         | 
| 527 | 
            +
            h ), vh) + (f(uk,1
         | 
| 528 | 
            +
            h , ∇uk,1
         | 
| 529 | 
            +
            h ), vh)
         | 
| 530 | 
            +
            −(a(uh, ∇uh), vh) − (f(uh, ∇uh), vh)
         | 
| 531 | 
            +
            :=
         | 
| 532 | 
            +
            A1 − A2 − A3,
         | 
| 533 | 
            +
            (4.17)
         | 
| 534 | 
            +
            where
         | 
| 535 | 
            +
            A1
         | 
| 536 | 
            +
            =
         | 
| 537 | 
            +
            B(uk,1
         | 
| 538 | 
            +
            h ; Ek − ek
         | 
| 539 | 
            +
            H, vh),
         | 
| 540 | 
            +
            A2
         | 
| 541 | 
            +
            =
         | 
| 542 | 
            +
            (a(uh, ∇uh), vh) − (a(uk,1
         | 
| 543 | 
            +
            h , ∇uk,1
         | 
| 544 | 
            +
            h ), vh),
         | 
| 545 | 
            +
            A3
         | 
| 546 | 
            +
            =
         | 
| 547 | 
            +
            (f(uh, ∇uh), vh) − (f(uk,1
         | 
| 548 | 
            +
            h , ∇uk,1
         | 
| 549 | 
            +
            h ), vh).
         | 
| 550 | 
            +
            For A1, using the definition (3.1) of B, we have
         | 
| 551 | 
            +
            A1
         | 
| 552 | 
            +
            =
         | 
| 553 | 
            +
            (ay(uk,1
         | 
| 554 | 
            +
            h )(Ek − ek
         | 
| 555 | 
            +
            H), ∇vh) + (az(uk,1
         | 
| 556 | 
            +
            h )∇(Ek − ek
         | 
| 557 | 
            +
            H), ∇vh)
         | 
| 558 | 
            +
            +(fy(uk,1
         | 
| 559 | 
            +
            h )(Ek − ek
         | 
| 560 | 
            +
            H), vh) + (fz(uk,1
         | 
| 561 | 
            +
            h )∇(Ek − ek
         | 
| 562 | 
            +
            H), vh).
         | 
| 563 | 
            +
            (4.18)
         | 
| 564 | 
            +
            For A2, using second order Taylor expansion, (4.10) and (4.9), we obtain
         | 
| 565 | 
            +
            A2
         | 
| 566 | 
            +
            =
         | 
| 567 | 
            +
            (ay(uk,1
         | 
| 568 | 
            +
            h )(Ek − ek
         | 
| 569 | 
            +
            H), ∇vh) + (az(uk,1
         | 
| 570 | 
            +
            h )∇(Ek − ek
         | 
| 571 | 
            +
            H), ∇vh)
         | 
| 572 | 
            +
            +(ayy(θ5)(Ek − ek
         | 
| 573 | 
            +
            H)2, ∇vh) + 2(ayz(θ5)∇(Ek − ek
         | 
| 574 | 
            +
            H)(Ek − ek
         | 
| 575 | 
            +
            H), ∇vh)
         | 
| 576 | 
            +
            +(∇(Ek − ek
         | 
| 577 | 
            +
            H)T azz(θ5)∇(Ek − ek
         | 
| 578 | 
            +
            H), ∇vh),
         | 
| 579 | 
            +
            (4.19)
         | 
| 580 | 
            +
            where θ5 is between uh and uk,1
         | 
| 581 | 
            +
            h .
         | 
| 582 | 
            +
            Similarly for A3, using second order Taylor expansion, (4.10) and (4.9), it is obtained that
         | 
| 583 | 
            +
            A3
         | 
| 584 | 
            +
            =
         | 
| 585 | 
            +
            (fy(uk,1
         | 
| 586 | 
            +
            h )(Ek − ek
         | 
| 587 | 
            +
            H), vh) + (fz(uk,1
         | 
| 588 | 
            +
            h )∇(Ek − ek
         | 
| 589 | 
            +
            H), vh)
         | 
| 590 | 
            +
            +(fyy(θ6)(Ek − ek
         | 
| 591 | 
            +
            H)2, vh) + 2(fyz(θ6) · ∇(Ek − ek
         | 
| 592 | 
            +
            H)(Ek − ek
         | 
| 593 | 
            +
            H), vh)
         | 
| 594 | 
            +
            +(∇(Ek − ek
         | 
| 595 | 
            +
            H)T fzz(θ6)∇(Ek − ek
         | 
| 596 | 
            +
            H), vh),
         | 
| 597 | 
            +
            (4.20)
         | 
| 598 | 
            +
             | 
| 599 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 600 | 
            +
            9
         | 
| 601 | 
            +
            where θ6 is between uh and uk,1
         | 
| 602 | 
            +
            h .
         | 
| 603 | 
            +
            Noticing the sum of the first order derivative items about a(·, ·, ·) and f(·, ·, ·) in (4.19) and
         | 
| 604 | 
            +
            (4.20) exactly equal A1. Substituting (4.18), (4.19) and (4.20) into (4.17), it’s obtained that
         | 
| 605 | 
            +
            B(uk,1
         | 
| 606 | 
            +
            h ; Ek+1, vh)
         | 
| 607 | 
            +
            =
         | 
| 608 | 
            +
            −(ayy(θ5)(Ek − ek
         | 
| 609 | 
            +
            H)2, ∇vh) − 2(ayz(θ5)∇(Ek − ek
         | 
| 610 | 
            +
            H)(Ek − ek
         | 
| 611 | 
            +
            H), ∇vh)
         | 
| 612 | 
            +
            −(∇(Ek − ek
         | 
| 613 | 
            +
            H)T azz(θ5)∇(Ek − ek
         | 
| 614 | 
            +
            H), ∇vh) − (fyy(θ6)(Ek − ek
         | 
| 615 | 
            +
            H)2, vh)
         | 
| 616 | 
            +
            −2(fyz(θ6) · ∇(Ek − ek
         | 
| 617 | 
            +
            H)(Ek − ek
         | 
| 618 | 
            +
            H), vh)
         | 
| 619 | 
            +
            −(∇(Ek − ek
         | 
| 620 | 
            +
            H)T fzz(θ6)∇(Ek − ek
         | 
| 621 | 
            +
            H), vh).
         | 
| 622 | 
            +
            (4.21)
         | 
| 623 | 
            +
            Applying Remark 2.1, H¨older inequality and triangle inequality into (4.21), we could obtain
         | 
| 624 | 
            +
            B(uk,1
         | 
| 625 | 
            +
            h ; Ek+1, vh)
         | 
| 626 | 
            +
            ≲
         | 
| 627 | 
            +
            ∥Ek − ek
         | 
| 628 | 
            +
            H∥1,∞∥Ek − ek
         | 
| 629 | 
            +
            H∥1∥vh∥1
         | 
| 630 | 
            +
            ⩽
         | 
| 631 | 
            +
            (∥Ek∥1,∞ + ∥ek
         | 
| 632 | 
            +
            H∥1,∞)(∥Ek∥1 + ∥ek
         | 
| 633 | 
            +
            H∥1)∥vh∥1,
         | 
| 634 | 
            +
            which completes the proof of (4.15). Similarly, we could obtain (4.16) by (4.21).
         | 
| 635 | 
            +
            Lemma 4.6
         | 
| 636 | 
            +
            Assume that uk,1
         | 
| 637 | 
            +
            h , ek
         | 
| 638 | 
            +
            H and Ek are defined by (4.10), Algorithm 3.2 and (4.9),
         | 
| 639 | 
            +
            respectively, then we have
         | 
| 640 | 
            +
            B(uk,1
         | 
| 641 | 
            +
            h ; ek
         | 
| 642 | 
            +
            H, vH) ≲ (∥Ek∥1 + ∥Ek+1∥1)∥vH∥1,
         | 
| 643 | 
            +
            ∀vH ∈ VH.
         | 
| 644 | 
            +
            (4.22)
         | 
| 645 | 
            +
            Proof.
         | 
| 646 | 
            +
            Taking vh = vH into (3.5) and using (3.4), we obtain
         | 
| 647 | 
            +
            B(uk,1
         | 
| 648 | 
            +
            h ; uk+1
         | 
| 649 | 
            +
            h
         | 
| 650 | 
            +
            , vH) = B(uk,1
         | 
| 651 | 
            +
            h ; uk
         | 
| 652 | 
            +
            h + ek
         | 
| 653 | 
            +
            H, vH).
         | 
| 654 | 
            +
            Rewriting the the above equation with Remark 3.1, and then using (4.9), (4.1) and triangle
         | 
| 655 | 
            +
            inequality, we have
         | 
| 656 | 
            +
            B(uk,1
         | 
| 657 | 
            +
            h ; ek
         | 
| 658 | 
            +
            H, vH)
         | 
| 659 | 
            +
            =
         | 
| 660 | 
            +
            B(uk,1
         | 
| 661 | 
            +
            h ; uk+1
         | 
| 662 | 
            +
            h
         | 
| 663 | 
            +
            − uk
         | 
| 664 | 
            +
            h, vH)
         | 
| 665 | 
            +
            =
         | 
| 666 | 
            +
            B(uk,1
         | 
| 667 | 
            +
            h ; uk+1
         | 
| 668 | 
            +
            h
         | 
| 669 | 
            +
            − uh + uh − uk
         | 
| 670 | 
            +
            h, vH)
         | 
| 671 | 
            +
            =
         | 
| 672 | 
            +
            B(uk,1
         | 
| 673 | 
            +
            h ; Ek − Ek+1, vH)
         | 
| 674 | 
            +
            ≲
         | 
| 675 | 
            +
            ∥Ek − Ek+1∥1∥vH∥1
         | 
| 676 | 
            +
            ⩽
         | 
| 677 | 
            +
            (∥Ek∥1 + ∥Ek+1∥1) ∥vH∥1,
         | 
| 678 | 
            +
            which completes the proof.
         | 
| 679 | 
            +
            Lemma 4.7
         | 
| 680 | 
            +
            Assume that Ek and ek
         | 
| 681 | 
            +
            H are given by (4.9) and Algorithm 3.2, respectively, and
         | 
| 682 | 
            +
            r ⩾ 1, when h is small enough, then for any integer k ⩾ 1,
         | 
| 683 | 
            +
            ∥Ek∥1 ≲ Hr+k,
         | 
| 684 | 
            +
            ∥Ek∥1,∞ ≲ | log h|H2,
         | 
| 685 | 
            +
            ∥ek
         | 
| 686 | 
            +
            H∥1,∞ ≲ H,
         | 
| 687 | 
            +
            ∥ek
         | 
| 688 | 
            +
            H∥1 ≲ Hr+k.
         | 
| 689 | 
            +
            (4.23)
         | 
| 690 | 
            +
            Proof.
         | 
| 691 | 
            +
            Here we use mathematical induction to prove that (4.23) is true.
         | 
| 692 | 
            +
            By (3.4), u0
         | 
| 693 | 
            +
            h = uH, (2.5) and the uniqueness of finite element solution (See Lemma 2.2), it
         | 
| 694 | 
            +
            could be seen that e0
         | 
| 695 | 
            +
            H = 0.
         | 
| 696 | 
            +
             | 
| 697 | 
            +
            10
         | 
| 698 | 
            +
            Jiajun Zhan & et al.
         | 
| 699 | 
            +
            Making use of triangle inequality, (2.6) and h ⩽ H, we have
         | 
| 700 | 
            +
            ∥E0∥1 ⩽ ∥u − uh∥1 + ∥u − uH∥1 ≲ hr + Hr ⩽ Hr,
         | 
| 701 | 
            +
            (4.24)
         | 
| 702 | 
            +
            ∥E0∥1,∞ ⩽ ∥u − uh∥1,∞ + ∥u − uH∥1,∞ ≲ hr + Hr ⩽ Hr.
         | 
| 703 | 
            +
            (4.25)
         | 
| 704 | 
            +
            Next, we will prove (4.23) is true when k = 1.
         | 
| 705 | 
            +
            (i) For ∥E1∥1 ≲ Hr+1.
         | 
| 706 | 
            +
            Noticing that r ⩾ 1 and e0
         | 
| 707 | 
            +
            H = 0, and using (4.25), we have
         | 
| 708 | 
            +
            ∥E0∥1,∞ ≲ H and ∥e0
         | 
| 709 | 
            +
            H∥1,∞ ≲ H , which could derive the BB condition of form B(u0,1
         | 
| 710 | 
            +
            h ; ·, ·) (See
         | 
| 711 | 
            +
            Remark 4.4). Using the BB condition of form B(u0,1
         | 
| 712 | 
            +
            h ; ·, ·), (4.15), (4.25), ek
         | 
| 713 | 
            +
            H = 0, (4.24), r ⩾ 1
         | 
| 714 | 
            +
            and H < 1, it’s obtained that
         | 
| 715 | 
            +
            ∥E1∥1
         | 
| 716 | 
            +
            ≲
         | 
| 717 | 
            +
            sup
         | 
| 718 | 
            +
            vh∈Vh
         | 
| 719 | 
            +
            B(u0,1
         | 
| 720 | 
            +
            h ; E1, vh)
         | 
| 721 | 
            +
            ∥vh∥1
         | 
| 722 | 
            +
            ≲
         | 
| 723 | 
            +
            (∥E0∥1,∞ + ∥e0
         | 
| 724 | 
            +
            H∥1,∞)(∥E0∥1 + ∥e0
         | 
| 725 | 
            +
            H∥1)
         | 
| 726 | 
            +
            ≲
         | 
| 727 | 
            +
            (Hr + 0)(Hr + 0)
         | 
| 728 | 
            +
            ≲
         | 
| 729 | 
            +
            Hr+1.
         | 
| 730 | 
            +
            (4.26)
         | 
| 731 | 
            +
            (ii) For ∥E1∥1,∞ ≲ | log h|H2. For k = 0 and any fixed x ∈ Ω, taking vh = E1 into (4.12),
         | 
| 732 | 
            +
            using (4.16), (4.25), e0
         | 
| 733 | 
            +
            H = 0, (4.13), r ⩾ 1 and H < 1, we obtain
         | 
| 734 | 
            +
            ∂E1(x)
         | 
| 735 | 
            +
            =
         | 
| 736 | 
            +
            B(u0,1
         | 
| 737 | 
            +
            h ; E1, g0,x
         | 
| 738 | 
            +
            h )
         | 
| 739 | 
            +
            ≲
         | 
| 740 | 
            +
            (∥E0∥2
         | 
| 741 | 
            +
            1,∞ + ∥e0
         | 
| 742 | 
            +
            H∥2
         | 
| 743 | 
            +
            1,∞)∥g0,x
         | 
| 744 | 
            +
            h ∥1,1
         | 
| 745 | 
            +
            ≲
         | 
| 746 | 
            +
            (H2r + 0)| log h|
         | 
| 747 | 
            +
            ≲
         | 
| 748 | 
            +
            | log h|H2.
         | 
| 749 | 
            +
            Further using the arbitrariness of x and (4.14), we derive that
         | 
| 750 | 
            +
            ∥E1∥1,∞ ≲ | log h|H2.
         | 
| 751 | 
            +
            (iii) For ∥e1
         | 
| 752 | 
            +
            H∥1,∞ ≲ H. Using ∥E1∥1,∞ ≲ | log h|H2 and Lemma A.1 (The specific content
         | 
| 753 | 
            +
            of lemma and proof are referred to Appendix), we obtain
         | 
| 754 | 
            +
            ∥e1
         | 
| 755 | 
            +
            H∥1,∞ ≲ H.
         | 
| 756 | 
            +
            (iv) For ∥e1
         | 
| 757 | 
            +
            H∥1 ≲ Hr+1. Noticing that ∥E1∥1,∞ ≲ | log h|H2 and ∥e1
         | 
| 758 | 
            +
            H∥1,∞ ≲ H are satisfied,
         | 
| 759 | 
            +
            therefore the BB condition of form B(u1,1
         | 
| 760 | 
            +
            h ; ·, ·) holds (See Remark 4.4). Using the BB condition
         | 
| 761 | 
            +
            of B(u1,1
         | 
| 762 | 
            +
            h ; ·, ·) and (4.15), it’s obtained that
         | 
| 763 | 
            +
            ∥E2∥1
         | 
| 764 | 
            +
            ≲
         | 
| 765 | 
            +
            sup
         | 
| 766 | 
            +
            vh
         | 
| 767 | 
            +
            B(u1,1
         | 
| 768 | 
            +
            h ; E2, vh)
         | 
| 769 | 
            +
            ∥vh∥1
         | 
| 770 | 
            +
            ≲
         | 
| 771 | 
            +
            (∥E1∥1,∞ + ∥e1
         | 
| 772 | 
            +
            H∥1,∞)(∥E1∥1 + ∥e1
         | 
| 773 | 
            +
            H∥1).
         | 
| 774 | 
            +
            (4.27)
         | 
| 775 | 
            +
            Using the BB condition of form B(u1,1
         | 
| 776 | 
            +
            h ; ·, ·), (4.22) with k = 1, (4.27), ∥E1∥1,∞ ≲ | log h|H2
         | 
| 777 | 
            +
            and ∥e1
         | 
| 778 | 
            +
            H∥1,∞ ≲ H, we have
         | 
| 779 | 
            +
            ∥e1
         | 
| 780 | 
            +
            H∥1
         | 
| 781 | 
            +
            ≲
         | 
| 782 | 
            +
            sup
         | 
| 783 | 
            +
            vH∈VH
         | 
| 784 | 
            +
            B(u1,1
         | 
| 785 | 
            +
            h ; e1
         | 
| 786 | 
            +
            H, vH)
         | 
| 787 | 
            +
            ∥vH∥1
         | 
| 788 | 
            +
            ≲
         | 
| 789 | 
            +
            ∥E1∥1 + ∥E2∥1
         | 
| 790 | 
            +
            ≲
         | 
| 791 | 
            +
            ∥E1∥1 + (∥E1∥1,∞ + ∥e1
         | 
| 792 | 
            +
            H∥1,∞)(∥E1∥1 + ∥e1
         | 
| 793 | 
            +
            H∥1)
         | 
| 794 | 
            +
            ≲
         | 
| 795 | 
            +
            ∥E1∥1 + (| log h|H2 + H)(∥E1∥1 + ∥e1
         | 
| 796 | 
            +
            H∥1).
         | 
| 797 | 
            +
             | 
| 798 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 799 | 
            +
            11
         | 
| 800 | 
            +
            Taking H be small enough in the above inequality, and using (4.26), it’s obtained that
         | 
| 801 | 
            +
            ∥e1
         | 
| 802 | 
            +
            H∥1 ≲ ∥E1∥1 ≲ Hr+1.
         | 
| 803 | 
            +
            We assume (4.23) is true when k = l, i.e.,
         | 
| 804 | 
            +
            ∥El∥1 ≲ Hr+l,
         | 
| 805 | 
            +
            ∥El∥1,∞ ≲ | log h|H2,
         | 
| 806 | 
            +
            ∥el
         | 
| 807 | 
            +
            H∥1,∞ ≲ H,
         | 
| 808 | 
            +
            ∥el
         | 
| 809 | 
            +
            H∥1 ≲ Hr+l.
         | 
| 810 | 
            +
            (4.28)
         | 
| 811 | 
            +
            Next, we will prove (4.23) also holding when k = l + 1.
         | 
| 812 | 
            +
            (i) For ∥El+1∥1 ≲ Hr+l+1.
         | 
| 813 | 
            +
            Noticing that ∥El∥1,∞ ≲ | log h|H2 and ∥el
         | 
| 814 | 
            +
            H∥1,∞ ≲ H are
         | 
| 815 | 
            +
            satisfied, therefore the BB condition of form B(ul,1
         | 
| 816 | 
            +
            h ; ·, ·) holds (See Remark 4.4). Using the BB
         | 
| 817 | 
            +
            condition of form B(ul,1
         | 
| 818 | 
            +
            h ; ·, ·), (4.15), (4.28) and H < 1, we obtain
         | 
| 819 | 
            +
            ∥El+1∥1
         | 
| 820 | 
            +
            ≲
         | 
| 821 | 
            +
            sup
         | 
| 822 | 
            +
            vh∈Vh
         | 
| 823 | 
            +
            B(ul,1
         | 
| 824 | 
            +
            h ; El+1, vh)
         | 
| 825 | 
            +
            ∥vh∥1
         | 
| 826 | 
            +
            ≲
         | 
| 827 | 
            +
            (∥El∥1,∞ + ∥el
         | 
| 828 | 
            +
            H∥1,∞)(∥El∥1 + ∥el
         | 
| 829 | 
            +
            H∥1)
         | 
| 830 | 
            +
            ≲
         | 
| 831 | 
            +
            (| log h|H2 + H)(Hr+l + Hr+l)
         | 
| 832 | 
            +
            ≲
         | 
| 833 | 
            +
            Hr+l+1.
         | 
| 834 | 
            +
            (4.29)
         | 
| 835 | 
            +
            (ii) For ∥El+1∥1,∞ ≲ | log h|H2. Taking vh = El+1 into (4.12) with k = l, using (4.16),
         | 
| 836 | 
            +
            (4.28) and (4.13), we obtain
         | 
| 837 | 
            +
            ∂El+1(x)
         | 
| 838 | 
            +
            =
         | 
| 839 | 
            +
            B(ul,1
         | 
| 840 | 
            +
            h ; El+1, gl,x
         | 
| 841 | 
            +
            h )
         | 
| 842 | 
            +
            ≲
         | 
| 843 | 
            +
            (∥El∥2
         | 
| 844 | 
            +
            1,∞ + ∥el
         | 
| 845 | 
            +
            H∥2
         | 
| 846 | 
            +
            1,∞)∥gl,x
         | 
| 847 | 
            +
            h ∥1,1
         | 
| 848 | 
            +
            ≲
         | 
| 849 | 
            +
            (| log h|2H4 + H2)| log h|
         | 
| 850 | 
            +
            ≲
         | 
| 851 | 
            +
            | log h|H2,
         | 
| 852 | 
            +
            which combining the arbitrariness of x and (4.14), it could be derived that
         | 
| 853 | 
            +
            ∥El+1∥1,∞ ≲ | log h|H2.
         | 
| 854 | 
            +
            (iii) For ∥el+1
         | 
| 855 | 
            +
            H ∥1,∞ ≲ H. Using ∥El+1∥1,∞ ≲ | log h|H2 and Lemma A.1, we obtain
         | 
| 856 | 
            +
            ∥el+1
         | 
| 857 | 
            +
            H ∥1,∞ ≲ H.
         | 
| 858 | 
            +
            (4.30)
         | 
| 859 | 
            +
            (iv) For ∥el+1
         | 
| 860 | 
            +
            H ∥1 ≲ Hr+l+1. Noticing that ∥El+1∥1,∞ ≲ | log h|H2 and ∥el+1
         | 
| 861 | 
            +
            H ∥1,∞ ≲ H are
         | 
| 862 | 
            +
            satisfied, therefore the BB condition of form B(ul+1,1
         | 
| 863 | 
            +
            h
         | 
| 864 | 
            +
            ; ·, ·) holds (See Remark 4.4). Using the
         | 
| 865 | 
            +
            BB condition of form B(ul+1,1
         | 
| 866 | 
            +
            h
         | 
| 867 | 
            +
            ; ·, ·), (4.15), it’s obtained that
         | 
| 868 | 
            +
            ∥El+2∥1
         | 
| 869 | 
            +
            ≲
         | 
| 870 | 
            +
            sup
         | 
| 871 | 
            +
            vh
         | 
| 872 | 
            +
            B(ul+1,1
         | 
| 873 | 
            +
            h
         | 
| 874 | 
            +
            ; El+2, vh)
         | 
| 875 | 
            +
            ∥vh∥1
         | 
| 876 | 
            +
            ≲
         | 
| 877 | 
            +
            (∥El+1∥1,∞ + ∥el+1
         | 
| 878 | 
            +
            H ∥1,∞)(∥El+1∥1 + ∥el+1
         | 
| 879 | 
            +
            H ∥1).
         | 
| 880 | 
            +
            (4.31)
         | 
| 881 | 
            +
            Using the BB condition of form B(ul+1,1
         | 
| 882 | 
            +
            h
         | 
| 883 | 
            +
            ; ·, ·), (4.22) with k = l + 1, (4.31), ∥El+1∥1,∞ ≲
         | 
| 884 | 
            +
            | log h|H2 and ∥el+1
         | 
| 885 | 
            +
            H ∥1,∞ ≲ H, we have
         | 
| 886 | 
            +
            ∥el+1
         | 
| 887 | 
            +
            H ∥1
         | 
| 888 | 
            +
            ≲
         | 
| 889 | 
            +
            sup
         | 
| 890 | 
            +
            vH∈VH
         | 
| 891 | 
            +
            B(ul+1,1
         | 
| 892 | 
            +
            h
         | 
| 893 | 
            +
            ; el+1
         | 
| 894 | 
            +
            H , vH)
         | 
| 895 | 
            +
            ∥vH∥1
         | 
| 896 | 
            +
            ≲
         | 
| 897 | 
            +
            ∥El+1∥1 + ∥El+2∥1
         | 
| 898 | 
            +
            ≲
         | 
| 899 | 
            +
            ∥El+1∥1 + (∥El+1∥1,∞ + ∥el+1
         | 
| 900 | 
            +
            H ∥1,∞)(∥El+1∥1 + ∥el+1
         | 
| 901 | 
            +
            H ∥1)
         | 
| 902 | 
            +
            ≲
         | 
| 903 | 
            +
            ∥El+1∥1 + (| log h|H2 + H)(∥El+1∥1 + ∥el+1
         | 
| 904 | 
            +
            H ∥1).
         | 
| 905 | 
            +
             | 
| 906 | 
            +
            12
         | 
| 907 | 
            +
            Jiajun Zhan & et al.
         | 
| 908 | 
            +
            Taking H be small enough in the above inequality and using (4.29), it’s obtained that
         | 
| 909 | 
            +
            ∥el+1
         | 
| 910 | 
            +
            H ∥1 ≲ ∥El+1∥1 ≲ Hr+l+1.
         | 
| 911 | 
            +
            By mathematical induction, the conclusion is obtained.
         | 
| 912 | 
            +
            Remark 4.8
         | 
| 913 | 
            +
            Although we just use the estimation ∥Ek+1∥1 ≲ Hr+k+1 in our main result
         | 
| 914 | 
            +
            (See Theorem 4.9), the availability of ∥Ek+1∥1 ≲ Hr+k+1 requires the support of ∥Ek∥1,∞ ≲
         | 
| 915 | 
            +
            | log h|H2, ∥ek
         | 
| 916 | 
            +
            H∥1,∞ ≲ H and ∥ek
         | 
| 917 | 
            +
            H∥1 ≲ Hr+k.
         | 
| 918 | 
            +
            Here gives the main result of this paper.
         | 
| 919 | 
            +
            Theorem 4.9
         | 
| 920 | 
            +
            Assume that u is the solution of (2.3) and uk
         | 
| 921 | 
            +
            h is given by Algorithm 3.2, then
         | 
| 922 | 
            +
            we have
         | 
| 923 | 
            +
            ∥u − uk
         | 
| 924 | 
            +
            h∥1 ≲ hr + Hr+k.
         | 
| 925 | 
            +
            (4.32)
         | 
| 926 | 
            +
            Proof.
         | 
| 927 | 
            +
            Using triangle inequality, (4.9), (2.6) and Lemma 4.7, we could obtain that
         | 
| 928 | 
            +
            ∥u − uk
         | 
| 929 | 
            +
            h∥1 ⩽ ∥u − uh∥1 + ∥Ek∥1 ≲ hr + Hr+k,
         | 
| 930 | 
            +
            which completes the proof.
         | 
| 931 | 
            +
            5
         | 
| 932 | 
            +
            Numerical experiments
         | 
| 933 | 
            +
            In this section, we present some numerical experiments to show the efficiency of the pro-
         | 
| 934 | 
            +
            posed iterative two-grid algorithm. We implemented these experiments by the software package
         | 
| 935 | 
            +
            FEALPy of programming language Python [5]. Specially in the Step 1 of Algorithm 3.2, we
         | 
| 936 | 
            +
            solve the nonlinear systems by Newton iteration methods with relative residual 10−8.
         | 
| 937 | 
            +
            We adopt the following mean curvature flow problem as our model problem:
         | 
| 938 | 
            +
            −∇ ·
         | 
| 939 | 
            +
            �
         | 
| 940 | 
            +
            ∇u
         | 
| 941 | 
            +
            (1 + |∇u|2)1/2
         | 
| 942 | 
            +
            �
         | 
| 943 | 
            +
            = g in Ω,
         | 
| 944 | 
            +
            u = 0 on ∂Ω,
         | 
| 945 | 
            +
            where the computational domain Ω = (0, 1)× (0, 1), the exact solution u = x(1 − x)2y(1 − y)ex,
         | 
| 946 | 
            +
            and g is so chosen according to the exact solution.
         | 
| 947 | 
            +
            Firstly, we choose conforming piecewise linear finite element space as Vh, namely choose
         | 
| 948 | 
            +
            r = 1. According to Theorem 4.9, we should keep hr = Hr+k hold in order to achieve the
         | 
| 949 | 
            +
            optimal convergence order. Therefore in Table 1, we present some numerical results in different
         | 
| 950 | 
            +
            mesh size with h = H2 for k = 1. In this case, our algorithm is same with Algorithm 3.1 (See
         | 
| 951 | 
            +
            Remark 3.3). Furthermore, we could observe that ∥u−u1
         | 
| 952 | 
            +
            h∥1 ∗max{H2, h}−1 are stable in Table
         | 
| 953 | 
            +
            1, which agrees with (4.32) in Theorem 4.9.
         | 
| 954 | 
            +
            Table 1: k = 1, r = 1
         | 
| 955 | 
            +
            H
         | 
| 956 | 
            +
            h
         | 
| 957 | 
            +
            ∥u − u1
         | 
| 958 | 
            +
            h∥1
         | 
| 959 | 
            +
            ∥u − u1
         | 
| 960 | 
            +
            h∥1 ∗ max{H2, h}−1
         | 
| 961 | 
            +
            1/9
         | 
| 962 | 
            +
            1/81
         | 
| 963 | 
            +
            2.74E-03
         | 
| 964 | 
            +
            0.221953
         | 
| 965 | 
            +
            1/10
         | 
| 966 | 
            +
            1/100
         | 
| 967 | 
            +
            2.22E-03
         | 
| 968 | 
            +
            0.221967
         | 
| 969 | 
            +
            1/11
         | 
| 970 | 
            +
            1/121
         | 
| 971 | 
            +
            1.83E-03
         | 
| 972 | 
            +
            0.221977
         | 
| 973 | 
            +
            1/12
         | 
| 974 | 
            +
            1/144
         | 
| 975 | 
            +
            1.54E-03
         | 
| 976 | 
            +
            0.221983
         | 
| 977 | 
            +
             | 
| 978 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 979 | 
            +
            13
         | 
| 980 | 
            +
            And then, we increase the iterative counts k to expand the distance between H and h, which
         | 
| 981 | 
            +
            is shown in Tables 2 and 3. We also observe that ∥u − u1
         | 
| 982 | 
            +
            h∥1 ∗ max{H1+k, h}−1 are stable.
         | 
| 983 | 
            +
            Table 2: k = 2, r = 1
         | 
| 984 | 
            +
            H
         | 
| 985 | 
            +
            h
         | 
| 986 | 
            +
            ∥u − u2
         | 
| 987 | 
            +
            h∥1
         | 
| 988 | 
            +
            ∥u − u2
         | 
| 989 | 
            +
            h∥1 ∗ max{H3, h}−1
         | 
| 990 | 
            +
            1/3
         | 
| 991 | 
            +
            1/27
         | 
| 992 | 
            +
            8.20E-03
         | 
| 993 | 
            +
            0.221524
         | 
| 994 | 
            +
            1/4
         | 
| 995 | 
            +
            1/64
         | 
| 996 | 
            +
            3.47E-03
         | 
| 997 | 
            +
            0.221784
         | 
| 998 | 
            +
            1/5
         | 
| 999 | 
            +
            1/125
         | 
| 1000 | 
            +
            1.77E-03
         | 
| 1001 | 
            +
            0.221826
         | 
| 1002 | 
            +
            1/6
         | 
| 1003 | 
            +
            1/216
         | 
| 1004 | 
            +
            1.03E-03
         | 
| 1005 | 
            +
            0.221836
         | 
| 1006 | 
            +
            Table 3: k = 3, r = 1
         | 
| 1007 | 
            +
            H
         | 
| 1008 | 
            +
            h
         | 
| 1009 | 
            +
            ∥u − u3
         | 
| 1010 | 
            +
            h∥1
         | 
| 1011 | 
            +
            ∥u − u3
         | 
| 1012 | 
            +
            h∥1 ∗ max{H4, h}−1
         | 
| 1013 | 
            +
            1/2
         | 
| 1014 | 
            +
            1/16
         | 
| 1015 | 
            +
            1.38E-02
         | 
| 1016 | 
            +
            0.220944
         | 
| 1017 | 
            +
            1/3
         | 
| 1018 | 
            +
            1/81
         | 
| 1019 | 
            +
            2.74E-03
         | 
| 1020 | 
            +
            0.221805
         | 
| 1021 | 
            +
            1/4
         | 
| 1022 | 
            +
            1/256
         | 
| 1023 | 
            +
            8.67E-04
         | 
| 1024 | 
            +
            0.221837
         | 
| 1025 | 
            +
            At last, we implement similar numerical experiments for high order finite element space
         | 
| 1026 | 
            +
            with r = 2 and r = 3 in Tables 4-9. By observation, all these numerical experiments are in
         | 
| 1027 | 
            +
            support of (4.32) in Theorem 4.9.
         | 
| 1028 | 
            +
            Table 4: k = 1, r = 2
         | 
| 1029 | 
            +
            H
         | 
| 1030 | 
            +
            h
         | 
| 1031 | 
            +
            ∥u − u1
         | 
| 1032 | 
            +
            h∥1
         | 
| 1033 | 
            +
            ∥u − u1
         | 
| 1034 | 
            +
            h∥1 ∗ max{H3, h2}−1
         | 
| 1035 | 
            +
            1/4
         | 
| 1036 | 
            +
            1/8
         | 
| 1037 | 
            +
            2.57E-03
         | 
| 1038 | 
            +
            0.164578
         | 
| 1039 | 
            +
            1/9
         | 
| 1040 | 
            +
            1/27
         | 
| 1041 | 
            +
            2.30E-04
         | 
| 1042 | 
            +
            0.167320
         | 
| 1043 | 
            +
            1/16
         | 
| 1044 | 
            +
            1/64
         | 
| 1045 | 
            +
            4.09E-05
         | 
| 1046 | 
            +
            0.167553
         | 
| 1047 | 
            +
            1/25
         | 
| 1048 | 
            +
            1/125
         | 
| 1049 | 
            +
            1.07E-05
         | 
| 1050 | 
            +
            0.167590
         | 
| 1051 | 
            +
            1/36
         | 
| 1052 | 
            +
            1/216
         | 
| 1053 | 
            +
            3.59E-06
         | 
| 1054 | 
            +
            0.167599
         | 
| 1055 | 
            +
            Acknowledgements
         | 
| 1056 | 
            +
            The work of the first and second authors were partially funded by the
         | 
| 1057 | 
            +
            Science and Technology Development Fund, Macau SAR (Nos. 0070/2019/A2, 0031/2022/A1).
         | 
| 1058 | 
            +
            The third author was supported by the National Natural Science Foundation of China (Grant
         | 
| 1059 | 
            +
            No.
         | 
| 1060 | 
            +
            11901212). The third and fourth authors are also supported by the National Natural
         | 
| 1061 | 
            +
            Science Foundation of China (Grant No. 12071160).
         | 
| 1062 | 
            +
            References
         | 
| 1063 | 
            +
            [1]
         | 
| 1064 | 
            +
            Bi C J, Wang C, Lin Y P. A posteriori error estimates of two-grid finite element methods for nonlinear
         | 
| 1065 | 
            +
            elliptic problems. J Sci Comput, 2018, 74: 23–48
         | 
| 1066 | 
            +
            [2]
         | 
| 1067 | 
            +
            Ciarlet P G. The Finite Element Method for Elliptic Problems. Classics in Applied Mathematics, No. 40.
         | 
| 1068 | 
            +
            SIAM, Philadelphia, 2002
         | 
| 1069 | 
            +
            [3]
         | 
| 1070 | 
            +
            Gudi T, Nataraj N, Pani A. hp-discontinuous Galerkin methods for strongly nonlinear elliptic boundary
         | 
| 1071 | 
            +
            value problems. Numer Math, 2008, 109: 233–268
         | 
| 1072 | 
            +
            [4]
         | 
| 1073 | 
            +
            Thom´ee V, Xu J C, Zhang N Y. Superconvergence of the gradient in piecewise linear finite-element approx-
         | 
| 1074 | 
            +
            imation to a parabolic problem. SIAM J Numer Anal, 1989, 26: 553–573
         | 
| 1075 | 
            +
            [5]
         | 
| 1076 | 
            +
            Wei H Y, Huang Y Q. Fealpy: Finite element analysis library in python. https://github.com/weihuayi/
         | 
| 1077 | 
            +
            fealpy, Xiangtan University, 2017-2021
         | 
| 1078 | 
            +
            [6]
         | 
| 1079 | 
            +
            Xu J C. Iterative methods by SPD and small subspace solvers for nonsymmetric or indefinite problems. In:
         | 
| 1080 | 
            +
            Proceedings of the 5th International Symposium on Domain Decomposition Methods for Partial Differential
         | 
| 1081 | 
            +
             | 
| 1082 | 
            +
            14
         | 
| 1083 | 
            +
            Jiajun Zhan & et al.
         | 
| 1084 | 
            +
            Table 5: k = 2, r = 2
         | 
| 1085 | 
            +
            H
         | 
| 1086 | 
            +
            h
         | 
| 1087 | 
            +
            ∥u − u2
         | 
| 1088 | 
            +
            h∥1
         | 
| 1089 | 
            +
            ∥u − u2
         | 
| 1090 | 
            +
            h∥1 ∗ max{H4, h2}−1
         | 
| 1091 | 
            +
            1/8
         | 
| 1092 | 
            +
            1/64
         | 
| 1093 | 
            +
            4.09E-05
         | 
| 1094 | 
            +
            0.167552
         | 
| 1095 | 
            +
            1/9
         | 
| 1096 | 
            +
            1/81
         | 
| 1097 | 
            +
            2.55E-05
         | 
| 1098 | 
            +
            0.167571
         | 
| 1099 | 
            +
            1/10
         | 
| 1100 | 
            +
            1/100
         | 
| 1101 | 
            +
            1.68E-05
         | 
| 1102 | 
            +
            0.167582
         | 
| 1103 | 
            +
            1/11
         | 
| 1104 | 
            +
            1/121
         | 
| 1105 | 
            +
            1.14E-05
         | 
| 1106 | 
            +
            0.167589
         | 
| 1107 | 
            +
            1/12
         | 
| 1108 | 
            +
            1/144
         | 
| 1109 | 
            +
            8.08E-06
         | 
| 1110 | 
            +
            0.167593
         | 
| 1111 | 
            +
            Table 6: k = 3, r = 2
         | 
| 1112 | 
            +
            H
         | 
| 1113 | 
            +
            h
         | 
| 1114 | 
            +
            ∥u − u3
         | 
| 1115 | 
            +
            h∥1
         | 
| 1116 | 
            +
            ∥u − u3
         | 
| 1117 | 
            +
            h∥1 ∗ max{H5, h2}−1
         | 
| 1118 | 
            +
            1/5
         | 
| 1119 | 
            +
            1/55
         | 
| 1120 | 
            +
            5.54E-05
         | 
| 1121 | 
            +
            0.167534
         | 
| 1122 | 
            +
            1/6
         | 
| 1123 | 
            +
            1/90
         | 
| 1124 | 
            +
            2.07E-05
         | 
| 1125 | 
            +
            0.160874
         | 
| 1126 | 
            +
            1/7
         | 
| 1127 | 
            +
            1/126
         | 
| 1128 | 
            +
            1.06E-05
         | 
| 1129 | 
            +
            0.167590
         | 
| 1130 | 
            +
            1/8
         | 
| 1131 | 
            +
            1/184
         | 
| 1132 | 
            +
            4.95E-06
         | 
| 1133 | 
            +
            0.162211
         | 
| 1134 | 
            +
            1/9
         | 
| 1135 | 
            +
            1/243
         | 
| 1136 | 
            +
            2.84E-06
         | 
| 1137 | 
            +
            0.167600
         | 
| 1138 | 
            +
            Table 7: k = 1, r = 3
         | 
| 1139 | 
            +
            H
         | 
| 1140 | 
            +
            h
         | 
| 1141 | 
            +
            ∥u − u1
         | 
| 1142 | 
            +
            h∥1
         | 
| 1143 | 
            +
            ∥u − u1
         | 
| 1144 | 
            +
            h∥1 ∗ max{H4, h3}−1
         | 
| 1145 | 
            +
            1/8
         | 
| 1146 | 
            +
            1/16
         | 
| 1147 | 
            +
            1.83E-05
         | 
| 1148 | 
            +
            0.075054
         | 
| 1149 | 
            +
            1/27
         | 
| 1150 | 
            +
            1/81
         | 
| 1151 | 
            +
            1.40E-07
         | 
| 1152 | 
            +
            0.074662
         | 
| 1153 | 
            +
            1/64
         | 
| 1154 | 
            +
            1/256
         | 
| 1155 | 
            +
            4.44E-09
         | 
| 1156 | 
            +
            0.074543
         | 
| 1157 | 
            +
            Table 8: k = 2, r = 3
         | 
| 1158 | 
            +
            H
         | 
| 1159 | 
            +
            h
         | 
| 1160 | 
            +
            ∥u − u2
         | 
| 1161 | 
            +
            h∥1
         | 
| 1162 | 
            +
            ∥u − u2
         | 
| 1163 | 
            +
            h∥1 ∗ max{H5, h3}−1
         | 
| 1164 | 
            +
            1/8
         | 
| 1165 | 
            +
            1/32
         | 
| 1166 | 
            +
            2.28E-06
         | 
| 1167 | 
            +
            0.074870
         | 
| 1168 | 
            +
            1/9
         | 
| 1169 | 
            +
            1/36
         | 
| 1170 | 
            +
            1.60E-06
         | 
| 1171 | 
            +
            0.074838
         | 
| 1172 | 
            +
            1/10
         | 
| 1173 | 
            +
            1/40
         | 
| 1174 | 
            +
            1.17E-06
         | 
| 1175 | 
            +
            0.074810
         | 
| 1176 | 
            +
            1/11
         | 
| 1177 | 
            +
            1/55
         | 
| 1178 | 
            +
            4.49E-07
         | 
| 1179 | 
            +
            0.072343
         | 
| 1180 | 
            +
            1/12
         | 
| 1181 | 
            +
            1/60
         | 
| 1182 | 
            +
            3.46E-07
         | 
| 1183 | 
            +
            0.074716
         | 
| 1184 | 
            +
            Table 9: k = 3, r = 3
         | 
| 1185 | 
            +
            H
         | 
| 1186 | 
            +
            h
         | 
| 1187 | 
            +
            ∥u − u3
         | 
| 1188 | 
            +
            h∥1
         | 
| 1189 | 
            +
            ∥u − u3
         | 
| 1190 | 
            +
            h∥1 ∗ max{H6, h3}−1
         | 
| 1191 | 
            +
            1/8
         | 
| 1192 | 
            +
            1/64
         | 
| 1193 | 
            +
            2.85E-07
         | 
| 1194 | 
            +
            0.074703
         | 
| 1195 | 
            +
            1/9
         | 
| 1196 | 
            +
            1/81
         | 
| 1197 | 
            +
            1.40E-07
         | 
| 1198 | 
            +
            0.074662
         | 
| 1199 | 
            +
            1/10
         | 
| 1200 | 
            +
            1/100
         | 
| 1201 | 
            +
            7.46E-08
         | 
| 1202 | 
            +
            0.074630
         | 
| 1203 | 
            +
            1/11
         | 
| 1204 | 
            +
            1/121
         | 
| 1205 | 
            +
            4.21E-08
         | 
| 1206 | 
            +
            0.074606
         | 
| 1207 | 
            +
            1/12
         | 
| 1208 | 
            +
            1/144
         | 
| 1209 | 
            +
            2.50E-08
         | 
| 1210 | 
            +
            0.074588
         | 
| 1211 | 
            +
             | 
| 1212 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 1213 | 
            +
            15
         | 
| 1214 | 
            +
            Equations. Siam, Philadelphia, 1992, 106–118
         | 
| 1215 | 
            +
            [7]
         | 
| 1216 | 
            +
            Xu J C. A novel two-grid method for semilinear elliptic equations. SIAM J Sci Comput, 1994, 15: 231–237
         | 
| 1217 | 
            +
            [8]
         | 
| 1218 | 
            +
            Xu J C. Some two-grid finite element methods. In: Domain Decomposition Methods in Science and Engi-
         | 
| 1219 | 
            +
            neering (Quarteroni, Alfio and P´eriaux, Jacques and Kuznetsov, Yuri A and Widlund, Olof B eds). Contemp
         | 
| 1220 | 
            +
            Math, vol. 157, Amer Math Soc, 1994, 79–87
         | 
| 1221 | 
            +
            [9]
         | 
| 1222 | 
            +
            Xu J C. Two-grid discretization techniques for linear and nonlinear PDEs. SIAM J Numer Anal, 1996, 33:
         | 
| 1223 | 
            +
            1759–1777
         | 
| 1224 | 
            +
            [10]
         | 
| 1225 | 
            +
            Xu J C, Cai X C. A preconditioned GMRES method for nonsymmetric or indefinite problems. Math Comp,
         | 
| 1226 | 
            +
            1992, 59: 311–319
         | 
| 1227 | 
            +
            [11]
         | 
| 1228 | 
            +
            Zhang W F, Fan R H, Zhong L Q. Iterative two-grid methods for semilinear elliptic equations. Comput
         | 
| 1229 | 
            +
            Math Appl, 2020, 80: 522–530
         | 
| 1230 | 
            +
            Appendix A
         | 
| 1231 | 
            +
            The purpose of this appendix is to provide the proof of Lemma A.1.
         | 
| 1232 | 
            +
            Lemma A.1
         | 
| 1233 | 
            +
            Assume ek
         | 
| 1234 | 
            +
            H is given in (3.4) and ∥Ek∥1,∞ ≲ | log h|H2, when H is small enough, it holds that
         | 
| 1235 | 
            +
            ∥ek
         | 
| 1236 | 
            +
            H∥1,∞ ≲ H.
         | 
| 1237 | 
            +
            (A.1)
         | 
| 1238 | 
            +
            Before we present the proof of Lemma A.1, we need to introduce some preliminaries and lemmas.
         | 
| 1239 | 
            +
            For the finite element solution uh of (2.5), we introduce a projection operator ˆPH : H1
         | 
| 1240 | 
            +
            0(Ω) → VH, which be
         | 
| 1241 | 
            +
            defined by,
         | 
| 1242 | 
            +
            B(uh; ˆPHw, vH) = B(uh; w, vH),
         | 
| 1243 | 
            +
            ∀w ∈ H1
         | 
| 1244 | 
            +
            0(Ω), vH ∈ VH.
         | 
| 1245 | 
            +
            (A.2)
         | 
| 1246 | 
            +
            It’s easy to derive that ˆPH is well-defined by the BB-conditions of form B(uh; ·, ·) which could be obtained by
         | 
| 1247 | 
            +
            Remark 4.3. Furthermore, the projection operator ˆPH satisfies the following estimate
         | 
| 1248 | 
            +
            ∥ ˆPHw∥1,∞ ≲ | log H|∥w∥1,∞,
         | 
| 1249 | 
            +
            ∀w ∈ W 1,∞(Ω).
         | 
| 1250 | 
            +
            (A.3)
         | 
| 1251 | 
            +
            In fact, taking vH = ˆPHw in (4.11), and using (A.2), (3.1), Remark 2.1, H¨older inequality and (4.13), we obtain
         | 
| 1252 | 
            +
            ∂ ˆPHw(x)
         | 
| 1253 | 
            +
            =
         | 
| 1254 | 
            +
            B(uh; ˆPHw, gx
         | 
| 1255 | 
            +
            H)
         | 
| 1256 | 
            +
            =
         | 
| 1257 | 
            +
            B(uh; w, gx
         | 
| 1258 | 
            +
            H)
         | 
| 1259 | 
            +
            =
         | 
| 1260 | 
            +
            (ay(uh)w, ∇gx
         | 
| 1261 | 
            +
            H) + (az(uh)∇w, ∇gx
         | 
| 1262 | 
            +
            H) + (fy(uh)w, gx
         | 
| 1263 | 
            +
            H) + (fz(uh)∇w, gx
         | 
| 1264 | 
            +
            H)
         | 
| 1265 | 
            +
            ≲
         | 
| 1266 | 
            +
            ∥w∥1,∞∥gx
         | 
| 1267 | 
            +
            H∥1,1
         | 
| 1268 | 
            +
            ≲
         | 
| 1269 | 
            +
            | log H|∥w∥1,∞.
         | 
| 1270 | 
            +
            Finally using of the arbitrariness of x and (4.14), we could obtain (A.3).
         | 
| 1271 | 
            +
            By Taylor expansion, we have (the detailed proof can be found in Lemma 3.1 of [9])
         | 
| 1272 | 
            +
            A(w, χ) = A(v, χ) + B(v; w − v, χ) + R(η; v, w, χ),
         | 
| 1273 | 
            +
            ∀w, v, χ ∈ H1
         | 
| 1274 | 
            +
            0(Ω),
         | 
| 1275 | 
            +
            (A.4)
         | 
| 1276 | 
            +
            where the forms A(·, ·) and B(·; ·, ·) are given by (2.2) and (3.1), respectively, η = v + t(w − v) and
         | 
| 1277 | 
            +
            R(η; v, w, χ)
         | 
| 1278 | 
            +
            =
         | 
| 1279 | 
            +
            � 1
         | 
| 1280 | 
            +
            0
         | 
| 1281 | 
            +
            �
         | 
| 1282 | 
            +
            (ayy(η)(v − w)2, ∇χ) + 2(ayz(η)∇(v − w)(v − w), ∇χ)
         | 
| 1283 | 
            +
            +(∇(v − w)T azz(η)∇(v − w), ∇χ) + (fyy(η)(v − w)2, χ)
         | 
| 1284 | 
            +
            +2(fyz(η) · ∇(v − w)(v − w), χ) + (∇(v − w)T fzz(η)∇(v − w), χ)
         | 
| 1285 | 
            +
            �
         | 
| 1286 | 
            +
            (1 − t)dt.
         | 
| 1287 | 
            +
            For the proof of Lemma A.1, we introduce a operator Φ as follow. Assume uh is the solution of (2.5), Ek,
         | 
| 1288 | 
            +
            R, uk
         | 
| 1289 | 
            +
            h are given in (4.9), (A.4) and Algorithm 3.2, respectively, we defined operator Φ : VH → VH by, for any
         | 
| 1290 | 
            +
            wH ∈ VH,
         | 
| 1291 | 
            +
            B(uh; Φ(wH), vH) = B(uh; Ek, vH) − R(uh + t(wH − Ek); uh, uk
         | 
| 1292 | 
            +
            h + wH, vH),
         | 
| 1293 | 
            +
            ∀vH ∈ VH.
         | 
| 1294 | 
            +
            (A.5)
         | 
| 1295 | 
            +
            By the BB-conditions of form B(uh; ·, ·) (See Remark 4.3), it’s easy to prove that operator Φ is well-defined.
         | 
| 1296 | 
            +
            We define a space
         | 
| 1297 | 
            +
            QH = {vH ∈ VH : ∥vH − ˆPHEk∥1,∞ ⩽ H},
         | 
| 1298 | 
            +
            (A.6)
         | 
| 1299 | 
            +
            where ˆPH is a projection operator defined by (A.2). Since QH is a finite dimensional space, it’s easy to see that
         | 
| 1300 | 
            +
            QH is a non-empty compact convex subset.
         | 
| 1301 | 
            +
            Next, we will use Brouwer fixed point theorem to prove that (A.5) has a fixed point ¯wH in QH.
         | 
| 1302 | 
            +
            Lemma A.2
         | 
| 1303 | 
            +
            Assume ∥Ek∥1,∞ ≲ | log h|H2, then when H is small enough, we have Φ(QH) ⊂ QH.
         | 
| 1304 | 
            +
             | 
| 1305 | 
            +
            16
         | 
| 1306 | 
            +
            Jiajun Zhan & et al.
         | 
| 1307 | 
            +
            Proof.
         | 
| 1308 | 
            +
            For any wH ∈ QH, vH ∈ VH, rewriting (A.5) with (A.2), we have
         | 
| 1309 | 
            +
            B(uh; Φ(wH) − ˆPHEk, vH) = −R(uh + t(wH − Ek); uh, uk
         | 
| 1310 | 
            +
            h + wH, vH).
         | 
| 1311 | 
            +
            (A.7)
         | 
| 1312 | 
            +
            Substituting vH = Φ(wH) − ˆPHEk into (4.11) and using (A.7), Remark 2.1, H¨older inequality, (4.9), triangle
         | 
| 1313 | 
            +
            inequality, (4.13), (A.3), (A.6) and ∥Ek∥1,∞ ≲ | log h|H2, it is obtained that
         | 
| 1314 | 
            +
            ∂(Φ(wH) − ˆPHEk)(x)
         | 
| 1315 | 
            +
            =
         | 
| 1316 | 
            +
            B(uh; Φ(wH) − ˆPHEk, gx
         | 
| 1317 | 
            +
            H)
         | 
| 1318 | 
            +
            =
         | 
| 1319 | 
            +
            −R(uh + t(wH − Ek); uh, uk
         | 
| 1320 | 
            +
            h + wH, gx
         | 
| 1321 | 
            +
            H)
         | 
| 1322 | 
            +
            ≲
         | 
| 1323 | 
            +
            ∥Ek − wH∥2
         | 
| 1324 | 
            +
            1,∞∥gx
         | 
| 1325 | 
            +
            H∥1,1
         | 
| 1326 | 
            +
            ≲
         | 
| 1327 | 
            +
            (∥Ek − ˆPHEk∥2
         | 
| 1328 | 
            +
            1,∞ + ∥ ˆPHEk − wH∥2
         | 
| 1329 | 
            +
            1,∞)| log H|
         | 
| 1330 | 
            +
            ≲
         | 
| 1331 | 
            +
            ((1 + | log H|)2∥Ek∥2
         | 
| 1332 | 
            +
            1,∞ + H2)| log H|
         | 
| 1333 | 
            +
            ≲
         | 
| 1334 | 
            +
            ((1 + | log H|)2| log h|2H4 + H2)| log H|.
         | 
| 1335 | 
            +
            Further using the arbitrariness of x and (4.14), the proof is finished.
         | 
| 1336 | 
            +
            Lemma A.3
         | 
| 1337 | 
            +
            Assume ∥Ek∥1,∞ ≲ | log h|H2, then the operator Φ is continuous in VH.
         | 
| 1338 | 
            +
            Proof.
         | 
| 1339 | 
            +
            For any w1, w2 ∈ QH, by (A.5), we have
         | 
| 1340 | 
            +
            B(uh; Φ(w1) − Φ(w2), vH)
         | 
| 1341 | 
            +
            =
         | 
| 1342 | 
            +
            R(uh + t(w2 − Ek); uh, uk
         | 
| 1343 | 
            +
            h + w2, vH)
         | 
| 1344 | 
            +
            −R(uh + t(w1 − Ek); uh, uk
         | 
| 1345 | 
            +
            h + w1, vH).
         | 
| 1346 | 
            +
            (A.8)
         | 
| 1347 | 
            +
            Noticing that the definition of R in (A.4), for the terms concerning ayy on the right hand side of (A.8), we can
         | 
| 1348 | 
            +
            use Remark 2.1 and H¨older inequality to obtain that
         | 
| 1349 | 
            +
            (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH) − (ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
         | 
| 1350 | 
            +
            =
         | 
| 1351 | 
            +
            (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH)
         | 
| 1352 | 
            +
            −(ayy(uh + t(w1 − Ek))(Ek − w2)2, ∇vH)
         | 
| 1353 | 
            +
            +(ayy(uh + t(w1 − Ek))(Ek − w2)2, ∇vH)
         | 
| 1354 | 
            +
            −(ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
         | 
| 1355 | 
            +
            =
         | 
| 1356 | 
            +
            ([ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))] (Ek − w2)2, ∇vH)
         | 
| 1357 | 
            +
            +(ayy(uh + t(w1 − Ek))
         | 
| 1358 | 
            +
            �
         | 
| 1359 | 
            +
            −2Ekw2 + w2
         | 
| 1360 | 
            +
            2 + 2Ekw1 − w2
         | 
| 1361 | 
            +
            1
         | 
| 1362 | 
            +
            �
         | 
| 1363 | 
            +
            , ∇vH)
         | 
| 1364 | 
            +
            =
         | 
| 1365 | 
            +
            ([ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))] (Ek − w2)2, ∇vH)
         | 
| 1366 | 
            +
            +(ayy(uh + t(w1 − Ek)) (2Ek − w1 − w2) (w1 − w2), ∇vH)
         | 
| 1367 | 
            +
            ≲
         | 
| 1368 | 
            +
            ∥ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))∥0,∞∥(Ek − w2)2∥0∥vH∥1
         | 
| 1369 | 
            +
            +∥2Ek − w1 − w2∥0∥w1 − w2∥0,∞∥vH∥1.
         | 
| 1370 | 
            +
            (A.9)
         | 
| 1371 | 
            +
            For ∥(Ek − w2)2∥0, we use triangle inequality, (A.3), (A.6) and ∥Ek∥1,∞ ≲ | log h|H2, it’s obtained that
         | 
| 1372 | 
            +
            ∥(Ek − w2)2∥0
         | 
| 1373 | 
            +
            ⩽
         | 
| 1374 | 
            +
            ∥Ek − w2∥2
         | 
| 1375 | 
            +
            1,∞
         | 
| 1376 | 
            +
            ≲
         | 
| 1377 | 
            +
            ∥Ek∥2
         | 
| 1378 | 
            +
            1,∞ + ∥ ˆPHEk∥2
         | 
| 1379 | 
            +
            1,∞ + ∥ ˆPHEk − w2∥2
         | 
| 1380 | 
            +
            1,∞
         | 
| 1381 | 
            +
            ≲
         | 
| 1382 | 
            +
            ∥Ek∥2
         | 
| 1383 | 
            +
            1,∞ + | log H|2∥Ek∥2
         | 
| 1384 | 
            +
            1,∞ + H2
         | 
| 1385 | 
            +
            ≲
         | 
| 1386 | 
            +
            | log h|2H4 + | log H|2| log h|2H4 + H2
         | 
| 1387 | 
            +
            :=
         | 
| 1388 | 
            +
            C1(H),
         | 
| 1389 | 
            +
            (A.10)
         | 
| 1390 | 
            +
            where C1(H) is a constant depending on H.
         | 
| 1391 | 
            +
            Similarly, for ∥2Ek − w1 − w2∥0, there also exists a constant C2(H) such that
         | 
| 1392 | 
            +
            ∥2Ek − w1 − w2∥0 ≲ C2(H).
         | 
| 1393 | 
            +
            (A.11)
         | 
| 1394 | 
            +
            Substituting (A.10) and (A.11) into (A.9), it’s could be obtained that
         | 
| 1395 | 
            +
            (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH) − (ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
         | 
| 1396 | 
            +
            ≲
         | 
| 1397 | 
            +
            C(H)
         | 
| 1398 | 
            +
            �
         | 
| 1399 | 
            +
            ∥ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))∥0,∞
         | 
| 1400 | 
            +
            +∥w1 − w2∥0,∞
         | 
| 1401 | 
            +
            �
         | 
| 1402 | 
            +
            ∥vH∥1,
         | 
| 1403 | 
            +
            where C(H) = max{C1(H), C2(H)} .
         | 
| 1404 | 
            +
            The rest of the items on the right hand side of (A.8) have similar
         | 
| 1405 | 
            +
            results, and here is omitted.
         | 
| 1406 | 
            +
            The conclusion follows from the above discussion, (A.8), the BB-conditions of
         | 
| 1407 | 
            +
             | 
| 1408 | 
            +
            An iterative two-grid method for strongly nonlinear elliptic boundary value problems
         | 
| 1409 | 
            +
            17
         | 
| 1410 | 
            +
            form B(uh; ·, ·) (See Remark 4.3) and the continuity of second order derivatives of a(·, ·, ·) and f(·, ·, ·) (See the
         | 
| 1411 | 
            +
            assumptions about a(·, ·, ·) and f(·, ·, ·) in Section 2).
         | 
| 1412 | 
            +
            At last, we present the proof of Lemma A.1 by Brouwer fixed point theorem.
         | 
| 1413 | 
            +
            Proof of Lemma A.1.
         | 
| 1414 | 
            +
            Making use of Lemmas A.2 and A.3 and Brouwer fixed point theorem, we know that
         | 
| 1415 | 
            +
            (A.5) exists a fixed point ¯wH in QH.
         | 
| 1416 | 
            +
            Taking w = uk
         | 
| 1417 | 
            +
            h + ¯wH, v = uh and χ = vH into (A.4), and then using (2.5) with VH ⊂ Vh, Remark 3.1,
         | 
| 1418 | 
            +
            (4.9), ¯wH = Φ( ¯wH) and (A.5), we obtain that
         | 
| 1419 | 
            +
            A(uk
         | 
| 1420 | 
            +
            h + ¯wH, vH)
         | 
| 1421 | 
            +
            =
         | 
| 1422 | 
            +
            A(uh, vH) + B(uh; uk
         | 
| 1423 | 
            +
            h + ¯wH − uh, vH) + R(η; uh, uk
         | 
| 1424 | 
            +
            h + ¯wH, vH)
         | 
| 1425 | 
            +
            =
         | 
| 1426 | 
            +
            B(uh; ¯wH, vH) − B(uh; Ek, vH) + R(η; uh, uk
         | 
| 1427 | 
            +
            h + ¯wH, vH)
         | 
| 1428 | 
            +
            =
         | 
| 1429 | 
            +
            B(uh; Φ( ¯wH), vH) − B(uh; Ek, vH) + R(η; uh, uk
         | 
| 1430 | 
            +
            h + ¯wH, vH)
         | 
| 1431 | 
            +
            =
         | 
| 1432 | 
            +
            0,
         | 
| 1433 | 
            +
            (A.12)
         | 
| 1434 | 
            +
            where η = uh + t( ¯wH − Ek). By the uniqueness of finite element solution (See Lemma 2.2), (3.4) and (A.12),
         | 
| 1435 | 
            +
            we can see that ¯wH = ek
         | 
| 1436 | 
            +
            H, which implies ek
         | 
| 1437 | 
            +
            H ∈ QH.
         | 
| 1438 | 
            +
            At last, using triangle inequality, (A.6), (A.3) and ∥Ek∥1,∞ ≲ | log h|H2, we obtain
         | 
| 1439 | 
            +
            ∥ek
         | 
| 1440 | 
            +
            H∥1,∞
         | 
| 1441 | 
            +
            ⩽
         | 
| 1442 | 
            +
            ∥ek
         | 
| 1443 | 
            +
            H − ˆPHEk∥1,∞ + ∥ ˆPHEk∥1,∞
         | 
| 1444 | 
            +
            ≲
         | 
| 1445 | 
            +
            H + | log H|∥Ek∥1,∞
         | 
| 1446 | 
            +
            ≲
         | 
| 1447 | 
            +
            H + | log H|| log h|H2,
         | 
| 1448 | 
            +
            which completes the proof.
         | 
| 1449 | 
            +
             | 
    	
        AtE1T4oBgHgl3EQfDQOp/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        DdAzT4oBgHgl3EQfif0c/vector_store/index.pkl
    ADDED
    
    | @@ -0,0 +1,3 @@ | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            version https://git-lfs.github.com/spec/v1
         | 
| 2 | 
            +
            oid sha256:c11ae16beb401dfd6c2dd54589e229d3e5be68e94f672cfbdb9460089c6eefb2
         | 
| 3 | 
            +
            size 199820
         | 
    	
        F9AzT4oBgHgl3EQfi_2P/content/tmp_files/2301.01509v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1201 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            Magnetization dynamics with time-dependent spin-density functional theory:
         | 
| 2 | 
            +
            significance of exchange-correlation torques
         | 
| 3 | 
            +
            Daniel Hill, Justin Shotton, and Carsten A. Ullrich∗
         | 
| 4 | 
            +
            Department of Physics and Astronomy, University of Missouri, Columbia, Missouri 65211, USA
         | 
| 5 | 
            +
            (Dated: January 5, 2023)
         | 
| 6 | 
            +
            In spin-density-functional theory (SDFT) for noncollinear magnetic materials, the Kohn-Sham
         | 
| 7 | 
            +
            system features exchange-correlation (xc) scalar potentials and magnetic fields. The significance of
         | 
| 8 | 
            +
            the xc magnetic fields is not very well explored; in particular, they can give rise to local torques
         | 
| 9 | 
            +
            on the magnetization, which are absent in standard local and semilocal approximations.
         | 
| 10 | 
            +
            Exact
         | 
| 11 | 
            +
            benchmark solutions for a five-site extended Hubbard lattice at half filling and in the presence of
         | 
| 12 | 
            +
            spin-orbit coupling are compared with SDFT results obtained using orbital-dependent exchange-
         | 
| 13 | 
            +
            only approximations. The magnetization dynamics following short-pulse excitations is found to be
         | 
| 14 | 
            +
            reasonably well described in the exchange-only approximation for weak to moderate interactions.
         | 
| 15 | 
            +
            For stronger interactions and near transitions between magnetically ordered and frustrated phases,
         | 
| 16 | 
            +
            exchange and correlation torques tend to compensate each other and must both be accounted for.
         | 
| 17 | 
            +
            I.
         | 
| 18 | 
            +
            INTRODUCTION
         | 
| 19 | 
            +
            Spin dynamics in magnetic systems is a research area
         | 
| 20 | 
            +
            of much current activity. Spintronics [1], which is con-
         | 
| 21 | 
            +
            cerned with the manipulation of electronic spins, spin
         | 
| 22 | 
            +
            currents, spin textures, and spin excitations, has created
         | 
| 23 | 
            +
            a wealth of scientific knowledge and many avenues for
         | 
| 24 | 
            +
            new technologies.
         | 
| 25 | 
            +
            Prominent examples are spin waves
         | 
| 26 | 
            +
            for encoding and transmitting information (magnonics)
         | 
| 27 | 
            +
            [2, 3], skyrmions for magnetic information storage [4–
         | 
| 28 | 
            +
            8], and single-spin qubits for quantum computation [9].
         | 
| 29 | 
            +
            Another related area of much interest is ultrafast demag-
         | 
| 30 | 
            +
            netization induced by femtosecond laser pulses [10–14].
         | 
| 31 | 
            +
            Computational approaches to simulate magnetization
         | 
| 32 | 
            +
            dynamics in a wide variety of systems are typically based
         | 
| 33 | 
            +
            on the Landau-Lifshitz-Gilbert (LLG) equation of motion
         | 
| 34 | 
            +
            [15, 16]. The LLG equation provides a classical descrip-
         | 
| 35 | 
            +
            tion of the time evolution of the magnetization vector
         | 
| 36 | 
            +
            m(t) in response to a time-dependent perturbation (typ-
         | 
| 37 | 
            +
            ically, a short pulse or a periodic driving field) or evolving
         | 
| 38 | 
            +
            from a nonequilibrium initial state.
         | 
| 39 | 
            +
            Materials proper-
         | 
| 40 | 
            +
            ties such as anisotropy, deformations, strain, and various
         | 
| 41 | 
            +
            forms of damping can be built into the LLG approach
         | 
| 42 | 
            +
            via phenomenological or “second-principles” parameters.
         | 
| 43 | 
            +
            In this paper, we are less concerned with these spe-
         | 
| 44 | 
            +
            cific materials properties; instead of LLG we will use a
         | 
| 45 | 
            +
            fully quantum mechanical description of the electronic
         | 
| 46 | 
            +
            charge and spin degrees of freedom, and our focus will
         | 
| 47 | 
            +
            be specifically on the impact of electron-electron interac-
         | 
| 48 | 
            +
            tions on the magnetization dynamics. To be more clear,
         | 
| 49 | 
            +
            we consider a system of N interacting electrons under
         | 
| 50 | 
            +
            the influence of a time-dependent scalar potential V (r, t)
         | 
| 51 | 
            +
            and a time-dependent magnetic field B(r, t) which cou-
         | 
| 52 | 
            +
            ples only to the electron spin (and not to orbital motion).
         | 
| 53 | |
| 54 | 
            +
            The associated many-body Hamiltonian is given by
         | 
| 55 | 
            +
            ˆH =
         | 
| 56 | 
            +
            N
         | 
| 57 | 
            +
            �
         | 
| 58 | 
            +
            j
         | 
| 59 | 
            +
            �
         | 
| 60 | 
            +
            −∇2
         | 
| 61 | 
            +
            j
         | 
| 62 | 
            +
            2 + V (rj, t) + σj · B(rj, t)
         | 
| 63 | 
            +
            �
         | 
| 64 | 
            +
            + 1
         | 
| 65 | 
            +
            2
         | 
| 66 | 
            +
            N
         | 
| 67 | 
            +
            �
         | 
| 68 | 
            +
            j̸=k
         | 
| 69 | 
            +
            1
         | 
| 70 | 
            +
            |rj − rk| ,
         | 
| 71 | 
            +
            (1)
         | 
| 72 | 
            +
            where σj is the vector of Pauli matrices acting on the
         | 
| 73 | 
            +
            spin of the jth electron, and we define the magnetic field
         | 
| 74 | 
            +
            strength such that the Bohr magneton, µB = e¯h/2m,
         | 
| 75 | 
            +
            does not explicitly appear in the Hamiltonian ˆH.
         | 
| 76 | 
            +
            We
         | 
| 77 | 
            +
            use atomic units (e = m = ¯h = 4πϵ0 = 1) throughout.
         | 
| 78 | 
            +
            From the Heisenberg equation of motion for ˆH, Capelle
         | 
| 79 | 
            +
            et al. showed that the magnetization has the following
         | 
| 80 | 
            +
            time evolution [17]:
         | 
| 81 | 
            +
            dm(r, t)
         | 
| 82 | 
            +
            dt
         | 
| 83 | 
            +
            + ˆ∇ · J(r, t) = m(r, t) × B(r, t) ,
         | 
| 84 | 
            +
            (2)
         | 
| 85 | 
            +
            where J(r, t) is the spin-current tensor. Equation (2) is
         | 
| 86 | 
            +
            exact but not very helpful in practice since J(r, t) re-
         | 
| 87 | 
            +
            quires the many-body wave function associated with ˆH.
         | 
| 88 | 
            +
            A more practical (but still in principle exact) alternative
         | 
| 89 | 
            +
            is time-dependent spin-density functional theory (TD-
         | 
| 90 | 
            +
            SDFT). The idea of TD-SDFT is to consider an auxiliary
         | 
| 91 | 
            +
            system of noninteracting fermions, acted upon by an “ef-
         | 
| 92 | 
            +
            fective” scalar potential and magnetic field, Veff(r, t) and
         | 
| 93 | 
            +
            Beff(r, t), such that the same density n(r, t) and magne-
         | 
| 94 | 
            +
            tization m(r, t) are produced as in the physical system.
         | 
| 95 | 
            +
            The resulting equation of motion, the TD-SDFT coun-
         | 
| 96 | 
            +
            terpart to Eq. (2), is [17]
         | 
| 97 | 
            +
            dm(r, t)
         | 
| 98 | 
            +
            dt
         | 
| 99 | 
            +
            + ˆ∇ · JKS(r, t) = m(r, t) × Beff(r, t) .
         | 
| 100 | 
            +
            (3)
         | 
| 101 | 
            +
            Here, JKS(r, t) is the Kohn-Sham spin-current tensor,
         | 
| 102 | 
            +
            which is easily determined from the noninteracting wave
         | 
| 103 | 
            +
            function, and the effective magnetic field is defined as
         | 
| 104 | 
            +
            Beff(r, t) = B(r, t) + Bxc(r, t), where the exchange-
         | 
| 105 | 
            +
            correlation (xc) magnetic field Bxc is a functional of the
         | 
| 106 | 
            +
            arXiv:2301.01509v1  [cond-mat.str-el]  4 Jan 2023
         | 
| 107 | 
            +
             | 
| 108 | 
            +
            2
         | 
| 109 | 
            +
            density and magnetization. Formally, m(r, t) is the same
         | 
| 110 | 
            +
            in Eqs. (2) and (3), but J and JKS are in general dif-
         | 
| 111 | 
            +
            ferent (the difference lies in the transverse component).
         | 
| 112 | 
            +
            Thus, the so-called xc torque,
         | 
| 113 | 
            +
            τxc(r, t) = m(r, t) × Bxc(r, t) ,
         | 
| 114 | 
            +
            (4)
         | 
| 115 | 
            +
            ensures that TD-SDFT produces the correct magnetiza-
         | 
| 116 | 
            +
            tion dynamics [17].
         | 
| 117 | 
            +
            While all of this is clear at the formal level, the ex-
         | 
| 118 | 
            +
            act form of Bxc is unknown and must be approximated
         | 
| 119 | 
            +
            in practice. This immediately raises several questions:
         | 
| 120 | 
            +
            which approximations of Bxc are available, and do they
         | 
| 121 | 
            +
            produce xc torques?
         | 
| 122 | 
            +
            And, how important are the xc
         | 
| 123 | 
            +
            torques for the magnetization dynamics?
         | 
| 124 | 
            +
            A number of approximations for Bxc have been derived
         | 
| 125 | 
            +
            within ground-state SDFT for noncollinear magnetism
         | 
| 126 | 
            +
            [18–20]; via the adiabatic approximation, they immedi-
         | 
| 127 | 
            +
            ately carry over to TD-SDFT. The most widely used ap-
         | 
| 128 | 
            +
            proach, pioneered by K¨ubler et al. [21, 22] and imple-
         | 
| 129 | 
            +
            mented in many popular electronic structure codes, is
         | 
| 130 | 
            +
            to use standard local or semilocal xc functionals such as
         | 
| 131 | 
            +
            the local spin-density approximation (LSDA) or general-
         | 
| 132 | 
            +
            ized gradient approximations (GGAs), and assume a lo-
         | 
| 133 | 
            +
            cal spin quantization axis which is aligned with the local
         | 
| 134 | 
            +
            magnetization vector m(r, t); this produces a Bxc(r, t)
         | 
| 135 | 
            +
            that is parallel to m(r, t) everywhere. We see right away
         | 
| 136 | 
            +
            from Eq. (4) that this class of approximations does not
         | 
| 137 | 
            +
            produce any xc torques.
         | 
| 138 | 
            +
            Approximations for Bxc that do include xc torque ef-
         | 
| 139 | 
            +
            fects can be constructed in several ways.
         | 
| 140 | 
            +
            Existing lo-
         | 
| 141 | 
            +
            cal and semilocal functionals (LSDA and GGAs) have
         | 
| 142 | 
            +
            been modified [23–26] or used in a source-free construc-
         | 
| 143 | 
            +
            tion [27], and new gradient-corrected functionals were
         | 
| 144 | 
            +
            constructed based using the spin-spiral state of the elec-
         | 
| 145 | 
            +
            tron gas as reference system [28–30].
         | 
| 146 | 
            +
            More consistent
         | 
| 147 | 
            +
            derivations of xc meta-GGAs, starting from noncollinear
         | 
| 148 | 
            +
            generalizations of the exchange hole and the two-body
         | 
| 149 | 
            +
            density matrix, were recently presented [31, 32]. Vari-
         | 
| 150 | 
            +
            ous orbital-dependent functionals were generalized to the
         | 
| 151 | 
            +
            case of noncollinear magnetization [33–35].
         | 
| 152 | 
            +
            Existing applications of ground-state SDFT to non-
         | 
| 153 | 
            +
            collinear magnetic materials [25, 26, 33] and model sys-
         | 
| 154 | 
            +
            tems [36] seem to suggest that xc torques are of relatively
         | 
| 155 | 
            +
            minor importance for magnetic structure and energetics,
         | 
| 156 | 
            +
            although the torques themselves may not be insignificant
         | 
| 157 | 
            +
            [32]. On the other hand, there are good reasons to expect
         | 
| 158 | 
            +
            that xc torques will be more impactful for magnetization
         | 
| 159 | 
            +
            dynamics: they explicitly appear in the equation of mo-
         | 
| 160 | 
            +
            tion, Eq. (3), and even if τxc(r, t) is relatively small at
         | 
| 161 | 
            +
            a given r and t, its effect can accumulate over time. So
         | 
| 162 | 
            +
            far, however, there has been no systematic attempt to
         | 
| 163 | 
            +
            assess this hypothesis. We are only aware of one study
         | 
| 164 | 
            +
            in the literature, where Dewhurst et al. [37] used their
         | 
| 165 | 
            +
            source-free Bxc functional to simulate laser-induced spin
         | 
| 166 | 
            +
            dynamics in bulk Co and Ni and Co-Pt and Ni-Pt inter-
         | 
| 167 | 
            +
            faces. They found that xc torques were significant only
         | 
| 168 | 
            +
            if they are not overshadowed by magnetic anisotropy ef-
         | 
| 169 | 
            +
            fects (i.e., in bulk, and not at interfaces), and that they
         | 
| 170 | 
            +
            FIG. 1.
         | 
| 171 | 
            +
            Geometry of the 5-site Hubbard cluster used in
         | 
| 172 | 
            +
            this work. The arrows indicate the ordering of the nearest-
         | 
| 173 | 
            +
            neighbor sum in Eq. (6), accounting for the directional hop-
         | 
| 174 | 
            +
            ping due to SOC.
         | 
| 175 | 
            +
            give rise to rather slow spin rotation compared to other
         | 
| 176 | 
            +
            forms of spin dynamics, induced optically or via spin-
         | 
| 177 | 
            +
            orbit coupling (SOC).
         | 
| 178 | 
            +
            In this paper, our goal is to assess the importance of
         | 
| 179 | 
            +
            xc torques in frustrated magnetic systems.
         | 
| 180 | 
            +
            Exchange-
         | 
| 181 | 
            +
            frustrated solids such as spin glasses and kagome antifer-
         | 
| 182 | 
            +
            romagnetic lattices are characterized by many competing
         | 
| 183 | 
            +
            noncollinear spin configurations and quantum spin liquid
         | 
| 184 | 
            +
            phases [38–40], and may therefore exhibit an enhanced
         | 
| 185 | 
            +
            sensitivity to subtle xc torque effects. Needless to say, ex-
         | 
| 186 | 
            +
            tended spin frustrated solids are challenging to describe,
         | 
| 187 | 
            +
            and exact or quasi-exact benchmark results are hard to
         | 
| 188 | 
            +
            come by. We will therefore limit ourselves to small model
         | 
| 189 | 
            +
            systems which capture the spirit of spin frustration and
         | 
| 190 | 
            +
            yet are computationally manageable.
         | 
| 191 | 
            +
            Here, we will consider small Hubbard-type model
         | 
| 192 | 
            +
            systems along similar lines as in our earlier studies
         | 
| 193 | 
            +
            [35, 36, 41]; by including SOC we can generate intrin-
         | 
| 194 | 
            +
            sically noncollinear ground states. In particular, we will
         | 
| 195 | 
            +
            focus on a five-site half-filled Hubbard bowtie as a mini-
         | 
| 196 | 
            +
            mal model for studying xc torque effects in the presence
         | 
| 197 | 
            +
            of magnetic frustration. We will generate both exact and
         | 
| 198 | 
            +
            SDFT phase diagrams of spin configurations for this sys-
         | 
| 199 | 
            +
            tem and explore the spin dynamics for different config-
         | 
| 200 | 
            +
            urations in the phase diagram.
         | 
| 201 | 
            +
            The TD-SDFT treat-
         | 
| 202 | 
            +
            ment will be based on orbital-dependent exchange-only
         | 
| 203 | 
            +
            functionals, and we will compare with exact solutions
         | 
| 204 | 
            +
            of the many-body time-dependent Schr¨odinger equation.
         | 
| 205 | 
            +
            Focusing on a few representative case studies, we will
         | 
| 206 | 
            +
            gain insight into the significance of xc torques in differ-
         | 
| 207 | 
            +
            ent regimes.
         | 
| 208 | 
            +
            The paper is organized as follows. In Sec. II the ex-
         | 
| 209 | 
            +
            tended Hubbard model and the SDFT framework are in-
         | 
| 210 | 
            +
            troduced and the exact and SDFT magnetic phase dia-
         | 
| 211 | 
            +
            grams are discussed. In Sec. III we describe some techni-
         | 
| 212 | 
            +
            cal aspects of the TD-SDFT modeling such as the choice
         | 
| 213 | 
            +
            of initial state.
         | 
| 214 | 
            +
            In Sec. IV the results of exact diago-
         | 
| 215 | 
            +
            nalization and SDFT models are compared for the cases
         | 
| 216 | 
            +
            with moderate to strong correlations and non-local inter-
         | 
| 217 | 
            +
            actions. Conclusions are given in Sec. V.
         | 
| 218 | 
            +
             | 
| 219 | 
            +
            2
         | 
| 220 | 
            +
            4
         | 
| 221 | 
            +
            3
         | 
| 222 | 
            +
            53
         | 
| 223 | 
            +
            II.
         | 
| 224 | 
            +
            EXACT AND SDFT MAGNETIC
         | 
| 225 | 
            +
            STRUCTURE OF HUBBARD CLUSTERS
         | 
| 226 | 
            +
            A.
         | 
| 227 | 
            +
            Definition of the model
         | 
| 228 | 
            +
            In this paper we limit ourselves to (TD-)SDFT in the
         | 
| 229 | 
            +
            exchange-only approximation. As discussed earlier [36],
         | 
| 230 | 
            +
            the standard Hubbard model with on-site interactions
         | 
| 231 | 
            +
            does not give rise to any exchange torques. If one wishes
         | 
| 232 | 
            +
            to study exchange torque effects it is necessary to work
         | 
| 233 | 
            +
            with an extended Hubbard model instead. We will con-
         | 
| 234 | 
            +
            sider, in the following, a half-filled 5-site Hubbard cluster
         | 
| 235 | 
            +
            in a bowtie shape, as shown in Fig. 1. Here, we go be-
         | 
| 236 | 
            +
            yond Ref. [36] and include SOC through a modification
         | 
| 237 | 
            +
            of the kinetic-energy operator, where the hopping term
         | 
| 238 | 
            +
            becomes complex and the hopping acquires a directional-
         | 
| 239 | 
            +
            ity [42, 43]. Thus, our inhomogeneous extended Hubbard
         | 
| 240 | 
            +
            model with SOC is described by the Hamiltonian
         | 
| 241 | 
            +
            ˆHmodel = ˆHT + ˆHU + ˆHext .
         | 
| 242 | 
            +
            (5)
         | 
| 243 | 
            +
            The first term is a hopping term with SOC absorbed into
         | 
| 244 | 
            +
            a spin dependent phase factor,
         | 
| 245 | 
            +
            ˆHT = −th
         | 
| 246 | 
            +
            �
         | 
| 247 | 
            +
            ⟨j,j′⟩
         | 
| 248 | 
            +
            �
         | 
| 249 | 
            +
            σ
         | 
| 250 | 
            +
            e−iσθc†
         | 
| 251 | 
            +
            jσcj′σ + h.c.,
         | 
| 252 | 
            +
            (6)
         | 
| 253 | 
            +
            where h.c. stands for Hermitian conjugate. Here, th =
         | 
| 254 | 
            +
            √
         | 
| 255 | 
            +
            T 2 + C2 is the generalized hopping strength parameter
         | 
| 256 | 
            +
            which depends on nearest neighbor hopping strength T
         | 
| 257 | 
            +
            and spin orbit coupling C, j is the site index for the
         | 
| 258 | 
            +
            geometry shown in Fig. 1, cjσ is the annihilation operator
         | 
| 259 | 
            +
            for an electron of spin σ at site j, the brackets ⟨. . .⟩ denote
         | 
| 260 | 
            +
            an ordered sum over nearest neighbors with the order
         | 
| 261 | 
            +
            indicated by the arrows in Fig. 1, and σ = ±1 labels
         | 
| 262 | 
            +
            spin-up and -down.
         | 
| 263 | 
            +
            Furthermore, θ is the SOC angle
         | 
| 264 | 
            +
            which parameterizes the strength of the SOC parameter
         | 
| 265 | 
            +
            C relative to the conventional hopping term T [44–46].
         | 
| 266 | 
            +
            The second term in the model Hamiltonian (5) com-
         | 
| 267 | 
            +
            prises the on-site and nearest-neighbor interaction terms,
         | 
| 268 | 
            +
            ˆHU = U0
         | 
| 269 | 
            +
            �
         | 
| 270 | 
            +
            j
         | 
| 271 | 
            +
            nj↑nj↓ + U1
         | 
| 272 | 
            +
            �
         | 
| 273 | 
            +
            ⟨j,j′⟩
         | 
| 274 | 
            +
            �
         | 
| 275 | 
            +
            σ,σ′
         | 
| 276 | 
            +
            njσnj′σ′ ,
         | 
| 277 | 
            +
            (7)
         | 
| 278 | 
            +
            where njσ = c†
         | 
| 279 | 
            +
            jσcjσ is the spin σ particle number density
         | 
| 280 | 
            +
            at site j, and U0 and U1 are the on-site and nearest-
         | 
| 281 | 
            +
            neighbor repulsion strengths, respectively. For the pur-
         | 
| 282 | 
            +
            poses of this paper, we set U1 =
         | 
| 283 | 
            +
            1
         | 
| 284 | 
            +
            2U0, a fairly typical
         | 
| 285 | 
            +
            choice for modeling real materials [47], and we restrict
         | 
| 286 | 
            +
            the hopping parameter th and on-site interaction param-
         | 
| 287 | 
            +
            eter U0 to be of similar orders of magnitude. Finite non-
         | 
| 288 | 
            +
            local interactions are necessary for nontrivial exchange
         | 
| 289 | 
            +
            torques, but we avoid the much stronger interactions
         | 
| 290 | 
            +
            regime because the charge degrees of freedom tend to
         | 
| 291 | 
            +
            freeze out as U0 and U1 become large, resulting in the
         | 
| 292 | 
            +
            dynamics being dominated by a simpler pure-spin low-
         | 
| 293 | 
            +
            energy effective model.
         | 
| 294 | 
            +
            Lastly, ˆHext contains the couplings to the external po-
         | 
| 295 | 
            +
            tential and external magnetic field,
         | 
| 296 | 
            +
            ˆHext =
         | 
| 297 | 
            +
            �
         | 
| 298 | 
            +
            j
         | 
| 299 | 
            +
            (Vjnj + Bj · mj) ,
         | 
| 300 | 
            +
            (8)
         | 
| 301 | 
            +
            where Vj is the scalar potential and Bj is the magnetic
         | 
| 302 | 
            +
            field on site j, the total density is nj = nj↑ + nj↓, and
         | 
| 303 | 
            +
            the magnetization is given by mj = �
         | 
| 304 | 
            +
            σ,σ′ c†
         | 
| 305 | 
            +
            jσ⃗σσσ′cjσ′
         | 
| 306 | 
            +
            with ⃗σ = (σx, σy, σz) denoting a vector composed of
         | 
| 307 | 
            +
            the Pauli matrices. We keep the external field param-
         | 
| 308 | 
            +
            eters each less than the on-site interaction and hopping,
         | 
| 309 | 
            +
            Vj, |Bj| < U0, th.
         | 
| 310 | 
            +
            These external field parameters are
         | 
| 311 | 
            +
            not strictly set to zero because they can be used to break
         | 
| 312 | 
            +
            degeneracy in order to fix a symmetry breaking state,
         | 
| 313 | 
            +
            and because, as discussed in Section III, small variation
         | 
| 314 | 
            +
            of these parameters in the exact model is found to be
         | 
| 315 | 
            +
            useful in matching the SDFT initial state and the exact
         | 
| 316 | 
            +
            initial state more accurately.
         | 
| 317 | 
            +
            B.
         | 
| 318 | 
            +
            Magnetic phase diagram of the Hubbard bowtie
         | 
| 319 | 
            +
            We use exact diagonalization of ˆHmodel to construct
         | 
| 320 | 
            +
            benchmark solutions with which to compare our SDFT
         | 
| 321 | 
            +
            results. Figure 2a shows the exact phase diagram of the
         | 
| 322 | 
            +
            half-filled Hubbard bowtie in a plane whose x − y axes
         | 
| 323 | 
            +
            are defined by C = (th/U0) sin θ and T = (th/U0) cos θ;
         | 
| 324 | 
            +
            the SOC angle θ is here measured with respect to the
         | 
| 325 | 
            +
            kinetic energy axis. Similar phase diagrams for the half-
         | 
| 326 | 
            +
            filled Hubbard trimer were obtained by Tabrizi et al.
         | 
| 327 | 
            +
            [43]. Within the above specified regime the model has
         | 
| 328 | 
            +
            a phase transition at θc = nπ/3 for any integer n. For
         | 
| 329 | 
            +
            the case of zero external fields, the ground state of the
         | 
| 330 | 
            +
            5-site model at half filling is degenerate and magnetically
         | 
| 331 | 
            +
            ordered with a nontrivial noncollinear spin structure (ex-
         | 
| 332 | 
            +
            cept at isolated points in the phase diagram where the
         | 
| 333 | 
            +
            spins are ferromagnetically aligned) indicating magnetic
         | 
| 334 | 
            +
            frustration.
         | 
| 335 | 
            +
            On the phase boundary, θc, the ground state exhibits
         | 
| 336 | 
            +
            a symmetry breaking charge density wave (CDW) in the
         | 
| 337 | 
            +
            form of a spontaneous charge polarization along the x-
         | 
| 338 | 
            +
            axis of Fig. 1. In Fig. 2a the states shown outside the
         | 
| 339 | 
            +
            phase diagram image are the states at the critical angles
         | 
| 340 | 
            +
            θc. A specific choice of charge polarization is depicted
         | 
| 341 | 
            +
            in order to show the corresponding spin state. The sites
         | 
| 342 | 
            +
            with no spin indicated do not necessarily have zero mag-
         | 
| 343 | 
            +
            netic moment, but it tends to be orders of magnitude
         | 
| 344 | 
            +
            smaller. The states shown inside the shaded segments of
         | 
| 345 | 
            +
            the phase diagram are those of the midpoint angles be-
         | 
| 346 | 
            +
            tween the phase boundaries, e.g. θ = 30◦. As θ changes,
         | 
| 347 | 
            +
            the relative angles of the spins change as well, with the
         | 
| 348 | 
            +
            fastest changes occurring in the vicinity of the phase tran-
         | 
| 349 | 
            +
            sitions. Thus, the phase transitions at θc are not discon-
         | 
| 350 | 
            +
            tinuous, rather they appear to be a zero temperature,
         | 
| 351 | 
            +
            finite model analog of a second order phase transition,
         | 
| 352 | 
            +
            although the continuous transition occurs over a rather
         | 
| 353 | 
            +
            narrow range of θ.
         | 
| 354 | 
            +
             | 
| 355 | 
            +
            4
         | 
| 356 | 
            +
            T
         | 
| 357 | 
            +
            C
         | 
| 358 | 
            +
            60∘
         | 
| 359 | 
            +
            T
         | 
| 360 | 
            +
            60∘
         | 
| 361 | 
            +
            C
         | 
| 362 | 
            +
            a
         | 
| 363 | 
            +
            b
         | 
| 364 | 
            +
            CDW
         | 
| 365 | 
            +
            CDW
         | 
| 366 | 
            +
            CDW
         | 
| 367 | 
            +
            CDW
         | 
| 368 | 
            +
            CDW
         | 
| 369 | 
            +
            CDW
         | 
| 370 | 
            +
            FIG. 2.
         | 
| 371 | 
            +
            (a) Magnetic phase diagram of the half-filled 5-site Hubbard model, obtained using exact diagonalization.
         | 
| 372 | 
            +
            The
         | 
| 373 | 
            +
            red arrows indicate the relative in-plane spin direction of the state depicted (taken at the midpoint angle between the phase
         | 
| 374 | 
            +
            boundaries). The blue pluses and minuses indicate the direction of electric polarization for the CDW critical angle states
         | 
| 375 | 
            +
            for the specific spin arrangement shown. (b) Corresponding magnetic phase diagram using exchange-only SDFT, showing the
         | 
| 376 | 
            +
            broadening of the phase boundary states. The phase diagram has approximately the same states as for the exact diagonalization
         | 
| 377 | 
            +
            phase diagram, but the critical angles, where a CDW occurs, acquire a width of a few degrees.
         | 
| 378 | 
            +
            The complete phase diagram of the ground state of
         | 
| 379 | 
            +
            our 5-site Hubbard bowtie and other finite and extended
         | 
| 380 | 
            +
            triangular lattice systems is of interest in and by itself,
         | 
| 381 | 
            +
            especially with respect to their symmetries.
         | 
| 382 | 
            +
            A more
         | 
| 383 | 
            +
            complete formal analysis of the phase boundaries and
         | 
| 384 | 
            +
            other symmetry-related properties will be the subject of
         | 
| 385 | 
            +
            a forthcoming study.
         | 
| 386 | 
            +
            C.
         | 
| 387 | 
            +
            Exchange-only SDFT
         | 
| 388 | 
            +
            Exact exchange in noncollinear SDFT has been defined
         | 
| 389 | 
            +
            in Ref. [35]. Starting point is the exchange energy
         | 
| 390 | 
            +
            Ex = −1
         | 
| 391 | 
            +
            2
         | 
| 392 | 
            +
            � �
         | 
| 393 | 
            +
            drdr′
         | 
| 394 | 
            +
            |r − r′|Tr
         | 
| 395 | 
            +
            �
         | 
| 396 | 
            +
            γ(r, r′)γ(r′, r)
         | 
| 397 | 
            +
            �
         | 
| 398 | 
            +
            .
         | 
| 399 | 
            +
            (9)
         | 
| 400 | 
            +
            Here, γ denotes the one-particle spin-density matrix, a
         | 
| 401 | 
            +
            2 × 2 matrix in spin space whose elements are given
         | 
| 402 | 
            +
            by γσξ(r, r′) = �N
         | 
| 403 | 
            +
            j ψjσ(r)ψ∗
         | 
| 404 | 
            +
            jξ(r′), constructed from two-
         | 
| 405 | 
            +
            component spinor Kohn-Sham orbitals, where σ =↑, ↓
         | 
| 406 | 
            +
            and likewise for ξ; Tr is the trace over spin indices. The
         | 
| 407 | 
            +
            exact noncollinear exchange potential then follows by
         | 
| 408 | 
            +
            minimizing Ex with respect to the orbitals, under the
         | 
| 409 | 
            +
            constraint that the orbitals come from a single-particle
         | 
| 410 | 
            +
            equation with a local potential—this is the so-called op-
         | 
| 411 | 
            +
            timized effective potential (OEP) approach [48].
         | 
| 412 | 
            +
            This
         | 
| 413 | 
            +
            approach is system-independent, i.e., it can be defined in
         | 
| 414 | 
            +
            real space and for lattice models alike.
         | 
| 415 | 
            +
            The exact-exchange OEP requires solving an integral
         | 
| 416 | 
            +
            equation; we use here instead a simplification known as
         | 
| 417 | 
            +
            the Krieger-Li-Iafrate (KLI) approximation [49].
         | 
| 418 | 
            +
            The
         | 
| 419 | 
            +
            construction and numerical solution of the noncollinear
         | 
| 420 | 
            +
            KLI approximation have been discussed in detail in Refs.
         | 
| 421 | 
            +
            [32, 35]. KLI directly yields a scalar exchange potential
         | 
| 422 | 
            +
            and an exchange magnetic field with moderate numeri-
         | 
| 423 | 
            +
            cal effort and with very little loss of accuracy compared
         | 
| 424 | 
            +
            to the full OEP. In time-dependent SDFT, the exact-
         | 
| 425 | 
            +
            exchange OEP formally carries a memory [50]. The time-
         | 
| 426 | 
            +
            dependent KLI, on the other hand, is an adiabatic ap-
         | 
| 427 | 
            +
            proximation.
         | 
| 428 | 
            +
            KLI
         | 
| 429 | 
            +
            for
         | 
| 430 | 
            +
            noncollinear
         | 
| 431 | 
            +
            systems
         | 
| 432 | 
            +
            produces
         | 
| 433 | 
            +
            exchange
         | 
| 434 | 
            +
            torques in extended Hubbard systems [36]. For the pur-
         | 
| 435 | 
            +
            poses of the present study, we also define a projected KLI
         | 
| 436 | 
            +
            (KLIp) in which the exchange magnetic field Bx on each
         | 
| 437 | 
            +
            lattice site is projected along the local magnetization di-
         | 
| 438 | 
            +
            rection, and which therefore has no exchange torques.
         | 
| 439 | 
            +
            D.
         | 
| 440 | 
            +
            SDFT phase diagram
         | 
| 441 | 
            +
            In the SDFT modeling of the Hamiltonian (5), a simi-
         | 
| 442 | 
            +
            lar magnetic phase diagram is obtained as the exact one
         | 
| 443 | 
            +
            shown in Fig. 2a. The main difference is that the phase
         | 
| 444 | 
            +
             | 
| 445 | 
            +
            5
         | 
| 446 | 
            +
            boundaries at the critical angles θc are not as sharp as
         | 
| 447 | 
            +
            in the exact case but quite diffuse, as schematically de-
         | 
| 448 | 
            +
            picted in Fig. 2b. This is mainly due to the well-known
         | 
| 449 | 
            +
            tendency of SDFT to prefer symmetry breaking, unless
         | 
| 450 | 
            +
            highly accurate correlation functionals are used.
         | 
| 451 | 
            +
            The broadened phase boundary region has a tendency
         | 
| 452 | 
            +
            to exhibit “charge sloshing” [51] in the Kohn-Sham self-
         | 
| 453 | 
            +
            consistency iterations. Charge sloshing spoils the con-
         | 
| 454 | 
            +
            vergence behavior and must be overcome with special
         | 
| 455 | 
            +
            measures, e.g. charge preconditioning or imaginary time
         | 
| 456 | 
            +
            propagation [52]. A sufficiently strong external potential
         | 
| 457 | 
            +
            Vj can also be applied to one side of the model in or-
         | 
| 458 | 
            +
            der to prevent charge sloshing. A fairly strong external
         | 
| 459 | 
            +
            potential in the exchange-only SDFT modeling is also
         | 
| 460 | 
            +
            necessary in the vicinity of θc in order to match to the
         | 
| 461 | 
            +
            exact initial state because correlation effects tend to be
         | 
| 462 | 
            +
            stronger close to the phase boundaries (see Sec. III).
         | 
| 463 | 
            +
            For the simulations of section IV D, where the SDFT
         | 
| 464 | 
            +
            calculations are not tethered to an exact initial solu-
         | 
| 465 | 
            +
            tion, charge sloshing can arise in the stronger interaction
         | 
| 466 | 
            +
            regime, even far from the critical angle θc.
         | 
| 467 | 
            +
            We found
         | 
| 468 | 
            +
            that replacing the Kohn-Sham self-consistency loop with
         | 
| 469 | 
            +
            an imaginary time propagation algorithm [52] for com-
         | 
| 470 | 
            +
            puting the SDFT ground state was useful in mitigating
         | 
| 471 | 
            +
            charge sloshing.
         | 
| 472 | 
            +
            III.
         | 
| 473 | 
            +
            TIME PROPAGATION AND CHOICE OF
         | 
| 474 | 
            +
            INITIAL STATE
         | 
| 475 | 
            +
            In order to compare the dynamics of the exact and
         | 
| 476 | 
            +
            TD-SDFT solutions, we excite the system with a small,
         | 
| 477 | 
            +
            localized magnetic field burst along the y direction dur-
         | 
| 478 | 
            +
            ing a brief number of time steps. To propagate the full
         | 
| 479 | 
            +
            time-dependent many-body Schr¨odinger equation for our
         | 
| 480 | 
            +
            Hubbard bowtie we use a standard Crank-Nicolson algo-
         | 
| 481 | 
            +
            rithm.
         | 
| 482 | 
            +
            The time-dependent Kohn-Sham equations are
         | 
| 483 | 
            +
            also propagated using Crank-Nicolson, including a pre-
         | 
| 484 | 
            +
            dictor-corrector scheme (one corrector step suffices) [53].
         | 
| 485 | 
            +
            Since our interest is predominantly in the dynamical
         | 
| 486 | 
            +
            effects comparing KLI and KLIp, we start in both cases
         | 
| 487 | 
            +
            from the same ground state. This means that the ex-
         | 
| 488 | 
            +
            change torques must be included in the calculation of
         | 
| 489 | 
            +
            the KLIp initial state, as this is required in order to
         | 
| 490 | 
            +
            have KLIp start with the same initial conditions as the
         | 
| 491 | 
            +
            full KLI simulations; however, these torques are frozen
         | 
| 492 | 
            +
            in, effectively in the form of an external magnetic field.
         | 
| 493 | 
            +
            By contrast, in full KLI the exchange torques are time-
         | 
| 494 | 
            +
            dependent as the system evolves.
         | 
| 495 | 
            +
            Compared to the differences between exchange-only
         | 
| 496 | 
            +
            SDFT and exact many-body benchmarks, the differences
         | 
| 497 | 
            +
            between KLI and KLIp are small and can easily be over-
         | 
| 498 | 
            +
            shadowed. Since we are here interested in relatively sub-
         | 
| 499 | 
            +
            tle dynamical exchange torque effects, it is desirable to
         | 
| 500 | 
            +
            start from a KLI initial state with external scalar poten-
         | 
| 501 | 
            +
            tial Vj and magnetic field Bj chosen to reproduce the
         | 
| 502 | 
            +
            exact density and magnetization. With some effort, Vj
         | 
| 503 | 
            +
            and Bj can be numerically constructed by minimizing
         | 
| 504 | 
            +
            TABLE I. SOC angle θ and interaction strength U0 for the
         | 
| 505 | 
            +
            three ground states considered in Sec. IV, the total magnitude
         | 
| 506 | 
            +
            of the exact xc torque and the exchange-only torque, and the
         | 
| 507 | 
            +
            correlation and exchange energies.
         | 
| 508 | 
            +
            θ
         | 
| 509 | 
            +
            U0
         | 
| 510 | 
            +
            Σj|τxc|
         | 
| 511 | 
            +
            Σj|τ KLI
         | 
| 512 | 
            +
            x
         | 
| 513 | 
            +
            |
         | 
| 514 | 
            +
            Ec
         | 
| 515 | 
            +
            Ex
         | 
| 516 | 
            +
            30◦
         | 
| 517 | 
            +
            1
         | 
| 518 | 
            +
            4.2 × 10−2
         | 
| 519 | 
            +
            2.6 × 10−2
         | 
| 520 | 
            +
            -0.214
         | 
| 521 | 
            +
            -1.84
         | 
| 522 | 
            +
            30◦
         | 
| 523 | 
            +
            3
         | 
| 524 | 
            +
            4.8 × 10−2
         | 
| 525 | 
            +
            1.2 × 10−1
         | 
| 526 | 
            +
            -0.236
         | 
| 527 | 
            +
            -5.82
         | 
| 528 | 
            +
            60◦
         | 
| 529 | 
            +
            1
         | 
| 530 | 
            +
            1.3 × 10−4
         | 
| 531 | 
            +
            2.0 × 10−3
         | 
| 532 | 
            +
            -0.448
         | 
| 533 | 
            +
            -1.92
         | 
| 534 | 
            +
            the functional
         | 
| 535 | 
            +
            F(Vj, Bj) =
         | 
| 536 | 
            +
            �
         | 
| 537 | 
            +
            j
         | 
| 538 | 
            +
            �
         | 
| 539 | 
            +
            (nj − n(0)
         | 
| 540 | 
            +
            j )2 + |mj − m(0)
         | 
| 541 | 
            +
            j |2�
         | 
| 542 | 
            +
            ,
         | 
| 543 | 
            +
            (10)
         | 
| 544 | 
            +
            where n(0)
         | 
| 545 | 
            +
            j
         | 
| 546 | 
            +
            and m(0)
         | 
| 547 | 
            +
            j
         | 
| 548 | 
            +
            are the target density and mag-
         | 
| 549 | 
            +
            netization, respectively.
         | 
| 550 | 
            +
            For each simulation matched
         | 
| 551 | 
            +
            to an exact initial state, we minimize F to an accu-
         | 
| 552 | 
            +
            racy of at least F = 10−25. The minimization is done
         | 
| 553 | 
            +
            via a conjugate gradient method with randomized resets
         | 
| 554 | 
            +
            when a local minimum of insufficient accuracy is reached.
         | 
| 555 | 
            +
            Searching over Vj and Bj of only the SDFT simulations
         | 
| 556 | 
            +
            to find the minimum of F is extremely computationally
         | 
| 557 | 
            +
            expensive due to the high dimensionality of the parame-
         | 
| 558 | 
            +
            ter space. In order to overcome this issue, we switch to
         | 
| 559 | 
            +
            minimizing F with respect to the external fields of the
         | 
| 560 | 
            +
            exact solution once F <∼ 10−4. Minimizing with respect
         | 
| 561 | 
            +
            to exact solution parameters is less computationally ex-
         | 
| 562 | 
            +
            pensive due to the much smoother response of the exact
         | 
| 563 | 
            +
            solution to small changes in the external fields.
         | 
| 564 | 
            +
            IV.
         | 
| 565 | 
            +
            RESULTS AND DISCUSSION
         | 
| 566 | 
            +
            The model system shown in Fig. 1 is simple yet ex-
         | 
| 567 | 
            +
            hibits quite a rich range of structural and dynamical be-
         | 
| 568 | 
            +
            havior. The parameter space to be explored comprises
         | 
| 569 | 
            +
            the hopping strength th, the SOC angle θ, and the inter-
         | 
| 570 | 
            +
            action strength U0 (fixing U1 = U0/2). In the following
         | 
| 571 | 
            +
            we set th = 1 and limit ourselves to three representative
         | 
| 572 | 
            +
            choices of (θ, U0) in the magnetic phase diagram. This
         | 
| 573 | 
            +
            will already be sufficient to gain insight into the signifi-
         | 
| 574 | 
            +
            cance of the xc torques.
         | 
| 575 | 
            +
            Table I gives an overview of the three parameter sets,
         | 
| 576 | 
            +
            the ground-state exchange and correlation energies Ex
         | 
| 577 | 
            +
            and Ec, and the magnitude of the exact xc torque τxc
         | 
| 578 | 
            +
            and of the exchange-only torque τx. These will be further
         | 
| 579 | 
            +
            discussed below.
         | 
| 580 | 
            +
            A.
         | 
| 581 | 
            +
            θ = 30◦, U0 = 1
         | 
| 582 | 
            +
            We first consider the case θ = 30◦, which is in the
         | 
| 583 | 
            +
            middle of the spin-frustrated region shown in yellow in
         | 
| 584 | 
            +
            the phase diagrams of Fig. 2, and for weak interaction
         | 
| 585 | 
            +
            strength U0 = 1. The magnetization dynamics compari-
         | 
| 586 | 
            +
            son of exact, KLI, and KLIp is shown in Fig. 3a, which
         | 
| 587 | 
            +
             | 
| 588 | 
            +
            6
         | 
| 589 | 
            +
            exact 
         | 
| 590 | 
            +
            KLI 
         | 
| 591 | 
            +
            KLIproj 
         | 
| 592 | 
            +
             b 
         | 
| 593 | 
            +
            a
         | 
| 594 | 
            +
            Frequency 
         | 
| 595 | 
            +
            Y-axis Magentization (x10−5)
         | 
| 596 | 
            +
            Spectral Amplitude (a.u.)
         | 
| 597 | 
            +
            FIG. 3.
         | 
| 598 | 
            +
            Comparison of exact, KLI, and KLIp modeling for
         | 
| 599 | 
            +
            the case of θ = 30◦ and U0 = 1.
         | 
| 600 | 
            +
            (a) Dynamics of the y-
         | 
| 601 | 
            +
            component of the magnetization of a corner site exited by a
         | 
| 602 | 
            +
            small, short, local burst of magnetic field in the y direction.
         | 
| 603 | 
            +
            (b) Associated spectral amplitude (in arbitrary units), calcu-
         | 
| 604 | 
            +
            lated via Fourier transform of the data shown in part (a).
         | 
| 605 | 
            +
            depicts the magnetization along the y-direction of a cor-
         | 
| 606 | 
            +
            ner site. By construction (see Sec. III), all three methods
         | 
| 607 | 
            +
            start from the same initial value.
         | 
| 608 | 
            +
            KLI and KLIp stay fairly close to one another for
         | 
| 609 | 
            +
            much of the run time due to the relative smallness of the
         | 
| 610 | 
            +
            Hubbard interaction, which indicates that the exchange
         | 
| 611 | 
            +
            torques are not very important in the chosen regime. For
         | 
| 612 | 
            +
            the first few cycles of the precessional motion triggered by
         | 
| 613 | 
            +
            the short pulse, exchange-only SDFT is quite close to the
         | 
| 614 | 
            +
            exact result. In spite of that, both KLI and KLIp start
         | 
| 615 | 
            +
            to diverge significantly from the exact solution around
         | 
| 616 | 
            +
            t = 15, which shows that the correlation effects, although
         | 
| 617 | 
            +
            relatively small, eventually start playing a nonnegligible
         | 
| 618 | 
            +
            role in the time evolution of the system.
         | 
| 619 | 
            +
            To gain further insight, we perform a spectral analysis
         | 
| 620 | 
            +
            of the time-dependent data via Fourier transformation
         | 
| 621 | 
            +
            of the amplitude of the magnetization oscillations, which
         | 
| 622 | 
            +
            reveals the spectrum of magnetic excitations. As shown
         | 
| 623 | 
            +
            in Fig. 3b, KLI and KLIp agree well with the exact spec-
         | 
| 624 | 
            +
            trum at low frequencies (up to about a frequency ω = 3).
         | 
| 625 | 
            +
            At higher frequencies, the SDFT spectra differ from the
         | 
| 626 | 
            +
             b 
         | 
| 627 | 
            +
            a
         | 
| 628 | 
            +
            Frequency 
         | 
| 629 | 
            +
            Y-axis Magentization (x10−5)
         | 
| 630 | 
            +
            Spectral Amplitude (a.u.)
         | 
| 631 | 
            +
            FIG. 4.
         | 
| 632 | 
            +
            Same as Fig. 3 but for U0 = 3.
         | 
| 633 | 
            +
            exact spectra, which may be due to the fact that we are
         | 
| 634 | 
            +
            using here an adiabatic approximation which does not
         | 
| 635 | 
            +
            produce double or higher excitations [53] and hence does
         | 
| 636 | 
            +
            not capture all peaks. However, KLI and KLIp remain
         | 
| 637 | 
            +
            very close to each other throughout, illustrating again
         | 
| 638 | 
            +
            that exchange torques are insignificant here.
         | 
| 639 | 
            +
            B.
         | 
| 640 | 
            +
            θ = 30◦, U0 = 3
         | 
| 641 | 
            +
            For the second case, we remain at θ = 30◦, away
         | 
| 642 | 
            +
            from the phase boundaries, but increase the interaction
         | 
| 643 | 
            +
            strength into the moderately strongly interacting regime,
         | 
| 644 | 
            +
            at U0 = 3. The real time magnetization dynamics and
         | 
| 645 | 
            +
            amplitude spectrum are shown in Fig. 4. Clearly, KLI
         | 
| 646 | 
            +
            and KLIp start to differ from each other almost right
         | 
| 647 | 
            +
            away, which points to the more important role of the
         | 
| 648 | 
            +
            exchange torques.
         | 
| 649 | 
            +
            At first glance, it is surprising to see that the projected
         | 
| 650 | 
            +
            KLI, which has no torques, agrees better with the exact
         | 
| 651 | 
            +
            magnetization oscillations, at least for the first few cycles.
         | 
| 652 | 
            +
            To explain this, it is helpful to consider the magnitudes
         | 
| 653 | 
            +
            of the initial τxc and τx given in Table I. For U0 = 1, the
         | 
| 654 | 
            +
            sum of the exchange torques is comparable to the sum of
         | 
| 655 | 
            +
            the xc torques (within a factor 1.6); at U0 = 3, on the
         | 
| 656 | 
            +
            other hand, the exchange torques are much larger than
         | 
| 657 | 
            +
             | 
| 658 | 
            +
            my[0]
         | 
| 659 | 
            +
            0.12826
         | 
| 660 | 
            +
            KS
         | 
| 661 | 
            +
            0.12828
         | 
| 662 | 
            +
            KSproj
         | 
| 663 | 
            +
            0.12830
         | 
| 664 | 
            +
            0.12832
         | 
| 665 | 
            +
            0.12834
         | 
| 666 | 
            +
            SIxe
         | 
| 667 | 
            +
            0.12836
         | 
| 668 | 
            +
            -0.12838
         | 
| 669 | 
            +
            0.0 
         | 
| 670 | 
            +
            2.5
         | 
| 671 | 
            +
            5.0
         | 
| 672 | 
            +
            7.5
         | 
| 673 | 
            +
            10.0
         | 
| 674 | 
            +
            12.5
         | 
| 675 | 
            +
            15.0
         | 
| 676 | 
            +
            17.5
         | 
| 677 | 
            +
            20.0
         | 
| 678 | 
            +
            Timemy[0]
         | 
| 679 | 
            +
            -0.12826
         | 
| 680 | 
            +
            exact
         | 
| 681 | 
            +
            KS
         | 
| 682 | 
            +
            -0.12828
         | 
| 683 | 
            +
            KSproj
         | 
| 684 | 
            +
            -0.12830
         | 
| 685 | 
            +
            -0.12832
         | 
| 686 | 
            +
            -0.12834
         | 
| 687 | 
            +
            -0.12836
         | 
| 688 | 
            +
            -0.12838
         | 
| 689 | 
            +
            0.0
         | 
| 690 | 
            +
            2.5
         | 
| 691 | 
            +
            5.0
         | 
| 692 | 
            +
            7.5
         | 
| 693 | 
            +
            10.0
         | 
| 694 | 
            +
            12.5
         | 
| 695 | 
            +
            15.0
         | 
| 696 | 
            +
            17.5
         | 
| 697 | 
            +
            20.0
         | 
| 698 | 
            +
            Timemy[O] FFT
         | 
| 699 | 
            +
            10-1
         | 
| 700 | 
            +
            exact
         | 
| 701 | 
            +
            KLI
         | 
| 702 | 
            +
            10-2
         | 
| 703 | 
            +
            KLIproj
         | 
| 704 | 
            +
            FFT amplitude (a.u.)
         | 
| 705 | 
            +
            10-4
         | 
| 706 | 
            +
            10-5
         | 
| 707 | 
            +
            10-6.
         | 
| 708 | 
            +
            10-7,
         | 
| 709 | 
            +
            0
         | 
| 710 | 
            +
            2
         | 
| 711 | 
            +
            4
         | 
| 712 | 
            +
            5
         | 
| 713 | 
            +
            6
         | 
| 714 | 
            +
            Excitation energy (in units of tg)my[o]
         | 
| 715 | 
            +
            le-5-1.567e.
         | 
| 716 | 
            +
            exact
         | 
| 717 | 
            +
            -5.2
         | 
| 718 | 
            +
            KLI
         | 
| 719 | 
            +
            KLIproj
         | 
| 720 | 
            +
            5.4
         | 
| 721 | 
            +
            5.6
         | 
| 722 | 
            +
            5.8
         | 
| 723 | 
            +
            6.0
         | 
| 724 | 
            +
            6.2
         | 
| 725 | 
            +
            -6.4
         | 
| 726 | 
            +
            0.0
         | 
| 727 | 
            +
            2.5
         | 
| 728 | 
            +
            5.0
         | 
| 729 | 
            +
            7.5
         | 
| 730 | 
            +
            10.0
         | 
| 731 | 
            +
            12.5
         | 
| 732 | 
            +
            15.0
         | 
| 733 | 
            +
            17.5
         | 
| 734 | 
            +
            20.0
         | 
| 735 | 
            +
            Timemy[O] FFT
         | 
| 736 | 
            +
            10-2
         | 
| 737 | 
            +
            amplitude (a.u.)
         | 
| 738 | 
            +
            10
         | 
| 739 | 
            +
            -4
         | 
| 740 | 
            +
            10-5
         | 
| 741 | 
            +
            FT
         | 
| 742 | 
            +
            10-6
         | 
| 743 | 
            +
            exact
         | 
| 744 | 
            +
            KLI
         | 
| 745 | 
            +
            KLIproj
         | 
| 746 | 
            +
            10-7
         | 
| 747 | 
            +
            0
         | 
| 748 | 
            +
            2
         | 
| 749 | 
            +
            3
         | 
| 750 | 
            +
            1
         | 
| 751 | 
            +
            4
         | 
| 752 | 
            +
            5
         | 
| 753 | 
            +
            6
         | 
| 754 | 
            +
            Excitation energy (in units of tg)my[0]
         | 
| 755 | 
            +
            1e-5-3.28e-1
         | 
| 756 | 
            +
            6.0
         | 
| 757 | 
            +
            6
         | 
| 758 | 
            +
            6.4
         | 
| 759 | 
            +
            6.6
         | 
| 760 | 
            +
            6.8
         | 
| 761 | 
            +
            7.0
         | 
| 762 | 
            +
            -7.2
         | 
| 763 | 
            +
            exact
         | 
| 764 | 
            +
            -7.4
         | 
| 765 | 
            +
            KLI
         | 
| 766 | 
            +
            KLIproj
         | 
| 767 | 
            +
            -7.6
         | 
| 768 | 
            +
            0.0
         | 
| 769 | 
            +
            2.5
         | 
| 770 | 
            +
            5.0
         | 
| 771 | 
            +
            7.5
         | 
| 772 | 
            +
            10.0
         | 
| 773 | 
            +
            12.5
         | 
| 774 | 
            +
            15.0
         | 
| 775 | 
            +
            17.5
         | 
| 776 | 
            +
            20.0
         | 
| 777 | 
            +
            Time7
         | 
| 778 | 
            +
             b 
         | 
| 779 | 
            +
            a
         | 
| 780 | 
            +
            Frequency 
         | 
| 781 | 
            +
            Y-axis Magentization (x10−5)
         | 
| 782 | 
            +
            Spectral Amplitude (a.u.)
         | 
| 783 | 
            +
            FIG. 5.
         | 
| 784 | 
            +
            Same as Fig. 3 but for θ = 60◦.
         | 
| 785 | 
            +
            the xc torques, which suggests that the correlation con-
         | 
| 786 | 
            +
            tribution to the torques becomes relatively much more
         | 
| 787 | 
            +
            important. In other words, exchange-only overestimates
         | 
| 788 | 
            +
            the torques, and correlation compensates for it. KLIp
         | 
| 789 | 
            +
            avoids this overestimation (better no exchange torque at
         | 
| 790 | 
            +
            all, than too much of it), and brings the dynamics closer
         | 
| 791 | 
            +
            to the exact case. Notice that this could have not been
         | 
| 792 | 
            +
            anticipated just from looking at the exchange and cor-
         | 
| 793 | 
            +
            relation energies Ex and Ec of the initial state, which
         | 
| 794 | 
            +
            would have suggested that the exchange is dominant.
         | 
| 795 | 
            +
            The Fourier spectrum in Fig. 4b is less clear: while
         | 
| 796 | 
            +
            both KLI and KLIp seem to reproduce the rough trends
         | 
| 797 | 
            +
            of the exact spectrum, it is difficult to say which one of
         | 
| 798 | 
            +
            them agrees better. Neither of them captures the details
         | 
| 799 | 
            +
            of the exact spectrum particularly well.
         | 
| 800 | 
            +
            C.
         | 
| 801 | 
            +
            θ = 60◦, U0 = 1
         | 
| 802 | 
            +
            Lastly, we consider the case of θ = 60◦ and U0 = 1, see
         | 
| 803 | 
            +
            Fig. 5. This state is at a critical angle of the magnetic
         | 
| 804 | 
            +
            phase diagram where artificial charge density symmetry
         | 
| 805 | 
            +
            breaking in exchange-only SDFT is prevalent, indicat-
         | 
| 806 | 
            +
            ing that strong correlations are needed to reproduce the
         | 
| 807 | 
            +
            exact results. As shown in Table I, Ec is significantly en-
         | 
| 808 | 
            +
            hanced relative to Ex, compared to the case of θ = 30◦.
         | 
| 809 | 
            +
            ∑j |τKLI
         | 
| 810 | 
            +
            x
         | 
| 811 | 
            +
            |
         | 
| 812 | 
            +
            0
         | 
| 813 | 
            +
            1
         | 
| 814 | 
            +
            2
         | 
| 815 | 
            +
            3
         | 
| 816 | 
            +
            4
         | 
| 817 | 
            +
            Fave
         | 
| 818 | 
            +
            U0
         | 
| 819 | 
            +
            FIG. 6.
         | 
| 820 | 
            +
            Red (right axis): Comparison between KLI and
         | 
| 821 | 
            +
            KLIp solutions as a function of interaction strength for the
         | 
| 822 | 
            +
            case of θ = 30◦ and U0, quantified by the time-averaged dis-
         | 
| 823 | 
            +
            tance measure Fave, Eq. (11). Blue (left axis): Σj|τ KLI
         | 
| 824 | 
            +
            x
         | 
| 825 | 
            +
            | of
         | 
| 826 | 
            +
            the Hubbard bowtie ground state versus U0.
         | 
| 827 | 
            +
            Correspondingly, the exchange torques are lower, due to
         | 
| 828 | 
            +
            the localization of the magnetization to one side of the
         | 
| 829 | 
            +
            system. The strong correlation effects at the transition
         | 
| 830 | 
            +
            angle result in both KLI and KLIp diverging from the
         | 
| 831 | 
            +
            exact solution fairly quickly. The magnetization oscilla-
         | 
| 832 | 
            +
            tions calculated with KLI and KLIp match each other
         | 
| 833 | 
            +
            fairly well, at least for the first few cycles, but then dif-
         | 
| 834 | 
            +
            ferences start to accumulate.
         | 
| 835 | 
            +
            The Fourier spectrum, see Fig. 5b, has well defined ex-
         | 
| 836 | 
            +
            citations, which are fairly well captured by both KLI and
         | 
| 837 | 
            +
            KLIp, but some inaccuracies are noticeable at both high
         | 
| 838 | 
            +
            and low frequencies.
         | 
| 839 | 
            +
            Notably, KLIp performs slightly
         | 
| 840 | 
            +
            better at estimating the gaps in the spectrum for mid-
         | 
| 841 | 
            +
            range frequency excitations. The better performance of
         | 
| 842 | 
            +
            KLIp occurs, similarly to Section IV B, due to the KLI
         | 
| 843 | 
            +
            exchange-only approximation substantially overestimat-
         | 
| 844 | 
            +
            ing the xc torques, with no correlation to compensate
         | 
| 845 | 
            +
            (see Table I).
         | 
| 846 | 
            +
            D.
         | 
| 847 | 
            +
            Distance between KLI and KLIp versus U0
         | 
| 848 | 
            +
            The effect of the exchange torques can be further quan-
         | 
| 849 | 
            +
            tified by introducing the time-averaged distance measure
         | 
| 850 | 
            +
            Fave = 1
         | 
| 851 | 
            +
            t
         | 
| 852 | 
            +
            � t
         | 
| 853 | 
            +
            0
         | 
| 854 | 
            +
            dt′ �
         | 
| 855 | 
            +
            j
         | 
| 856 | 
            +
            � �
         | 
| 857 | 
            +
            nKLI
         | 
| 858 | 
            +
            j
         | 
| 859 | 
            +
            − nKLIp
         | 
| 860 | 
            +
            j
         | 
| 861 | 
            +
            �2
         | 
| 862 | 
            +
            +
         | 
| 863 | 
            +
            ���mKLI
         | 
| 864 | 
            +
            j
         | 
| 865 | 
            +
            − mKLIp
         | 
| 866 | 
            +
            j
         | 
| 867 | 
            +
            ���
         | 
| 868 | 
            +
            2 �
         | 
| 869 | 
            +
            ,
         | 
| 870 | 
            +
            (11)
         | 
| 871 | 
            +
            where we calculate the time average over a short time
         | 
| 872 | 
            +
            (t = 2) after initial excitation.
         | 
| 873 | 
            +
            This provides an esti-
         | 
| 874 | 
            +
            mate of the degree of divergence between the solutions
         | 
| 875 | 
            +
            which can be compared with interaction strength and the
         | 
| 876 | 
            +
            magnitude of ground state KLI exchange torques.
         | 
| 877 | 
            +
            Figure 6 shows the time-averaged distance measure
         | 
| 878 | 
            +
            (11) between KLI and KLIp as a function of U0 at
         | 
| 879 | 
            +
            θ = 30◦, and, for the sake of comparison, the sum of
         | 
| 880 | 
            +
             | 
| 881 | 
            +
            my[O] FFT
         | 
| 882 | 
            +
            10-1
         | 
| 883 | 
            +
            exact
         | 
| 884 | 
            +
            KLI
         | 
| 885 | 
            +
            10-2
         | 
| 886 | 
            +
            KLIproj
         | 
| 887 | 
            +
            FFT amplitude (a.u.)
         | 
| 888 | 
            +
            10-4
         | 
| 889 | 
            +
            10-5
         | 
| 890 | 
            +
            10-6.
         | 
| 891 | 
            +
            10-7_
         | 
| 892 | 
            +
            0
         | 
| 893 | 
            +
            2
         | 
| 894 | 
            +
            3
         | 
| 895 | 
            +
            4
         | 
| 896 | 
            +
            5
         | 
| 897 | 
            +
            7
         | 
| 898 | 
            +
            6
         | 
| 899 | 
            +
            Excitation energy (in units of tg)my[o]
         | 
| 900 | 
            +
            1e-5-2.521e-1
         | 
| 901 | 
            +
            3.2
         | 
| 902 | 
            +
            Y-axis Magnetization Magnitude
         | 
| 903 | 
            +
            3.4
         | 
| 904 | 
            +
            3.6
         | 
| 905 | 
            +
            3.8
         | 
| 906 | 
            +
            4.0
         | 
| 907 | 
            +
            4.2
         | 
| 908 | 
            +
            exact
         | 
| 909 | 
            +
            KLI
         | 
| 910 | 
            +
            -4.4
         | 
| 911 | 
            +
            KLIproj
         | 
| 912 | 
            +
            0.0
         | 
| 913 | 
            +
            2.5
         | 
| 914 | 
            +
            5.0
         | 
| 915 | 
            +
            7.5
         | 
| 916 | 
            +
            10.0
         | 
| 917 | 
            +
            12.5
         | 
| 918 | 
            +
            15.0
         | 
| 919 | 
            +
            17.5
         | 
| 920 | 
            +
            20.0
         | 
| 921 | 
            +
            Time0.25
         | 
| 922 | 
            +
            0.12
         | 
| 923 | 
            +
            0.10
         | 
| 924 | 
            +
            0.20
         | 
| 925 | 
            +
            0.08
         | 
| 926 | 
            +
            0.15
         | 
| 927 | 
            +
            0.06
         | 
| 928 | 
            +
            0.10
         | 
| 929 | 
            +
            0.04
         | 
| 930 | 
            +
            0.05
         | 
| 931 | 
            +
            0.02
         | 
| 932 | 
            +
            0.00
         | 
| 933 | 
            +
            0.00
         | 
| 934 | 
            +
            0.0
         | 
| 935 | 
            +
            0.5
         | 
| 936 | 
            +
            1.0
         | 
| 937 | 
            +
            1.5
         | 
| 938 | 
            +
            2.08
         | 
| 939 | 
            +
            the magnitudes of the KLI exchange torques of the corre-
         | 
| 940 | 
            +
            sponding initial states. Both Fave and Σj|τ KLI
         | 
| 941 | 
            +
            x
         | 
| 942 | 
            +
            | start out
         | 
| 943 | 
            +
            linearly for small interaction strengths U0 and keep in-
         | 
| 944 | 
            +
            creasing well into the moderate interaction regime, where
         | 
| 945 | 
            +
            Fave appears to start leveling off around U0 = 2.
         | 
| 946 | 
            +
            A comparison with exact time-dependent xc torques
         | 
| 947 | 
            +
            is, unfortunately, not possible; even the construction of
         | 
| 948 | 
            +
            the exact Σj|τxc| over the whole range of U0 is numeri-
         | 
| 949 | 
            +
            cally too demanding, except for the three cases in Table
         | 
| 950 | 
            +
            I. Nevertheless, we can infer from the results presented
         | 
| 951 | 
            +
            in Fig.
         | 
| 952 | 
            +
            6 that both exchange and correlation torques
         | 
| 953 | 
            +
            must be accounted for even for relatively low interaction
         | 
| 954 | 
            +
            strengths in order to accurately describe the dynamics.
         | 
| 955 | 
            +
            V.
         | 
| 956 | 
            +
            CONCLUSION
         | 
| 957 | 
            +
            We have performed exact and approximate, exchange-
         | 
| 958 | 
            +
            only (TD)-SDFT calculations on a half-filled 5-site Hub-
         | 
| 959 | 
            +
            bard cluster with varying interaction and SOC strengths.
         | 
| 960 | 
            +
            The purpose of this study was to assess the significance of
         | 
| 961 | 
            +
            many-body magnetic torques for the description of spin
         | 
| 962 | 
            +
            dynamics. We considered three scenarios with weak and
         | 
| 963 | 
            +
            moderate interactions and close to and away from a tran-
         | 
| 964 | 
            +
            sition between different magnetic phases. While this is
         | 
| 965 | 
            +
            clearly not an exhaustive exploration of the parameter
         | 
| 966 | 
            +
            space, the examples studied here are good representa-
         | 
| 967 | 
            +
            tives and allow us to draw meaningful conclusions.
         | 
| 968 | 
            +
            We find that exchange torques become increasingly im-
         | 
| 969 | 
            +
            portant as non-local interactions become stronger, with
         | 
| 970 | 
            +
            an approximately linear dependence at low interactions
         | 
| 971 | 
            +
            (see Fig. 6), but the relationship becomes nonlinear for
         | 
| 972 | 
            +
            more general interaction strengths. Strong correlations in
         | 
| 973 | 
            +
            the vicinity of phase boundaries reduce the importance of
         | 
| 974 | 
            +
            exchange torques due to localization. When correlations
         | 
| 975 | 
            +
            are particularly strong, they appear to counteract the ex-
         | 
| 976 | 
            +
            change torques, leading to a net reduction of the total xc
         | 
| 977 | 
            +
            torques. This suggests that when lacking a sufficiently ac-
         | 
| 978 | 
            +
            curate correlation functional, completely projecting out
         | 
| 979 | 
            +
            the xc torques may improve the overall accuracy of TD-
         | 
| 980 | 
            +
            SDFT magnetic dynamics, at least for short times.
         | 
| 981 | 
            +
            The challenge for future work is clearly to construct
         | 
| 982 | 
            +
            correlation functionals that produce accurate torques,
         | 
| 983 | 
            +
            and test these against benchmarks. A good starting point
         | 
| 984 | 
            +
            will be to do this for similar finite Hubbard models, fol-
         | 
| 985 | 
            +
            lowed by tests for the magnetization dynamics in real
         | 
| 986 | 
            +
            magnetic materials in the linear and nonlinear regime.
         | 
| 987 | 
            +
            ACKNOWLEDGMENTS
         | 
| 988 | 
            +
            This work was supported by DOE Grant No.
         | 
| 989 | 
            +
            DE-
         | 
| 990 | 
            +
            SC0019109. The authors wish to thank Aurora Pribram-
         | 
| 991 | 
            +
            Jones for helpful discussion.
         | 
| 992 | 
            +
            [1] I. ˇZuti´c, J. Fabian, and S. Das Sarma, Spintronics: Fun-
         | 
| 993 | 
            +
            damentals and applications, Rev. Mod. Phys. 76, 323
         | 
| 994 | 
            +
            (2004).
         | 
| 995 | 
            +
            [2] S. M. Rezende, Fundamentals of Magnonics, Lecture
         | 
| 996 | 
            +
            Notes in Physics, Vol. 969 (Springer, Heidelberg, 2020).
         | 
| 997 | 
            +
            [3] A. Barman, G. Gubbiotti, S. Ladak, A. O. Adey-
         | 
| 998 | 
            +
            eye, M. Krawczyk, J. Gr¨afe, C. Adelmann, S. Coto-
         | 
| 999 | 
            +
            fana,
         | 
| 1000 | 
            +
            A. Naeemi,
         | 
| 1001 | 
            +
            V. I. Vasyuchka,
         | 
| 1002 | 
            +
            B. Hillebrands,
         | 
| 1003 | 
            +
            S. A. Nikitov, H. Yu, D. Grundler, A. V. Sadovnikov,
         | 
| 1004 | 
            +
            A. A. Grachev, S. E. Sheshukova, J.-Y. Duquesne,
         | 
| 1005 | 
            +
            M. Marangolo, G. Csaba, W. Porod, V. E. Demidov,
         | 
| 1006 | 
            +
            S. Urazhdin, S. O. Demokritov, E. Albisetti, D. Petti,
         | 
| 1007 | 
            +
            R. Bertacco, H. Schultheiss, V. V. Kruglyak, V. D.
         | 
| 1008 | 
            +
            Poimanov, S. Sahoo, J. Sinha, H. Yang, M. M¨unzenberg,
         | 
| 1009 | 
            +
            T. Moriyama, S. Mizukami, P. Landeros, R. A. Gallardo,
         | 
| 1010 | 
            +
            G. Carlotti, J.-V. Kim, R. L. Stamps, R. E. Camley,
         | 
| 1011 | 
            +
            B. Rana, Y. Otani, W. Yu, T. Yu, G. E. W. Bauer,
         | 
| 1012 | 
            +
            C. Back, G. S. Uhrig, O. V. Dobrovolskiy, B. Budinska,
         | 
| 1013 | 
            +
            H. Qin, S. van Dijken, A. V. Chumak, A. Khitun, D. E.
         | 
| 1014 | 
            +
            Nikonov, I. A. Young, B. W. Zingsem, and M. Winkl-
         | 
| 1015 | 
            +
            hofer, The 2021 magnonics roadmap, J. Phys.: Condens.
         | 
| 1016 | 
            +
            Matter 337, 413001 (2021).
         | 
| 1017 | 
            +
            [4] N. Nagasoa and Y. Tokura, Topological properties and
         | 
| 1018 | 
            +
            dynamics of magnetic skyrmions, Nature Nanotech. 8,
         | 
| 1019 | 
            +
            899 (2013).
         | 
| 1020 | 
            +
            [5] A. Fert, N. Reyren, and V. Cros, Magnetic skyrmions:
         | 
| 1021 | 
            +
            advances in physics and potential applications, Nature
         | 
| 1022 | 
            +
            Reviews Materials 2, 17031 (2017).
         | 
| 1023 | 
            +
            [6] X. Zhang, J. Xia, Y. Zhou, X. Liu, H. Zhang, and
         | 
| 1024 | 
            +
            M. Ezawa, Skyrmion dynamics in a frustrated ferromag-
         | 
| 1025 | 
            +
            netic film and current-induced helicity locking-unlocking
         | 
| 1026 | 
            +
            transition, Nature Commun. 8, 1717 (2017).
         | 
| 1027 | 
            +
            [7] B. G¨obel, I. Mertig, and O. A. Tretiakov, Beyond
         | 
| 1028 | 
            +
            skyrmions: Review and perspectives of alternative mag-
         | 
| 1029 | 
            +
            netic quasiparticles, Phys. Rep. 895, 1 (2021).
         | 
| 1030 | 
            +
            [8] Z. Chen, X. Zhang, Y. Zhou, and Q. Shao, Skyrmion dy-
         | 
| 1031 | 
            +
            namics in the presence of deformation, Phys. Rev. Appl.
         | 
| 1032 | 
            +
            17, L011002 (2022).
         | 
| 1033 | 
            +
            [9] L. Vandersypen and M. Eriksson, Quantum computing
         | 
| 1034 | 
            +
            with semiconductor spins, Physics Today 72 (8), 38
         | 
| 1035 | 
            +
            (2017).
         | 
| 1036 | 
            +
            [10] U. Bovensiepen, Femtomagnetism:
         | 
| 1037 | 
            +
            Magnetism in step
         | 
| 1038 | 
            +
            with light, Nature Phys. 5, 461 (2009).
         | 
| 1039 | 
            +
            [11] K. Krieger, J. K. Dewhurst, P. Elliott, S. Sharma, and
         | 
| 1040 | 
            +
            E. K. U. Gross, Laser-induced demagnetization at ultra-
         | 
| 1041 | 
            +
            short time scales: Predictions of TDDFT, J. Chem. The-
         | 
| 1042 | 
            +
            ory Comput. 11, 4870 (2015).
         | 
| 1043 | 
            +
            [12] G. P. Zhang, T. Latta, Z. Babyak, Y. H. Bai, and T. F.
         | 
| 1044 | 
            +
            George, All-optical spin switching: a new frontier in fem-
         | 
| 1045 | 
            +
            tomagnetism, Mod. Phys. Lett. B 30, 1630005 (2016).
         | 
| 1046 | 
            +
            [13] G. P. Zhang, Y. H. Bai, and T. F. George, Ultrafast re-
         | 
| 1047 | 
            +
            duction of exchange splitting in ferromagnetic nickel, J.
         | 
| 1048 | 
            +
            Phys.: Condens. Matter 28, 236004 (2016).
         | 
| 1049 | 
            +
            [14] S. R. Acharya, V. Turkowski, G. P. Zhang, and T. S.
         | 
| 1050 | 
            +
            Rahman, Ultrafast electron correlations and memory ef-
         | 
| 1051 | 
            +
            fects at work: Femtosecond demagnetization in Ni, Phys.
         | 
| 1052 | 
            +
            Rev. Lett. 125, 017202 (2020).
         | 
| 1053 | 
            +
            [15] E. M. Lifshitz and L. P. Pitaevskii, Statistical Physics:
         | 
| 1054 | 
            +
            Theory of the Condensed State (Pt 2) (Butterworth-
         | 
| 1055 | 
            +
            Heinemann, Oxford, 1980).
         | 
| 1056 | 
            +
             | 
| 1057 | 
            +
            9
         | 
| 1058 | 
            +
            [16] O. Eriksson, A. Bergman, L. Bergqvist, and J. Hellsvik,
         | 
| 1059 | 
            +
            Atomistic Spin Dynamics: Foundations and Applications
         | 
| 1060 | 
            +
            (Oxford University Press, Oxford, 2017).
         | 
| 1061 | 
            +
            [17] K. Capelle, G. Vignale, and B. L. Gy¨orffy, Spin currents
         | 
| 1062 | 
            +
            and spin dynamics in time-dependent density-functional
         | 
| 1063 | 
            +
            theory, Phys. Rev. Lett. 87, 206403 (2001).
         | 
| 1064 | 
            +
            [18] U. von Barth and L. Hedin, A local exchange-correlation
         | 
| 1065 | 
            +
            potential for the spin polarized case: I, J. Phys. C 5, 1629
         | 
| 1066 | 
            +
            (1972).
         | 
| 1067 | 
            +
            [19] O. Gunnarsson and B. I. Lundqvist, Exchange and corre-
         | 
| 1068 | 
            +
            lation in atoms, molecules, and solids by the spin-density-
         | 
| 1069 | 
            +
            functional formalism, Phys. Rev. B 13, 4274 (1976).
         | 
| 1070 | 
            +
            [20] N. I. Gidopoulos, Potential in spin-density-functional
         | 
| 1071 | 
            +
            theory of noncollinear magnetism determined by the
         | 
| 1072 | 
            +
            many-electron ground state, Phys. Rev. B 75, 134408
         | 
| 1073 | 
            +
            (2007).
         | 
| 1074 | 
            +
            [21] J. K¨ubler, K.-H. H¨ock, J. Sticht, and A. R. Williams,
         | 
| 1075 | 
            +
            Density functional theory of non-collinear magnetism, J.
         | 
| 1076 | 
            +
            Phys. F: Met. Phys. 18, 469 (1988).
         | 
| 1077 | 
            +
            [22] L. M. Sandratskii, Noncollinear magnetism in itinerant-
         | 
| 1078 | 
            +
            electron systems: theory and applications, Adv. Phys.
         | 
| 1079 | 
            +
            47, 91 (1998).
         | 
| 1080 | 
            +
            [23] M. I. Katsnelson and V. P. Antropov, Spin angular gradi-
         | 
| 1081 | 
            +
            ent approximation in the density functional theory, Phys.
         | 
| 1082 | 
            +
            Rev. B 67, 140406(R) (2003).
         | 
| 1083 | 
            +
            [24] J. E. Peralta, G. E. Scuseria, and M. J. Frisch, Non-
         | 
| 1084 | 
            +
            collinear magnetism in density functional calculations,
         | 
| 1085 | 
            +
            Phys. Rev. B 75, 125119 (2007).
         | 
| 1086 | 
            +
            [25] G. Scalmani and M. J. Frisch, A new approach to non-
         | 
| 1087 | 
            +
            collinear spin density functional theory beyond the local
         | 
| 1088 | 
            +
            density approximation, J. Chem. Theor. Comput. 8, 2193
         | 
| 1089 | 
            +
            (2012).
         | 
| 1090 | 
            +
            [26] I. W. Bulik, G. Scalmani, M. J. Frisch, and G. E. Scuse-
         | 
| 1091 | 
            +
            ria, Noncollinear density functional theory having proper
         | 
| 1092 | 
            +
            invariance and local torque properties, Phys. Rev. B 87,
         | 
| 1093 | 
            +
            035117 (2013).
         | 
| 1094 | 
            +
            [27] S. Sharma, E. K. U. Gross, A. Sanna, and J. K. De-
         | 
| 1095 | 
            +
            whurst, Source-free exchange-correlation magnetic fields
         | 
| 1096 | 
            +
            in density functional theory, J. Chem. Theory Comput.
         | 
| 1097 | 
            +
            14, 1247 (2018).
         | 
| 1098 | 
            +
            [28] L. Kleinman, Density functional for noncollinear mag-
         | 
| 1099 | 
            +
            netic systems, Phys. Rev. B 59, 3314 (1999).
         | 
| 1100 | 
            +
            [29] F. G. Eich and E. K. U. Gross, Transverse spin-gradient
         | 
| 1101 | 
            +
            functional for noncollinear spin-density-functional the-
         | 
| 1102 | 
            +
            ory, Phys. Rev. Lett. 111, 156401 (2013).
         | 
| 1103 | 
            +
            [30] F. G. Eich, S. Pittalis, and G. Vignale, Transverse
         | 
| 1104 | 
            +
            and longitudinal gradients of the spin magnetization in
         | 
| 1105 | 
            +
            spin-density-functional theory, Phys. Rev. B 88, 245102
         | 
| 1106 | 
            +
            (2013).
         | 
| 1107 | 
            +
            [31] S. Pittalis, G. Vignale, and F. G. Eich, U(1)×SU(2)
         | 
| 1108 | 
            +
            gauge invariance made simple for density functional ap-
         | 
| 1109 | 
            +
            proximations, Phys. Rev. B 96, 035141 (2017).
         | 
| 1110 | 
            +
            [32] N. Tancogne-Dejean, A. Rubio, and C. A. Ullrich, Con-
         | 
| 1111 | 
            +
            structing semilocal approximations for noncollinear spin
         | 
| 1112 | 
            +
            density functional theory featuring exchange-correlation
         | 
| 1113 | 
            +
            torques, arXiv:2208.07729.
         | 
| 1114 | 
            +
            [33] S.
         | 
| 1115 | 
            +
            Sharma,
         | 
| 1116 | 
            +
            J.
         | 
| 1117 | 
            +
            K.
         | 
| 1118 | 
            +
            Dewhurst,
         | 
| 1119 | 
            +
            C.
         | 
| 1120 | 
            +
            Ambrosch-Draxl,
         | 
| 1121 | 
            +
            S. Kurth, N. Helbig, S. Pittalis, S. Shallcross, L. Nord-
         | 
| 1122 | 
            +
            str¨om, and E. K. U. Gross, First-principles approach to
         | 
| 1123 | 
            +
            noncollinear magnetism: towards spin dynamics, Phys.
         | 
| 1124 | 
            +
            Rev. Lett. 98, 196405 (2007).
         | 
| 1125 | 
            +
            [34] K. Capelle, G. Vignale, and C. A. Ullrich, Spin gaps and
         | 
| 1126 | 
            +
            spin-flip energies in density-functional theory, Phys. Rev.
         | 
| 1127 | 
            +
            B 81, 125114 (2010).
         | 
| 1128 | 
            +
            [35] C. A. Ullrich, Density-functional theory for systems
         | 
| 1129 | 
            +
            with noncollinear spin:
         | 
| 1130 | 
            +
            orbital-dependent exchange-
         | 
| 1131 | 
            +
            correlation functionals and their application to the Hub-
         | 
| 1132 | 
            +
            bard dimer, Phys. Rev. B 98, 035140 (2018).
         | 
| 1133 | 
            +
            [36] E. A. Pluhar, III and C. A. Ullrich, Exchange-correlation
         | 
| 1134 | 
            +
            magnetic fields in spin-density-functional theory, Phys.
         | 
| 1135 | 
            +
            Rev. B 100, 125135 (2019).
         | 
| 1136 | 
            +
            [37] J. K. Dewhurst, A. Sanna, and S. Sharma, Effect of
         | 
| 1137 | 
            +
            exchange-correlation spin-torque on spin dynamics, Eur.
         | 
| 1138 | 
            +
            Phys. J. B 91, 218 (2018).
         | 
| 1139 | 
            +
            [38] L. Balents, Spin liquids in frustrated magnets, Nature
         | 
| 1140 | 
            +
            464, 199 (2010).
         | 
| 1141 | 
            +
            [39] Y. Zhou, K. Kanoda, and T.-K. Ng, Quantum spin liquid
         | 
| 1142 | 
            +
            states, Rev. Mod. Phys. 89, 025003 (2017).
         | 
| 1143 | 
            +
            [40] C. Broholm, R. J. Cava, S. A. Kivelson, D. G. Nocera,
         | 
| 1144 | 
            +
            M. R. Norman, and T. Senthil, Quantum spin liquids,
         | 
| 1145 | 
            +
            Science 367, 263 (2020).
         | 
| 1146 | 
            +
            [41] C. A. Ullrich, (Spin-)density-functional theory for open-
         | 
| 1147 | 
            +
            shell systems: exact magnetization density functional for
         | 
| 1148 | 
            +
            the half-filled Hubbard trimer, Phys. Rev. A 100, 012516
         | 
| 1149 | 
            +
            (2019).
         | 
| 1150 | 
            +
            [42] T. A. Kaplan, Single-band Hubbard model with spin-
         | 
| 1151 | 
            +
            orbit coupling, Z. Phys. B 49, 313 (1983).
         | 
| 1152 | 
            +
            [43] S. G. Tabrizi, A. V. Arbuznikov, and M. Kaupp, Hubbard
         | 
| 1153 | 
            +
            trimer with spin-orbit coupling: Hartree-Fock solutions,
         | 
| 1154 | 
            +
            (non)collinearity, and anisotropic spin Hamiltonian, J.
         | 
| 1155 | 
            +
            Phys. Chem. A 123, 2361 (2019).
         | 
| 1156 | 
            +
            [44] J.
         | 
| 1157 | 
            +
            H.
         | 
| 1158 | 
            +
            Pixley,
         | 
| 1159 | 
            +
            S.
         | 
| 1160 | 
            +
            S.
         | 
| 1161 | 
            +
            Natu,
         | 
| 1162 | 
            +
            I.
         | 
| 1163 | 
            +
            B.
         | 
| 1164 | 
            +
            Spielman,
         | 
| 1165 | 
            +
            and
         | 
| 1166 | 
            +
            S. Das Sarma, Interaction-driven exotic quantum phases
         | 
| 1167 | 
            +
            in spin-orbit-coupled spin-1 bosons, Phys. Rev. B 93,
         | 
| 1168 | 
            +
            081101 (2016).
         | 
| 1169 | 
            +
            [45] J. Li, N. Dasari, and M. Eckstein, Ultrafast dynamics in
         | 
| 1170 | 
            +
            relativistic Mott insulators, arXiv:2010.009253.
         | 
| 1171 | 
            +
            [46] D. Hill, V. Slastikov, and O. Tchernyshyov, Chiral mag-
         | 
| 1172 | 
            +
            netism: a geometric perspective, SciPost Phys. 10, 078
         | 
| 1173 | 
            +
            (2021).
         | 
| 1174 | 
            +
            [47] R. Strack and D. Vollhardt, Hubbard model with nearest-
         | 
| 1175 | 
            +
            neighbor and bond-charge interaction:
         | 
| 1176 | 
            +
            exact ground-
         | 
| 1177 | 
            +
            state solution in a wide range of parameters, Phys. Rev.
         | 
| 1178 | 
            +
            Lett. 70, 2637 (1993).
         | 
| 1179 | 
            +
            [48] S. K¨ummel and L. Kronik, Orbital-dependent density
         | 
| 1180 | 
            +
            functionals: theory and applications, Rev. Mod. Phys.
         | 
| 1181 | 
            +
            80, 3 (2008).
         | 
| 1182 | 
            +
            [49] J. B. Krieger, Y. Li, and G. J. Iafrate, Construction
         | 
| 1183 | 
            +
            and application of an accurate local spin-polarized Kohn-
         | 
| 1184 | 
            +
            Sham potential with integer discontinuity:
         | 
| 1185 | 
            +
            Exchange-
         | 
| 1186 | 
            +
            only theory, Phys. Rev. A 45, 101 (1992).
         | 
| 1187 | 
            +
            [50] H. O. Wijewardane and C. A. Ullrich, Real-time electron
         | 
| 1188 | 
            +
            dynamics with exact-exchange time-dependent density-
         | 
| 1189 | 
            +
            functional theory, Phys. Rev. Lett. 100, 056404 (2008).
         | 
| 1190 | 
            +
            [51] Y. Zhou, H. Wang, Y. Liu, X. Gao, and H. Song, Ap-
         | 
| 1191 | 
            +
            plicability of Kerker preconditioning scheme to the self-
         | 
| 1192 | 
            +
            consistent density functional theory calculations of inho-
         | 
| 1193 | 
            +
            mogeneous systems, Phys. Rev. E 97, 033305 (2018).
         | 
| 1194 | 
            +
            [52] C. Flamant, G. Kolesov, E. Manousakis, and E. Kaxiras,
         | 
| 1195 | 
            +
            Imaginary-time time-dependent density functional the-
         | 
| 1196 | 
            +
            ory and its application for robust convergence of elec-
         | 
| 1197 | 
            +
            tronic states, J. Chem. Theory Comput. 15, 6036 (2019).
         | 
| 1198 | 
            +
            [53] C. A. Ullrich, Time-dependent density-functional theory:
         | 
| 1199 | 
            +
            concepts and applications (Oxford University Press, Ox-
         | 
| 1200 | 
            +
            ford, 2012).
         | 
| 1201 | 
            +
             | 
    	
        F9AzT4oBgHgl3EQfi_2P/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        GtE1T4oBgHgl3EQf_QYB/content/tmp_files/2301.03577v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,951 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.03577v1  [nlin.CD]  9 Jan 2023
         | 
| 2 | 
            +
            Records and occupation time statistics for area-preserving maps⋆
         | 
| 3 | 
            +
            Roberto Artuso1,2,∗ Tulio M. de Oliveira3, and Cesar Manchein3†
         | 
| 4 | 
            +
            1Dipartimento di Scienza e Alta Tecnologia and Center for Nonlinear
         | 
| 5 | 
            +
            and Complex Systems, Via Valleggio 11, 22100 Como, Italy;
         | 
| 6 | 
            +
            2I.N.F.N, Sezione di Milano, Via Celoria 16, 20133 Milano, Italy; and
         | 
| 7 | 
            +
            3Departamento de Física, Universidade do Estado de Santa Catarina, 89219-710 Joinville, SC, Brazil
         | 
| 8 | 
            +
            ⋆To Giulio Casati, celebrating his birthday and his achievements.
         | 
| 9 | 
            +
            (Dated: January 10, 2023)
         | 
| 10 | 
            +
            A relevant problem in dynamics is to characterize how deterministic systems may exhibit fea-
         | 
| 11 | 
            +
            tures typically associated to stochastic processes. A widely studied example is the study of (normal
         | 
| 12 | 
            +
            or anomalous) transport properties for deterministic systems on a non-compact phase space. We
         | 
| 13 | 
            +
            consider here two examples of area-preserving maps: the Chirikov-Taylor standard map and the
         | 
| 14 | 
            +
            Casati-Prosen triangle map, and we investigate transport properties, records’ statistics and occu-
         | 
| 15 | 
            +
            pation time statistics. While the standard map, when a chaotic sea is present, always reproduces
         | 
| 16 | 
            +
            results expected for simple random walks, the triangle map -whose analysis still displays many elu-
         | 
| 17 | 
            +
            sive points- behaves in a wildly different way, some of the features being compatible with a transient
         | 
| 18 | 
            +
            (non conservative) nature of the dynamics.
         | 
| 19 | 
            +
            Keywords: Area-preserving maps, record statistics, infinite ergodicity.
         | 
| 20 | 
            +
            I.
         | 
| 21 | 
            +
            INTRODUCTION
         | 
| 22 | 
            +
            One of the most remarkable advances in modern dy-
         | 
| 23 | 
            +
            namics lies in the recognition that deterministic sys-
         | 
| 24 | 
            +
            tems may exhibit statistical properties typical of purely
         | 
| 25 | 
            +
            stochastic processes: for instance such systems may dis-
         | 
| 26 | 
            +
            play diffusion properties similar to random walks [1–4].
         | 
| 27 | 
            +
            Area-preserving maps (see for instance [1]) represent a
         | 
| 28 | 
            +
            prominent example of Hamiltonian systems where subtle
         | 
| 29 | 
            +
            features of dynamics, as integrability vs chaotic proper-
         | 
| 30 | 
            +
            ties, may be studied. In this context one of the most out-
         | 
| 31 | 
            +
            standing example is represented by the Chirikov-Taylor
         | 
| 32 | 
            +
            standard map (SM) (see [1, 5] and references therein):
         | 
| 33 | 
            +
            we also mention the fundamental role of such a map in
         | 
| 34 | 
            +
            the development of quantum chaos, unveiling features
         | 
| 35 | 
            +
            like quantum dynamical localization [6]. Though the SM
         | 
| 36 | 
            +
            has been extensively explored by numerical simulations,
         | 
| 37 | 
            +
            very few rigorous results have been proven (see, for in-
         | 
| 38 | 
            +
            stance, the introduction in [7]): however it is generally
         | 
| 39 | 
            +
            believed that for large nonlinearity parameter this map
         | 
| 40 | 
            +
            typically exhibits good stochastic properties, and sensi-
         | 
| 41 | 
            +
            tive dependence upon initial conditions. Here a remark
         | 
| 42 | 
            +
            is due: such a map can be studied either on a 2-torus
         | 
| 43 | 
            +
            or on an (unbounded) cylinder: the latter representa-
         | 
| 44 | 
            +
            tion is naturally adopted when transport properties are
         | 
| 45 | 
            +
            concerned, and analogies with random walks are taken
         | 
| 46 | 
            +
            into account [1, 3, 8, 9]. While particular nonlinear pa-
         | 
| 47 | 
            +
            rameters in the standard map can be tuned to generate
         | 
| 48 | 
            +
            strong anomalous diffusion [10], here we will only deal
         | 
| 49 | 
            +
            with the case in which diffusion is normal.
         | 
| 50 | 
            +
            Our find-
         | 
| 51 | 
            +
            ings will be confronted with those obtained for another
         | 
| 52 | 
            +
            area-preserving map, characterized by the lack of expo-
         | 
| 53 | 
            +
            nential instability: the so called Casati-Prosen Triangle
         | 
| 54 | |
| 55 | |
| 56 | 
            +
            Map (TM) [11], introduced by considering, in an appro-
         | 
| 57 | 
            +
            priate limit, the Birkhoff dynamics of a triangular bil-
         | 
| 58 | 
            +
            liard: apart from its intrinsic interest, such a map is an
         | 
| 59 | 
            +
            ideal benchmark to test whether stochasticity properties,
         | 
| 60 | 
            +
            exhibited by strongly chaotic systems, are showcased also
         | 
| 61 | 
            +
            by systems lacking any exponential instability. It also
         | 
| 62 | 
            +
            turns out that many features about the TM are still de-
         | 
| 63 | 
            +
            bated, starting from basic properties like ergodicity and
         | 
| 64 | 
            +
            mixing (see for instance [12, 13]).
         | 
| 65 | 
            +
            More precisely we will compare different indicators
         | 
| 66 | 
            +
            for both map on the cylinder: though in principle fur-
         | 
| 67 | 
            +
            ther complications are added when one considers a non-
         | 
| 68 | 
            +
            compact phase space [14, 15], this is the appropriate sce-
         | 
| 69 | 
            +
            nario to discuss transport properties and record statis-
         | 
| 70 | 
            +
            tics, and to check whether tools from infinite ergodic
         | 
| 71 | 
            +
            theory may enrich our understanding of such systems.
         | 
| 72 | 
            +
            Our main findings are that the SM, in its typical
         | 
| 73 | 
            +
            chaotic regime, displays all stochastic properties of a
         | 
| 74 | 
            +
            purely stochastic system, while -as expected- results are
         | 
| 75 | 
            +
            far more complicated for the TM, even if we believe that
         | 
| 76 | 
            +
            some new insight is provided by our analysis, in partic-
         | 
| 77 | 
            +
            ular as regards persistence behaviour, occupation time
         | 
| 78 | 
            +
            statistics and the relationship between transport proper-
         | 
| 79 | 
            +
            ties and record statistics.
         | 
| 80 | 
            +
            The paper is organized as follows.
         | 
| 81 | 
            +
            In Sec. II,
         | 
| 82 | 
            +
            the Chirikov-Taylor standard map (1) and the triangle
         | 
| 83 | 
            +
            map (3) -our basic models- are presented and we also
         | 
| 84 | 
            +
            mention the main properties we analyze. Section III is
         | 
| 85 | 
            +
            dedicated to discuss transport properties, records’ statis-
         | 
| 86 | 
            +
            tics and occupation time statistics. We end with a dis-
         | 
| 87 | 
            +
            cussions in Sec. IV.
         | 
| 88 | 
            +
             | 
| 89 | 
            +
            2
         | 
| 90 | 
            +
            II.
         | 
| 91 | 
            +
            THE BASIC SETTING
         | 
| 92 | 
            +
            We recall the definition of the SM
         | 
| 93 | 
            +
            pn+1 = pn + K
         | 
| 94 | 
            +
            2π sin (2πxn),
         | 
| 95 | 
            +
            xn+1 = xn + pn+1
         | 
| 96 | 
            +
            mod 1;
         | 
| 97 | 
            +
            (1)
         | 
| 98 | 
            +
            K being the nonlinear parameter: when K is sufficiently
         | 
| 99 | 
            +
            big no KAM invariant circles bound the motion and one
         | 
| 100 | 
            +
            can study moments of the diffusing variable p ∈ R:
         | 
| 101 | 
            +
            ⟨|pn − p0|q⟩ ∼ nqν(q).
         | 
| 102 | 
            +
            (2)
         | 
| 103 | 
            +
            The typical behaviour observed for the second moment in
         | 
| 104 | 
            +
            simulations is normal diffusion ν(2) = 1/2 [16, 17], while,
         | 
| 105 | 
            +
            for certain parameter values, the existence of stable run-
         | 
| 106 | 
            +
            ning orbits (accelerator modes) induces superdiffusion,
         | 
| 107 | 
            +
            ν(2) > 1/2) [18–20]. We point out that a finer descrip-
         | 
| 108 | 
            +
            tion of anomalous transport is obtained by considering
         | 
| 109 | 
            +
            the full spectrum ν(q): if ν(q) = α · q, for some α ̸= 1/2
         | 
| 110 | 
            +
            one speaks about weak anomalous diffusion whereas the
         | 
| 111 | 
            +
            case of a nontrivial ν(q) is dubbed strong anomalous dif-
         | 
| 112 | 
            +
            fusion [10]. As far as the SM is concerned we will consider
         | 
| 113 | 
            +
            the case where transport in the stochastic sea is normal
         | 
| 114 | 
            +
            (even if the phase space exhibits a mixture of chaotic and
         | 
| 115 | 
            +
            elliptic components (see Figure 1).
         | 
| 116 | 
            +
            Figure 1. Phase-space portrait for the standard map (1) on
         | 
| 117 | 
            +
            the 2-torus, for K = 2.6. Here 40 uniformly distributed initial
         | 
| 118 | 
            +
            conditions were used for x, while maintaining p0 = 0 fixed:
         | 
| 119 | 
            +
            each initial condition is iterated 104 times.
         | 
| 120 | 
            +
            On the other side the TM is defined (on the cylinder)
         | 
| 121 | 
            +
            as:
         | 
| 122 | 
            +
            pn+1 = pn + 2(xn− ⇂ xn ↿ −µ(−1)⇂xn↿),
         | 
| 123 | 
            +
            xn+1 = xn − 2pn+1
         | 
| 124 | 
            +
            mod 2,
         | 
| 125 | 
            +
            (3)
         | 
| 126 | 
            +
            where ⇂ · · · ↿ denotes the nearest integer. It was intro-
         | 
| 127 | 
            +
            duced in [11] (see also [21]) as a limit case for the Birkhoff
         | 
| 128 | 
            +
            map of irrational triangular billiards: systems lacking ex-
         | 
| 129 | 
            +
            ponential instability, whose ergodic properties are subtly
         | 
| 130 | 
            +
            related to irrationality properties of the angles [22–25]:
         | 
| 131 | 
            +
            we remark that polygonal billiards represent both a hard
         | 
| 132 | 
            +
            mathematical challenge [26–29], and a natural bench-
         | 
| 133 | 
            +
            mark when trying to assess which microscopic dynam-
         | 
| 134 | 
            +
            ical features lead to macroscopic transport laws [30–32]
         | 
| 135 | 
            +
            ( see also [33, 34]): in this respect it is worth mentioning
         | 
| 136 | 
            +
            that anomalous transport has been associated to scaling
         | 
| 137 | 
            +
            exponents of the spectral measure [35], and that general-
         | 
| 138 | 
            +
            ized triangle maps have been investigated recently, both
         | 
| 139 | 
            +
            as connected to dynamical localization [36], and with
         | 
| 140 | 
            +
            respect to slow diffusion [37]. A typical phase portrait
         | 
| 141 | 
            +
            (on the torus) of the TM is shown in Figure 2. Before
         | 
| 142 | 
            +
            Figure 2. Phase-space dynamics for the triangle map (3), for
         | 
| 143 | 
            +
            µ =
         | 
| 144 | 
            +
            1+
         | 
| 145 | 
            +
            √
         | 
| 146 | 
            +
            5
         | 
| 147 | 
            +
            2
         | 
| 148 | 
            +
            (golden mean).
         | 
| 149 | 
            +
            Here 100 randomly distributed
         | 
| 150 | 
            +
            initial conditions were used for x and p: each initial condition
         | 
| 151 | 
            +
            is iterated 5×104 times. Notice the typical filament structure
         | 
| 152 | 
            +
            in the phase space [23, 24].
         | 
| 153 | 
            +
            mentioning the numerical experiments we performed, a
         | 
| 154 | 
            +
            crucial observation is in order. When looking at trans-
         | 
| 155 | 
            +
            port properties (and records statistics), considering maps
         | 
| 156 | 
            +
            on the cylinder is quite natural, while from the ergodic
         | 
| 157 | 
            +
            point of view this perspective is somehow delicate, since
         | 
| 158 | 
            +
            no renormalizable invariant density exists [14, 15], and
         | 
| 159 | 
            +
            the appropriate setting is infinite ergodic theory. When
         | 
| 160 | 
            +
            polygonal channels are considered, even establishing re-
         | 
| 161 | 
            +
            current properties of the dynamics is a demanding task
         | 
| 162 | 
            +
            [38].
         | 
| 163 | 
            +
            The first set of properties we investigated is more con-
         | 
| 164 | 
            +
            ventional, and a few results -as we will mention in the
         | 
| 165 | 
            +
            next section- have already been considered, especially as
         | 
| 166 | 
            +
            far as the SM is considered. We will look at transport
         | 
| 167 | 
            +
            properties, in particular through the first and the sec-
         | 
| 168 | 
            +
            ond moment of the diffusing variable We will also con-
         | 
| 169 | 
            +
            sider records’ statistics, which recently has turned very
         | 
| 170 | 
            +
            popular (see [39, 40] and references therein). Then we
         | 
| 171 | 
            +
            will study statistical properties like persistence probabil-
         | 
| 172 | 
            +
            ity and (generalized) arcsine law [41, 42]: while motion
         | 
| 173 | 
            +
            in the stochastic sea for the SM will exhibit typical prop-
         | 
| 174 | 
            +
            erties of a simple stochastic process like a random walk,
         | 
| 175 | 
            +
             | 
| 176 | 
            +
            1.0
         | 
| 177 | 
            +
            p
         | 
| 178 | 
            +
            0.0
         | 
| 179 | 
            +
            0.0
         | 
| 180 | 
            +
            2.00.5
         | 
| 181 | 
            +
            p
         | 
| 182 | 
            +
            -0.5
         | 
| 183 | 
            +
            0.03
         | 
| 184 | 
            +
            our findings are quite different in the case of the TM.
         | 
| 185 | 
            +
            III.
         | 
| 186 | 
            +
            RESULTS
         | 
| 187 | 
            +
            We start by considering properties associated to the
         | 
| 188 | 
            +
            spreading of trajectories over the phase space, then we
         | 
| 189 | 
            +
            will consider occupation time statistics.
         | 
| 190 | 
            +
            A.
         | 
| 191 | 
            +
            Diffusion
         | 
| 192 | 
            +
            This is a warm-up exercise, since transport properties
         | 
| 193 | 
            +
            have been studied both for the SM [1, 16, 17] and for the
         | 
| 194 | 
            +
            TM [25]. We observe normal transport for the case of
         | 
| 195 | 
            +
            the SM (see panels (c) and (d) in Figure 3), while for the
         | 
| 196 | 
            +
            TM are results indicate a superdiffusion, with
         | 
| 197 | 
            +
            ⟨(pn − p0)2⟩ ∼ n1.83,
         | 
| 198 | 
            +
            (4)
         | 
| 199 | 
            +
            in agreement with [25]. We remark that by looking at the
         | 
| 200 | 
            +
            power-law exponents of the first two moments, we have
         | 
| 201 | 
            +
            that possibly anomalous diffusion is weak [10], namely if
         | 
| 202 | 
            +
            we consider the full spectrum of moments’ asymptotics:
         | 
| 203 | 
            +
            ⟨|pn − p0|q⟩ ∼ nφ(q),
         | 
| 204 | 
            +
            (5)
         | 
| 205 | 
            +
            we have a single scaling, in the sense that
         | 
| 206 | 
            +
            φ(q) = α · q;
         | 
| 207 | 
            +
            (6)
         | 
| 208 | 
            +
            where normal diffusion is recovered when α = 1/2. This
         | 
| 209 | 
            +
            is reasonable since weak anomalous diffusion has been
         | 
| 210 | 
            +
            observed in polygonal billiards [43].
         | 
| 211 | 
            +
            B.
         | 
| 212 | 
            +
            Average number of records
         | 
| 213 | 
            +
            The statistics of records is very popular in the anal-
         | 
| 214 | 
            +
            ysis of correlated and uncorrelated stochastic time se-
         | 
| 215 | 
            +
            quences [39, 40]:
         | 
| 216 | 
            +
            since this subject has not been ex-
         | 
| 217 | 
            +
            plores thoroughly in the deterministic setting (with the
         | 
| 218 | 
            +
            remarkable exception of [44, 45]), we briefly review the
         | 
| 219 | 
            +
            basic concepts. First of all let us recall the (straightfor-
         | 
| 220 | 
            +
            ward) definition of a record: given a sequence of real data
         | 
| 221 | 
            +
            x0, x1, . . . , xk, . . . the element xm is a record if
         | 
| 222 | 
            +
            xm > xj
         | 
| 223 | 
            +
            j = 0, 1, . . . m − 1,
         | 
| 224 | 
            +
            (7)
         | 
| 225 | 
            +
            (we consider x0 to be the first record).
         | 
| 226 | 
            +
            To the se-
         | 
| 227 | 
            +
            quence of data points we associate the binary string
         | 
| 228 | 
            +
            σ0, σ1, . . . , σk, . . . , where
         | 
| 229 | 
            +
            σl =
         | 
| 230 | 
            +
            �
         | 
| 231 | 
            +
            1
         | 
| 232 | 
            +
            if xl is a record
         | 
| 233 | 
            +
            0
         | 
| 234 | 
            +
            otherwise
         | 
| 235 | 
            +
            (8)
         | 
| 236 | 
            +
            The number of records up to time N is then
         | 
| 237 | 
            +
            MN =
         | 
| 238 | 
            +
            N
         | 
| 239 | 
            +
            �
         | 
| 240 | 
            +
            j=0
         | 
| 241 | 
            +
            σj.
         | 
| 242 | 
            +
            (9)
         | 
| 243 | 
            +
            10−1
         | 
| 244 | 
            +
            100
         | 
| 245 | 
            +
            101
         | 
| 246 | 
            +
            102
         | 
| 247 | 
            +
            103
         | 
| 248 | 
            +
            104
         | 
| 249 | 
            +
            105
         | 
| 250 | 
            +
            106
         | 
| 251 | 
            +
            107
         | 
| 252 | 
            +
            108
         | 
| 253 | 
            +
            100
         | 
| 254 | 
            +
            101
         | 
| 255 | 
            +
            102
         | 
| 256 | 
            +
            103
         | 
| 257 | 
            +
            104
         | 
| 258 | 
            +
            105
         | 
| 259 | 
            +
            106
         | 
| 260 | 
            +
            107
         | 
| 261 | 
            +
            108
         | 
| 262 | 
            +
            (b)
         | 
| 263 | 
            +
            10−2
         | 
| 264 | 
            +
            10−1
         | 
| 265 | 
            +
            100
         | 
| 266 | 
            +
            101
         | 
| 267 | 
            +
            102
         | 
| 268 | 
            +
            103
         | 
| 269 | 
            +
            104
         | 
| 270 | 
            +
            105
         | 
| 271 | 
            +
            100
         | 
| 272 | 
            +
            101
         | 
| 273 | 
            +
            102
         | 
| 274 | 
            +
            103
         | 
| 275 | 
            +
            104
         | 
| 276 | 
            +
            105
         | 
| 277 | 
            +
            106
         | 
| 278 | 
            +
            (d)
         | 
| 279 | 
            +
            10−1
         | 
| 280 | 
            +
            100
         | 
| 281 | 
            +
            101
         | 
| 282 | 
            +
            102
         | 
| 283 | 
            +
            103
         | 
| 284 | 
            +
            104
         | 
| 285 | 
            +
            100
         | 
| 286 | 
            +
            101
         | 
| 287 | 
            +
            102
         | 
| 288 | 
            +
            103
         | 
| 289 | 
            +
            104
         | 
| 290 | 
            +
            105
         | 
| 291 | 
            +
            106
         | 
| 292 | 
            +
            107
         | 
| 293 | 
            +
            108
         | 
| 294 | 
            +
            (a)
         | 
| 295 | 
            +
            10−2
         | 
| 296 | 
            +
            10−1
         | 
| 297 | 
            +
            100
         | 
| 298 | 
            +
            101
         | 
| 299 | 
            +
            102
         | 
| 300 | 
            +
            100
         | 
| 301 | 
            +
            101
         | 
| 302 | 
            +
            102
         | 
| 303 | 
            +
            103
         | 
| 304 | 
            +
            104
         | 
| 305 | 
            +
            105
         | 
| 306 | 
            +
            106
         | 
| 307 | 
            +
            (c)
         | 
| 308 | 
            +
            σ2(n)
         | 
| 309 | 
            +
            ⟨(pn − p0)2⟩
         | 
| 310 | 
            +
            n
         | 
| 311 | 
            +
            ⟨M(n)⟩
         | 
| 312 | 
            +
            ⟨pn − p0⟩
         | 
| 313 | 
            +
            n
         | 
| 314 | 
            +
            Figure 3.
         | 
| 315 | 
            +
            (a) Average number of records, (b) variance, (c)
         | 
| 316 | 
            +
            first, and (b) second moments of variable p for K = 2.6 in the
         | 
| 317 | 
            +
            standard map (1), as a function of time. These quantities were
         | 
| 318 | 
            +
            computed for 106 initial conditions for x0, arbitrarily chosen
         | 
| 319 | 
            +
            in the chaotic sea along the line p0 = 0. Black-continuous
         | 
| 320 | 
            +
            lines correspond to power-law asymptotics fit F(n) = anγ:
         | 
| 321 | 
            +
            the fitting parameters are, for (a) a = 0.86(0), γ = 0.50(9), for
         | 
| 322 | 
            +
            (b) a = 0.50(7), γ = 1.00(3), for (c) a = 0.77(7), γ = 0.50(1)
         | 
| 323 | 
            +
            and for (d) a = 0.02(1), γ = 0.99(1).
         | 
| 324 | 
            +
            The properties of the average number of records,
         | 
| 325 | 
            +
            ⟨MN⟩, and the corresponding variance
         | 
| 326 | 
            +
            V ar(MN) = ⟨M 2
         | 
| 327 | 
            +
            N⟩ − ⟨MN⟩2
         | 
| 328 | 
            +
            (10)
         | 
| 329 | 
            +
            are important tools to access the nature of the data se-
         | 
| 330 | 
            +
            quence: as a matter of fact if the different xj are inde-
         | 
| 331 | 
            +
            pendent, identically distributed random variables, then,
         | 
| 332 | 
            +
            for large N we have [46, 47]:
         | 
| 333 | 
            +
            ⟨MN⟩ = ln N + γE + O(N −1),
         | 
| 334 | 
            +
            (11)
         | 
| 335 | 
            +
            where γE = 0.5772 . . . is the Euler-Mascheroni constant,
         | 
| 336 | 
            +
            and
         | 
| 337 | 
            +
            V ar(MN) = σ2(N) = ln N + γE − π2
         | 
| 338 | 
            +
            6 + O(N −1). (12)
         | 
| 339 | 
            +
            We remark that both quantities are independent of the
         | 
| 340 | 
            +
            common distribution of the random variables: this uni-
         | 
| 341 | 
            +
            versality is an important feature of record statistics in
         | 
| 342 | 
            +
            different contexts.
         | 
| 343 | 
            +
            Results are quite different for a correlated sequence, as
         | 
| 344 | 
            +
            when xj denotes the position of a random walker at time
         | 
| 345 | 
            +
            j:
         | 
| 346 | 
            +
            xj+1 = xj + ξj+1,
         | 
| 347 | 
            +
            (13)
         | 
| 348 | 
            +
            where the jumps are taken from a common distribution
         | 
| 349 | 
            +
            ℘(ξ). In this case the behaviour is [39, 40]:
         | 
| 350 | 
            +
            ⟨MN⟩ ≈
         | 
| 351 | 
            +
            2
         | 
| 352 | 
            +
            √π
         | 
| 353 | 
            +
            √
         | 
| 354 | 
            +
            N,
         | 
| 355 | 
            +
            (14)
         | 
| 356 | 
            +
             | 
| 357 | 
            +
            4
         | 
| 358 | 
            +
            100
         | 
| 359 | 
            +
            102
         | 
| 360 | 
            +
            104
         | 
| 361 | 
            +
            106
         | 
| 362 | 
            +
            108
         | 
| 363 | 
            +
            1010
         | 
| 364 | 
            +
            1012
         | 
| 365 | 
            +
            100
         | 
| 366 | 
            +
            101
         | 
| 367 | 
            +
            102
         | 
| 368 | 
            +
            103
         | 
| 369 | 
            +
            104
         | 
| 370 | 
            +
            105
         | 
| 371 | 
            +
            106
         | 
| 372 | 
            +
            107
         | 
| 373 | 
            +
            (b)
         | 
| 374 | 
            +
            102
         | 
| 375 | 
            +
            104
         | 
| 376 | 
            +
            106
         | 
| 377 | 
            +
            108
         | 
| 378 | 
            +
            1010
         | 
| 379 | 
            +
            1012
         | 
| 380 | 
            +
            100
         | 
| 381 | 
            +
            101
         | 
| 382 | 
            +
            102
         | 
| 383 | 
            +
            103
         | 
| 384 | 
            +
            104
         | 
| 385 | 
            +
            105
         | 
| 386 | 
            +
            106
         | 
| 387 | 
            +
            107
         | 
| 388 | 
            +
            (d)
         | 
| 389 | 
            +
            10−1
         | 
| 390 | 
            +
            100
         | 
| 391 | 
            +
            101
         | 
| 392 | 
            +
            102
         | 
| 393 | 
            +
            103
         | 
| 394 | 
            +
            104
         | 
| 395 | 
            +
            105
         | 
| 396 | 
            +
            106
         | 
| 397 | 
            +
            100
         | 
| 398 | 
            +
            101
         | 
| 399 | 
            +
            102
         | 
| 400 | 
            +
            103
         | 
| 401 | 
            +
            104
         | 
| 402 | 
            +
            105
         | 
| 403 | 
            +
            106
         | 
| 404 | 
            +
            107
         | 
| 405 | 
            +
            (a)
         | 
| 406 | 
            +
            100
         | 
| 407 | 
            +
            101
         | 
| 408 | 
            +
            102
         | 
| 409 | 
            +
            103
         | 
| 410 | 
            +
            104
         | 
| 411 | 
            +
            105
         | 
| 412 | 
            +
            106
         | 
| 413 | 
            +
            107
         | 
| 414 | 
            +
            100
         | 
| 415 | 
            +
            101
         | 
| 416 | 
            +
            102
         | 
| 417 | 
            +
            103
         | 
| 418 | 
            +
            104
         | 
| 419 | 
            +
            105
         | 
| 420 | 
            +
            106
         | 
| 421 | 
            +
            107
         | 
| 422 | 
            +
            (c)
         | 
| 423 | 
            +
            σ2(n)
         | 
| 424 | 
            +
            ⟨(pn − p0)2⟩
         | 
| 425 | 
            +
            n
         | 
| 426 | 
            +
            ⟨M(n)⟩
         | 
| 427 | 
            +
            ⟨pn − p0⟩
         | 
| 428 | 
            +
            n
         | 
| 429 | 
            +
            Figure 4. (a) Average number of records, (b) variance, (c)
         | 
| 430 | 
            +
            first, and (b) second moments of variable p for the golden
         | 
| 431 | 
            +
            mean µ =
         | 
| 432 | 
            +
            1+
         | 
| 433 | 
            +
            √
         | 
| 434 | 
            +
            5
         | 
| 435 | 
            +
            2
         | 
| 436 | 
            +
            in the triangular map (3) as a function of
         | 
| 437 | 
            +
            time.
         | 
| 438 | 
            +
            These quantities were computed for 106 initial con-
         | 
| 439 | 
            +
            ditions for x0, arbitrarily chosen in phase space along the
         | 
| 440 | 
            +
            line p0 = 0. Black-continuous lines correspond to power-law
         | 
| 441 | 
            +
            asymptotics F(n) = anγ: the fitting parameters are, for (a)
         | 
| 442 | 
            +
            a = 0.13(9), γ = 0.92(4), for (b) a = 0.04(0), γ = 1.84(9),
         | 
| 443 | 
            +
            for (c) a = 0.65(4), γ = 0.92(4) and for (c) a = 0.67(6),
         | 
| 444 | 
            +
            γ = 1.86(0) in (d).
         | 
| 445 | 
            +
            and
         | 
| 446 | 
            +
            V ar(MN) ≈ 2
         | 
| 447 | 
            +
            �
         | 
| 448 | 
            +
            1 − 2
         | 
| 449 | 
            +
            π
         | 
| 450 | 
            +
            �
         | 
| 451 | 
            +
            N,
         | 
| 452 | 
            +
            (15)
         | 
| 453 | 
            +
            so that the standard deviation is of the same order of
         | 
| 454 | 
            +
            magnitude as the average.
         | 
| 455 | 
            +
            Again this is a universal
         | 
| 456 | 
            +
            result, independent of the particular jump distribution
         | 
| 457 | 
            +
            ℘(ξ), as long as the distribution is continuous and sym-
         | 
| 458 | 
            +
            metric. The crucial ingredient of the proof is that the
         | 
| 459 | 
            +
            process renews as soon as a new record is achieved and
         | 
| 460 | 
            +
            the appearance of the new record is related to the survival
         | 
| 461 | 
            +
            probability for the process, which is universal in view of
         | 
| 462 | 
            +
            Sparre-Andersen theorem [42, 48, 49] (see also [50]).
         | 
| 463 | 
            +
            Numerical results on records statistics are reported in
         | 
| 464 | 
            +
            Figures 3, 4, panels (a) and (b): for the SM our results
         | 
| 465 | 
            +
            are consistent with early investigations [44, 45], and with
         | 
| 466 | 
            +
            the asymptotic behaviour of a random walk, while for
         | 
| 467 | 
            +
            the TM we observe anomalous scaling w.r.t. (14,15): the
         | 
| 468 | 
            +
            behaviour is related to transport properties, in the sense
         | 
| 469 | 
            +
            that data are consistent with the growths:
         | 
| 470 | 
            +
            ⟨MN⟩ ∼ N φ(1),
         | 
| 471 | 
            +
            V ar(MN) ∼ N φ(2).
         | 
| 472 | 
            +
            (16)
         | 
| 473 | 
            +
            A similar behaviour was observed in [44, 45], for the SM
         | 
| 474 | 
            +
            in the presence of accelerator modes. We remark that,
         | 
| 475 | 
            +
            though in the following we will fix our attention of a
         | 
| 476 | 
            +
            particular parameter value for the TM, we checked that
         | 
| 477 | 
            +
            reported experiments do not depend on the particular
         | 
| 478 | 
            +
            parameter choice, as exemplified in Figure 5, where the
         | 
| 479 | 
            +
            growth of the averaged number of records is reported for
         | 
| 480 | 
            +
            different parameters of the TM.
         | 
| 481 | 
            +
            While a general, quantitative relationship (if any) be-
         | 
| 482 | 
            +
            10−1
         | 
| 483 | 
            +
            100
         | 
| 484 | 
            +
            101
         | 
| 485 | 
            +
            102
         | 
| 486 | 
            +
            103
         | 
| 487 | 
            +
            104
         | 
| 488 | 
            +
            105
         | 
| 489 | 
            +
            106
         | 
| 490 | 
            +
            100
         | 
| 491 | 
            +
            101
         | 
| 492 | 
            +
            102
         | 
| 493 | 
            +
            103
         | 
| 494 | 
            +
            104
         | 
| 495 | 
            +
            105
         | 
| 496 | 
            +
            106
         | 
| 497 | 
            +
            107
         | 
| 498 | 
            +
            ⟨Mn⟩
         | 
| 499 | 
            +
            n
         | 
| 500 | 
            +
            √
         | 
| 501 | 
            +
            7
         | 
| 502 | 
            +
            √
         | 
| 503 | 
            +
            2/2
         | 
| 504 | 
            +
            (
         | 
| 505 | 
            +
            √
         | 
| 506 | 
            +
            5 + e)/12
         | 
| 507 | 
            +
            Figure 5. (a) Average number of records for three additional
         | 
| 508 | 
            +
            parameters µ in the TM. Black-continuous line correspond to
         | 
| 509 | 
            +
            the power-law asymptotic fitting function F(n) = anγ, with
         | 
| 510 | 
            +
            γ = 0.92(4).
         | 
| 511 | 
            +
            tween transport exponents and statistical properties of
         | 
| 512 | 
            +
            records has not been fully developed, to the best of our
         | 
| 513 | 
            +
            knowledge, it is possible, in some cases, to connect φ(1)
         | 
| 514 | 
            +
            to the expected maximum of the walk [51, 52], that, for
         | 
| 515 | 
            +
            random walk with unit jumps, coincides with the num-
         | 
| 516 | 
            +
            ber of records. On the other side we mention that non-
         | 
| 517 | 
            +
            homogeneous random walks offer examples where such
         | 
| 518 | 
            +
            relationship does not hold [53–57].
         | 
| 519 | 
            +
            C.
         | 
| 520 | 
            +
            Occupation time statistics
         | 
| 521 | 
            +
            When we consider the evolution on the cylinder, both
         | 
| 522 | 
            +
            for the SM and the TM, we are in the presence of in-
         | 
| 523 | 
            +
            finitely ergodic systems [14, 15], since, while Lebesgue
         | 
| 524 | 
            +
            measure is preserved, due to area conservation, the (con-
         | 
| 525 | 
            +
            stant) phase space is unbounded, so the invariant density
         | 
| 526 | 
            +
            cannot be normalized. This has a series of remarkable
         | 
| 527 | 
            +
            consequences, which originally have been considered in
         | 
| 528 | 
            +
            the context of stochastic processes, and then explored in
         | 
| 529 | 
            +
            the deterministic evolution framework.
         | 
| 530 | 
            +
            One of the most striking property that has been in-
         | 
| 531 | 
            +
            vestigated is the generalized arcsine law (see [41] for the
         | 
| 532 | 
            +
            standard formulation for stochastic processes): we briefly
         | 
| 533 | 
            +
            recall the main result that lies at the basis of our analysis,
         | 
| 534 | 
            +
            namely Lamperti’s theorem [58]. The original formula-
         | 
| 535 | 
            +
            tion involves discrete stochastic processes, for which the
         | 
| 536 | 
            +
            infinite set of possible states can be separated into two
         | 
| 537 | 
            +
            sets A and B separated by a single site x0, such that a
         | 
| 538 | 
            +
             | 
| 539 | 
            +
            5
         | 
| 540 | 
            +
            transition from one set to the other can only be achieved
         | 
| 541 | 
            +
            by passing through x0, which can be taken as the start-
         | 
| 542 | 
            +
            ing site, and is supposed to be recurrent (namely the
         | 
| 543 | 
            +
            probability of returning to it is 1). For instance we can
         | 
| 544 | 
            +
            think of one dimensional random walk on an integer lat-
         | 
| 545 | 
            +
            tice, with x0 = 0 and A (B) consists of strictly positive
         | 
| 546 | 
            +
            (negative) lattice sites. We are interested in the limit-
         | 
| 547 | 
            +
            ing distribution of N(n)/n, the fraction of time spent in
         | 
| 548 | 
            +
            the positive semi-axis up to time n. The theorem states
         | 
| 549 | 
            +
            that such a distribution exists in the n → ∞ limit, and
         | 
| 550 | 
            +
            it is characterized by two parameters α and η. η is re-
         | 
| 551 | 
            +
            lated to symmetry properties of the process, being the
         | 
| 552 | 
            +
            expectation value of the fraction of time spent in R+:
         | 
| 553 | 
            +
            η = lim
         | 
| 554 | 
            +
            n→∞ E
         | 
| 555 | 
            +
            �N(n)
         | 
| 556 | 
            +
            n
         | 
| 557 | 
            +
            �
         | 
| 558 | 
            +
            :
         | 
| 559 | 
            +
            (17)
         | 
| 560 | 
            +
            for a symmetric process η = 1/2, and from now on we
         | 
| 561 | 
            +
            will only consider such a case.
         | 
| 562 | 
            +
            −1.0
         | 
| 563 | 
            +
            −0.5
         | 
| 564 | 
            +
            0.0
         | 
| 565 | 
            +
            0.5
         | 
| 566 | 
            +
            1.0
         | 
| 567 | 
            +
            1.5
         | 
| 568 | 
            +
            2.0
         | 
| 569 | 
            +
            2.5
         | 
| 570 | 
            +
            0.0
         | 
| 571 | 
            +
            0.5
         | 
| 572 | 
            +
            1.0
         | 
| 573 | 
            +
            1.5
         | 
| 574 | 
            +
            2.0
         | 
| 575 | 
            +
            2.5
         | 
| 576 | 
            +
            3.0
         | 
| 577 | 
            +
            (b)
         | 
| 578 | 
            +
            −0.4
         | 
| 579 | 
            +
            −0.2
         | 
| 580 | 
            +
            0.0
         | 
| 581 | 
            +
            0.2
         | 
| 582 | 
            +
            0.4
         | 
| 583 | 
            +
            0.6
         | 
| 584 | 
            +
            0.8
         | 
| 585 | 
            +
            1.0
         | 
| 586 | 
            +
            1.2
         | 
| 587 | 
            +
            1.4
         | 
| 588 | 
            +
            0.0
         | 
| 589 | 
            +
            0.5
         | 
| 590 | 
            +
            1.0
         | 
| 591 | 
            +
            1.5
         | 
| 592 | 
            +
            2.0
         | 
| 593 | 
            +
            2.5
         | 
| 594 | 
            +
            3.0
         | 
| 595 | 
            +
            (a)
         | 
| 596 | 
            +
            arccos(2(N(n)/n)−1)
         | 
| 597 | 
            +
            log10P(N(n)/n))
         | 
| 598 | 
            +
            arccos(2(N(n)/n)−1)
         | 
| 599 | 
            +
            Figure 6. Distribution of the fraction of time spent in the positive axis for the momentum p in the standard (1) (a) and triangle
         | 
| 600 | 
            +
            (3) (b) maps, in semi-logarithmic scale. To enhance readability of the border values, the transformation x → arccos(2x − 1) on
         | 
| 601 | 
            +
            the horizontal axis. The (light blue) points represent the simulation results, the (red) line the Lamperti distribution (20). Data
         | 
| 602 | 
            +
            are obtained by computing 106 initial conditions iterated 106 times for the standard map and 106 initial conditions iterated
         | 
| 603 | 
            +
            108 times for the triangle map. The fitting parameters are α = 0.49(9) for (a) and α = 0.42(0) for (b). In the case of the TM,
         | 
| 604 | 
            +
            data suggest a superposition of a (rescaled) Lamperti distribution and two Dirac’s δ centered of x = 0 and x = 1 (see text).
         | 
| 605 | 
            +
            The other parameter α is instead connected to the be-
         | 
| 606 | 
            +
            haviour of the generating function of first return prob-
         | 
| 607 | 
            +
            abilities to the starting site: it can be shown [59] that
         | 
| 608 | 
            +
            it can be related to the probability Pn of being at the
         | 
| 609 | 
            +
            starting site after n steps in the following way:
         | 
| 610 | 
            +
            Pn ∼ H(n)
         | 
| 611 | 
            +
            n1−α ,
         | 
| 612 | 
            +
            (18)
         | 
| 613 | 
            +
            where H(n) is a slowly varying function, namely
         | 
| 614 | 
            +
            lim
         | 
| 615 | 
            +
            n→∞
         | 
| 616 | 
            +
            H(yn)
         | 
| 617 | 
            +
            n
         | 
| 618 | 
            +
            = 1.
         | 
| 619 | 
            +
            (19)
         | 
| 620 | 
            +
            Under such conditions the density of ϕ = N(n)/n in the
         | 
| 621 | 
            +
            infinite time limit is given by Lamperti distribution:
         | 
| 622 | 
            +
            Gα(ϕ) = sin(πα)
         | 
| 623 | 
            +
            π
         | 
| 624 | 
            +
            ϕ1−α(1 − ϕ)1−α
         | 
| 625 | 
            +
            ϕ2α + 2ϕα(1 − ϕ)α cos(πα) + (1 − ϕ)2α ,
         | 
| 626 | 
            +
            (20)
         | 
| 627 | 
            +
            that reproduces the usual arcsine law
         | 
| 628 | 
            +
            P ((Nn/n) ≤ ξ) = 2
         | 
| 629 | 
            +
            π arcsin
         | 
| 630 | 
            +
            ��
         | 
| 631 | 
            +
            ξ
         | 
| 632 | 
            +
            �
         | 
| 633 | 
            +
            (21)
         | 
| 634 | 
            +
            when α = 1/2, in the universality class of Sparre-
         | 
| 635 | 
            +
            Andersen theorem. Deviations from standard arcsine law
         | 
| 636 | 
            +
            have been reported for a number of cases, in the frame-
         | 
| 637 | 
            +
            work of deterministic dynamics [60–67], mainly in the
         | 
| 638 | 
            +
            context of intermittent maps. Numerical experiments for
         | 
| 639 | 
            +
            the SM confirm the validity of the arcsine law, α = 1/2,
         | 
| 640 | 
            +
            see panel (a) in Figure 6: to our knowledge this is the
         | 
| 641 | 
            +
            first time such an indicator has been considered in the
         | 
| 642 | 
            +
            analysis of area preserving maps.
         | 
| 643 | 
            +
            The results, as expected, are quite different for the TM,
         | 
| 644 | 
            +
            and they suggest novel features exhibited by this map. In
         | 
| 645 | 
            +
            particular (see panel (b) in Figure 6) numerical results are
         | 
| 646 | 
            +
            well fitted by a Lamperti distribution (with α ≈ 0.42),
         | 
| 647 | 
            +
            thus different from an ordinary random walk), except for
         | 
| 648 | 
            +
            the endpoints, that present enhanced peaks. Intuitively
         | 
| 649 | 
            +
             | 
| 650 | 
            +
            6
         | 
| 651 | 
            +
            such an additional contribution might be due to a frac-
         | 
| 652 | 
            +
            tion of orbits never returning to the origin: this would
         | 
| 653 | 
            +
            correspond, in stochastic language, to a transient random
         | 
| 654 | 
            +
            walk (we recall that, according to Pólya’s theorem [68] a
         | 
| 655 | 
            +
            simple symmetric random walk is recurrent -so the return
         | 
| 656 | 
            +
            to the starting site is sure- in one and two dimensions,
         | 
| 657 | 
            +
            and transient in higher dimensions). Such a possibility is
         | 
| 658 | 
            +
            indeed not excluded for infinite polygonal channels [38].
         | 
| 659 | 
            +
            Our last set of simulations concerns the survival proba-
         | 
| 660 | 
            +
            bility [61]:
         | 
| 661 | 
            +
            Pcum(n) = prob (pn ≥ 0 . . . p1 ≥ 0|p0 = 0) .
         | 
| 662 | 
            +
            (22)
         | 
| 663 | 
            +
            10−3
         | 
| 664 | 
            +
            10−2
         | 
| 665 | 
            +
            10−1
         | 
| 666 | 
            +
            100
         | 
| 667 | 
            +
            100
         | 
| 668 | 
            +
            101
         | 
| 669 | 
            +
            102
         | 
| 670 | 
            +
            103
         | 
| 671 | 
            +
            104
         | 
| 672 | 
            +
            105
         | 
| 673 | 
            +
            106
         | 
| 674 | 
            +
            (a)
         | 
| 675 | 
            +
            10−2
         | 
| 676 | 
            +
            10−1
         | 
| 677 | 
            +
            100
         | 
| 678 | 
            +
            100 101 102 103 104 105 106 107 108 109
         | 
| 679 | 
            +
            (b)
         | 
| 680 | 
            +
            Pcum(n)
         | 
| 681 | 
            +
            n
         | 
| 682 | 
            +
            n
         | 
| 683 | 
            +
            Figure 7. Cumulative distribution function for the survival times obtained for the variable p for (a) the standard map (1), and
         | 
| 684 | 
            +
            (b) the triangle map (3), in logarithmic scale. Data are obtained by simulating 106 and 105 initial conditions, respectively.
         | 
| 685 | 
            +
            Continuous-black lines correspond to power-law asymptotic functions F(n) = a + bn−α: the fitting parameters are a = 0, b =
         | 
| 686 | 
            +
            2.80(0), and α = 0.51(5) in (a) and a = 0.021(0), b = 1.62(6), and α = 0.42(0) in (b).
         | 
| 687 | 
            +
            When considering recurrent random walks, the asymp-
         | 
| 688 | 
            +
            totic behaviour of the survival probability is again ruled
         | 
| 689 | 
            +
            by Lamperti exponent [58, 59] (see also [69]):
         | 
| 690 | 
            +
            Pcum(n) ∼ n−α.
         | 
| 691 | 
            +
            (23)
         | 
| 692 | 
            +
            Once again SM simulations (see panel (a) in Figure 7)
         | 
| 693 | 
            +
            agree with expected behaviour for simple random walks
         | 
| 694 | 
            +
            (α = 1/2), while the situation is completely different for
         | 
| 695 | 
            +
            the TM, where the survival probability seems to tend to
         | 
| 696 | 
            +
            a finite limit for large n, see panel (b) in Figure 7. This
         | 
| 697 | 
            +
            is coherent with the transient nature of the TM, which
         | 
| 698 | 
            +
            we conjectured in the analysis of generalized arcsine law.
         | 
| 699 | 
            +
            IV.
         | 
| 700 | 
            +
            DISCUSSION
         | 
| 701 | 
            +
            We have performed a set of extensive numerical experi-
         | 
| 702 | 
            +
            ments on two paradigmatic area-preserving maps, the SM
         | 
| 703 | 
            +
            and the TM, focusing in the case where such maps are
         | 
| 704 | 
            +
            considered on a cylinder, namely a non compact phase
         | 
| 705 | 
            +
            space. Firstly we reproduced known results about nor-
         | 
| 706 | 
            +
            mal diffusion for typical (chaotic) parameters of the SM,
         | 
| 707 | 
            +
            and superdiffusion for the TM. Then we explored records’
         | 
| 708 | 
            +
            statistics: numerical simulations again confirm that the
         | 
| 709 | 
            +
            SM behave like a simple random walk, while anomalous
         | 
| 710 | 
            +
            growth is exhibited by the TM. The most interesting re-
         | 
| 711 | 
            +
            sults arise in the analysis of occupation times, like gen-
         | 
| 712 | 
            +
            eralized arcsine law and survival probability. While once
         | 
| 713 | 
            +
            again normal stochastic properties are displayed by the
         | 
| 714 | 
            +
            SM, the TM presents more surprising results, which we
         | 
| 715 | 
            +
            conjecture are possibly connected to lack of conserva-
         | 
| 716 | 
            +
            tivity [38] (or transient behaviour, in the language of
         | 
| 717 | 
            +
            random walks). This feature, which we think is worth
         | 
| 718 | 
            +
            of further investigations, might suggest new stochastic
         | 
| 719 | 
            +
            modeling of the TM (see [37]).
         | 
| 720 | 
            +
            AUTHORS’ CONTRIBUTIONS
         | 
| 721 | 
            +
            All authors have contributed substantially to the work.
         | 
| 722 | 
            +
            All authors have read and agreed to the published version
         | 
| 723 | 
            +
            of the manuscript.
         | 
| 724 | 
            +
             | 
| 725 | 
            +
            7
         | 
| 726 | 
            +
            ACKNOWLEDGEMENTS
         | 
| 727 | 
            +
            R.A. acknowledges partial support from PRIN Re-
         | 
| 728 | 
            +
            search Project No. 2017S35EHN “Regular and stochastic
         | 
| 729 | 
            +
            behavior in dynamical systems” of the Italian Ministry of
         | 
| 730 | 
            +
            Education, University and Research (MIUR). R.A. ac-
         | 
| 731 | 
            +
            knowledges an association to the GNFM group of IN-
         | 
| 732 | 
            +
            DAM. R.A thanks Gaia Pozzoli for discussions. C.M. ac-
         | 
| 733 | 
            +
            knowledges the National Council for Scientific and Tech-
         | 
| 734 | 
            +
            nological Development - CNPq (Brazilian agency) for
         | 
| 735 | 
            +
            partial financial support (Grant Number 310228/2020-4).
         | 
| 736 | 
            +
            T.M.O. acknowledges the Coordenação de Aperfeiçoa-
         | 
| 737 | 
            +
            mento de Pessoal de Nível Superior - CAPES (Brazilian
         | 
| 738 | 
            +
            agency ) - Finance Code 001, for partial financial sup-
         | 
| 739 | 
            +
            port. Additionally, T.M.O. and C.M. also acknowledges
         | 
| 740 | 
            +
            the Fundação de Amparo à Pesquisa e Inovação do Es-
         | 
| 741 | 
            +
            tado de Santa Catarina - FAPESC (Brazilian agency) for
         | 
| 742 | 
            +
            partial financial support.
         | 
| 743 | 
            +
            [1] Lichtenberg, A.J.; Lieberman, M.A. Regular and chaotic
         | 
| 744 | 
            +
            dynamics; Springer: Berlin, Germany, 1992.
         | 
| 745 | 
            +
            [2] Ott, E., Chaos in dynamical systems; CUP: Cambridge,
         | 
| 746 | 
            +
            U.K. 2002.
         | 
| 747 | 
            +
            [3] Cvitanović, P.; Artuso, R.; Mainieri, R.; Tanner, G.; Vat-
         | 
| 748 | 
            +
            tay, G., Chaos: Classical and Quantum, ChaosBook.org
         | 
| 749 | 
            +
            ; Niels Bohr Institute, Copenhagen 2020.
         | 
| 750 | 
            +
            [4] Artuso, R.; Burioni, R. Anomalous diffusion: determin-
         | 
| 751 | 
            +
            istic and stochastic perspectives. In Large deviations in
         | 
| 752 | 
            +
            physics; Vulpiani A. et al., Eds.; Springer-Verlag: Berlin
         | 
| 753 | 
            +
            Heidelberg, Germany, 2014; pp. 263–293.
         | 
| 754 | 
            +
            [5] Chirikov, B.V.; Shepelyansky, D.L. Chirikov standard
         | 
| 755 | 
            +
            map. Scholarpedia 2008, 3, 3550.
         | 
| 756 | 
            +
            [6] Casati, G.; Chirikov, B.V., (Eds.) Quantum chaos; OUP:
         | 
| 757 | 
            +
            Oxford, U.K., 1995.
         | 
| 758 | 
            +
            [7] Bloor, K.; Luzzatto, S. Some remarks on the geometry of
         | 
| 759 | 
            +
            the standard map. Int.J.Bifurcat.Chaos 2009, 19, 2213–
         | 
| 760 | 
            +
            2232.
         | 
| 761 | 
            +
            [8] Chirikov, B.V. A universal instability of many dimen-
         | 
| 762 | 
            +
            sional oscillator systems. Phys.Rep. 1979, 52, 263–379.
         | 
| 763 | 
            +
            [9] MacKay, R.S.; Meiss,J.D.; Percival, I.C. Stochasticity
         | 
| 764 | 
            +
            and transport in hamiltonian systems. Phys.Rev.Lett.
         | 
| 765 | 
            +
            1984, 52, 697–700.
         | 
| 766 | 
            +
            [10] Castiglione, P.; Mazzino, A.; Muratore-Ginanneschi, P.;
         | 
| 767 | 
            +
            Vulpiani, A, On strong anomalous diffusion. Physica D
         | 
| 768 | 
            +
            1999, 134, 75–93.
         | 
| 769 | 
            +
            [11] Casati, G.; Prosen, T.. Triangle map: a model of quan-
         | 
| 770 | 
            +
            tum chaos. Phys.Rev.Lett. 2000, 85, 4261–4264.
         | 
| 771 | 
            +
            [12] Horvat, M.; Degli Esposti, M.; Isola, S.; Prosen, T.; Buni-
         | 
| 772 | 
            +
            movich, L. On ergodic and mixing properties of the tri-
         | 
| 773 | 
            +
            angle map. Physica D 2009, 238, 395–415.
         | 
| 774 | 
            +
            [13] Degli Esposti, M.; Galatolo, S. Recurrence near given
         | 
| 775 | 
            +
            sets and the complexity of the Casati-Prosen map. Chaos,
         | 
| 776 | 
            +
            Solitons & Fractals 2005, 23, 1275–1284.
         | 
| 777 | 
            +
            [14] Aaronson, J. An introduction to infinite ergodic theory;
         | 
| 778 | 
            +
            AMS: Providence, U.S.A. , 1997.
         | 
| 779 | 
            +
            [15] Zweimüller, R. Surrey notes on infinite ergodic theory.
         | 
| 780 | 
            +
            Available online
         | 
| 781 | 
            +
            https://mat.univie.ac.at/%7Ezweimueller/PapersAndPreprints.html
         | 
| 782 | 
            +
            (accessed on 1 11 2022)
         | 
| 783 | 
            +
            [16] Rechester, A.B.; White, R.B. Calculation of turbulent
         | 
| 784 | 
            +
            diffusion for the Chirikov-Taylor model. Phys.Rev.Lett.
         | 
| 785 | 
            +
            1980, 44, 1586–1589.
         | 
| 786 | 
            +
            [17] Dana, I.; Murray, N.W.; Percival, I.C. Resonances and
         | 
| 787 | 
            +
            diffusion in periodic Hamiltonian maps. Phys.Rev.Lett.
         | 
| 788 | 
            +
            1989, 62, 233–236.
         | 
| 789 | 
            +
            [18] Ishizaki, R.; Horita, T.; Kobayashi, T.; Mori, H. Anoma-
         | 
| 790 | 
            +
            lous diffusion due to accelerator modes in the standard
         | 
| 791 | 
            +
            map. Progr.Theor.Phys. 1991, 85, 1013–1022.
         | 
| 792 | 
            +
            [19] Benkadda, S.; Kassibrakis, S.; White, R.B.; Zaslavsky,
         | 
| 793 | 
            +
            G.M. Self-similarity and transport in the standard map.
         | 
| 794 | 
            +
            Phys.Rev. E 1997, 55, 4909–4917.
         | 
| 795 | 
            +
            [20] Zaslavsky, G.M.;
         | 
| 796 | 
            +
            Edelman, M.;
         | 
| 797 | 
            +
            Niyazov, B.A. Self-
         | 
| 798 | 
            +
            similarity, renormalization, and phase-space nonunifor-
         | 
| 799 | 
            +
            mity of Hamiltonian chaotic dynamics. Chaos 1997, 7,
         | 
| 800 | 
            +
            159–181.
         | 
| 801 | 
            +
            [21] Kaplan, L.; Heller, E.J. Weak quantum ergodicity. Phys-
         | 
| 802 | 
            +
            ica D 1998, 121, 1–18.
         | 
| 803 | 
            +
            [22] Casati, G.; Prosen, T. Mixing properties of triangular
         | 
| 804 | 
            +
            billiards. Phys.Rev.Lett. 1999, 83, 4728–4732.
         | 
| 805 | 
            +
            [23] Artuso, R.; Casati, G.; Guarneri, I. Numerical study
         | 
| 806 | 
            +
            on ergodic properties of triangular billiards. Phys.Rev.
         | 
| 807 | 
            +
            E 1997, 55, 6384–6390.
         | 
| 808 | 
            +
            [24] Artuso, R. Correlations and spectra of triangular bil-
         | 
| 809 | 
            +
            liards. Physica D 1997, 109, 1–10.
         | 
| 810 | 
            +
            [25] Prosen, T.; ˘Znidariˆc, M. Anomalous diffusion and dy-
         | 
| 811 | 
            +
            namical localization in polygonal billiards. Phys.Rev.Lett.
         | 
| 812 | 
            +
            2001, 87, 114101
         | 
| 813 | 
            +
            [26] Gutkin, E. Billiards in polygons. Physica D 1986, 19,
         | 
| 814 | 
            +
            311–333.
         | 
| 815 | 
            +
            [27] Gutkin, E. Billiards in polygons: survey of recent results.
         | 
| 816 | 
            +
            J.Stat.Phys. 1996, 83, 7–26.
         | 
| 817 | 
            +
            [28] Gutkin, E. Billiard dynamics: a survey with the emphasis
         | 
| 818 | 
            +
            on open problems. Regular and chaotic dynamics 2003,
         | 
| 819 | 
            +
            8, 1–13.
         | 
| 820 | 
            +
            [29] Gutkin, E. Billiard dynamics: an updated survey with
         | 
| 821 | 
            +
            the emphasis on open problems. Chaos 2012, 22, 026116.
         | 
| 822 | 
            +
            [30] Alonso, D.; Ruiz, A.; De Vega, I. Transport in polygonal
         | 
| 823 | 
            +
            billiards. Physica D 2004, 187, 184–199.
         | 
| 824 | 
            +
            [31] Jepps, O.G.; Bianca, C.; Rondoni, L. Onset of diffusive
         | 
| 825 | 
            +
            behavior in confined transport systems. Chaos 2008, 18,
         | 
| 826 | 
            +
            013127.
         | 
| 827 | 
            +
            [32] Sanders,
         | 
| 828 | 
            +
            D.P.;
         | 
| 829 | 
            +
            Larralde,
         | 
| 830 | 
            +
            H. Occurrence of normal
         | 
| 831 | 
            +
            and anomalous diffusion in polygonal billiard channels.
         | 
| 832 | 
            +
            Phys.Rev. E 2006, 73, 026205.
         | 
| 833 | 
            +
            [33] Cecconi,
         | 
| 834 | 
            +
            F.;
         | 
| 835 | 
            +
            Del-Castillo-Negrete,
         | 
| 836 | 
            +
            D.;
         | 
| 837 | 
            +
            Falcioni,
         | 
| 838 | 
            +
            M.;
         | 
| 839 | 
            +
            Vulpiani, A. The origin of diffusion: the case of non-
         | 
| 840 | 
            +
            chaotic systems. Physica D 2003, 180, 129–139.
         | 
| 841 | 
            +
            [34] Cecconi, F.; Cencini, M.; Falcioni, M.; Vulpiani, A.
         | 
| 842 | 
            +
            Brownian motion and diffusion:
         | 
| 843 | 
            +
            from stochastic pro-
         | 
| 844 | 
            +
            cesses to chaos and beyond. Chaos 2005, 15, 026102.
         | 
| 845 | 
            +
            [35] Artuso, R.; Guarneri, I.; Rebuzzini, L. Spectral prop-
         | 
| 846 | 
            +
            erties and anomalous transport in a polygonal billiard.
         | 
| 847 | 
            +
            Chaos 2000, 10, 189–194.
         | 
| 848 | 
            +
            [36] Guarneri, I.; Casati, G.; Karle, V. Classical dynamical
         | 
| 849 | 
            +
            localization. Phys.Rev.Lett. 2014, 113, 174101
         | 
| 850 | 
            +
            [37] Yoshida, K.; Casati, G.; Watanabe, S.; Shudo, A. Sublin-
         | 
| 851 | 
            +
            ear diffusion in the generalized triangle map. Phys.Rev.
         | 
| 852 | 
            +
             | 
| 853 | 
            +
            8
         | 
| 854 | 
            +
            E 2022, 106, 014206.
         | 
| 855 | 
            +
            [38] Conze, J-P.; Gutkin, E. On recurrence and ergodicity for
         | 
| 856 | 
            +
            geodesic flows on non-compact periodic polygonal sur-
         | 
| 857 | 
            +
            faces Ergod.Th.& Dynam.Sys 2012, 32, 491–515.
         | 
| 858 | 
            +
            [39] Majumdar, M.N. Universal first-passage properties of
         | 
| 859 | 
            +
            discrete-time random walks and Lévy flights on a line:
         | 
| 860 | 
            +
            statistics of the global maximum and records. Physica A
         | 
| 861 | 
            +
            2010, 389, 4299–4316.
         | 
| 862 | 
            +
            [40] Godrèche, C.; Majumdar, S.N.; Schehr, G. Record statis-
         | 
| 863 | 
            +
            tics of a strongly correlated time series: random walks
         | 
| 864 | 
            +
            and Lévy flights. J.Phys. A 2017, 50, 333001.
         | 
| 865 | 
            +
            [41] Feller, W. An introduction to probability theory and its
         | 
| 866 | 
            +
            applications. Vol. 1; Wiley: New York, U.S.A., 1968.
         | 
| 867 | 
            +
            [42] Feller, W. An introduction to probability theory and its
         | 
| 868 | 
            +
            applications. Vol. 2; Wiley: New York, U.S.A., 1971.
         | 
| 869 | 
            +
            [43] Rebuzzini, L.; Artuso, R. Higher order statistics in
         | 
| 870 | 
            +
            the annulus square billiard: transport and polyspectra.
         | 
| 871 | 
            +
            J.Phys. A 2011, 44, 025101.
         | 
| 872 | 
            +
            [44] Srivastava,
         | 
| 873 | 
            +
            S.C.L.;
         | 
| 874 | 
            +
            Lakshminarayan,
         | 
| 875 | 
            +
            A.;
         | 
| 876 | 
            +
            Jain,
         | 
| 877 | 
            +
            S.R.
         | 
| 878 | 
            +
            Record statistics in random vectors and quantum chaos.
         | 
| 879 | 
            +
            Europhys.Lett. 2013, 101, 10003.
         | 
| 880 | 
            +
            [45] Srivastava, S.C.L.; Lakshminarayan, A. Records in the
         | 
| 881 | 
            +
            classical and quantum standard map. Chaos, Solitons &
         | 
| 882 | 
            +
            Fractals 2015, 74, 67–78.
         | 
| 883 | 
            +
            [46] Wergen, G. Records in stochastic processes: theory and
         | 
| 884 | 
            +
            applications. J.Phys. A 2013, 46, 223001.
         | 
| 885 | 
            +
            [47] Nevzorov, V.B. Records:
         | 
| 886 | 
            +
            mathematical theory; AMS:
         | 
| 887 | 
            +
            Providence, U.S.A., 2004.
         | 
| 888 | 
            +
            [48] Sparre Andersen, E. On the fluctuations of sums or ran-
         | 
| 889 | 
            +
            dom variables I. Math.Scand. 1953, 1, 263–285.
         | 
| 890 | 
            +
            [49] Sparre Andersen, E. On the fluctuations of sums or ran-
         | 
| 891 | 
            +
            dom variables II. Math.Scand. 1954, 2, 195–233.
         | 
| 892 | 
            +
            [50] Artuso, R.; Cristadoro, G.; Degli Esposti, M.; Knight,
         | 
| 893 | 
            +
            G. Sparre-Andersen theorem with spatiotemporal corre-
         | 
| 894 | 
            +
            lations. Phys.Rev. E 2014, 89, 052111.
         | 
| 895 | 
            +
            [51] Comtet, A.; Majumdar, S.N. Precise asymptotics for a
         | 
| 896 | 
            +
            random walker’s maximum. J.Stat.Mech. 2005, P06013.
         | 
| 897 | 
            +
            [52] Mounaix, P.; Majumdar, S.N.; Schehr, G. Asymptotics
         | 
| 898 | 
            +
            for the expected maximum of ramndom walks and Lévy
         | 
| 899 | 
            +
            flights with a constant drift. J.Stat.Mech. 2018, P083201.
         | 
| 900 | 
            +
            [53] Gillis, J. Centrally biased discrete random walk. Q.J.
         | 
| 901 | 
            +
            Math. 1956, 7, 144–152.
         | 
| 902 | 
            +
            [54] Serva, M. Scaling behavior for random walks with mem-
         | 
| 903 | 
            +
            ory of the largest distance from the origin. Phys. Rev. E
         | 
| 904 | 
            +
            2013, 88, 052141.
         | 
| 905 | 
            +
            [55] Radice, M.; Onofri, M.; Artuso, R.; Cristadoro, G. Trans-
         | 
| 906 | 
            +
            port properties and ageing for the averaged Lévy-Lorentz
         | 
| 907 | 
            +
            gas. J. Phys. A 2020,53, 025701.
         | 
| 908 | 
            +
            [56] Singh, P. Extreme value statistics and arcsine laws for
         | 
| 909 | 
            +
            heterogeneous diffusion processes. Phys. Rev. E 2022,
         | 
| 910 | 
            +
            105, 024113.
         | 
| 911 | 
            +
            [57] Artuso, R.; Onofri, M.; Pozzoli, G.; Radice, M. Extreme
         | 
| 912 | 
            +
            value statistics of positive recurrent centrally biased ran-
         | 
| 913 | 
            +
            dom walks. J.Stat.Mech. 2022, P103209.
         | 
| 914 | 
            +
            [58] Lamperti, J. An occupation time theorem for a class
         | 
| 915 | 
            +
            of stochastic processes. Trans.Amer.Math.Soc 1958, 88,
         | 
| 916 | 
            +
            380–387.
         | 
| 917 | 
            +
            [59] Radice, M.; Onofri, M.; Artuso, R.; Pozzoli, G. Statistics
         | 
| 918 | 
            +
            of occupation times and connection to local properties of
         | 
| 919 | 
            +
            nonhomogeneous random walks. Phys.Rev. E 2020, 101,
         | 
| 920 | 
            +
            042103.
         | 
| 921 | 
            +
            [60] Bel, G.; Barkai, E. Weak ergodicity breaking with deter-
         | 
| 922 | 
            +
            ministic dynamics. Europhys.Lett. 2006, 74, 16–21.
         | 
| 923 | 
            +
            [61] Bray, A.J.; Majumdar, S.N.; Schehr, G. Persistence
         | 
| 924 | 
            +
            and first-passage properties in nonequilibrium systems.
         | 
| 925 | 
            +
            Adv.Phys. 2013, 62, 225–361.
         | 
| 926 | 
            +
            [62] Thaler, M. The Dynkin-Lamperti arc-sine laws for mea-
         | 
| 927 | 
            +
            sure preserving transformations. Trans.Amer.Math.Soc
         | 
| 928 | 
            +
            1998, 350, 4593–4607.
         | 
| 929 | 
            +
            [63] Zweimüller, R. Infinite measure preserving transforma-
         | 
| 930 | 
            +
            tions with compact first regeneration. Jour.Anal.Math.
         | 
| 931 | 
            +
            2007, 103, 93–131.
         | 
| 932 | 
            +
            [64] Huang, J.; Zhao, H. Ultraslow diffusion and weak ergod-
         | 
| 933 | 
            +
            icity breaking in right triangular billiards. Phys.Rev. E
         | 
| 934 | 
            +
            2017, 95, 032209.
         | 
| 935 | 
            +
            [65] Thaler, M. A limit theorem for sojourns near indifferent
         | 
| 936 | 
            +
            fixed points of one dimensional maps. Ergod.Theory &
         | 
| 937 | 
            +
            Dyn.Syst. 2002, 22, 1289–1312.
         | 
| 938 | 
            +
            [66] Akimoto, T. Generalized arcsine law and stable law in an
         | 
| 939 | 
            +
            infinite measure dynamical system. J.Stat.Phys. 2008,
         | 
| 940 | 
            +
            132, 171–186.
         | 
| 941 | 
            +
            [67] Singh, P.; Kundu, A. Generalized ‘arcsine’ laws for
         | 
| 942 | 
            +
            run-and-tumble particle in one dimension. J.Stat.Mech.
         | 
| 943 | 
            +
            2019, 083205.
         | 
| 944 | 
            +
            [68] Hughes, B.D. Random walks and random environments.
         | 
| 945 | 
            +
            Volume I: Random walks; Clarendon Press:
         | 
| 946 | 
            +
            Oxford,
         | 
| 947 | 
            +
            U.K., 1995.
         | 
| 948 | 
            +
            [69] Barkai, E. Residence time statistics for normal and frac-
         | 
| 949 | 
            +
            tional diffusion in a force field. J.Stat.Phys. 2006, 123,
         | 
| 950 | 
            +
            883–907.
         | 
| 951 | 
            +
             | 
    	
        GtE1T4oBgHgl3EQf_QYB/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        HtFIT4oBgHgl3EQfXys9/content/tmp_files/2301.11245v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1378 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.11245v1  [math.AP]  26 Jan 2023
         | 
| 2 | 
            +
            Exponential decay of the solutions to nonlinear Schr¨odinger systems
         | 
| 3 | 
            +
            Felipe Angeles∗, M´onica Clapp†, and Alberto Salda˜na (�)‡
         | 
| 4 | 
            +
            Abstract
         | 
| 5 | 
            +
            We show that the components of finite energy solutions to general nonlinear Schr¨odinger
         | 
| 6 | 
            +
            systems have exponential decay at infinity.
         | 
| 7 | 
            +
            Our results apply to positive or sign-changing
         | 
| 8 | 
            +
            components, and to cooperative, competitive, or mixed-interaction systems. As an application,
         | 
| 9 | 
            +
            we use the exponential decay to derive an upper bound for the least possible energy of a solution
         | 
| 10 | 
            +
            with a prescribed number of positive and nonradial sign-changing components.
         | 
| 11 | 
            +
            Keywords: Exponential decay; Schr¨odinger system; energy bounds; nodal solutions.
         | 
| 12 | 
            +
            MSC2010: 35B40; 35B45; 35J47; 35B06; 35J10;
         | 
| 13 | 
            +
            1
         | 
| 14 | 
            +
            Introduction
         | 
| 15 | 
            +
            Consider the nonlinear Schr¨odinger system
         | 
| 16 | 
            +
            
         | 
| 17 | 
            +
            
         | 
| 18 | 
            +
            
         | 
| 19 | 
            +
            
         | 
| 20 | 
            +
            
         | 
| 21 | 
            +
            
         | 
| 22 | 
            +
            
         | 
| 23 | 
            +
            −∆ui + Vi(x)ui =
         | 
| 24 | 
            +
            ℓ
         | 
| 25 | 
            +
            �
         | 
| 26 | 
            +
            j=1
         | 
| 27 | 
            +
            βij|uj|p|ui|p−2ui,
         | 
| 28 | 
            +
            ui ∈ H1(RN),
         | 
| 29 | 
            +
            i = 1, . . . , ℓ,
         | 
| 30 | 
            +
            (1.1)
         | 
| 31 | 
            +
            where N ≥ 1, Vi ∈ L∞(RN), βij ∈ R and 1 < p < 2∗
         | 
| 32 | 
            +
            2 . Here 2∗ is the usual critical Sobolev
         | 
| 33 | 
            +
            exponent, namely, 2∗ :=
         | 
| 34 | 
            +
            2N
         | 
| 35 | 
            +
            N−2 if N ≥ 3 and 2∗ := ∞ for N = 1, 2.
         | 
| 36 | 
            +
            Systems of this type occur as models for various natural phenomena. In physics, for example,
         | 
| 37 | 
            +
            they describe the behavior of standing waves for a mixture of Bose-Einstein condensates of different
         | 
| 38 | 
            +
            hyperfine states which overlap in space [13]. The coefficients βij determine the type of interaction
         | 
| 39 | 
            +
            between the states; if βij > 0, then there is an attractive force between ui and uj, similarly, if
         | 
| 40 | 
            +
            βij < 0, then the force is repulsive, and if βij = 0, then there is no direct interaction between
         | 
| 41 | 
            +
            these components. Whenever all the interaction coefficients are positive, we say that the system is
         | 
| 42 | 
            +
            cooperative. If βii > 0 and βij < 0 for all i ̸= j, then the system is called competitive. And if some
         | 
| 43 | 
            +
            βij are positive and others are negative for i ̸= j, then we say that the system has mixed couplings.
         | 
| 44 | 
            +
            All these regimes exhibit very different qualitative behaviors and have been studied extensively in
         | 
| 45 | 
            +
            recent years, see for instance [5,6,8–12,17,19–24,26] and the references therein.
         | 
| 46 | 
            +
            ∗Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Circuito Exterior, Ciudad Universitaria,
         | 
| 47 | 
            +
            04510 Coyoac´an, Ciudad de M´exico, Mexico, [email protected]
         | 
| 48 | 
            +
            †Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Campus Juriquilla, Boulevard Juriquilla
         | 
| 49 | 
            +
            3001, 76230 Quer´etaro, Qro., Mexico, [email protected]
         | 
| 50 | 
            +
            ‡(Corresponding author �) Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Circuito Ex-
         | 
| 51 | 
            +
            terior, Ciudad Universitaria, 04510 Coyoac´an, Ciudad de M´exico, Mexico, [email protected]
         | 
| 52 | 
            +
            1
         | 
| 53 | 
            +
             | 
| 54 | 
            +
            System (1.1) has a variational structure, and therefore a natural strategy is to find weak solutions
         | 
| 55 | 
            +
            by minimizing an associated energy functional on a suitable set, under additional assumptions on
         | 
| 56 | 
            +
            the matrix (βij) and on the potentials Vi. Using this approach, several kinds of solutions have been
         | 
| 57 | 
            +
            found in terms of their signs and their symmetries. However, there seems to be no information
         | 
| 58 | 
            +
            available about the decay of these solutions at infinity. In this paper, we show that finite energy
         | 
| 59 | 
            +
            solutions must decay exponentially at infinity, and a rate can be found in terms of the potentials
         | 
| 60 | 
            +
            Vi. Our main result is the following one.
         | 
| 61 | 
            +
            Theorem 1.1. Assume that, for every i = 1, . . . , ℓ,
         | 
| 62 | 
            +
            (V1) Vi : RN → R is H¨older continuous and bounded,
         | 
| 63 | 
            +
            (V2) there exists ρ ≥ 0 such that
         | 
| 64 | 
            +
            σi :=
         | 
| 65 | 
            +
            inf
         | 
| 66 | 
            +
            RN∖Bρ(0) Vi > 0.
         | 
| 67 | 
            +
            Let (u1, . . . , uℓ) ∈
         | 
| 68 | 
            +
            �
         | 
| 69 | 
            +
            H1(RN)
         | 
| 70 | 
            +
            �ℓ be a solution of (1.1) and let µi ∈ (0, √σi). Then, there is C > 0
         | 
| 71 | 
            +
            such that
         | 
| 72 | 
            +
            |ui(x)| ≤ Ce−µi|x|
         | 
| 73 | 
            +
            for all x ∈ RN and i = 1, . . . , ℓ.
         | 
| 74 | 
            +
            (1.2)
         | 
| 75 | 
            +
            Furthermore, if Vi ≡ 1 for every i = 1, . . . , ℓ, then (1.2) holds true with µi = 1.
         | 
| 76 | 
            +
            We emphasize that each component may have a different decay depending on each potential Vi.
         | 
| 77 | 
            +
            The main obstacle to showing (1.2) is to handle the possibly sublinear term |ui|p−2ui for p ∈ (1, 2)
         | 
| 78 | 
            +
            (which is always the case for N ≥ 4). To explain this point in more detail, assume that (u1, . . . , uℓ)
         | 
| 79 | 
            +
            is a solution of (1.1) and write the i-th equation of the system as
         | 
| 80 | 
            +
            −∆ui +
         | 
| 81 | 
            +
            �
         | 
| 82 | 
            +
            ai(x) − ci(x)|ui(x)|p−2�
         | 
| 83 | 
            +
            ui = 0,
         | 
| 84 | 
            +
            ai := Vi − βii|ui|2p−2,
         | 
| 85 | 
            +
            ci :=
         | 
| 86 | 
            +
            ℓ
         | 
| 87 | 
            +
            �
         | 
| 88 | 
            +
            j̸=i
         | 
| 89 | 
            +
            βij|uj|p.
         | 
| 90 | 
            +
            (1.3)
         | 
| 91 | 
            +
            Since every uj ∈ H1(RN)∩C0(RN), we know that ai and ci are bounded in RN, but |ui|p−2 → ∞ as
         | 
| 92 | 
            +
            |x| → ∞ and it is also singular at the nodal set of a sign-changing solution. As a consequence, one
         | 
| 93 | 
            +
            cannot use directly previously known results about exponential decay for scalar equations, such as
         | 
| 94 | 
            +
            those in [1, 3, 18]. In fact, one can easily construct a one dimensional solution of a similar scalar
         | 
| 95 | 
            +
            equation that has a power-type decay. For instance, let w ∈ C2(R) be a positive function such that
         | 
| 96 | 
            +
            w(x) = |x|−2/3 for |x| > 1 and let
         | 
| 97 | 
            +
            c(x) := −w′′(x) + w(x)
         | 
| 98 | 
            +
            w(x)
         | 
| 99 | 
            +
            1
         | 
| 100 | 
            +
            2
         | 
| 101 | 
            +
            ,
         | 
| 102 | 
            +
            x ∈ R.
         | 
| 103 | 
            +
            Then, w ∈ H1(R) is a solution of −w′′ + w = c w
         | 
| 104 | 
            +
            1
         | 
| 105 | 
            +
            2 in R, c(x) → 0 as |x| → ∞, and w decays as a
         | 
| 106 | 
            +
            power at infinity.
         | 
| 107 | 
            +
            This shows that the proof of the exponential estimate in Theorem 1.1 must rely on a careful
         | 
| 108 | 
            +
            study of the system structure. In other words, although the sublinear nonlinearity |ui|p−2ui appears
         | 
| 109 | 
            +
            in (1.1), the system is not sublinear. As a whole, it is always superlinear.
         | 
| 110 | 
            +
            With this in mind, we adapt some of the arguments in [1,18] preserving at each step the system
         | 
| 111 | 
            +
            structure of the problem. These arguments rely basically on elliptic regularity and comparison
         | 
| 112 | 
            +
            principles.
         | 
| 113 | 
            +
            2
         | 
| 114 | 
            +
             | 
| 115 | 
            +
            The exponential decay of solutions is a powerful tool in their qualitative study. As an application
         | 
| 116 | 
            +
            of Theorem 1.1, we derive energy bounds of solutions having prescribed positive and nonradial sign-
         | 
| 117 | 
            +
            changing components. For this, power type decay would not be enough.
         | 
| 118 | 
            +
            To be more precise, we consider the autonomous system
         | 
| 119 | 
            +
            
         | 
| 120 | 
            +
            
         | 
| 121 | 
            +
            
         | 
| 122 | 
            +
            
         | 
| 123 | 
            +
            
         | 
| 124 | 
            +
            
         | 
| 125 | 
            +
            
         | 
| 126 | 
            +
            −∆ui + ui =
         | 
| 127 | 
            +
            ℓ
         | 
| 128 | 
            +
            �
         | 
| 129 | 
            +
            j=1
         | 
| 130 | 
            +
            βij|uj|p|ui|p−2ui,
         | 
| 131 | 
            +
            ui ∈ H1(RN),
         | 
| 132 | 
            +
            i = 1, . . . , ℓ.
         | 
| 133 | 
            +
            (1.4)
         | 
| 134 | 
            +
            where the βij’s satisfy the following condition:
         | 
| 135 | 
            +
            (B1) The matrix (βij) is symmetric and admits a block decomposition as follows: For some 1 ≤
         | 
| 136 | 
            +
            q ≤ ℓ there exist 0 = ℓ0 < ℓ1 < · · · < ℓq−1 < ℓq = ℓ such that, if we set
         | 
| 137 | 
            +
            Ih := {i ∈ {1, . . . , ℓ} : ℓh−1 < i ≤ ℓh},
         | 
| 138 | 
            +
            h ∈ {1, . . . , q},
         | 
| 139 | 
            +
            then βii > 0, βij ≥ 0 if i, j ∈ Ih, and βij < 0 if i ∈ Ih, j ∈ Ik and h ̸= k.
         | 
| 140 | 
            +
            According to this decomposition, a solution u = (u1, . . . , uℓ) to (1.1) may be written in block-
         | 
| 141 | 
            +
            form as
         | 
| 142 | 
            +
            u = (u1, . . . , uq)
         | 
| 143 | 
            +
            with uh = (uℓh−1+1, . . . , uℓh),
         | 
| 144 | 
            +
            h = 1, . . . , q.
         | 
| 145 | 
            +
            We say that u is fully nontrivial if every component ui is different from zero.
         | 
| 146 | 
            +
            Set Q := {1, . . . , q}. Given a partition Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅ we look for solutions
         | 
| 147 | 
            +
            such that every component of uh is positive if h ∈ Q+ and every component of uh is nonradial
         | 
| 148 | 
            +
            and changes sign if h ∈ Q−. To this end, we use variational methods in a space having suitable
         | 
| 149 | 
            +
            symmetries. As shown in [11, Section 3], to guarantee that the solutions obtained are fully nontrivial
         | 
| 150 | 
            +
            we need to assume the following two conditions:
         | 
| 151 | 
            +
            (B2) For each h ∈ Q, the graph whose set of vertices is Ih and whose set of edges is Eh := {{i, j} :
         | 
| 152 | 
            +
            i, j ∈ Ih, i ̸= j, βij > 0} is connected.
         | 
| 153 | 
            +
            (B3) If q ≥ 2 then, for every h ∈ {1, . . . , q} such that ℓh − ℓh−1 ≥ 2, the inequality
         | 
| 154 | 
            +
            �
         | 
| 155 | 
            +
            min
         | 
| 156 | 
            +
            {i,j}∈Eh
         | 
| 157 | 
            +
            βij
         | 
| 158 | 
            +
            �
         | 
| 159 | 
            +
            
         | 
| 160 | 
            +
            
         | 
| 161 | 
            +
            min
         | 
| 162 | 
            +
            h=1,...,q max
         | 
| 163 | 
            +
            i∈Ih βii
         | 
| 164 | 
            +
            �
         | 
| 165 | 
            +
            i,j∈Ih
         | 
| 166 | 
            +
            βij
         | 
| 167 | 
            +
            
         | 
| 168 | 
            +
            
         | 
| 169 | 
            +
            p
         | 
| 170 | 
            +
            p−1
         | 
| 171 | 
            +
            > C∗
         | 
| 172 | 
            +
            q
         | 
| 173 | 
            +
            �
         | 
| 174 | 
            +
            k=1
         | 
| 175 | 
            +
            k̸=h
         | 
| 176 | 
            +
            �
         | 
| 177 | 
            +
            i∈Ih
         | 
| 178 | 
            +
            j∈Ik
         | 
| 179 | 
            +
            |βij|
         | 
| 180 | 
            +
            holds true, where C∗ = C∗(N, p, q, Q+) > 0 is the explicit constant given in (3.7) below.
         | 
| 181 | 
            +
            In [11] it is shown that, for any q, the system (1.1) has a fully nontrivial solution satisfying the
         | 
| 182 | 
            +
            sign requirements described above. Furthermore, an upper bound for its energy is exhibited, but
         | 
| 183 | 
            +
            only for systems with at most 2 blocks, i.e., for q = 1, 2. Here we use Theorem 1.1 to obtain an
         | 
| 184 | 
            +
            energy bound for any number of blocks.
         | 
| 185 | 
            +
            For each h = 1, . . . , q, let RIh := {s = (sℓh−1+1, . . . , sℓh) : si ∈ R for all i ∈ Ih} and define
         | 
| 186 | 
            +
            µh := inf
         | 
| 187 | 
            +
            s∈RIh
         | 
| 188 | 
            +
            s̸=0
         | 
| 189 | 
            +
            
         | 
| 190 | 
            +
            
         | 
| 191 | 
            +
            
         | 
| 192 | 
            +
            �
         | 
| 193 | 
            +
            i∈Ih s2
         | 
| 194 | 
            +
            i
         | 
| 195 | 
            +
            � �
         | 
| 196 | 
            +
            i,j∈Ih βij|si|p|sj|p
         | 
| 197 | 
            +
            � 2
         | 
| 198 | 
            +
            2p
         | 
| 199 | 
            +
            
         | 
| 200 | 
            +
            
         | 
| 201 | 
            +
            
         | 
| 202 | 
            +
            p
         | 
| 203 | 
            +
            p−1
         | 
| 204 | 
            +
            .
         | 
| 205 | 
            +
            (1.5)
         | 
| 206 | 
            +
            3
         | 
| 207 | 
            +
             | 
| 208 | 
            +
            For any ℓ ∈ N, we write ∥u∥ for the usual norm of u = (u1, . . . , uℓ) in (H1(RN))ℓ, i.e.,
         | 
| 209 | 
            +
            ∥u∥2 :=
         | 
| 210 | 
            +
            ℓ
         | 
| 211 | 
            +
            �
         | 
| 212 | 
            +
            i=1
         | 
| 213 | 
            +
            �
         | 
| 214 | 
            +
            RN (|∇ui|2 + |ui|2).
         | 
| 215 | 
            +
            We prove the following result.
         | 
| 216 | 
            +
            Theorem 1.2. Let N = 4 or N ≥ 6, and let Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅. Assume (B1),
         | 
| 217 | 
            +
            (B2), and (B3). Then, there exists a fully nontrivial solution u = (u1, . . . , uq) to the system (1.4)
         | 
| 218 | 
            +
            with the following properties:
         | 
| 219 | 
            +
            (a) Every component of uh is positive if h ∈ Q+ and every component of uh is nonradial and
         | 
| 220 | 
            +
            changes sign if h ∈ Q−.
         | 
| 221 | 
            +
            (b) If q = 1, then
         | 
| 222 | 
            +
            ∥u∥2 = µ1∥ω∥2 if Q = Q+
         | 
| 223 | 
            +
            and
         | 
| 224 | 
            +
            ∥u∥2 < 10 µ1∥ω∥2 if Q = Q−.
         | 
| 225 | 
            +
            (c) If q ≥ 2 the following estimate holds true
         | 
| 226 | 
            +
            ∥u∥2 <
         | 
| 227 | 
            +
            
         | 
| 228 | 
            +
            min
         | 
| 229 | 
            +
            k∈Q
         | 
| 230 | 
            +
            �
         | 
| 231 | 
            +
            akµk +
         | 
| 232 | 
            +
            �
         | 
| 233 | 
            +
            h∈Q∖{k}
         | 
| 234 | 
            +
            bhµh
         | 
| 235 | 
            +
            �
         | 
| 236 | 
            +
            
         | 
| 237 | 
            +
             ∥ω∥2,
         | 
| 238 | 
            +
            (1.6)
         | 
| 239 | 
            +
            where ak := 1 if k ∈ Q+, ak := 12 if k ∈ Q−, bh := 6 if h ∈ Q+, bh := 12 if h ∈ Q−, and ω is the
         | 
| 240 | 
            +
            unique positive radial solution to the equation
         | 
| 241 | 
            +
            − ∆w + w = |w|2p−2w,
         | 
| 242 | 
            +
            w ∈ H1(RN).
         | 
| 243 | 
            +
            (1.7)
         | 
| 244 | 
            +
            To prove Theorem 1.2, we follow the approach in [11] and impose on the variational setting
         | 
| 245 | 
            +
            some carefully constructed symmetries which admit finite orbits. This approach immediately gives
         | 
| 246 | 
            +
            energy estimates but it requires showing a quantitative compactness condition which needs precise
         | 
| 247 | 
            +
            knowledge about the asymptotic decay of the components of the system. Here is where we use
         | 
| 248 | 
            +
            Theorem 1.1.
         | 
| 249 | 
            +
            The paper is organized as follows. Section 2 is devoted to the proof of the exponential decay
         | 
| 250 | 
            +
            stated in Theorem 1.1. The application of this result to derive energy bounds is contained in Section
         | 
| 251 | 
            +
            3, where we also give some concrete examples.
         | 
| 252 | 
            +
            Acknowledgments
         | 
| 253 | 
            +
            We thank Nils Ackermann for helpful comments and suggestions.
         | 
| 254 | 
            +
            F. Angeles and A. Salda˜na
         | 
| 255 | 
            +
            thank the Instituto de Matem´aticas - Campus Juriquilla for the kind hospitality. F. Angeles is
         | 
| 256 | 
            +
            supported by CONACYT (Mexico) through a postdoctoral fellowship under grant A1-S-10457. M.
         | 
| 257 | 
            +
            Clapp is supported by CONACYT (Mexico) through the research grant A1-S-10457. A. Salda˜na
         | 
| 258 | 
            +
            is supported by UNAM-DGAPA-PAPIIT (Mexico) grant IA100923 and by CONACYT (Mexico)
         | 
| 259 | 
            +
            grant A1-S-10457.
         | 
| 260 | 
            +
            4
         | 
| 261 | 
            +
             | 
| 262 | 
            +
            2
         | 
| 263 | 
            +
            Exponential decay
         | 
| 264 | 
            +
            This section is devoted to the proof of Theorem 1.1. As a first step, we extend the argument
         | 
| 265 | 
            +
            in [2, Lemma 5.3] to systems. Let Br denote the ball of radius r in RN centered at zero. Let σi
         | 
| 266 | 
            +
            and βij as in (V2) and (1.1), then we let σ := (σ1, . . . , σℓ) and β := (βij)ℓ
         | 
| 267 | 
            +
            i,j=1.
         | 
| 268 | 
            +
            Lemma 2.1. Let Vi ∈ L∞(RN) satisfy (V2) and let u = (u1, . . . , uℓ) be a solution of (1.1). Set
         | 
| 269 | 
            +
            ξi(r) :=
         | 
| 270 | 
            +
            �
         | 
| 271 | 
            +
            RN∖Br
         | 
| 272 | 
            +
            �
         | 
| 273 | 
            +
            |∇ui|2 + |ui|2�
         | 
| 274 | 
            +
            and
         | 
| 275 | 
            +
            ξ(r) := (ξ1(r), . . . , ξℓ(r)).
         | 
| 276 | 
            +
            Then, there are positive constants C = C(u, σ, β, N, ρ, p) and ϑ = ϑ(σ), with ρ and σi as in (V2),
         | 
| 277 | 
            +
            such that
         | 
| 278 | 
            +
            |ξ(r)|1 :=
         | 
| 279 | 
            +
            ℓ
         | 
| 280 | 
            +
            �
         | 
| 281 | 
            +
            i=1
         | 
| 282 | 
            +
            ξi(r) ≤ Ce−ϑr
         | 
| 283 | 
            +
            for every r ≥ 0.
         | 
| 284 | 
            +
            Proof. Let χ : RN → R be given by χ(r) := 0 if r ≤ 0, χ(r) := r if r ∈ (0, 1) and χ(r) := 1 if
         | 
| 285 | 
            +
            r ≥ 1. Let ur
         | 
| 286 | 
            +
            i (x) := χ(|x| − r)ui(x) for r ≥ 0, x ∈ RN, and i = 1, . . . , ℓ. Then ur
         | 
| 287 | 
            +
            i ∈ H1(RN) and
         | 
| 288 | 
            +
            ur
         | 
| 289 | 
            +
            i (x) = (|x| − r)ui(x),
         | 
| 290 | 
            +
            ∇ur
         | 
| 291 | 
            +
            i (x) = (|x| − r)∇ui(x) + x
         | 
| 292 | 
            +
            |x|ui(x),
         | 
| 293 | 
            +
            if x ∈ Br+1 ∖ Br.
         | 
| 294 | 
            +
            Set δ := min{σ1, . . . , σℓ, 1}. Using that |ui x
         | 
| 295 | 
            +
            |x| · ∇ui| ≤ 1
         | 
| 296 | 
            +
            2(|∇ui|2 + |ui|2) we obtain
         | 
| 297 | 
            +
            �
         | 
| 298 | 
            +
            RN
         | 
| 299 | 
            +
            �
         | 
| 300 | 
            +
            ∇ui · ∇ur
         | 
| 301 | 
            +
            i + Vi uiur
         | 
| 302 | 
            +
            i
         | 
| 303 | 
            +
            �
         | 
| 304 | 
            +
            ≥ δξi(r + 1) +
         | 
| 305 | 
            +
            �
         | 
| 306 | 
            +
            Br+1∖Br
         | 
| 307 | 
            +
            �
         | 
| 308 | 
            +
            (|x| − r)
         | 
| 309 | 
            +
            �
         | 
| 310 | 
            +
            |∇ui|2 + Vi u2
         | 
| 311 | 
            +
            i
         | 
| 312 | 
            +
            �
         | 
| 313 | 
            +
            + ui
         | 
| 314 | 
            +
            x
         | 
| 315 | 
            +
            |x| · ∇ui
         | 
| 316 | 
            +
            �
         | 
| 317 | 
            +
            ≥ δξi(r + 1) − 1
         | 
| 318 | 
            +
            2
         | 
| 319 | 
            +
            �
         | 
| 320 | 
            +
            Br+1∖Br
         | 
| 321 | 
            +
            �
         | 
| 322 | 
            +
            |∇ui|2 + |ui|2�
         | 
| 323 | 
            +
            ≥ (δ + 1
         | 
| 324 | 
            +
            2)ξi(r + 1) − 1
         | 
| 325 | 
            +
            2ξi(r)
         | 
| 326 | 
            +
            if r + 1 ≥ ρ.
         | 
| 327 | 
            +
            (2.1)
         | 
| 328 | 
            +
            As u solves (1.1) we have that
         | 
| 329 | 
            +
            ����
         | 
| 330 | 
            +
            �
         | 
| 331 | 
            +
            RN ∇ui · ∇ur
         | 
| 332 | 
            +
            i + Vi uiur
         | 
| 333 | 
            +
            i
         | 
| 334 | 
            +
            ���� =
         | 
| 335 | 
            +
            ������
         | 
| 336 | 
            +
            �
         | 
| 337 | 
            +
            RN
         | 
| 338 | 
            +
            ℓ
         | 
| 339 | 
            +
            �
         | 
| 340 | 
            +
            j=1
         | 
| 341 | 
            +
            βij|uj|p|ui|p−2uiur
         | 
| 342 | 
            +
            i
         | 
| 343 | 
            +
            ������
         | 
| 344 | 
            +
            ≤
         | 
| 345 | 
            +
            ℓ
         | 
| 346 | 
            +
            �
         | 
| 347 | 
            +
            j=1
         | 
| 348 | 
            +
            �
         | 
| 349 | 
            +
            RN\Br
         | 
| 350 | 
            +
            |βij||uj|p|ui|p−2|ui|2 =
         | 
| 351 | 
            +
            ℓ
         | 
| 352 | 
            +
            �
         | 
| 353 | 
            +
            j=1
         | 
| 354 | 
            +
            |βij|
         | 
| 355 | 
            +
            �
         | 
| 356 | 
            +
            RN∖Br
         | 
| 357 | 
            +
            |uj|p|ui|p
         | 
| 358 | 
            +
            and since |um|p ≤
         | 
| 359 | 
            +
            ��ℓ
         | 
| 360 | 
            +
            k=1 |uk|2p�1/2
         | 
| 361 | 
            +
            for every m = 1, . . . , ℓ, we obtain
         | 
| 362 | 
            +
            ����
         | 
| 363 | 
            +
            �
         | 
| 364 | 
            +
            RN ∇ui · ∇ur
         | 
| 365 | 
            +
            i + Vi uiur
         | 
| 366 | 
            +
            i
         | 
| 367 | 
            +
            ���� ≤
         | 
| 368 | 
            +
            
         | 
| 369 | 
            +
            
         | 
| 370 | 
            +
            ℓ
         | 
| 371 | 
            +
            �
         | 
| 372 | 
            +
            j=1
         | 
| 373 | 
            +
            |βij|
         | 
| 374 | 
            +
            
         | 
| 375 | 
            +
            
         | 
| 376 | 
            +
            ℓ
         | 
| 377 | 
            +
            �
         | 
| 378 | 
            +
            k=1
         | 
| 379 | 
            +
            �
         | 
| 380 | 
            +
            RN∖Br
         | 
| 381 | 
            +
            |uk|2p.
         | 
| 382 | 
            +
            Given that uk ∈ H1(RN) for all k = 1, . . . , ℓ, Lemma A.1 implies the existence of a constant
         | 
| 383 | 
            +
            C1 = C1(N, p) > 0 such that
         | 
| 384 | 
            +
            ����
         | 
| 385 | 
            +
            �
         | 
| 386 | 
            +
            RN ∇ui · ∇ur
         | 
| 387 | 
            +
            i + Vi uiur
         | 
| 388 | 
            +
            i
         | 
| 389 | 
            +
            ���� ≤ C1
         | 
| 390 | 
            +
            
         | 
| 391 | 
            +
            
         | 
| 392 | 
            +
            ℓ
         | 
| 393 | 
            +
            �
         | 
| 394 | 
            +
            j=1
         | 
| 395 | 
            +
            |βij|
         | 
| 396 | 
            +
            
         | 
| 397 | 
            +
            
         | 
| 398 | 
            +
            ℓ
         | 
| 399 | 
            +
            �
         | 
| 400 | 
            +
            k=1
         | 
| 401 | 
            +
            ��
         | 
| 402 | 
            +
            RN∖Br
         | 
| 403 | 
            +
            �
         | 
| 404 | 
            +
            |∇uk|2 + |uk|2��p
         | 
| 405 | 
            +
            (2.2)
         | 
| 406 | 
            +
            5
         | 
| 407 | 
            +
             | 
| 408 | 
            +
            for every r ≥ 1 and i = 1, . . . , ℓ. Set C2 := C1
         | 
| 409 | 
            +
            �ℓ
         | 
| 410 | 
            +
            i,j=1 |βij|. From (2.1) and (2.2), assuming without
         | 
| 411 | 
            +
            loss of generality that ρ ≥ 2 and adding over i, we get
         | 
| 412 | 
            +
            2δ + 1
         | 
| 413 | 
            +
            2
         | 
| 414 | 
            +
            |ξ(r + 1)|1 − 1
         | 
| 415 | 
            +
            2|ξ(r)|1 ≤ C2
         | 
| 416 | 
            +
            ℓ
         | 
| 417 | 
            +
            �
         | 
| 418 | 
            +
            k=1
         | 
| 419 | 
            +
            |ξk(r)|p =: C2 |ξ(r)|p
         | 
| 420 | 
            +
            p
         | 
| 421 | 
            +
            if r + 1 ≥ ρ.
         | 
| 422 | 
            +
            Therefore,
         | 
| 423 | 
            +
            |ξ(r + 1)|1
         | 
| 424 | 
            +
            |ξ(r)|1
         | 
| 425 | 
            +
            ≤
         | 
| 426 | 
            +
            1
         | 
| 427 | 
            +
            2δ + 1
         | 
| 428 | 
            +
            �
         | 
| 429 | 
            +
            1 + 2C2
         | 
| 430 | 
            +
            |ξ(r)|p
         | 
| 431 | 
            +
            p
         | 
| 432 | 
            +
            |ξ(r)|1
         | 
| 433 | 
            +
            �
         | 
| 434 | 
            +
            ≤
         | 
| 435 | 
            +
            1
         | 
| 436 | 
            +
            2δ + 1
         | 
| 437 | 
            +
            �
         | 
| 438 | 
            +
            1 + 2C2|ξ(r)|p−1
         | 
| 439 | 
            +
            1
         | 
| 440 | 
            +
            �
         | 
| 441 | 
            +
            =: γ(r)
         | 
| 442 | 
            +
            if r + 1 ≥ ρ. (2.3)
         | 
| 443 | 
            +
            Since |ξ(r)|1 → 0 as r → ∞, there is r0 = r0(u, p, β, ρ) ∈ N such that r0 ≥ ρ and γ(r) ≤ γ−1
         | 
| 444 | 
            +
            0
         | 
| 445 | 
            +
            for all
         | 
| 446 | 
            +
            r ≥ r0 with γ0 := 2δ+1
         | 
| 447 | 
            +
            δ+1 > 1. Then, for r > r0 + 1,
         | 
| 448 | 
            +
            |ξ(r)|1 ≤ |ξ(⌊r⌋)|1 = |ξ(r0)|1
         | 
| 449 | 
            +
            ⌊r⌋−1
         | 
| 450 | 
            +
            �
         | 
| 451 | 
            +
            k=r0
         | 
| 452 | 
            +
            |ξ(k + 1)|1
         | 
| 453 | 
            +
            |ξ(k)|1
         | 
| 454 | 
            +
            ≤ |ξ(r0)|1γr0−⌊r⌋
         | 
| 455 | 
            +
            0
         | 
| 456 | 
            +
            ≤ ∥u∥2γr0−r+1
         | 
| 457 | 
            +
            0
         | 
| 458 | 
            +
            ,
         | 
| 459 | 
            +
            where ⌊r⌋ denotes the floor of r. Since |ξ(r)|1 ≤ ∥u∥2 ≤ ∥u∥2γr0−r+1
         | 
| 460 | 
            +
            0
         | 
| 461 | 
            +
            for r ≤ r0 + 1 we have that
         | 
| 462 | 
            +
            |ξ(r)|1 ≤ ∥u∥2γr0−r+1
         | 
| 463 | 
            +
            0
         | 
| 464 | 
            +
            = ∥u∥2γr0+1
         | 
| 465 | 
            +
            0
         | 
| 466 | 
            +
            e− ln(γ0)r
         | 
| 467 | 
            +
            for every r ≥ 0,
         | 
| 468 | 
            +
            as claimed.
         | 
| 469 | 
            +
            Lemma 2.2. Assume (V1) and let u = (u1, . . . , uℓ) be a solution of (1.1). Then ui ∈ W 2,s(RN) ∩
         | 
| 470 | 
            +
            C2(RN) for every s ≥ 2 and i = 1, . . . , ℓ.
         | 
| 471 | 
            +
            Proof. Let N ≥ 3. The argument for N = 1, 2 is similar and easier. For each i = 1, . . . , ℓ set
         | 
| 472 | 
            +
            fi :=
         | 
| 473 | 
            +
            l
         | 
| 474 | 
            +
            �
         | 
| 475 | 
            +
            j=1
         | 
| 476 | 
            +
            βij|uj|p|ui|p−2ui.
         | 
| 477 | 
            +
            (2.4)
         | 
| 478 | 
            +
            Since |uk| ≤ |u| :=
         | 
| 479 | 
            +
            �
         | 
| 480 | 
            +
            u2
         | 
| 481 | 
            +
            1 + · · · + u2
         | 
| 482 | 
            +
            ℓ for every k = 1, . . . ℓ, we have that
         | 
| 483 | 
            +
            |fi| ≤
         | 
| 484 | 
            +
            ℓ
         | 
| 485 | 
            +
            �
         | 
| 486 | 
            +
            i,j=1
         | 
| 487 | 
            +
            |βij||uj|p|ui|p−1 ≤
         | 
| 488 | 
            +
            
         | 
| 489 | 
            +
            
         | 
| 490 | 
            +
            ℓ
         | 
| 491 | 
            +
            �
         | 
| 492 | 
            +
            j=1
         | 
| 493 | 
            +
            |βij|
         | 
| 494 | 
            +
            
         | 
| 495 | 
            +
             |u|p|u|p−1 ≤
         | 
| 496 | 
            +
            
         | 
| 497 | 
            +
            
         | 
| 498 | 
            +
            ℓ
         | 
| 499 | 
            +
            �
         | 
| 500 | 
            +
            i,j=1
         | 
| 501 | 
            +
            |βij|
         | 
| 502 | 
            +
            
         | 
| 503 | 
            +
             |u|2p−1.
         | 
| 504 | 
            +
            (2.5)
         | 
| 505 | 
            +
            Therefore, fi ∈ Ls1(RN) for s1 :=
         | 
| 506 | 
            +
            2∗
         | 
| 507 | 
            +
            2p−1 > 1 and, by the standard Lp-elliptic regularity theory,
         | 
| 508 | 
            +
            ui ∈ W 2,s1(RN) for all i = 1, . . . , ℓ (see, e.g., [14, Chapter 9] or [25, Section 3.2]).
         | 
| 509 | 
            +
            Using a
         | 
| 510 | 
            +
            bootstrapping argument, we conclude the existence of s > max{N
         | 
| 511 | 
            +
            2 , 2} such that ui ∈ W 2,s(RN) for
         | 
| 512 | 
            +
            all i = 1, . . . , ℓ and thus, by the Sobolev embedding theorem, ui ∈ C1,α(RN). Since Vi is H¨older
         | 
| 513 | 
            +
            continuous and bounded, applying the Schauder estimates repeatedly, we deduce that ui is of class
         | 
| 514 | 
            +
            C2 (see [15, Section 1.3]).
         | 
| 515 | 
            +
            In the rest of the paper, we write | · |t for the norm in Lt(RN), 1 ≤ t ≤ ∞. If u = (u1, . . . , uℓ) ∈
         | 
| 516 | 
            +
            [L∞(RN)]ℓ, then |u|∞ := �ℓ
         | 
| 517 | 
            +
            i=1 supRN |ui|. Moreover, for a proper open subset Ω of RN we denote
         | 
| 518 | 
            +
            the usual Sobolev norm in H1(Ω) by ∥ · ∥H1(Ω), i.e.,
         | 
| 519 | 
            +
            ∥u∥2
         | 
| 520 | 
            +
            H1(Ω) :=
         | 
| 521 | 
            +
            �
         | 
| 522 | 
            +
            Ω
         | 
| 523 | 
            +
            (|∇u|2 + |u|2).
         | 
| 524 | 
            +
            6
         | 
| 525 | 
            +
             | 
| 526 | 
            +
            Lemma 2.3. Assume (V1). Let u = (u1, . . . , uℓ) be a solution of (1.1), s > max{2, N
         | 
| 527 | 
            +
            2 } and Λ > 0
         | 
| 528 | 
            +
            be such that |Vi|∞ ≤ Λ for i = 1, . . . , ℓ. Then there is a constant C = C(β, N, p, Λ, s) > 0 such
         | 
| 529 | 
            +
            that, for any x ∈ RN,
         | 
| 530 | 
            +
            ∥ui∥W 2,s(B 1
         | 
| 531 | 
            +
            2 (x)) ≤ C
         | 
| 532 | 
            +
            
         | 
| 533 | 
            +
            |ui|
         | 
| 534 | 
            +
            s−2
         | 
| 535 | 
            +
            s
         | 
| 536 | 
            +
            ∞ ∥ui∥
         | 
| 537 | 
            +
            2
         | 
| 538 | 
            +
            s
         | 
| 539 | 
            +
            H1(B1(x)) + |u|
         | 
| 540 | 
            +
            2ps−(s+2)
         | 
| 541 | 
            +
            s
         | 
| 542 | 
            +
            ∞
         | 
| 543 | 
            +
            �
         | 
| 544 | 
            +
            ℓ
         | 
| 545 | 
            +
            �
         | 
| 546 | 
            +
            j=1
         | 
| 547 | 
            +
            ∥uj∥2
         | 
| 548 | 
            +
            H1(B1(x))
         | 
| 549 | 
            +
            � p
         | 
| 550 | 
            +
            s
         | 
| 551 | 
            +
            
         | 
| 552 | 
            +
             ,
         | 
| 553 | 
            +
            where |u| :=
         | 
| 554 | 
            +
            �
         | 
| 555 | 
            +
            u2
         | 
| 556 | 
            +
            1 + · · · + u2
         | 
| 557 | 
            +
            ℓ and BR(x) is the ball of radius R centered at x.
         | 
| 558 | 
            +
            Proof. Since ui ∈ W 2,s(RN) ⊂ L∞(RN), we have that
         | 
| 559 | 
            +
            |ui|s = |ui|s−2|ui|2 ≤ |ui|s−2
         | 
| 560 | 
            +
            ∞ |ui|2.
         | 
| 561 | 
            +
            Set fi as in (2.4). By (2.5), there is a constant C2 = C2(β) such that
         | 
| 562 | 
            +
            |fi|s ≤ Cs
         | 
| 563 | 
            +
            2|u|(p−1)s|u|ps = Cs
         | 
| 564 | 
            +
            2|u|(p−1)s+p(s−2)(u2
         | 
| 565 | 
            +
            1 + · · · + u2
         | 
| 566 | 
            +
            ℓ)p
         | 
| 567 | 
            +
            ≤ Cs
         | 
| 568 | 
            +
            2|u|2ps−(s+2)
         | 
| 569 | 
            +
            ∞
         | 
| 570 | 
            +
            ℓp(u2p
         | 
| 571 | 
            +
            1 + · · · + u2p
         | 
| 572 | 
            +
            ℓ ),
         | 
| 573 | 
            +
            where (p − 1)s + p(s − 2) > 0. Then, by [14, Theorem 9.11], there is a positive constant C1 =
         | 
| 574 | 
            +
            C1(s, N, Λ) such that
         | 
| 575 | 
            +
            ∥ui∥W 2,s(B 1
         | 
| 576 | 
            +
            2 (x)) ≤ C1
         | 
| 577 | 
            +
            �
         | 
| 578 | 
            +
            |ui|Ls(B1(x)) + |fi|Ls(B1(x))
         | 
| 579 | 
            +
            �
         | 
| 580 | 
            +
            for any x ∈ RN.
         | 
| 581 | 
            +
            From the previous inequalities we derive
         | 
| 582 | 
            +
            ∥ui∥W 2,s(B 1
         | 
| 583 | 
            +
            2 (x)) ≤ C1
         | 
| 584 | 
            +
            
         | 
| 585 | 
            +
            |ui|
         | 
| 586 | 
            +
            s−2
         | 
| 587 | 
            +
            s
         | 
| 588 | 
            +
            ∞ ∥ui∥
         | 
| 589 | 
            +
            2
         | 
| 590 | 
            +
            s
         | 
| 591 | 
            +
            H1(B1(x))) + C2ℓ
         | 
| 592 | 
            +
            p
         | 
| 593 | 
            +
            s C3|u|
         | 
| 594 | 
            +
            2ps−(s+2)
         | 
| 595 | 
            +
            s
         | 
| 596 | 
            +
            ∞
         | 
| 597 | 
            +
            �
         | 
| 598 | 
            +
            ℓ
         | 
| 599 | 
            +
            �
         | 
| 600 | 
            +
            j=1
         | 
| 601 | 
            +
            ∥uj∥2
         | 
| 602 | 
            +
            H1(B1(x))
         | 
| 603 | 
            +
            � p
         | 
| 604 | 
            +
            s
         | 
| 605 | 
            +
            
         | 
| 606 | 
            +
             ,
         | 
| 607 | 
            +
            where C3 = C3(N, p) is the constant given by the Sobolev embedding H1(B1) ⊂ L2p(B1).
         | 
| 608 | 
            +
            Lemma 2.4. Assume (V1) − (V2), let u = (u1, . . . , uℓ) be a solution of (1.1) and let fi be as in
         | 
| 609 | 
            +
            (2.4). Then, there are constants η > 0, C1 > 0, and C2 > 0 such that
         | 
| 610 | 
            +
            |ui(x)| ≤ C1e−η|x|,
         | 
| 611 | 
            +
            |fi(x)| ≤ C2e−(2p−1)η|x|,
         | 
| 612 | 
            +
            for all x ∈ RN and i = 1, . . . , ℓ.
         | 
| 613 | 
            +
            Proof. For x ∈ RN with |x| ≥ 2, set r := 1
         | 
| 614 | 
            +
            2|x|. Then, B1(x) ⊂ RN ∖ Br and, by Lemma 2.1, there
         | 
| 615 | 
            +
            are positive constants K1 = K1(u, σ, β, N, ρ, p) and ϑ = ϑ(σ), with ρ and σi as in (V2), such that
         | 
| 616 | 
            +
            ∥uj∥2
         | 
| 617 | 
            +
            H1(B1(x)) ≤ ∥uj∥2
         | 
| 618 | 
            +
            H1(RN∖Br) = ξj(r) ≤
         | 
| 619 | 
            +
            ℓ
         | 
| 620 | 
            +
            �
         | 
| 621 | 
            +
            i=1
         | 
| 622 | 
            +
            ξi(r) ≤ K1e−ϑr
         | 
| 623 | 
            +
            for every j = 1, . . . , ℓ.
         | 
| 624 | 
            +
            Fix s > max{N
         | 
| 625 | 
            +
            2 , 2}. By Lemma 2.3 there are positive constants K2 = K2(u, β, N, p, Λ, s) and
         | 
| 626 | 
            +
            K3 = K3(u, σ, β, ρ, N, p, s) such that
         | 
| 627 | 
            +
            ∥ui∥W 2,s(B 1
         | 
| 628 | 
            +
            2 (x)) ≤ K2
         | 
| 629 | 
            +
            
         | 
| 630 | 
            +
            ∥ui∥
         | 
| 631 | 
            +
            2
         | 
| 632 | 
            +
            s
         | 
| 633 | 
            +
            H1(B1(x))) +
         | 
| 634 | 
            +
            �
         | 
| 635 | 
            +
            ℓ
         | 
| 636 | 
            +
            �
         | 
| 637 | 
            +
            j=1
         | 
| 638 | 
            +
            ∥uj∥2
         | 
| 639 | 
            +
            H1(B1(x))
         | 
| 640 | 
            +
            � p
         | 
| 641 | 
            +
            s
         | 
| 642 | 
            +
            
         | 
| 643 | 
            +
             ≤ K2K3e− ϑ
         | 
| 644 | 
            +
            s r.
         | 
| 645 | 
            +
            7
         | 
| 646 | 
            +
             | 
| 647 | 
            +
            Therefore,
         | 
| 648 | 
            +
            |ui(x)| ≤ |ui|L∞(B 1
         | 
| 649 | 
            +
            2 (x)) ≤ K4∥ui∥W 2,s(B 1
         | 
| 650 | 
            +
            2 (x)) ≤ K2K3K4e− ϑ
         | 
| 651 | 
            +
            2s|x|
         | 
| 652 | 
            +
            for every x ∈ RN ∖ B2,
         | 
| 653 | 
            +
            where K4 is the positive constant given by the embedding W 2,s(B 1
         | 
| 654 | 
            +
            2) ⊂ L∞(B 1
         | 
| 655 | 
            +
            2).
         | 
| 656 | 
            +
            Since ui is
         | 
| 657 | 
            +
            continuous, we may choose C1 ≥ K2K3K4 such that |ui(x)| ≤ C1e− ϑ
         | 
| 658 | 
            +
            s for every x ∈ B2. So, setting
         | 
| 659 | 
            +
            η := ϑ
         | 
| 660 | 
            +
            2s, we obtain
         | 
| 661 | 
            +
            |ui(x)| ≤ C1e−η|x|
         | 
| 662 | 
            +
            for every x ∈ RN.
         | 
| 663 | 
            +
            The estimate for fi follows immediately from (2.5).
         | 
| 664 | 
            +
            The following result is a particular case of [18, Theorem 2.1]. We include a simplified proof for
         | 
| 665 | 
            +
            completeness.
         | 
| 666 | 
            +
            Lemma 2.5. Assume that V : RN → R satisfies σ := infRN∖Bρ(0) V > 0 for some ρ ≥ 0. Let w be
         | 
| 667 | 
            +
            a classical solution of −∆w + V w = f in RN such that
         | 
| 668 | 
            +
            |w(x)| ≤ Ce−η|x|
         | 
| 669 | 
            +
            and
         | 
| 670 | 
            +
            |f(x)| ≤ Ce−δ|x|
         | 
| 671 | 
            +
            for all x ∈ RN
         | 
| 672 | 
            +
            and for some constants C > 0, η ∈ (0, √σ) and δ ∈ (η, √σ]. Then, for any µ ∈ (η, δ), there is
         | 
| 673 | 
            +
            M = M(µ, δ, ρ, σ, C) > 0 such that
         | 
| 674 | 
            +
            |w(x)| ≤ Me−µ|x|
         | 
| 675 | 
            +
            for all x ∈ RN.
         | 
| 676 | 
            +
            Proof. Let ρ, σ, η, δ, µ, and C be as in the statement. Set v(x) := e−µ|x| for x ∈ RN. Then,
         | 
| 677 | 
            +
            ∆v(x) = v(x)h(|x|)
         | 
| 678 | 
            +
            for x ∈ RN ∖ {0},
         | 
| 679 | 
            +
            where h(r) := µ2 − (N − 1)µ
         | 
| 680 | 
            +
            r .
         | 
| 681 | 
            +
            In particular, V (x) − h(|x|) ≥ σ − µ2 =: ε > 0 for |x| > ρ. Fix t ∈ R satisfying
         | 
| 682 | 
            +
            t > C
         | 
| 683 | 
            +
            ε e(µ−δ)ρ
         | 
| 684 | 
            +
            and
         | 
| 685 | 
            +
            w(x) < tv(x) for |x| = ρ.
         | 
| 686 | 
            +
            (2.6)
         | 
| 687 | 
            +
            We claim that w(x) ≤ tv(x) for all |x| > ρ. Indeed, let z := w − tv and assume, by contradiction,
         | 
| 688 | 
            +
            that m := sup|x|≥ρ z(x) > 0. Since lim|x|→∞ z(x) = 0, there is R > ρ such that z(x) ≤ m
         | 
| 689 | 
            +
            2 for
         | 
| 690 | 
            +
            |x| ≥ R. Let Ω := {x ∈ RN : ρ < |x| < R and z(x) > 0}. Then z ≤ m
         | 
| 691 | 
            +
            2 on ∂Ω and, by (2.6),
         | 
| 692 | 
            +
            −∆z(x) = −∆w(x) + t∆v(x) = f(x) − V (x)w(x) + tv(x)h(|x|)
         | 
| 693 | 
            +
            = f(x) − V (x)z(x) + tv(x)(h(|x|) − V (x))
         | 
| 694 | 
            +
            < Ce−δ|x| − εtv(x) = Ce−δ|x| − εte−µ|x| < 0
         | 
| 695 | 
            +
            for every x ∈ Ω.
         | 
| 696 | 
            +
            Then, by the maximum principle, m = maxΩ z = max∂Ω z ≤ m
         | 
| 697 | 
            +
            2 . This is a contradiction. Therefore
         | 
| 698 | 
            +
            m ≤ 0, namely, w(x) ≤ te−µ|x| for all |x| ≥ ρ. Arguing similarly for −w and using that w ∈ L∞(RN)
         | 
| 699 | 
            +
            we obtain that |w(x)| ≤ Me−µ|x| for all x ∈ RN, as claimed.
         | 
| 700 | 
            +
            We are ready to prove Theorem 1.1.
         | 
| 701 | 
            +
            Proof of Theorem 1.1. Iterating Lemmas 2.4 and 2.5, using that 2p − 1 > 1, one shows that, for
         | 
| 702 | 
            +
            any µi ∈ (0, √σi), there is C > 0 such that |ui(x)| ≤ Ce−µi|x| for all x ∈ RN and for all i = 1, . . . , ℓ.
         | 
| 703 | 
            +
            Now, assume that Vi ≡ 1 for every i = 1, . . . , ℓ and let µ ∈ (0, 1) be such that (2p − 1)µ > 1.
         | 
| 704 | 
            +
            By Lemma 2.4, we have that |fi(x)| ≤ C2e−(2p−1)µ|x| for all x ∈ RN.
         | 
| 705 | 
            +
            The claim now follows
         | 
| 706 | 
            +
            from [1, Theorem 2.3(c)].
         | 
| 707 | 
            +
            8
         | 
| 708 | 
            +
             | 
| 709 | 
            +
            3
         | 
| 710 | 
            +
            Energy estimates for seminodal solutions
         | 
| 711 | 
            +
            In this section we prove Theorem 1.2.
         | 
| 712 | 
            +
            Consider the autonomous system (1.4) where N ≥ 4,
         | 
| 713 | 
            +
            1 < p <
         | 
| 714 | 
            +
            N
         | 
| 715 | 
            +
            N−2 and βij satisfy the assumption (B1) stated in the Introduction. According to the
         | 
| 716 | 
            +
            decomposition given by (B1), a solution u = (u1, . . . , uℓ) to (1.4) may be written in block-form as
         | 
| 717 | 
            +
            u = (u1, . . . , uq)
         | 
| 718 | 
            +
            with uh = (uℓh−1+1, . . . , uℓh),
         | 
| 719 | 
            +
            h = 1, . . . , q.
         | 
| 720 | 
            +
            u is called fully nontrivial if every component ui is different from zero. We say that u is block-wise
         | 
| 721 | 
            +
            nontrivial if at least one component in each block uh is nontrivial.
         | 
| 722 | 
            +
            Following [11], we introduce suitable symmetries to produce a change of sign in some compo-
         | 
| 723 | 
            +
            nents. Let G be a finite subgroup of the group O(N) of linear isometries of RN and denote by
         | 
| 724 | 
            +
            Gx := {gx : g ∈ G} the G-orbit of x ∈ RN. Let φ : G → Z2 := {−1, 1} be a homomorphism of
         | 
| 725 | 
            +
            groups. A function u : RN → R is called G-invariant if it is constant on Gx for every x ∈ RN and
         | 
| 726 | 
            +
            it is called φ-equivariant if
         | 
| 727 | 
            +
            u(gx) = φ(g)u(x) for all g ∈ G, x ∈ RN.
         | 
| 728 | 
            +
            (3.1)
         | 
| 729 | 
            +
            Note that, if φ ≡ 1 is the trivial homomorphism and u satisfies (3.1), then u is G-invariant. On
         | 
| 730 | 
            +
            the other hand, if φ is surjective every nontrivial function satisfying (3.1) is nonradial and changes
         | 
| 731 | 
            +
            sign. Define
         | 
| 732 | 
            +
            H1(RN)φ := {u ∈ H1(RN) : u is φ-equivariant}.
         | 
| 733 | 
            +
            For each h = 1, . . . , q, fix a homomorphism φh : G → Z2. Take φi := φh for all i ∈ Ih and set
         | 
| 734 | 
            +
            φ = (φ1, . . . , φℓ). Denote by
         | 
| 735 | 
            +
            Hφ := H1(RN)φ1 × · · · × H1(RN)φℓ,
         | 
| 736 | 
            +
            and let J φ : Hφ → R be the functional given by
         | 
| 737 | 
            +
            J φ(u) := 1
         | 
| 738 | 
            +
            2
         | 
| 739 | 
            +
            ℓ
         | 
| 740 | 
            +
            �
         | 
| 741 | 
            +
            i=1
         | 
| 742 | 
            +
            ∥ui∥2 − 1
         | 
| 743 | 
            +
            2p
         | 
| 744 | 
            +
            ℓ
         | 
| 745 | 
            +
            �
         | 
| 746 | 
            +
            i,j=1
         | 
| 747 | 
            +
            βij
         | 
| 748 | 
            +
            �
         | 
| 749 | 
            +
            RN |ui|p|uj|p.
         | 
| 750 | 
            +
            This functional is of class C1 and its critical points are the solutions to the system (1.4) satisfying
         | 
| 751 | 
            +
            (3.1). The block-wise nontrivial solutions belong to the Nehari set
         | 
| 752 | 
            +
            N φ := {u ∈ Hφ : ∥uh∥ ̸= 0 and ∂uhJ φ(u)uh = 0 for every h = 1, . . . , ℓ}.
         | 
| 753 | 
            +
            Note that
         | 
| 754 | 
            +
            ∂uhJ φ|K(u)uh = ∥uh∥2 −
         | 
| 755 | 
            +
            ℓ
         | 
| 756 | 
            +
            �
         | 
| 757 | 
            +
            k=1
         | 
| 758 | 
            +
            �
         | 
| 759 | 
            +
            (i,j)∈Ih×Ik
         | 
| 760 | 
            +
            βij
         | 
| 761 | 
            +
            �
         | 
| 762 | 
            +
            RN |ui|p|uj|p,
         | 
| 763 | 
            +
            and that J φ(u) = p−1
         | 
| 764 | 
            +
            2p ∥u∥2 if u ∈ N φ. Let
         | 
| 765 | 
            +
            cφ :=
         | 
| 766 | 
            +
            inf
         | 
| 767 | 
            +
            u∈N φ J φ(u).
         | 
| 768 | 
            +
            If s = (s1, . . . , sq) ∈ Rq and u = (u1, . . . , uq) ∈ Hφ we write su := (s1u1, . . . , squq). The following
         | 
| 769 | 
            +
            facts were proved in [8].
         | 
| 770 | 
            +
            9
         | 
| 771 | 
            +
             | 
| 772 | 
            +
            Lemma 3.1.
         | 
| 773 | 
            +
            (i) cφ > 0.
         | 
| 774 | 
            +
            (ii) If the coordinates of u ∈ Hφ satisfy
         | 
| 775 | 
            +
            q
         | 
| 776 | 
            +
            �
         | 
| 777 | 
            +
            k=1
         | 
| 778 | 
            +
            �
         | 
| 779 | 
            +
            (i,j)∈Ih×Ik
         | 
| 780 | 
            +
            �
         | 
| 781 | 
            +
            RN βij|ui|p|uj|p > 0
         | 
| 782 | 
            +
            for every h = 1, . . . , q,
         | 
| 783 | 
            +
            (3.2)
         | 
| 784 | 
            +
            then there exists a unique su ∈ (0, ∞)q such that suu ∈ N φ. Furthermore,
         | 
| 785 | 
            +
            J φ(suu) =
         | 
| 786 | 
            +
            max
         | 
| 787 | 
            +
            s∈(0,∞)q J φ(su).
         | 
| 788 | 
            +
            Proof. See [8, Lemma 2.2] or [11, Lemma 2.2].
         | 
| 789 | 
            +
            Lemma 3.2. If cφ is attained, then the system (1.4) has a block-wise nontrivial solution u =
         | 
| 790 | 
            +
            (u1, . . . , uℓ) ∈ Hφ. Furthermore, if ui is nontrivial, then ui is positive if φi ≡ 1 and ui is nonradial
         | 
| 791 | 
            +
            and changes sign if φi is surjective.
         | 
| 792 | 
            +
            Proof. It is shown in [8, Lemma 2.4] that any minimizer of J φ on N φ is a block-wise nontrivial
         | 
| 793 | 
            +
            solution to (1.4). If ui ̸= 0 and φi is surjective, then ui is nonradial and changes sign. If φi ≡ 1 then
         | 
| 794 | 
            +
            |ui| is G-invariant and replacing ui with |ui| we obtain a solution with the required properties.
         | 
| 795 | 
            +
            Set Q := {1, . . . , q} and fix a decomposition Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅. From now
         | 
| 796 | 
            +
            on, we consider the following symmetries. We write RN ≡ C × C × RN−4 and a point in RN as
         | 
| 797 | 
            +
            (z1, z2, y) ∈ C × C × RN−4.
         | 
| 798 | 
            +
            Definitions 3.3. Let i denote the imaginary unit. For each m ∈ N, let
         | 
| 799 | 
            +
            Km := {e2πij/m : j = 0, . . . , m − 1},
         | 
| 800 | 
            +
            Gm be the group generated by Km ∪{τ}∪O(N −4), acting on each point (z1, z2, y) ∈ C×C×RN−4
         | 
| 801 | 
            +
            as
         | 
| 802 | 
            +
            e2πij/m(z1, z2, y) := (e2πij/mz1, e2πij/mz2, y),
         | 
| 803 | 
            +
            τ(z1, z2, y) := (z2, z1, y),
         | 
| 804 | 
            +
            α(z1, z2, y) := (z1, z2, αy)
         | 
| 805 | 
            +
            if α ∈ O(N − 4),
         | 
| 806 | 
            +
            and θ : Gm → Z2 be the homomorphism satisfying
         | 
| 807 | 
            +
            θ(e2πij/m) = 1,
         | 
| 808 | 
            +
            θ(τ) = −1,
         | 
| 809 | 
            +
            and
         | 
| 810 | 
            +
            θ(α) = 1
         | 
| 811 | 
            +
            for every α ∈ O(N − 4).
         | 
| 812 | 
            +
            Define φh : Gm → Z2 by
         | 
| 813 | 
            +
            φh :=
         | 
| 814 | 
            +
            �
         | 
| 815 | 
            +
            1
         | 
| 816 | 
            +
            if h ∈ Q+,
         | 
| 817 | 
            +
            θ
         | 
| 818 | 
            +
            if h ∈ Q−.
         | 
| 819 | 
            +
            (3.3)
         | 
| 820 | 
            +
            Due to the lack of compactness, cφ is not always attained; see e.g. [11, Corollary 2.8(i)]. A
         | 
| 821 | 
            +
            sufficient condition for this to happen is given by the next lemma. We use the following notation.
         | 
| 822 | 
            +
            If Q′ ⊂ Q := {1, . . . , q} we consider the subsystem of (1.4) obtained by deleting all components of
         | 
| 823 | 
            +
            uh for every h /∈ Q′, and we denote by J φ
         | 
| 824 | 
            +
            Q′ and N φ
         | 
| 825 | 
            +
            Q′ the functional and the Nehari set associated
         | 
| 826 | 
            +
            to this subsystem. We write
         | 
| 827 | 
            +
            cφ
         | 
| 828 | 
            +
            Q′ :=
         | 
| 829 | 
            +
            inf
         | 
| 830 | 
            +
            u∈N φ
         | 
| 831 | 
            +
            Q′
         | 
| 832 | 
            +
            J φ
         | 
| 833 | 
            +
            Q′(u).
         | 
| 834 | 
            +
            If Q′ = {h} we omit the curly brackets and write, for instance, cφ
         | 
| 835 | 
            +
            h or J φ
         | 
| 836 | 
            +
            h .
         | 
| 837 | 
            +
            10
         | 
| 838 | 
            +
             | 
| 839 | 
            +
            Lemma 3.4 (Compactness). Let N ̸= 5, m ≥ 5 and φh : Gm → Z2 be as in (3.3). If, for each
         | 
| 840 | 
            +
            h ∈ Q := {1, . . . , q}, the strict inequality
         | 
| 841 | 
            +
            cφ <
         | 
| 842 | 
            +
            
         | 
| 843 | 
            +
            
         | 
| 844 | 
            +
            
         | 
| 845 | 
            +
            cφ
         | 
| 846 | 
            +
            Q∖{h} + mµh
         | 
| 847 | 
            +
            p−1
         | 
| 848 | 
            +
            2p ∥ω∥2,
         | 
| 849 | 
            +
            if h ∈ Q+,
         | 
| 850 | 
            +
            cφ
         | 
| 851 | 
            +
            Q∖{h} + 2mµh
         | 
| 852 | 
            +
            p−1
         | 
| 853 | 
            +
            2p ∥ω∥2,
         | 
| 854 | 
            +
            if h ∈ Q−,
         | 
| 855 | 
            +
            (3.4)
         | 
| 856 | 
            +
            holds true, then cφ is attained, where ω is the positive radial solution to (1.7) and µh is given by
         | 
| 857 | 
            +
            (1.5).
         | 
| 858 | 
            +
            Proof. This statement follows by combining [11, Corollary 2.8(ii)] with [11, Equation (5.1)].
         | 
| 859 | 
            +
            To verify condition (3.4) we introduce a suitable test function. Fix m ≥ 5 and let Km be as in
         | 
| 860 | 
            +
            Definitions 3.3. If h ∈ Q+, we take ζh := ( 1
         | 
| 861 | 
            +
            √
         | 
| 862 | 
            +
            2,
         | 
| 863 | 
            +
            1
         | 
| 864 | 
            +
            √
         | 
| 865 | 
            +
            2, 0) and, for each R > 1, we define
         | 
| 866 | 
            +
            �σhR(x) :=
         | 
| 867 | 
            +
            �
         | 
| 868 | 
            +
            g∈Km
         | 
| 869 | 
            +
            ω(x − Rgζh),
         | 
| 870 | 
            +
            x ∈ RN.
         | 
| 871 | 
            +
            If h ∈ Q− we take ζh := (1, 0, 0) and we define
         | 
| 872 | 
            +
            �σhR(x) :=
         | 
| 873 | 
            +
            �
         | 
| 874 | 
            +
            g∈G′m
         | 
| 875 | 
            +
            φh(g) ω(x − Rgζh),
         | 
| 876 | 
            +
            x ∈ RN,
         | 
| 877 | 
            +
            where ω is the positive radial solution to (1.7) and G′
         | 
| 878 | 
            +
            m is the subgroup of Gm generated by Km∪{τ}.
         | 
| 879 | 
            +
            Note that �σhR(gx) = φh(g)�σhR(x) for every g ∈ Gm, x ∈ RN. Let
         | 
| 880 | 
            +
            σhR := thR�σhR,
         | 
| 881 | 
            +
            (3.5)
         | 
| 882 | 
            +
            where thR > 0 is chosen so that ∥σhR∥2 =
         | 
| 883 | 
            +
            �
         | 
| 884 | 
            +
            RN |σhR|2p.
         | 
| 885 | 
            +
            Lemma 3.5. If m ≥ 5, then, for each h ∈ {1, . . . , q}, there exist th = (tℓh−1+1, . . . , tℓh) ∈
         | 
| 886 | 
            +
            (0, ∞)ℓh−ℓh−1 and C0, R0 > 0 such that thσhR := (tℓh−1+1σhR, . . . , tℓhσhR) ∈ N φ
         | 
| 887 | 
            +
            h and
         | 
| 888 | 
            +
            J φ
         | 
| 889 | 
            +
            h (thσhR) ≤ |Gmζh| µh
         | 
| 890 | 
            +
            p−1
         | 
| 891 | 
            +
            2p ∥ω∥2 − C0e−Rdm
         | 
| 892 | 
            +
            for every R ≥ R0,
         | 
| 893 | 
            +
            where |Gmζh| is the cardinality of the Gm-orbit of ζh, i.e., |Gmζh| = m if h ∈ Q+ and |Gmζh| = 2m
         | 
| 894 | 
            +
            if h ∈ Q−, and
         | 
| 895 | 
            +
            dm := |1 − e2πi/m|.
         | 
| 896 | 
            +
            (3.6)
         | 
| 897 | 
            +
            Proof. Take th = (tℓh−1+1, . . . , tℓh) ∈ (0, ∞)ℓh−ℓh−1 such that
         | 
| 898 | 
            +
            �
         | 
| 899 | 
            +
            i∈Ih
         | 
| 900 | 
            +
            t2
         | 
| 901 | 
            +
            i =
         | 
| 902 | 
            +
            �
         | 
| 903 | 
            +
            i,j∈Ih
         | 
| 904 | 
            +
            βijtp
         | 
| 905 | 
            +
            jtp
         | 
| 906 | 
            +
            i = µh
         | 
| 907 | 
            +
            and apply [11, Proposition 4.1(i) and Lemma 4.4].
         | 
| 908 | 
            +
            11
         | 
| 909 | 
            +
             | 
| 910 | 
            +
            Proof of Theorem 1.2. Assume (B1) and let φh : Gm → Z2 be given by (3.3). For q = 1 and m ≥ 5
         | 
| 911 | 
            +
            it is proved in [11, Corollary 4.2 and Proposition 4.5] that cφ is attained at u ∈ N φ satisfying
         | 
| 912 | 
            +
            ∥u∥2 = µ1∥ω∥2 if Q+ = {1}
         | 
| 913 | 
            +
            and
         | 
| 914 | 
            +
            ∥u∥2 < 2m µ1∥ω∥2 if Q− = {1}.
         | 
| 915 | 
            +
            Taking m = 5 gives statement (b).
         | 
| 916 | 
            +
            Fix m = 6. We claim that cφ is attained and that the estimate (c) holds true for every q ≥ 2.
         | 
| 917 | 
            +
            To prove this claim, we proceed by induction. Assume it is true for q − 1 with q ≥ 2.
         | 
| 918 | 
            +
            We will show that the compactness condition (3.4) holds true. Using a change of coordinates, it
         | 
| 919 | 
            +
            suffices to argue for h = q. By induction hypothesis there exists w = (w1, . . . , wq−1) ∈ N φ
         | 
| 920 | 
            +
            Q∖{q} such
         | 
| 921 | 
            +
            that J φ
         | 
| 922 | 
            +
            Q∖{q}(w) = cφ
         | 
| 923 | 
            +
            Q∖{q}. For each R > 1 let σqR be as in (3.5) and take tq ∈ (0, ∞)ℓ−ℓq−1 as in
         | 
| 924 | 
            +
            Lemma 3.5. Set whR = wh for h = 1, . . . , q−1 and wqR = tqσqR, and define wR = (w1R, . . . , wℓR) :=
         | 
| 925 | 
            +
            (w1R, . . . , wqR). Then, as w ∈ N φ
         | 
| 926 | 
            +
            Q∖{q} and the interaction between the components of w and σqR
         | 
| 927 | 
            +
            tends to 0 as R → ∞, we have that wR satisfies (3.2) for large enough R and, as a consequence,
         | 
| 928 | 
            +
            there exist R1 > 0 and (s1R, . . . , sqR) ∈ [1/2, 2]q such that (s1Rw1R, . . . , sqRwqR) ∈ N φ if R ≥ R1.
         | 
| 929 | 
            +
            Set uR = (u1R, . . . , uℓR) := (s1Rw1R, . . . , sqRwqR). Using that w ∈ N φ
         | 
| 930 | 
            +
            Q∖{q} and tqσqR ∈ N φ
         | 
| 931 | 
            +
            q , from
         | 
| 932 | 
            +
            the last statement in Lemma 3.1(ii) and Lemma 3.5 we derive
         | 
| 933 | 
            +
            J φ(uR) = 1
         | 
| 934 | 
            +
            2
         | 
| 935 | 
            +
            ℓ
         | 
| 936 | 
            +
            �
         | 
| 937 | 
            +
            i=1
         | 
| 938 | 
            +
            ∥uiR∥2 − 1
         | 
| 939 | 
            +
            2p
         | 
| 940 | 
            +
            ℓ
         | 
| 941 | 
            +
            �
         | 
| 942 | 
            +
            i,j=1
         | 
| 943 | 
            +
            βij
         | 
| 944 | 
            +
            �
         | 
| 945 | 
            +
            RN |uiR|p|ujR|p
         | 
| 946 | 
            +
            ≤ J φ
         | 
| 947 | 
            +
            Q∖{q}(w) + J φ
         | 
| 948 | 
            +
            q (tqσqR) − 1
         | 
| 949 | 
            +
            p
         | 
| 950 | 
            +
            q−1
         | 
| 951 | 
            +
            �
         | 
| 952 | 
            +
            h=1
         | 
| 953 | 
            +
            �
         | 
| 954 | 
            +
            (i,j)∈Ih×Iq
         | 
| 955 | 
            +
            βij
         | 
| 956 | 
            +
            �
         | 
| 957 | 
            +
            RN |shRwiR|p|sqRwjR|p
         | 
| 958 | 
            +
            ≤ cφ
         | 
| 959 | 
            +
            Q∖{q} + |Gmζh| µq
         | 
| 960 | 
            +
            p−1
         | 
| 961 | 
            +
            2p ∥ω∥2 − C0e−Rdm + C1
         | 
| 962 | 
            +
            q−1
         | 
| 963 | 
            +
            �
         | 
| 964 | 
            +
            h=1
         | 
| 965 | 
            +
            �
         | 
| 966 | 
            +
            i∈Ih
         | 
| 967 | 
            +
            �
         | 
| 968 | 
            +
            RN |wiR|p|σqR|p,
         | 
| 969 | 
            +
            if R ≥ max{R0, R1}, where C0 and C1 are positive constants and dm is given in (3.6).
         | 
| 970 | 
            +
            It is well known that |ω(x)| ≤ Ce−|x| and, as w solves a subsystem of (1.4), Theorem 1.1 asserts
         | 
| 971 | 
            +
            that
         | 
| 972 | 
            +
            |wiR(x)| ≤ Ce−|x|
         | 
| 973 | 
            +
            for every i ∈ Ih with h = 1, . . . , q − 1.
         | 
| 974 | 
            +
            Therefore, for every g ∈ Gm,
         | 
| 975 | 
            +
            �
         | 
| 976 | 
            +
            RN |wiR|p|ω( · − Rgζh)|p ≤ C
         | 
| 977 | 
            +
            �
         | 
| 978 | 
            +
            RN e−p|x| e−p|x−Rgζh| dx ≤ Ce−Rp.
         | 
| 979 | 
            +
            So, if p > dm, we conclude that
         | 
| 980 | 
            +
            cφ < cφ
         | 
| 981 | 
            +
            Q∖{q} + |Gmζh| µq
         | 
| 982 | 
            +
            p−1
         | 
| 983 | 
            +
            2p ∥ω∥2
         | 
| 984 | 
            +
            and, by Lemmas 3.4 and 3.2, cφ is attained at a block-wise nontrivial solution u of (1.4) such
         | 
| 985 | 
            +
            that every component of uh is positive if h ∈ Q+ and every component of uh is nonradial and
         | 
| 986 | 
            +
            changes sign if h ∈ Q−. Furthermore, since we are assuming (B2) and (B3) with C∗ as in (3.7)
         | 
| 987 | 
            +
            below, [11, Theorem 3.3] asserts that u is fully nontrivial.
         | 
| 988 | 
            +
            Finally, note that p > 1 = dm because m = 6. As |Gmζh| = 6 if h ∈ Q+ and |Gmζh| = 12 if
         | 
| 989 | 
            +
            h ∈ Q−, the estimate in statement (c) follows by induction.
         | 
| 990 | 
            +
            12
         | 
| 991 | 
            +
             | 
| 992 | 
            +
            Remark 3.6. If m = 5 and p > dm we arrive to a similar conclusion, where, in this case, the
         | 
| 993 | 
            +
            constant bh in statement (b) is 5 if h ∈ Q+ and it is 10 if h ∈ Q−. Note, however, that numbers p
         | 
| 994 | 
            +
            satisfying d5 = 2 sin π
         | 
| 995 | 
            +
            5 < p <
         | 
| 996 | 
            +
            N
         | 
| 997 | 
            +
            N−2 exist only for N ≤ 13.
         | 
| 998 | 
            +
            Remark 3.7. For φh as in (3.3), the constant C∗ > 0 appearing in (B3) depends on N, p, q, and
         | 
| 999 | 
            +
            Q+. It is explicitly defined in [11, Equation (3.1)] as
         | 
| 1000 | 
            +
            C∗ :=
         | 
| 1001 | 
            +
            
         | 
| 1002 | 
            +
            
         | 
| 1003 | 
            +
            pdφ
         | 
| 1004 | 
            +
            (p − 1)S
         | 
| 1005 | 
            +
            p
         | 
| 1006 | 
            +
            p−1
         | 
| 1007 | 
            +
            φ
         | 
| 1008 | 
            +
            
         | 
| 1009 | 
            +
            
         | 
| 1010 | 
            +
            p
         | 
| 1011 | 
            +
            ,
         | 
| 1012 | 
            +
            (3.7)
         | 
| 1013 | 
            +
            where
         | 
| 1014 | 
            +
            dφ := p − 1
         | 
| 1015 | 
            +
            2p
         | 
| 1016 | 
            +
            inf
         | 
| 1017 | 
            +
            (v1,...,vq)∈Uφ
         | 
| 1018 | 
            +
            q
         | 
| 1019 | 
            +
            �
         | 
| 1020 | 
            +
            h=1
         | 
| 1021 | 
            +
            ∥vh∥2
         | 
| 1022 | 
            +
            with Uφ := {(v1, . . . , vq) : vh ∈ H1(RN)φh ∖ {0}, ∥vh∥2 = |vh|2p
         | 
| 1023 | 
            +
            2p, vhvk = 0 if h ̸= k}, and
         | 
| 1024 | 
            +
            Sφ :=
         | 
| 1025 | 
            +
            min
         | 
| 1026 | 
            +
            h=1,...,q
         | 
| 1027 | 
            +
            inf
         | 
| 1028 | 
            +
            v∈H1(RN)φh∖{0}
         | 
| 1029 | 
            +
            ∥v∥2
         | 
| 1030 | 
            +
            |v|2
         | 
| 1031 | 
            +
            2p
         | 
| 1032 | 
            +
            .
         | 
| 1033 | 
            +
            Remark 3.8. In the proof of Theorem 1.2 we use [1, Theorem 2.3], which also characterizes the
         | 
| 1034 | 
            +
            sharp decay rate for positive components by providing a bound from below. This kind of information
         | 
| 1035 | 
            +
            can be useful to show uniqueness of positive solutions for some problems, see [4, Section 8.2].
         | 
| 1036 | 
            +
            To conclude, we discuss some special cases.
         | 
| 1037 | 
            +
            Examples 3.9. Assume (B1) and let p ∈ (1, 2∗
         | 
| 1038 | 
            +
            2 ).
         | 
| 1039 | 
            +
            (a) If q = 1 the system (1.4) is cooperative and more can be said. Indeed, it is shown in [11,
         | 
| 1040 | 
            +
            Corollary 4.2 and Proposition 4.5] that, if (B2) is satisfied, then (1.4) has a synchronized
         | 
| 1041 | 
            +
            solution u = (t1u, . . . , tℓu), where (t1, . . . , tℓ) ∈ (0, ∞)ℓ is a minimizer for (1.5) and u is a
         | 
| 1042 | 
            +
            nontrivial φ-equivariant least energy solution of the equation
         | 
| 1043 | 
            +
            −∆u + u = |u|2p−2u,
         | 
| 1044 | 
            +
            u ∈ H1(RN)φ.
         | 
| 1045 | 
            +
            (3.8)
         | 
| 1046 | 
            +
            Here, if Q+ = {1}, then φ ≡ 1 (and therefore u = ω) and ∥u∥2 ≤ µ1∥ω∥2. On the other
         | 
| 1047 | 
            +
            hand, if Q− = {1}, then φ : Gm → Z2 is the homomorphism θ given in Definitions 3.3 and
         | 
| 1048 | 
            +
            ∥u∥2 ≤ 10µ1∥ω∥2.
         | 
| 1049 | 
            +
            (b) If q = ℓ ≥ 2 the system (1.4) is competitive, i.e., βii > 0 and βij < 0 if i ̸= j. Assumptions
         | 
| 1050 | 
            +
            (B2) and (B3) are automatically satisfied and, as µi = β
         | 
| 1051 | 
            +
            −
         | 
| 1052 | 
            +
            1
         | 
| 1053 | 
            +
            p−1
         | 
| 1054 | 
            +
            ii
         | 
| 1055 | 
            +
            , the estimate in Theorem 1.2(c)
         | 
| 1056 | 
            +
            becomes
         | 
| 1057 | 
            +
            ∥u∥2 <
         | 
| 1058 | 
            +
            
         | 
| 1059 | 
            +
            min
         | 
| 1060 | 
            +
            j∈Q
         | 
| 1061 | 
            +
            �
         | 
| 1062 | 
            +
            ajβ
         | 
| 1063 | 
            +
            −
         | 
| 1064 | 
            +
            1
         | 
| 1065 | 
            +
            p−1
         | 
| 1066 | 
            +
            jj
         | 
| 1067 | 
            +
            +
         | 
| 1068 | 
            +
            �
         | 
| 1069 | 
            +
            i∈Q∖{i}
         | 
| 1070 | 
            +
            biβ
         | 
| 1071 | 
            +
            −
         | 
| 1072 | 
            +
            1
         | 
| 1073 | 
            +
            p−1
         | 
| 1074 | 
            +
            ii
         | 
| 1075 | 
            +
            �
         | 
| 1076 | 
            +
            
         | 
| 1077 | 
            +
             ∥ω∥2
         | 
| 1078 | 
            +
            ≤
         | 
| 1079 | 
            +
            
         | 
| 1080 | 
            +
            
         | 
| 1081 | 
            +
            
         | 
| 1082 | 
            +
            (6 |Q+| + 12 |Q−| − 5) β
         | 
| 1083 | 
            +
            −
         | 
| 1084 | 
            +
            1
         | 
| 1085 | 
            +
            p−1
         | 
| 1086 | 
            +
            0
         | 
| 1087 | 
            +
            ∥ω∥2
         | 
| 1088 | 
            +
            if Q+ ̸= ∅,
         | 
| 1089 | 
            +
            12 |Q−|β
         | 
| 1090 | 
            +
            −
         | 
| 1091 | 
            +
            1
         | 
| 1092 | 
            +
            p−1
         | 
| 1093 | 
            +
            0
         | 
| 1094 | 
            +
            ∥ω∥2
         | 
| 1095 | 
            +
            if Q+ = ∅,
         | 
| 1096 | 
            +
            where |Q±| denotes the cardinality of Q± and β0 := min{β11, . . . , βℓℓ}.
         | 
| 1097 | 
            +
            13
         | 
| 1098 | 
            +
             | 
| 1099 | 
            +
            (c) Similarly, for any q ≥ 2, the estimate in Theorem 1.2(c) yields
         | 
| 1100 | 
            +
            ∥u∥2 ≤
         | 
| 1101 | 
            +
            �
         | 
| 1102 | 
            +
            (6 |Q+| + 12 |Q−| − 5) µ∗∥ω∥2
         | 
| 1103 | 
            +
            if Q+ ̸= ∅,
         | 
| 1104 | 
            +
            12 |Q−| µ∗∥ω∥2
         | 
| 1105 | 
            +
            if Q+ = ∅.
         | 
| 1106 | 
            +
            where µ∗ = max{µ1, . . . , µq}.
         | 
| 1107 | 
            +
            Assumptions (B2) and (B3) guarantee that u is fully nontrivial. Note that the left-hand side of
         | 
| 1108 | 
            +
            the inequality in (B3) depends only on the entries of the submatrices (βij)i,j∈Ih, h = 1, . . . , q,
         | 
| 1109 | 
            +
            whereas the right-hand side only depends on the other entries. So, if the former are large
         | 
| 1110 | 
            +
            enough with respect to the absolute values of the latter, (B3) is satisfied. For example, if we
         | 
| 1111 | 
            +
            take ℓ = 2q and the matrix is
         | 
| 1112 | 
            +
            
         | 
| 1113 | 
            +
            
         | 
| 1114 | 
            +
            
         | 
| 1115 | 
            +
            
         | 
| 1116 | 
            +
            
         | 
| 1117 | 
            +
            
         | 
| 1118 | 
            +
            
         | 
| 1119 | 
            +
            
         | 
| 1120 | 
            +
            
         | 
| 1121 | 
            +
            
         | 
| 1122 | 
            +
            
         | 
| 1123 | 
            +
            λ
         | 
| 1124 | 
            +
            λ
         | 
| 1125 | 
            +
            β13
         | 
| 1126 | 
            +
            β14
         | 
| 1127 | 
            +
            β15
         | 
| 1128 | 
            +
            . . .
         | 
| 1129 | 
            +
            β1ℓ
         | 
| 1130 | 
            +
            λ
         | 
| 1131 | 
            +
            λ
         | 
| 1132 | 
            +
            β23
         | 
| 1133 | 
            +
            β24
         | 
| 1134 | 
            +
            β25
         | 
| 1135 | 
            +
            . . .
         | 
| 1136 | 
            +
            β2ℓ
         | 
| 1137 | 
            +
            β31
         | 
| 1138 | 
            +
            β32
         | 
| 1139 | 
            +
            λ
         | 
| 1140 | 
            +
            λ
         | 
| 1141 | 
            +
            β35
         | 
| 1142 | 
            +
            . . .
         | 
| 1143 | 
            +
            β3ℓ
         | 
| 1144 | 
            +
            β41
         | 
| 1145 | 
            +
            β42
         | 
| 1146 | 
            +
            λ
         | 
| 1147 | 
            +
            λ
         | 
| 1148 | 
            +
            β45
         | 
| 1149 | 
            +
            . . .
         | 
| 1150 | 
            +
            β4ℓ
         | 
| 1151 | 
            +
            ...
         | 
| 1152 | 
            +
            ...
         | 
| 1153 | 
            +
            ...
         | 
| 1154 | 
            +
            ...
         | 
| 1155 | 
            +
            βℓ−1 1
         | 
| 1156 | 
            +
            . . .
         | 
| 1157 | 
            +
            βℓ−1 ℓ−2
         | 
| 1158 | 
            +
            λ
         | 
| 1159 | 
            +
            λ
         | 
| 1160 | 
            +
            βℓ1
         | 
| 1161 | 
            +
            . . .
         | 
| 1162 | 
            +
            βℓ ℓ−2
         | 
| 1163 | 
            +
            λ
         | 
| 1164 | 
            +
            λ
         | 
| 1165 | 
            +
            
         | 
| 1166 | 
            +
            
         | 
| 1167 | 
            +
            
         | 
| 1168 | 
            +
            
         | 
| 1169 | 
            +
            
         | 
| 1170 | 
            +
            
         | 
| 1171 | 
            +
            
         | 
| 1172 | 
            +
            
         | 
| 1173 | 
            +
            
         | 
| 1174 | 
            +
            
         | 
| 1175 | 
            +
            
         | 
| 1176 | 
            +
            .
         | 
| 1177 | 
            +
            with λ > 0 and βji = βij < 0, then (B1) and (B2) are satisfied. If, additionally,
         | 
| 1178 | 
            +
            λ > 4
         | 
| 1179 | 
            +
            2p−1
         | 
| 1180 | 
            +
            p−1 (q − 1)C∗
         | 
| 1181 | 
            +
            and
         | 
| 1182 | 
            +
            |βij| ≤ 1,
         | 
| 1183 | 
            +
            then, for any h = 1, . . . , q,
         | 
| 1184 | 
            +
            �
         | 
| 1185 | 
            +
            min
         | 
| 1186 | 
            +
            {i,j}∈Eh
         | 
| 1187 | 
            +
            βij
         | 
| 1188 | 
            +
            �
         | 
| 1189 | 
            +
            
         | 
| 1190 | 
            +
            
         | 
| 1191 | 
            +
            min
         | 
| 1192 | 
            +
            h=1,...,q max
         | 
| 1193 | 
            +
            i∈Ih
         | 
| 1194 | 
            +
            βii
         | 
| 1195 | 
            +
            �
         | 
| 1196 | 
            +
            i,j∈Ih
         | 
| 1197 | 
            +
            βij
         | 
| 1198 | 
            +
            
         | 
| 1199 | 
            +
            
         | 
| 1200 | 
            +
            p
         | 
| 1201 | 
            +
            p−1
         | 
| 1202 | 
            +
            = λ
         | 
| 1203 | 
            +
            � λ
         | 
| 1204 | 
            +
            4λ
         | 
| 1205 | 
            +
            �
         | 
| 1206 | 
            +
            p
         | 
| 1207 | 
            +
            p−1
         | 
| 1208 | 
            +
            > C∗4(q − 1) ≥ C∗
         | 
| 1209 | 
            +
            q
         | 
| 1210 | 
            +
            �
         | 
| 1211 | 
            +
            k=1
         | 
| 1212 | 
            +
            k̸=h
         | 
| 1213 | 
            +
            �
         | 
| 1214 | 
            +
            i∈Ih
         | 
| 1215 | 
            +
            j∈Ik
         | 
| 1216 | 
            +
            |βij|
         | 
| 1217 | 
            +
            so (B3) is satisfied.
         | 
| 1218 | 
            +
            A
         | 
| 1219 | 
            +
            An auxiliary result
         | 
| 1220 | 
            +
            Lemma A.1. For every r ≥ 1 there is a linear operator Er : H1(RN ∖ Br) → H1(RN) such that,
         | 
| 1221 | 
            +
            for every u ∈ H1(RN ∖ Br),
         | 
| 1222 | 
            +
            (i) Eru = u a.e. in RN ∖ Br,
         | 
| 1223 | 
            +
            (ii) |Eru|2
         | 
| 1224 | 
            +
            2 ≤ C1|u|2
         | 
| 1225 | 
            +
            L2(RN∖Br)
         | 
| 1226 | 
            +
            (iii) ∥Eru∥2 ≤ C1∥u∥2
         | 
| 1227 | 
            +
            H1(RN∖Br)
         | 
| 1228 | 
            +
            for some positive constant C1 depending only on N and not on r. As a consequence, given p ∈ (1, 2∗
         | 
| 1229 | 
            +
            2 )
         | 
| 1230 | 
            +
            there is a positive constant C depending only on N and p such that
         | 
| 1231 | 
            +
            |u|L2p(RN∖Br) ≤ C∥u∥H1(RN∖Br)
         | 
| 1232 | 
            +
            for every u ∈ H1(RN ∖ Br) and every r ≥ 1.
         | 
| 1233 | 
            +
            14
         | 
| 1234 | 
            +
             | 
| 1235 | 
            +
            Proof. Fix a linear (extension) operator E1 : H1(RN ∖ B1) → H1(RN) and a positive constant C1
         | 
| 1236 | 
            +
            satisfying (i), (ii) and (iii) for r = 1; see e.g. [16, Theorem 2.3.2]. For r > 1, set �u(x) := u(rx)
         | 
| 1237 | 
            +
            and, for u ∈ H1(RN ∖ Br), define
         | 
| 1238 | 
            +
            (Eru)(y) := (E1�u)
         | 
| 1239 | 
            +
            �y
         | 
| 1240 | 
            +
            r
         | 
| 1241 | 
            +
            �
         | 
| 1242 | 
            +
            .
         | 
| 1243 | 
            +
            Then, �
         | 
| 1244 | 
            +
            Eru = E1�u. Clearly, Er satisfies (i). Note that |�u|2
         | 
| 1245 | 
            +
            L2(RN ∖B1) = r−N|u|2
         | 
| 1246 | 
            +
            L2(RN∖Br) and that
         | 
| 1247 | 
            +
            ∥�u∥2
         | 
| 1248 | 
            +
            H1(RN∖B1) = r−N
         | 
| 1249 | 
            +
            ��
         | 
| 1250 | 
            +
            RN∖Br
         | 
| 1251 | 
            +
            �
         | 
| 1252 | 
            +
            r2|∇u|2 + |u|2��
         | 
| 1253 | 
            +
            .
         | 
| 1254 | 
            +
            Similar identities hold true when we replace RN ∖ B1 and RN ∖ Br with RN. Therefore,
         | 
| 1255 | 
            +
            r−N|Eru|2
         | 
| 1256 | 
            +
            2 = |�
         | 
| 1257 | 
            +
            Eru|2
         | 
| 1258 | 
            +
            2 = |E1�u|2
         | 
| 1259 | 
            +
            2 ≤ C1∥�u∥2
         | 
| 1260 | 
            +
            L2(RN∖B1) = r−NC1|u|2
         | 
| 1261 | 
            +
            L2(RN ∖Br),
         | 
| 1262 | 
            +
            which yields (ii). Furthermore,
         | 
| 1263 | 
            +
            r−N
         | 
| 1264 | 
            +
            ��
         | 
| 1265 | 
            +
            RN
         | 
| 1266 | 
            +
            �
         | 
| 1267 | 
            +
            r2|∇(Eru)|2 + |Eru|2��
         | 
| 1268 | 
            +
            = ∥�
         | 
| 1269 | 
            +
            Eru∥2 = ∥E1�u∥2
         | 
| 1270 | 
            +
            ≤ C1∥�u∥2
         | 
| 1271 | 
            +
            H1(RN∖B1) = r−NC1
         | 
| 1272 | 
            +
            ��
         | 
| 1273 | 
            +
            RN∖Br
         | 
| 1274 | 
            +
            �
         | 
| 1275 | 
            +
            r2|∇u|2 + |u|2��
         | 
| 1276 | 
            +
            .
         | 
| 1277 | 
            +
            This inequality, combined with (ii), yields
         | 
| 1278 | 
            +
            r2∥Eru∥2 =
         | 
| 1279 | 
            +
            �
         | 
| 1280 | 
            +
            RN
         | 
| 1281 | 
            +
            �
         | 
| 1282 | 
            +
            r2|∇(Eru)|2 + |Eru|2�
         | 
| 1283 | 
            +
            + (r2 − 1)
         | 
| 1284 | 
            +
            �
         | 
| 1285 | 
            +
            RN |Eru|2
         | 
| 1286 | 
            +
            ≤ C1
         | 
| 1287 | 
            +
            �
         | 
| 1288 | 
            +
            RN∖Br
         | 
| 1289 | 
            +
            �
         | 
| 1290 | 
            +
            r2|∇u|2 + |u|2�
         | 
| 1291 | 
            +
            + C1(r2 − 1)
         | 
| 1292 | 
            +
            �
         | 
| 1293 | 
            +
            RN∖Br
         | 
| 1294 | 
            +
            |u|2 = r2C1∥u∥2
         | 
| 1295 | 
            +
            H1(RN∖Br),
         | 
| 1296 | 
            +
            which gives (iii).
         | 
| 1297 | 
            +
            For p ∈ (1,
         | 
| 1298 | 
            +
            N
         | 
| 1299 | 
            +
            N−2) let C2 = C2(N, p) be the constant for the Sobolev embedding H1(RN) ⊂
         | 
| 1300 | 
            +
            L2p(RN). Then, for any u ∈ H1(RN ∖ Br), using statements (i) and (iii) we obtain
         | 
| 1301 | 
            +
            |u|2
         | 
| 1302 | 
            +
            L2p(RN∖Br) ≤ |Eru|2
         | 
| 1303 | 
            +
            2p ≤ C2∥Eru∥2 ≤ C2C1∥u∥2
         | 
| 1304 | 
            +
            H1(RN∖Br),
         | 
| 1305 | 
            +
            as claimed.
         | 
| 1306 | 
            +
            References
         | 
| 1307 | 
            +
            [1] Ackermann, Nils; Dancer, Norman: Precise exponential decay for solutions of semilinear elliptic
         | 
| 1308 | 
            +
            equations and its effect on the structure of the solution set for a real analytic nonlinearity.
         | 
| 1309 | 
            +
            Differential Integral Equations 29 (2016), no. 7-8, 757–774.
         | 
| 1310 | 
            +
            [2] Ackermann, Nils; Weth, Tobias: Multibump solutions of nonlinear periodic Schr¨odinger equa-
         | 
| 1311 | 
            +
            tions in a degenerate setting. Commun. Contemp. Math. 7 (2005), no. 3, 269–298.
         | 
| 1312 | 
            +
            [3] Berezin, F. A.; Shubin, M. A.: The Schr¨odinger equation. Mathematics and its Applications
         | 
| 1313 | 
            +
            (Soviet Series), 66. Kluwer Academic Publishers Group, Dordrecht, 1991.
         | 
| 1314 | 
            +
            15
         | 
| 1315 | 
            +
             | 
| 1316 | 
            +
            [4] Bonheure, Denis; F¨oldes, Juraj; Moreira dos Santos, Ederson; Salda˜na, Alberto; Tavares,
         | 
| 1317 | 
            +
            Hugo: Paths to uniqueness of critical points and applications to partial differential equations.
         | 
| 1318 | 
            +
            Trans. Amer. Math. Soc. 370 (2018), no. 10, 7081–7127.
         | 
| 1319 | 
            +
            [5] Byeon, Jaeyoung; Sato, Yohei; Wang, Zhi-Qiang: Pattern formation via mixed attractive and
         | 
| 1320 | 
            +
            repulsive interactions for nonlinear Schr¨odinger systems. J. Math. Pures Appl. (9) 106 (2016),
         | 
| 1321 | 
            +
            no. 3, 477–511.
         | 
| 1322 | 
            +
            [6] Chen, Haixia; Pistoia, Angela; Vaira, Giusi:
         | 
| 1323 | 
            +
            Segregated solutions for some non-linear
         | 
| 1324 | 
            +
            Schr¨odinger systems with critical growth. Discrete Contin. Dyn. Syst. 43 (2023), no. 1, 482–506.
         | 
| 1325 | 
            +
            [7] Cherrier, Pascal; Milani, Albert: Linear and quasi-linear evolution equations in Hilbert spaces.
         | 
| 1326 | 
            +
            Graduate Studies in Mathematics, 135. American Mathematical Society, Providence, RI, 2012.
         | 
| 1327 | 
            +
            [8] Clapp, M´onica; Pistoia, Angela: Fully nontrivial solutions to elliptic systems with mixed
         | 
| 1328 | 
            +
            couplings. Nonlinear Anal. 216 (2022), Paper No. 112694, 19 pp.
         | 
| 1329 | 
            +
            [9] Clapp, M´onica;
         | 
| 1330 | 
            +
            Pistoia, Angela:
         | 
| 1331 | 
            +
            Pinwheel solutions to Schr¨odinger systems. Preprint
         | 
| 1332 | 
            +
            arXiv:2301.07000.
         | 
| 1333 | 
            +
            [10] Clapp, M´onica; Soares, Mayra: Coupled and uncoupled sign-changing spikes of singularly
         | 
| 1334 | 
            +
            perturbed elliptic systems, Commun. Contemp. Math. (2022), Paper No. 2250048, 24 pp.
         | 
| 1335 | 
            +
            [11] Clapp, M´onica; Soares, Mayra: Energy estimates for seminodal solutions to an elliptic system
         | 
| 1336 | 
            +
            with mixed couplings. NoDEA Nonlinear Differential Equations Appl. 30 (2023), no. 1, Paper
         | 
| 1337 | 
            +
            No. 11.
         | 
| 1338 | 
            +
            [12] Dovetta, Simone; Pistoia, Angela: Solutions to a cubic Schr¨odinger system with mixed attrac-
         | 
| 1339 | 
            +
            tive and repulsive forces in a critical regime. Math. Eng. 4 (2022), no. 4, Paper No. 027, 21
         | 
| 1340 | 
            +
            pp.
         | 
| 1341 | 
            +
            [13] Esry, B. D.; Greene, Chris H.; Burke, Jr., James P.; Bohn, John L: Hartree-Fock theory for
         | 
| 1342 | 
            +
            double condensates. Phys. Rev. Lett. 78 (1997), 3594-3597.
         | 
| 1343 | 
            +
            [14] Gilbarg, David; Trudinger, Neil S.: Elliptic partial differential equations of second order.
         | 
| 1344 | 
            +
            Grundlehren der Mathematischen Wissenschaften, Vol. 224. Springer-Verlag, Berlin-New York,
         | 
| 1345 | 
            +
            1977.
         | 
| 1346 | 
            +
            [15] Han, Qing: Nonlinear elliptic equations of the second order. Graduate Studies in Mathematics,
         | 
| 1347 | 
            +
            171. American Mathematical Society, Providence, RI, 2016.
         | 
| 1348 | 
            +
            [16] Kesavan, S.: Topics in functional analysis and applications. John Wiley & Sons, Inc., New
         | 
| 1349 | 
            +
            York, 1989.
         | 
| 1350 | 
            +
            [17] Peng, Shuangjie; Wang, Zhi-Qiang: Segregated and synchronized vector solutions for nonlinear
         | 
| 1351 | 
            +
            Schr¨odinger systems. Arch. Ration. Mech. Anal. 208 (2013), no. 1, 305–339.
         | 
| 1352 | 
            +
            [18] Rabier, Patrick J.; Stuart, Charles A.: Exponential decay of the solutions of quasilinear second-
         | 
| 1353 | 
            +
            order equations and Pohozaev identities. J. Differential Equations 165 (2000), no. 1, 199–234.
         | 
| 1354 | 
            +
            16
         | 
| 1355 | 
            +
             | 
| 1356 | 
            +
            [19] Sato, Yohei; Wang, Zhi-Qiang: Least energy solutions for nonlinear Schr¨odinger systems with
         | 
| 1357 | 
            +
            mixed attractive and repulsive couplings. Adv. Nonlinear Stud. 15 (2015), no. 1, 1–22.
         | 
| 1358 | 
            +
            [20] Sato, Yohei; Wang, Zhi-Qiang: Multiple positive solutions for Schr¨odinger systems with mixed
         | 
| 1359 | 
            +
            couplings. Calc. Var. Partial Differential Equations 54 (2015), no. 2, 1373–1392.
         | 
| 1360 | 
            +
            [21] Soave, Nicola: On existence and phase separation of solitary waves for nonlinear Schr¨odinger
         | 
| 1361 | 
            +
            systems modelling simultaneous cooperation and competition. Calc. Var. Partial Differential
         | 
| 1362 | 
            +
            Equations 53 (2015), no. 3-4, 689–718.
         | 
| 1363 | 
            +
            [22] Soave, Nicola; Tavares, Hugo: New existence and symmetry results for least energy positive
         | 
| 1364 | 
            +
            solutions of Schr¨odinger systems with mixed competition and cooperation terms. J. Differential
         | 
| 1365 | 
            +
            Equations 261 (2016), no. 1, 505–537.
         | 
| 1366 | 
            +
            [23] Tavares, Hugo; You, Song: Existence of least energy positive solutions to Schr¨odinger systems
         | 
| 1367 | 
            +
            with mixed competition and cooperation terms: the critical case. Calc. Var. Partial Differential
         | 
| 1368 | 
            +
            Equations 59 (2020), no. 1, Paper No. 26, 35 pp.
         | 
| 1369 | 
            +
            [24] Tavares, Hugo; You, Song; Zou, Wenming:
         | 
| 1370 | 
            +
            Least energy positive solutions of critical
         | 
| 1371 | 
            +
            Schr¨odinger systems with mixed competition and cooperation terms: the higher dimensional
         | 
| 1372 | 
            +
            case. J. Funct. Anal. 283 (2022), no. 2, Paper No. 109497, 50 pp.
         | 
| 1373 | 
            +
            [25] Villavert, John: Elementary theory and methods for elliptic partial differential equations.
         | 
| 1374 | 
            +
            Lecture Notes. University of Texas, 2015.
         | 
| 1375 | 
            +
            [26] Wei, Juncheng; Wu, Yuanze: Ground states of nonlinear Schr¨odinger systems with mixed
         | 
| 1376 | 
            +
            couplings. J. Math. Pures Appl. (9) 141 (2020), 50–88.
         | 
| 1377 | 
            +
            17
         | 
| 1378 | 
            +
             | 
    	
        HtFIT4oBgHgl3EQfXys9/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        IdAzT4oBgHgl3EQfU_z6/content/tmp_files/2301.01278v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1460 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            AE 
         | 
| 2 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 3 | 
            +
            Performance Analysis 
         | 
| 4 | 
            +
             
         | 
| 5 | 
            +
            496 
         | 
| 6 | 
            +
            Amfiteatru Economic 
         | 
| 7 | 
            +
            STUDENTS’ PERCEPTIONS OF SUSTAINABLE UNIVERSITIES  
         | 
| 8 | 
            +
            IN HUNGARY: AN IMPORTANCE-PERFORMANCE ANALYSIS 
         | 
| 9 | 
            +
             
         | 
| 10 | 
            +
            Szabolcs Nagy1* and Mariann Veresné Somosi2 
         | 
| 11 | 
            +
             1)2) University of Miskolc, Miskolc, Hungary 
         | 
| 12 | 
            +
             
         | 
| 13 | 
            +
             
         | 
| 14 | 
            +
             
         | 
| 15 | 
            +
            Please cite this article as: 
         | 
| 16 | 
            +
            Nagy, S. and Somosi, M.V., 2020. Students’ 
         | 
| 17 | 
            +
            Perceptions of Sustainable Universities in Hungary: 
         | 
| 18 | 
            +
            An Importance-Performance Analysis. Amfiteatru 
         | 
| 19 | 
            +
            Economic, 22(54), pp. 496-515. 
         | 
| 20 | 
            +
             
         | 
| 21 | 
            +
            DOI: 10.24818/EA/2020/54/496 
         | 
| 22 | 
            +
             
         | 
| 23 | 
            +
            Article History 
         | 
| 24 | 
            +
            Received: 29 December 2019  
         | 
| 25 | 
            +
            Revised: 3 February 2020 
         | 
| 26 | 
            +
            Accepted: 30 March 2020 
         | 
| 27 | 
            +
             
         | 
| 28 | 
            +
            Abstract 
         | 
| 29 | 
            +
            In order to succeed, universities are forced to respond to the new challenges in the rapidly 
         | 
| 30 | 
            +
            changing world. The recently emerging fourth-generation universities should meet 
         | 
| 31 | 
            +
            sustainability objectives to better serve their students and their communities. It is essential 
         | 
| 32 | 
            +
            for universities to measure their sustainability performance to capitalise on their core 
         | 
| 33 | 
            +
            strengths and to overcome their weaknesses. In line with the stakeholder theory, the 
         | 
| 34 | 
            +
            objective of this study was to investigate students’ perceptions of university sustainability 
         | 
| 35 | 
            +
            including their expectations about and satisfaction with the efforts that universities make 
         | 
| 36 | 
            +
            towards sustainability. This paper proposes a new approach that combines the sustainable 
         | 
| 37 | 
            +
            university scale, developed by the authors, with the importance-performance analysis to 
         | 
| 38 | 
            +
            identify key areas of university sustainability. To collect data, an online survey was 
         | 
| 39 | 
            +
            conducted in Hungary in 2019. The sustainable university scale was found to be a reliable 
         | 
| 40 | 
            +
            construct to measure different aspects of university sustainability. Results of the 
         | 
| 41 | 
            +
            importance-performance analysis suggest that students consider Hungarian universities 
         | 
| 42 | 
            +
            unsustainable. Research findings indicate that Hungarian universities perform poorly in 
         | 
| 43 | 
            +
            sustainable purchasing and renewable energy use, but their location and their efforts 
         | 
| 44 | 
            +
            towards separate waste collection are their major competitive advantages. The main 
         | 
| 45 | 
            +
            domains of university sustainability were also discussed. This study provides university 
         | 
| 46 | 
            +
            decision-makers and researchers with insightful results supporting the transformation of 
         | 
| 47 | 
            +
            traditional universities into sustainable, fourth-generation higher education institutions. 
         | 
| 48 | 
            +
             
         | 
| 49 | 
            +
            Keywords: sustainable university, students’ perception, importance-performance analysis, 
         | 
| 50 | 
            +
            Hungary, student satisfaction, student expectation 
         | 
| 51 | 
            +
             
         | 
| 52 | 
            +
            JEL Classification: I23, Q56 
         | 
| 53 | 
            +
             
         | 
| 54 | 
            +
             
         | 
| 55 | 
            +
                                                             
         | 
| 56 | 
            +
            * Corresponding author, Szabolcs Nagy – [email protected]  
         | 
| 57 | 
            +
             
         | 
| 58 | 
            +
             | 
| 59 | 
            +
            Sustainable University  
         | 
| 60 | 
            +
            AE 
         | 
| 61 | 
            +
             
         | 
| 62 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 63 | 
            +
            497 
         | 
| 64 | 
            +
            Introduction 
         | 
| 65 | 
            +
            We live in the age of rapid changes to which higher education institutions should adopt. A 
         | 
| 66 | 
            +
            university that wants to succeed needs to respond to the challenges of the new era. One of 
         | 
| 67 | 
            +
            them is the urgency to meet sustainability objectives (Filho, Manolas and Pace, 2015; Soini, 
         | 
| 68 | 
            +
            et al., 2018; Olalla and Merino, 2019). Universities are undergoing a rapid transformation 
         | 
| 69 | 
            +
            as they are not only traditionally engaged in education but are also playing an increasingly 
         | 
| 70 | 
            +
            important role in the society (Papp-Váry and Lukács, 2019). Nowadays, the emergence of 
         | 
| 71 | 
            +
            the so-called Fourth Generation universities, which actively shape their socio-economic 
         | 
| 72 | 
            +
            environment, can be seen (Pawłowski, 2009; Lukovics and Zuti, 2017).  
         | 
| 73 | 
            +
            The topic of sustainable development is increasingly present among the major concerns of 
         | 
| 74 | 
            +
            the international academic community (Grecu and Ipiña, 2014). Universities must take 
         | 
| 75 | 
            +
            steps to achieve the United Nations Sustainable Development Goals (Paletta, et al., 2019). 
         | 
| 76 | 
            +
            Target 4.7 declares that students have the right to acquire the knowledge and skills needed 
         | 
| 77 | 
            +
            to promote sustainable development (UN, 2019). Globally, the proliferation of the efforts to 
         | 
| 78 | 
            +
            assess universities’ responses to the challenges of sustainability can be seen (Li, Gu and 
         | 
| 79 | 
            +
            Liu, 2018). Adams, Martin, and Boom (2018) draw the attention to the importance of the 
         | 
| 80 | 
            +
            university sustainability culture. 
         | 
| 81 | 
            +
            Adaptation of the stakeholder theory is essential for higher education institutions 
         | 
| 82 | 
            +
            (Mainardes, et al., 2010) as stakeholders can create opportunities for or pose threats to an 
         | 
| 83 | 
            +
            organisation (Chapleo and Sims, 2017). Students as stakeholders have a serious impact on 
         | 
| 84 | 
            +
            the future development of universities (Degtjarjova, Lapina and Freidenfelds, 2018). 
         | 
| 85 | 
            +
            Commitment to sustainability of leaders and important stakeholders play a key role in the 
         | 
| 86 | 
            +
            effectiveness of sustainable development initiatives in higher education institutions 
         | 
| 87 | 
            +
            (Wright, 2010.)  
         | 
| 88 | 
            +
            The position of Hungarian higher education institutes in the world rankings is not very 
         | 
| 89 | 
            +
            favourable. The best Hungarian university can be found around the 500th place in global 
         | 
| 90 | 
            +
            rankings. There are only seven or eight Hungarian institutions that are ranked at all 
         | 
| 91 | 
            +
            (Polónyi and Kozma, 2019). The weak performance of the Hungarian higher education 
         | 
| 92 | 
            +
            institutions in sustainability rankings explains the need for a comprehensive analysis of 
         | 
| 93 | 
            +
            university sustainability in Hungary from the students as stakeholders’ perspective, which 
         | 
| 94 | 
            +
            is one of the main objectives of this study.  
         | 
| 95 | 
            +
            Students as stakeholders form expectations regarding university sustainability not only 
         | 
| 96 | 
            +
            generally, but also very specifically, and how those expectations are met determines the 
         | 
| 97 | 
            +
            level of their satisfaction. This study aims to investigate student expectations about and 
         | 
| 98 | 
            +
            satisfaction with the attributes of the sustainable university by using the sustainable 
         | 
| 99 | 
            +
            university scale (SUS) combined with the importance-performance analysis (IPA). SUS, 
         | 
| 100 | 
            +
            the items of which are the determinants of university sustainability, was developed by the 
         | 
| 101 | 
            +
            authors. IPA has been widely used to examine the relationship between importance, 
         | 
| 102 | 
            +
            performance, and satisfaction in many areas (Yuvinatileng, et al., 2013; Wyród-Wróbel and 
         | 
| 103 | 
            +
            Biesok, 2017, Kim, et al., 2018) However, no previous study has investigated it in the 
         | 
| 104 | 
            +
            context of university sustainability in spite of the fact that universities should use 
         | 
| 105 | 
            +
            managerial tools to develop their sustainability strategy. This study seeks to address this 
         | 
| 106 | 
            +
            research gap.  
         | 
| 107 | 
            +
             
         | 
| 108 | 
            +
             | 
| 109 | 
            +
            AE 
         | 
| 110 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 111 | 
            +
            Performance Analysis 
         | 
| 112 | 
            +
             
         | 
| 113 | 
            +
            498 
         | 
| 114 | 
            +
            Amfiteatru Economic 
         | 
| 115 | 
            +
            1. Literature review 
         | 
| 116 | 
            +
            1.1. Perceptions of the sustainable university 
         | 
| 117 | 
            +
            In the UI GreenMetric World University Ranking 2019, which provides information about 
         | 
| 118 | 
            +
            the current conditions and policies related to Green Campus and Sustainability, only seven 
         | 
| 119 | 
            +
            Hungarian universities can be found. The University of Szeged is in the best position, 
         | 
| 120 | 
            +
            ranked first in Hungary, and 74th in the world. It is followed by the University of Pecs, 
         | 
| 121 | 
            +
            ranked 100th globally and the University of Debrecen, in the 202nd position in the world 
         | 
| 122 | 
            +
            ranking. The University of Miskolc, for which the authors work, can be found only in the 
         | 
| 123 | 
            +
            605th place in this ranking of 780 universities globally (Greenmetric, 2019). Students’ 
         | 
| 124 | 
            +
            perceptions of university sustainability were assumed to be in line with this poor ranking 
         | 
| 125 | 
            +
            performance. It is therefore hypothesized that students are not satisfied with the 
         | 
| 126 | 
            +
            sustainability performance of the Hungarian higher education institutions (H1). Mention 
         | 
| 127 | 
            +
            must be made of some of the shortcomings of the GreenMetric Ranking, i.e. non-
         | 
| 128 | 
            +
            compliance with the Berlin Principles (Ragazzi and Ghidini, 2017), however, it is still one 
         | 
| 129 | 
            +
            of the best tools to quantify university sustainability. 
         | 
| 130 | 
            +
            The perceptions of university students towards factors of a sustainable university was first 
         | 
| 131 | 
            +
            discussed by Nejati and Nejati (2013). The authors developed a reliable scale to assess the 
         | 
| 132 | 
            +
            university practices towards sustainability. They identified four main dimensions of the 
         | 
| 133 | 
            +
            sustainable university scale, which are respectively: 1) community outreach, 2) 
         | 
| 134 | 
            +
            sustainability commitment and monitoring, 3) waste and energy, and 4) land use and 
         | 
| 135 | 
            +
            planning. Their initial scale contained 28 items, which they reduced to a 12-item scale, 
         | 
| 136 | 
            +
            which could be a key instrument for university decision-makers and stakeholders to 
         | 
| 137 | 
            +
            measure the university’s performance regarding the implementation of the transition 
         | 
| 138 | 
            +
            strategy towards sustainability. Their construct measuring sustainability practices of 
         | 
| 139 | 
            +
            universities contains 1) community outreach programs; 2) green community centres; 3) 
         | 
| 140 | 
            +
            partnerships with government, non-governmental organizations, and industry working 
         | 
| 141 | 
            +
            toward sustainability; 4-5) written commitment to sustainability (university and department 
         | 
| 142 | 
            +
            level); 6-7) sustainability audits on the surrounding community and on campus; 8) reuse of 
         | 
| 143 | 
            +
            campus waste; 9) use of renewable and safe energy sources; 10) sustainable support 
         | 
| 144 | 
            +
            services (e.g. recycling bins on campus, efficient public transport throughout the 
         | 
| 145 | 
            +
            university); 11) sustainable campus building planning and 12) sustainable campus land-use. 
         | 
| 146 | 
            +
            Dagiliute, Liobikiene and Minelgaite (2018) were the first to investigate the differences in 
         | 
| 147 | 
            +
            the perceived sustainability performance between the ‘green’ and the ‘non-green’ 
         | 
| 148 | 
            +
            universities. They compared the students' attitudes towards sustainability in two Lithuanian 
         | 
| 149 | 
            +
            universities. They did not find any significant differences in sustainability aspects in 
         | 
| 150 | 
            +
            general, however, students of the green university sought more information about 
         | 
| 151 | 
            +
            sustainability and were more often involved in sustainability activities. They also found that 
         | 
| 152 | 
            +
            campus sustainability and environmental information have a significant impact on students’ 
         | 
| 153 | 
            +
            sustainable behaviour. In their study, they used a scale to measure perceptions made up of 
         | 
| 154 | 
            +
            16 items, grouped into four main constructs: 1) ‘campus sustainability’, 2) ‘environmental 
         | 
| 155 | 
            +
            information’, 3) ‘students’ sustainability involvement’, and 4) ‘university's role in 
         | 
| 156 | 
            +
            sustainable development. The item ‘university's self-representation as a green university’ 
         | 
| 157 | 
            +
            was also involved in their construct. Their 17-item scale involves 1) environmental student 
         | 
| 158 | 
            +
            organization(s); 2) use of public transport, bikes; 3) possibility to recycle waste at the 
         | 
| 159 | 
            +
            university; 4) use one's own non-disposable cup; 5) availability of strategic documents and 
         | 
| 160 | 
            +
            their implementation reports; 6) sustainability-related information during lectures;  
         | 
| 161 | 
            +
             | 
| 162 | 
            +
            Sustainable University  
         | 
| 163 | 
            +
            AE 
         | 
| 164 | 
            +
             
         | 
| 165 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 166 | 
            +
            499 
         | 
| 167 | 
            +
            7) university website on environmental objectives; 8) participation in environmental, social 
         | 
| 168 | 
            +
            activities; 9) involvement in activities at the university; 10) energy and resource saving;  
         | 
| 169 | 
            +
            11) contribution to social well-being, tolerance; 12) environmental education; 13) 
         | 
| 170 | 
            +
            cooperation with other national and foreign universities and businesses; 14) inclusion of 
         | 
| 171 | 
            +
            sustainability aspects in study programmes; 15) sustainability research; 16) university's 
         | 
| 172 | 
            +
            self-representation as a green university; and 17) declared environmental objectives. They 
         | 
| 173 | 
            +
            found that students considered social aspects, i.e. social well-being, tolerance the most 
         | 
| 174 | 
            +
            important attribute of the sustainable university. However, students considered 
         | 
| 175 | 
            +
            environmental aspects, such as energy saving, environmental education, and actions less 
         | 
| 176 | 
            +
            important. 
         | 
| 177 | 
            +
            Li, Gu and Liu (2018) established a new scoring system for campus sustainability in 
         | 
| 178 | 
            +
            Australia. They suggest that sustainable campus performance indicators should be 
         | 
| 179 | 
            +
            identified from the different perspectives of the economy, environment and society. In 
         | 
| 180 | 
            +
            order to identify and prioritise the key sustainability indicators for university campuses, 
         | 
| 181 | 
            +
            they proposed a new approach combining the qualitative scoring method and an analytical 
         | 
| 182 | 
            +
            hierarchical process. After thorough literature review, they identified 54 indicators and 
         | 
| 183 | 
            +
            quantified the weight coefficients for the criteria, sub-criteria and elements, and proposed a 
         | 
| 184 | 
            +
            model that can be a flexible tool for university decision-makers. 
         | 
| 185 | 
            +
            It is hypothesized that combining the most relevant items of the constructs developed by 
         | 
| 186 | 
            +
            Nejati and Nejati (2013), Dagiliute, Liobikiene and Minelgaite (2018) and Li, Gu and Liu 
         | 
| 187 | 
            +
            (2018), a new, reliable scale to measure perceived university sustainability, i.e. the 
         | 
| 188 | 
            +
            sustainable university scale, can be developed (H2).  
         | 
| 189 | 
            +
            Shuqin, et al. (2019) aimed to assess and compare the sustainability performance of 
         | 
| 190 | 
            +
            different Chinese universities. The authors developed a campus sustainability evaluation 
         | 
| 191 | 
            +
            system that is made up of the five main domains of campus sustainability, which are 
         | 
| 192 | 
            +
            respectively: organization and management, energy and resource saving, friendly 
         | 
| 193 | 
            +
            environment, campus culture, and social outreach. Their evaluation system included 14 
         | 
| 194 | 
            +
            mandatory indicators and 69 optional indicators. They found that the most problematic 
         | 
| 195 | 
            +
            fields are organization management, resource saving and campus culture. For example, 
         | 
| 196 | 
            +
            there are issues with green education, green research and green humanities as they are not 
         | 
| 197 | 
            +
            so developed there. The assessment tool proposed by the authors can be used to guide the 
         | 
| 198 | 
            +
            green campus revolution in China and could be adopted by the rest of the world. 
         | 
| 199 | 
            +
            Wakkee, et al. (2019) demonstrated how (entrepreneurial) universities can drive regional 
         | 
| 200 | 
            +
            sustainable development in developing countries. They found that local campus leadership, 
         | 
| 201 | 
            +
            a holistic teaching and research programme, and student involvement can have significant 
         | 
| 202 | 
            +
            local effects.  
         | 
| 203 | 
            +
            1.2. Importance-Performance Analysis (IPA) 
         | 
| 204 | 
            +
            The importance-performance analysis (IPA) was developed by Martilla and James (1977). 
         | 
| 205 | 
            +
            The original version of IPA defines consumer satisfaction as the function of two 
         | 
| 206 | 
            +
            components that are respectively: the importance of an attribute of the product/service, and 
         | 
| 207 | 
            +
            the perceived performance of the company on this attribute. The mean of importance and 
         | 
| 208 | 
            +
            performance ratings of each attribute determines its position on the importance-
         | 
| 209 | 
            +
            performance matrix or grid, which is also often called the Cartesian diagram (Figure no. 1). 
         | 
| 210 | 
            +
            The overall mean of the performance/importance ratings is used as a delimiter of high and 
         | 
| 211 | 
            +
            low performance/importance (Yuvinatileng, Utomo and Latuperissa, 2013).  
         | 
| 212 | 
            +
             | 
| 213 | 
            +
            AE 
         | 
| 214 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 215 | 
            +
            Performance Analysis 
         | 
| 216 | 
            +
             
         | 
| 217 | 
            +
            500 
         | 
| 218 | 
            +
            Amfiteatru Economic 
         | 
| 219 | 
            +
            The 2x2 IPA matrix can be divided into four quadrants. Each quadrant requires a different 
         | 
| 220 | 
            +
            approach and strategy (Wyród-Wróbel and Biesok, 2017):  
         | 
| 221 | 
            +
             Quadrant 1: Keep up the good work. This is the best possible position for an attribute. 
         | 
| 222 | 
            +
            This quadrant contains the competitive advantages and major strengths of a company. The 
         | 
| 223 | 
            +
            organization must defend all of them to succeed. These are high importance/high 
         | 
| 224 | 
            +
            performance items. 
         | 
| 225 | 
            +
             
         | 
| 226 | 
            +
              
         | 
| 227 | 
            +
            Figure no. 1: The modified Importance Performance Matrix 
         | 
| 228 | 
            +
            Source: Kim, Jeon, Cho and Kim, 2018. 
         | 
| 229 | 
            +
             
         | 
| 230 | 
            +
             Quadrant 2: The territory of Possible overkill. Here low importance/high performance 
         | 
| 231 | 
            +
            attributes, i.e. items of overperformance, can be found. Organizations should deploy 
         | 
| 232 | 
            +
            business resources used here somewhere else (e.g. in Quadrant 1) or should increase the 
         | 
| 233 | 
            +
            importance of those attributes that can be found here to turn them into competitive 
         | 
| 234 | 
            +
            advantages. 
         | 
| 235 | 
            +
             Quadrant 3: The area of Low priority. Low importance/low performance attributes can 
         | 
| 236 | 
            +
            be seen here. Those are minor weaknesses that require no additional resources. 
         | 
| 237 | 
            +
            Organizations are suggested to avoid investing in this quadrant. 
         | 
| 238 | 
            +
             Quadrant 4: Concentrate here. High importance/low performance attributes can be 
         | 
| 239 | 
            +
            found here. Those are the major weaknesses of an organization that require immediate 
         | 
| 240 | 
            +
            corrective actions to increase consumer satisfaction and to avoid customer churn.  
         | 
| 241 | 
            +
            1.3. Stakeholder theory 
         | 
| 242 | 
            +
            The stakeholder theory originates from the 1980s. Freeman (1984) was the first to coin the 
         | 
| 243 | 
            +
            phrase as an opposite to the shareholder theory or Friedman’s doctrine, which suggests that a 
         | 
| 244 | 
            +
            company’s sole responsibility is to make money for its shareholders (Friedman, 1965). 
         | 
| 245 | 
            +
             | 
| 246 | 
            +
            High
         | 
| 247 | 
            +
            Quadrant 2
         | 
| 248 | 
            +
            Quadrant1
         | 
| 249 | 
            +
            Possible overkill
         | 
| 250 | 
            +
            Keep up the good work
         | 
| 251 | 
            +
            Performance
         | 
| 252 | 
            +
            Quadrant3
         | 
| 253 | 
            +
            Quadrant 4
         | 
| 254 | 
            +
            Low priority
         | 
| 255 | 
            +
            Concentrate here
         | 
| 256 | 
            +
            Low
         | 
| 257 | 
            +
            Low
         | 
| 258 | 
            +
            Importance
         | 
| 259 | 
            +
            HighSustainable University  
         | 
| 260 | 
            +
            AE 
         | 
| 261 | 
            +
             
         | 
| 262 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 263 | 
            +
            501 
         | 
| 264 | 
            +
            According to the stakeholder theory, shareholders are only one of many stakeholders in a 
         | 
| 265 | 
            +
            company, and an organization’s key to market success is how it satisfies all the stakeholders, 
         | 
| 266 | 
            +
            not only its shareholders (Freeman, 2010). The stakeholder theory says that the stakeholder 
         | 
| 267 | 
            +
            ecosystem is made up of all parties that invested and involved in, or affected by, the company. 
         | 
| 268 | 
            +
            Therefore, companies must pay special attention to their employees, vendors, suppliers, 
         | 
| 269 | 
            +
            owners, community/neighbours, community groups, competitors, governmental bodies, 
         | 
| 270 | 
            +
            oversight organizations and the local ecology (Freeman, 2010).  
         | 
| 271 | 
            +
            The stakeholder theory is intertwined with the domains of ethics and sustainability. Carroll and 
         | 
| 272 | 
            +
            Buchholtz (2014) suggest that successful businesses in society adopt a stakeholder 
         | 
| 273 | 
            +
            management approach. The stakeholder theory is solid ground for corporate social 
         | 
| 274 | 
            +
            responsibility and business ethics inside the company (Kakabadse, Rozules and Davies, 2005). 
         | 
| 275 | 
            +
            The stakeholder ecosystem of a university comprises current, former (alumni) and potential 
         | 
| 276 | 
            +
            students, parents, municipalities, academics, faculties, management (Rector, the Senate, 
         | 
| 277 | 
            +
            Chancellor), administrative staff, governmental organisations, Academy of Sciences, 
         | 
| 278 | 
            +
            research partners and companies. In higher education institutions, students and employees 
         | 
| 279 | 
            +
            are always the major stakeholders in terms of their number. According to the stakeholder 
         | 
| 280 | 
            +
            theory, universities are service providers to students and students are one of the most 
         | 
| 281 | 
            +
            important stakeholders (Degtjarjova, Lapina, and Freidenfelds, 2018). The more satisfied 
         | 
| 282 | 
            +
            students are, the more likely it is that the university could succeed, also in the field of 
         | 
| 283 | 
            +
            sustainability. It is therefore assumed that IPA as a strategic tool should be used to 
         | 
| 284 | 
            +
            maximize student satisfaction with the efforts that universities make towards sustainability. 
         | 
| 285 | 
            +
             
         | 
| 286 | 
            +
            2. Methodology  
         | 
| 287 | 
            +
            2.1. Methodology and research questions 
         | 
| 288 | 
            +
            Based on the literature review presented above, and in line with the main objectives of the 
         | 
| 289 | 
            +
            research, this study aims to address the following research questions respectively: 
         | 
| 290 | 
            +
             R1: What are the student expectations about university sustainability in Hungary? 
         | 
| 291 | 
            +
            (student expectations) 
         | 
| 292 | 
            +
             R2: To what extent are students satisfied with the sustainability performance of 
         | 
| 293 | 
            +
            universities? (student satisfaction). H1 refers to this question. 
         | 
| 294 | 
            +
             R3: Is combining sustainable university scale (SUS) with importance-performance 
         | 
| 295 | 
            +
            analysis (IPA) a powerful strategic tool for university decision-makers to identify key areas 
         | 
| 296 | 
            +
            of university sustainability? 
         | 
| 297 | 
            +
             R4: What are the main components of the perceived university sustainability? 
         | 
| 298 | 
            +
             R5: Is sustainable university scale (SUS) a reliable construct to measure students’ 
         | 
| 299 | 
            +
            perceptions of university sustainability? H2 refers to this question. 
         | 
| 300 | 
            +
            In line with the research questions, the following hypotheses were developed: 
         | 
| 301 | 
            +
             H1: Students are not satisfied with the sustainability performance of the Hungarian 
         | 
| 302 | 
            +
            higher education institutions. 
         | 
| 303 | 
            +
             | 
| 304 | 
            +
            AE 
         | 
| 305 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 306 | 
            +
            Performance Analysis 
         | 
| 307 | 
            +
             
         | 
| 308 | 
            +
            502 
         | 
| 309 | 
            +
            Amfiteatru Economic 
         | 
| 310 | 
            +
             H2: Combining the most relevant items of the constructs developed by Nejati and 
         | 
| 311 | 
            +
            Nejati (2013), Dagiliute, Liobikiene and Minelgaite (2018) and Li, Gu and Liu (2018), a 
         | 
| 312 | 
            +
            new, reliable scale for measuring perceived university sustainability, i.e. the Sustainable 
         | 
| 313 | 
            +
            University Scale (SUS), can be developed. 
         | 
| 314 | 
            +
            To answer the research questions, and to thoroughly investigate students’ perceptions of the 
         | 
| 315 | 
            +
            sustainable university, a questionnaire made up of 47 questions grouped into three sections 
         | 
| 316 | 
            +
            were designed: 
         | 
| 317 | 
            +
             Section 1: Importance of the sustainable university scale (SUS) items. It contains 21 
         | 
| 318 | 
            +
            statements measured on a five-point importance scale (1. not at all important … 5. very 
         | 
| 319 | 
            +
            important). Respondents were asked to answer the following question: “How important are 
         | 
| 320 | 
            +
            the followings to you regarding a sustainable university?”. SUS items can be seen in Table 
         | 
| 321 | 
            +
            no. 1. 
         | 
| 322 | 
            +
             Section 2: Perceived performance of the sustainable university scale (SUS) items: The 
         | 
| 323 | 
            +
            very same 21 statements as in Section 1, measured on a five-point rating scale (1 – very 
         | 
| 324 | 
            +
            poor ... 5 – excellent), answering the question “How do you rate the sustainability 
         | 
| 325 | 
            +
            performance of your university?”. 
         | 
| 326 | 
            +
             Section 3: Demographic variables. It contains 5 questions including gender, age, 
         | 
| 327 | 
            +
            study level, branch of sciences and the university where they study (Table no. 2).  
         | 
| 328 | 
            +
            The sustainable university scale (SUS), which contains 21 items, is a construct developed 
         | 
| 329 | 
            +
            by the authors. It is based on the domains of university sustainability discussed in the 
         | 
| 330 | 
            +
            literature review. More specifically, in our construct we combined 9 items (item 4, 5, 7, 9, 
         | 
| 331 | 
            +
            10, 15, 17, 18 and 20) from Dagiliute, Liobikiene and Minelgaite (2018) with 9 items (item 
         | 
| 332 | 
            +
            1, 3, 6, 7, 8, 11, 13, 14 and 16) used by Nejati and Nejati (2013), with 3 items (item 9, 11 
         | 
| 333 | 
            +
            and 16) from Li, Gu and Liu (2018). It must be noted that four items are overlapping. They 
         | 
| 334 | 
            +
            were found in not only one but two of the three reference studies (item 7, 9, 11 and 16). 
         | 
| 335 | 
            +
            Moreover, we added four new items to SUS (item 2, 12, 19 and 21). The newly added items 
         | 
| 336 | 
            +
            are 1) the awareness of the sustainability strategy of the university; 2) green location; 3) the 
         | 
| 337 | 
            +
            inclusion of sustainability information into normal courses and 4) the integration of 
         | 
| 338 | 
            +
            sustainability research results into the curricula. The sustainable university scale makes it 
         | 
| 339 | 
            +
            possible that university decision-makers could gain deep insight into how students perceive 
         | 
| 340 | 
            +
            their efforts towards sustainability.  
         | 
| 341 | 
            +
            Eight of 21 items were used without any modifications in its original form (referred as 
         | 
| 342 | 
            +
            ‘original’), nine items were modified to be unambiguous (referred to as ‘revised’), and the 
         | 
| 343 | 
            +
            four new items that we added are labelled as ‘New’ (Table no 1.).  
         | 
| 344 | 
            +
            Table no. 1: The items of the sustainable university scale (SUS) 
         | 
| 345 | 
            +
             
         | 
| 346 | 
            +
            Sustainable university scale items 
         | 
| 347 | 
            +
            S* 
         | 
| 348 | 
            +
            Type 
         | 
| 349 | 
            +
            1 
         | 
| 350 | 
            +
            The university has a sustainability strategy 
         | 
| 351 | 
            +
            2 
         | 
| 352 | 
            +
            R 
         | 
| 353 | 
            +
            2 
         | 
| 354 | 
            +
            All the students, researchers, academic and non-academic staff are 
         | 
| 355 | 
            +
            aware of the sustainability strategy of the university 
         | 
| 356 | 
            +
            4 
         | 
| 357 | 
            +
            N 
         | 
| 358 | 
            +
            3 
         | 
| 359 | 
            +
            Regular sustainability audits are performed on campus 
         | 
| 360 | 
            +
            2 
         | 
| 361 | 
            +
            O 
         | 
| 362 | 
            +
            4 
         | 
| 363 | 
            +
            Sustainability information is readily available on the university's 
         | 
| 364 | 
            +
            website, newsletter, Neptun messages, etc. 
         | 
| 365 | 
            +
            1 
         | 
| 366 | 
            +
            R 
         | 
| 367 | 
            +
             | 
| 368 | 
            +
            Sustainable University  
         | 
| 369 | 
            +
            AE 
         | 
| 370 | 
            +
             
         | 
| 371 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 372 | 
            +
            503 
         | 
| 373 | 
            +
             
         | 
| 374 | 
            +
            Sustainable university scale items 
         | 
| 375 | 
            +
            S* 
         | 
| 376 | 
            +
            Type 
         | 
| 377 | 
            +
            5 
         | 
| 378 | 
            +
            The university distinguishes itself as sustainable/green from other 
         | 
| 379 | 
            +
            higher education institutions. 
         | 
| 380 | 
            +
            1 
         | 
| 381 | 
            +
            R 
         | 
| 382 | 
            +
            6 
         | 
| 383 | 
            +
            The university established environmentally and socially responsible 
         | 
| 384 | 
            +
            purchasing practices  
         | 
| 385 | 
            +
            2 
         | 
| 386 | 
            +
            O 
         | 
| 387 | 
            +
            7 
         | 
| 388 | 
            +
            Separate waste collection is possible on campus, and the university 
         | 
| 389 | 
            +
            encourages everyone to do so. 
         | 
| 390 | 
            +
            1, 2 
         | 
| 391 | 
            +
            R 
         | 
| 392 | 
            +
            8 
         | 
| 393 | 
            +
            The university uses renewable energy sources (e.g. solar panels). 
         | 
| 394 | 
            +
            2 
         | 
| 395 | 
            +
            O 
         | 
| 396 | 
            +
            9 
         | 
| 397 | 
            +
            The university saves water and energy (e.g. LED lighting) 
         | 
| 398 | 
            +
            1, 3 
         | 
| 399 | 
            +
            R 
         | 
| 400 | 
            +
            10 
         | 
| 401 | 
            +
            The university encourages use of public transport, bikes. 
         | 
| 402 | 
            +
            1 
         | 
| 403 | 
            +
            O 
         | 
| 404 | 
            +
            11 
         | 
| 405 | 
            +
            The university buildings are designed / converted in an energy 
         | 
| 406 | 
            +
            efficient and sustainable way (e.g. windows, doors, insulation) 
         | 
| 407 | 
            +
            2, 3 
         | 
| 408 | 
            +
            R 
         | 
| 409 | 
            +
            12 
         | 
| 410 | 
            +
            The university buildings are located in a natural setting (quiet, 
         | 
| 411 | 
            +
            green area with many trees where the air quality is excellent) 
         | 
| 412 | 
            +
            4 
         | 
| 413 | 
            +
            N 
         | 
| 414 | 
            +
            13 
         | 
| 415 | 
            +
            The university engages in community outreach programs that 
         | 
| 416 | 
            +
            benefit the local environment. 
         | 
| 417 | 
            +
            2 
         | 
| 418 | 
            +
            O 
         | 
| 419 | 
            +
            14 
         | 
| 420 | 
            +
            The university has created partnerships with government, non-
         | 
| 421 | 
            +
            governmental organizations, and industry working toward 
         | 
| 422 | 
            +
            sustainability. 
         | 
| 423 | 
            +
            2 
         | 
| 424 | 
            +
            O 
         | 
| 425 | 
            +
            15 
         | 
| 426 | 
            +
            The university has active environmental student organization(s)  
         | 
| 427 | 
            +
            1 
         | 
| 428 | 
            +
            O 
         | 
| 429 | 
            +
            16 
         | 
| 430 | 
            +
            There are many green actions, projects running / available at the 
         | 
| 431 | 
            +
            university to support the achievement of sustainability goals 
         | 
| 432 | 
            +
            2, 3 
         | 
| 433 | 
            +
            R 
         | 
| 434 | 
            +
            17 
         | 
| 435 | 
            +
            The university offers a lot of study programmes related to 
         | 
| 436 | 
            +
            sustainability. 
         | 
| 437 | 
            +
            1 
         | 
| 438 | 
            +
            R 
         | 
| 439 | 
            +
            18 
         | 
| 440 | 
            +
            The university offers a lot of subjects/courses related to 
         | 
| 441 | 
            +
            sustainability. 
         | 
| 442 | 
            +
            1 
         | 
| 443 | 
            +
            R 
         | 
| 444 | 
            +
            19 
         | 
| 445 | 
            +
            There is also a lot of information about sustainability in normal 
         | 
| 446 | 
            +
            courses 
         | 
| 447 | 
            +
            4 
         | 
| 448 | 
            +
            N 
         | 
| 449 | 
            +
            20 
         | 
| 450 | 
            +
            The university promotes sustainability research  
         | 
| 451 | 
            +
            1 
         | 
| 452 | 
            +
            O 
         | 
| 453 | 
            +
            21 
         | 
| 454 | 
            +
            Sustainability research results are integrated into the curricula 
         | 
| 455 | 
            +
            4 
         | 
| 456 | 
            +
            N 
         | 
| 457 | 
            +
            Notes: S* (Source) = 1: Dagiliute, Liobikiene and Minelgaite (2018); 2: Nejati and Nejati (2013); 3: 
         | 
| 458 | 
            +
            Li, Gu and Liu (2018); 4: New variables added by the authors. 
         | 
| 459 | 
            +
            Type = N: new, O: original, R: revised. 
         | 
| 460 | 
            +
            An online survey, designed in Google Form, was conducted to collect data in October and 
         | 
| 461 | 
            +
            November 2019. Current student status (ongoing studies) was the one and only eligibility 
         | 
| 462 | 
            +
            criterion for students to participate in the study. Convenience sampling method was used. 
         | 
| 463 | 
            +
            Students of nine Hungarian universities located in different regions of Hungary were asked 
         | 
| 464 | 
            +
            to fill in the online questionnaire. The internal messaging systems of the universities were 
         | 
| 465 | 
            +
            used to reach their students. Due to the low response rate, the sample size is 297. 
         | 
| 466 | 
            +
            SPSS 24 was used for data analysis (Babbie, Wagner and Zaino, 2019), and MS Excel for 
         | 
| 467 | 
            +
            data visualisation (Walkenbach, 2016). Means were calculated to quantify the importance 
         | 
| 468 | 
            +
            (R1) and performance (R2) of each item of the sustainable university scale. Importance- 
         | 
| 469 | 
            +
            performance matrix was drawn to illustrate the position of SUS items to answer R3 (Kim et 
         | 
| 470 | 
            +
            al., 2018.). To answer R4, Principle Component Analysis was run to understand patterns in 
         | 
| 471 | 
            +
             | 
| 472 | 
            +
            AE 
         | 
| 473 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 474 | 
            +
            Performance Analysis 
         | 
| 475 | 
            +
             
         | 
| 476 | 
            +
            504 
         | 
| 477 | 
            +
            Amfiteatru Economic 
         | 
| 478 | 
            +
            SUS items (Jolliffe, 2011). The reliability of the sustainable university scale (SUS) was 
         | 
| 479 | 
            +
            measured by Cronbach's alpha to answer R5 (DeVellis, 2017). Frequency tables of 
         | 
| 480 | 
            +
            demographic variables were also calculated (Babbie, Wagner and Zaino, 2019). 
         | 
| 481 | 
            +
            2.2. The sample 
         | 
| 482 | 
            +
            Of the sample of 297 respondents, 61.3% was female, 38.7% male (Table no. 2). Mostly 
         | 
| 483 | 
            +
            undergraduate students (77.1%) participated in this study, however some graduate students 
         | 
| 484 | 
            +
            (16.8%) and doctoral students (6.1%) contributed to the survey. The majority of the 
         | 
| 485 | 
            +
            respondents (54.2%) fell into the category ‘aged 18-24’. Most of the students in the sample 
         | 
| 486 | 
            +
            study social sciences (51.1%), engineering (23.9%) or humanities (13.87%). A significant 
         | 
| 487 | 
            +
            part of them study in Miskolc (75.4%), the rest (24.6%) in other Hungarian universities. 
         | 
| 488 | 
            +
            Therefore, this convenience sample is not representative, which is a limitation of this study. 
         | 
| 489 | 
            +
            Table no. 2: Distribution of demographic variables (N=297) 
         | 
| 490 | 
            +
            Demographic variables 
         | 
| 491 | 
            +
            Values 
         | 
| 492 | 
            +
            Frequency 
         | 
| 493 | 
            +
            Percent 
         | 
| 494 | 
            +
            Gender 
         | 
| 495 | 
            +
            male 
         | 
| 496 | 
            +
            115 
         | 
| 497 | 
            +
            38.7 
         | 
| 498 | 
            +
             
         | 
| 499 | 
            +
            female 
         | 
| 500 | 
            +
            182 
         | 
| 501 | 
            +
            61.3 
         | 
| 502 | 
            +
            Study level 
         | 
| 503 | 
            +
            bachelor 
         | 
| 504 | 
            +
            229 
         | 
| 505 | 
            +
            77.1 
         | 
| 506 | 
            +
             
         | 
| 507 | 
            +
            master 
         | 
| 508 | 
            +
            50 
         | 
| 509 | 
            +
            16.8 
         | 
| 510 | 
            +
             
         | 
| 511 | 
            +
            PhD 
         | 
| 512 | 
            +
            18 
         | 
| 513 | 
            +
            6.1 
         | 
| 514 | 
            +
            Age 
         | 
| 515 | 
            +
            18-24 
         | 
| 516 | 
            +
            161 
         | 
| 517 | 
            +
            54.2 
         | 
| 518 | 
            +
             
         | 
| 519 | 
            +
            25-31 
         | 
| 520 | 
            +
            60 
         | 
| 521 | 
            +
            20.2 
         | 
| 522 | 
            +
             
         | 
| 523 | 
            +
            32-38 
         | 
| 524 | 
            +
            29 
         | 
| 525 | 
            +
            9.8 
         | 
| 526 | 
            +
             
         | 
| 527 | 
            +
            39-45 
         | 
| 528 | 
            +
            27 
         | 
| 529 | 
            +
            9.1 
         | 
| 530 | 
            +
             
         | 
| 531 | 
            +
            46- 
         | 
| 532 | 
            +
            20 
         | 
| 533 | 
            +
            6.7 
         | 
| 534 | 
            +
            Branch of science 
         | 
| 535 | 
            +
            agricultural sciences 
         | 
| 536 | 
            +
            2 
         | 
| 537 | 
            +
            0.7 
         | 
| 538 | 
            +
             
         | 
| 539 | 
            +
            arts 
         | 
| 540 | 
            +
            4 
         | 
| 541 | 
            +
            1.3 
         | 
| 542 | 
            +
             
         | 
| 543 | 
            +
            engineering 
         | 
| 544 | 
            +
            71 
         | 
| 545 | 
            +
            23.9 
         | 
| 546 | 
            +
             
         | 
| 547 | 
            +
            humanities 
         | 
| 548 | 
            +
            41 
         | 
| 549 | 
            +
            13.8 
         | 
| 550 | 
            +
             
         | 
| 551 | 
            +
            medicine 
         | 
| 552 | 
            +
            19 
         | 
| 553 | 
            +
            6.4 
         | 
| 554 | 
            +
             
         | 
| 555 | 
            +
            natural sciences 
         | 
| 556 | 
            +
            7 
         | 
| 557 | 
            +
            2.4 
         | 
| 558 | 
            +
             
         | 
| 559 | 
            +
            social sciences 
         | 
| 560 | 
            +
            153 
         | 
| 561 | 
            +
            51.5 
         | 
| 562 | 
            +
            University  
         | 
| 563 | 
            +
            Corvinus University 
         | 
| 564 | 
            +
            2 
         | 
| 565 | 
            +
            0.7 
         | 
| 566 | 
            +
             
         | 
| 567 | 
            +
            Eszterhazy Uni. Eger 
         | 
| 568 | 
            +
            14 
         | 
| 569 | 
            +
            4.7 
         | 
| 570 | 
            +
             
         | 
| 571 | 
            +
            METU Budapest 
         | 
| 572 | 
            +
            3 
         | 
| 573 | 
            +
            1.0 
         | 
| 574 | 
            +
             
         | 
| 575 | 
            +
            National Uni. of Public Service 
         | 
| 576 | 
            +
            2 
         | 
| 577 | 
            +
            0.7 
         | 
| 578 | 
            +
             
         | 
| 579 | 
            +
            Szechenyi Uni. Gyor 
         | 
| 580 | 
            +
            7 
         | 
| 581 | 
            +
            2.4 
         | 
| 582 | 
            +
             
         | 
| 583 | 
            +
            University of Miskolc 
         | 
| 584 | 
            +
            224 
         | 
| 585 | 
            +
            75.4 
         | 
| 586 | 
            +
             
         | 
| 587 | 
            +
            University of Pannonia 
         | 
| 588 | 
            +
            27 
         | 
| 589 | 
            +
            9.1 
         | 
| 590 | 
            +
             
         | 
| 591 | 
            +
            University of Pecs 
         | 
| 592 | 
            +
            15 
         | 
| 593 | 
            +
            5.1 
         | 
| 594 | 
            +
             
         | 
| 595 | 
            +
            University of Szeged 
         | 
| 596 | 
            +
            3 
         | 
| 597 | 
            +
            1.0 
         | 
| 598 | 
            +
             
         | 
| 599 | 
            +
             | 
| 600 | 
            +
            Sustainable University  
         | 
| 601 | 
            +
            AE 
         | 
| 602 | 
            +
             
         | 
| 603 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 604 | 
            +
            505 
         | 
| 605 | 
            +
             
         | 
| 606 | 
            +
            3. Results and discussion 
         | 
| 607 | 
            +
            This chapter is divided into five main sections, and each of them discusses the results 
         | 
| 608 | 
            +
            related to one of the research questions. 
         | 
| 609 | 
            +
            3.1. Importance of the sustainable university scale items (student expectations) 
         | 
| 610 | 
            +
            In order to answer the first research question (R1), and to investigate student expectations 
         | 
| 611 | 
            +
            about university sustainability in Hungary, the items of SUS were measured on a five-point 
         | 
| 612 | 
            +
            importance scale. The lowest value (1) means the item is not at all important, whereas the 
         | 
| 613 | 
            +
            highest value (5) indicates the item is very important. The importance of SUS items refers 
         | 
| 614 | 
            +
            to the students’ expectations regarding university sustainability. It expresses their opinion 
         | 
| 615 | 
            +
            on what a university should do in order to be sustainable. 
         | 
| 616 | 
            +
            It was found that the opportunity for separate waste collection on campus and 
         | 
| 617 | 
            +
            encouragement of this activity by the university is the most important attribute of university 
         | 
| 618 | 
            +
            sustainability (4.54), whereas regular sustainability audits performed on campus is the least 
         | 
| 619 | 
            +
            important for university students (3.51). They consider water and energy savings (e.g. the 
         | 
| 620 | 
            +
            use of LEDs) as well as sustainable university buildings that are designed or converted in 
         | 
| 621 | 
            +
            an energy efficient and sustainable way (e.g. windows, doors, insulation) extremely 
         | 
| 622 | 
            +
            important (4.43).  
         | 
| 623 | 
            +
            If a university intends to be more sustainable, it must make efforts to provide the necessary 
         | 
| 624 | 
            +
            infrastructure for sperate waste collection and promote this activity. The sustainable 
         | 
| 625 | 
            +
            university should save water and energy and invest in sustainable, energy efficient 
         | 
| 626 | 
            +
            buildings on campus. These findings are not fully consistent with those of Dagiliute, 
         | 
| 627 | 
            +
            Liobikiene and Minelgaite (2018), who found recycling is less important for students. 
         | 
| 628 | 
            +
            It is also crucial for the students that university buildings must be located in a natural 
         | 
| 629 | 
            +
            setting, e.g. in a quiet, green area with many trees where the air quality is excellent (4.39). 
         | 
| 630 | 
            +
            Students, therefore, expect sustainable universities not only to be green, but to be located in 
         | 
| 631 | 
            +
            a green environment. For the most important stakeholders, it is also essential that the 
         | 
| 632 | 
            +
            sustainable university should use renewable energy sources, e.g. solar panels (4.35), it has a 
         | 
| 633 | 
            +
            sustainability strategy (4.1) and promotes sustainability research (4.07).  
         | 
| 634 | 
            +
            It was also found that students think it important that the sustainable university carries out 
         | 
| 635 | 
            +
            environmentally and socially responsible purchasing practices (4.0) and encourages the use 
         | 
| 636 | 
            +
            of public transport, bikes (4.0). In a sustainable university, it is important that all the 
         | 
| 637 | 
            +
            students, researchers, academic and non-academic staff should be aware of the 
         | 
| 638 | 
            +
            sustainability strategy of the university (3.95) and sustainability information should be 
         | 
| 639 | 
            +
            readily available on the university’s website, newsletters, etc. (3.94), as well as the 
         | 
| 640 | 
            +
            university should create partnerships with government, non-governmental organizations, 
         | 
| 641 | 
            +
            and industry working toward sustainability (3.94). Green actions and projects (3.9) and 
         | 
| 642 | 
            +
            community outreach programs (3.89) were found to be even less important. 
         | 
| 643 | 
            +
            The existence of environmental student organization(s) (3.76), the integration of 
         | 
| 644 | 
            +
            sustainability research results into the curricula (3.72) as well as sustainability-focused 
         | 
| 645 | 
            +
            positioning, when the university distinguishes itself as sustainable/green from other higher 
         | 
| 646 | 
            +
            education institutions (3.71) are even less central for the students. There is only moderate 
         | 
| 647 | 
            +
            demand for subjects/courses about sustainability (3.71) Students do not require that a lot of 
         | 
| 648 | 
            +
             | 
| 649 | 
            +
            AE 
         | 
| 650 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 651 | 
            +
            Performance Analysis 
         | 
| 652 | 
            +
             
         | 
| 653 | 
            +
            506 
         | 
| 654 | 
            +
            Amfiteatru Economic 
         | 
| 655 | 
            +
            information about sustainability should be integrated into normal courses (3.61) or the 
         | 
| 656 | 
            +
            university should offer a lot of study programmes related to sustainability issues (3.6). 
         | 
| 657 | 
            +
            These results match those observed in earlier studies (Dagiliute, Liobikiene and Minelgaite, 
         | 
| 658 | 
            +
            2018). The overall mean of the importance items is 3.98. (Table no. 3.) 
         | 
| 659 | 
            +
            3.2. Perceived performance of the sustainable university items (student satisfaction) 
         | 
| 660 | 
            +
            In order to answer the second research question (R2), and to find out to what extent 
         | 
| 661 | 
            +
            students are satisfied with the performance of the Hungarian universities towards 
         | 
| 662 | 
            +
            sustainability, students were asked to rate the performance of the universities on a five-
         | 
| 663 | 
            +
            point rating scale. The lowest score (1) indicates very poor rating (dissatisfaction), whereas 
         | 
| 664 | 
            +
            the highest score (5) means excellent rating (very high satisfaction). The rating scores of the 
         | 
| 665 | 
            +
            sustainable university scale items refer to how students are satisfied with the sustainability 
         | 
| 666 | 
            +
            performance of the university where they study. It expresses their opinion on how 
         | 
| 667 | 
            +
            sustainable the university is perceived regarding each attribute (item) of the sustainable 
         | 
| 668 | 
            +
            university scale. It allows decision-makers to get more insight into how their efforts 
         | 
| 669 | 
            +
            towards sustainability are seen by their students, their most important stakeholders. 
         | 
| 670 | 
            +
            As far as the perceived sustainability performance of the Hungarian universities is 
         | 
| 671 | 
            +
            concerned, their overall performance rating is only 3.23, which means that that students are 
         | 
| 672 | 
            +
            not satisfied with it and consider Hungarian universities unsustainable (Table no. 3). These 
         | 
| 673 | 
            +
            results provide support for the first hypothesis (H1), therefore it has been accepted.  
         | 
| 674 | 
            +
            Students are most satisfied with the location of the university buildings, the rating of which 
         | 
| 675 | 
            +
            is very good (4.17). It suggests that Hungarian universities have preferred locations that are 
         | 
| 676 | 
            +
            mostly situated in quiet, green areas with many trees where the air quality is excellent. This 
         | 
| 677 | 
            +
            could be a strength they capitalise on. Student are also satisfied with the separate waste 
         | 
| 678 | 
            +
            collection opportunities on campus (3.7), community outreach programs benefiting the 
         | 
| 679 | 
            +
            local environment (3.5) and the promotion of sustainability research (3.47). Students are 
         | 
| 680 | 
            +
            somewhat satisfied with the efforts made towards sustainability strategy (3.35), 
         | 
| 681 | 
            +
            partnerships with government, non-governmental organizations, and industry working 
         | 
| 682 | 
            +
            towards sustainability (3.34), as well as sustainable university buildings (3.33), water and 
         | 
| 683 | 
            +
            energy savings in the university (3.29) and the use of public transport and bikes (3.27). 
         | 
| 684 | 
            +
            However, students are not really satisfied with how much information about sustainability 
         | 
| 685 | 
            +
            is integrated into normal courses (3.14) and the mostly unsustainable purchasing practices 
         | 
| 686 | 
            +
            of universities (3.13). They are not convinced by the green actions/projects (3.12) and the 
         | 
| 687 | 
            +
            integration of sustainability research results into the curricula (3.11).  
         | 
| 688 | 
            +
            Moreover, students think only limited information on sustainability is available for them on 
         | 
| 689 | 
            +
            the website or in the newsletters of the universities (3.08). This is a serious problem as the 
         | 
| 690 | 
            +
            lack of information is usually one of the greatest barriers towards sustainability (Avila et al, 
         | 
| 691 | 
            +
            2017). Also, students think that they and other important stakeholders (researchers, 
         | 
| 692 | 
            +
            academic and non-academic staff) are not aware of the sustainability strategy of the 
         | 
| 693 | 
            +
            university (3.06), however their participation would be essential in the implementation. 
         | 
| 694 | 
            +
            Students do not think that universities position themselves as sustainable/green (3.03) or 
         | 
| 695 | 
            +
            use solar panels or other renewable energy sources (3.02). They are not content with the 
         | 
| 696 | 
            +
            number of subjects/courses about sustainability (3.0), green/environmental student 
         | 
| 697 | 
            +
            organizations (2.99) and the number of study programmes related to sustainability (2.93). 
         | 
| 698 | 
            +
            Students were found to be the least satisfied with the sustainability audits on campus (2.82).  
         | 
| 699 | 
            +
             | 
| 700 | 
            +
            Sustainable University  
         | 
| 701 | 
            +
            AE 
         | 
| 702 | 
            +
             
         | 
| 703 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 704 | 
            +
            507 
         | 
| 705 | 
            +
            3.3. Importance-performance analysis (IPA) 
         | 
| 706 | 
            +
            In this section, in line with research question 3 (R3), it is discussed whether combining the 
         | 
| 707 | 
            +
            sustainable university scale (SUS) with importance-performance analysis (IPA) could be a 
         | 
| 708 | 
            +
            useful strategic tool for university decision-makers to identify key areas of university 
         | 
| 709 | 
            +
            sustainability. In order to determine the position of each item of the sustainable university 
         | 
| 710 | 
            +
            scale in the quadrants of the importance-performance matrix, deviations of the means from 
         | 
| 711 | 
            +
            the overall mean of importance (Δ IMP) and performance (Δ PER) were calculated. Table 
         | 
| 712 | 
            +
            no. 3 shows the results and the position of each item in the quadrants of IPA. 
         | 
| 713 | 
            +
            Seven attributes of the sustainable university scale including location, separate waste 
         | 
| 714 | 
            +
            collection, strategy, energy and water savings, public transport, research and sustainable 
         | 
| 715 | 
            +
            buildings fall into the ‘Keep up the good work” quadrant (Q1), which contains the 
         | 
| 716 | 
            +
            competitive advantages (strengths) of the Hungarian universities with regard to 
         | 
| 717 | 
            +
            sustainability. It is suggested that universities should use all of them in communication 
         | 
| 718 | 
            +
            campaigns targeted at students who are concerned about sustainability.  
         | 
| 719 | 
            +
            Table no. 3: Importance and performance of the sustainable university scale items  
         | 
| 720 | 
            +
             
         | 
| 721 | 
            +
             
         | 
| 722 | 
            +
            IMP 
         | 
| 723 | 
            +
            means 
         | 
| 724 | 
            +
            PER 
         | 
| 725 | 
            +
            means 
         | 
| 726 | 
            +
            Δ IMP 
         | 
| 727 | 
            +
            Δ PER 
         | 
| 728 | 
            +
            Quad- 
         | 
| 729 | 
            +
            rant 
         | 
| 730 | 
            +
            1 
         | 
| 731 | 
            +
            Sustainability strategy 
         | 
| 732 | 
            +
            4.10 
         | 
| 733 | 
            +
            3.35 
         | 
| 734 | 
            +
            0.12 
         | 
| 735 | 
            +
            0.12 
         | 
| 736 | 
            +
            Q1 
         | 
| 737 | 
            +
            2 
         | 
| 738 | 
            +
            Awareness of the sust. strategy 
         | 
| 739 | 
            +
            3.95 
         | 
| 740 | 
            +
            3.06 
         | 
| 741 | 
            +
            -0.03 
         | 
| 742 | 
            +
            -0.17 
         | 
| 743 | 
            +
            Q3 
         | 
| 744 | 
            +
            3 
         | 
| 745 | 
            +
            Sustainability audits 
         | 
| 746 | 
            +
            3.51 
         | 
| 747 | 
            +
            2.82 
         | 
| 748 | 
            +
            -0.47 
         | 
| 749 | 
            +
            -0.41 
         | 
| 750 | 
            +
            Q3 
         | 
| 751 | 
            +
            4 
         | 
| 752 | 
            +
            Sustainability information 
         | 
| 753 | 
            +
            3.94 
         | 
| 754 | 
            +
            3.08 
         | 
| 755 | 
            +
            -0.04 
         | 
| 756 | 
            +
            -0.15 
         | 
| 757 | 
            +
            Q3 
         | 
| 758 | 
            +
            5 
         | 
| 759 | 
            +
            Green positioning 
         | 
| 760 | 
            +
            3.71 
         | 
| 761 | 
            +
            3.03 
         | 
| 762 | 
            +
            -0.27 
         | 
| 763 | 
            +
            -0.20 
         | 
| 764 | 
            +
            Q3 
         | 
| 765 | 
            +
            6 
         | 
| 766 | 
            +
            Green purchasing 
         | 
| 767 | 
            +
            4.00 
         | 
| 768 | 
            +
            3.13 
         | 
| 769 | 
            +
            0.02 
         | 
| 770 | 
            +
            -0.10 
         | 
| 771 | 
            +
            Q4 
         | 
| 772 | 
            +
            7 
         | 
| 773 | 
            +
            Separate waste collection 
         | 
| 774 | 
            +
            4.54 
         | 
| 775 | 
            +
            3.70 
         | 
| 776 | 
            +
            0.56 
         | 
| 777 | 
            +
            0.47 
         | 
| 778 | 
            +
            Q1 
         | 
| 779 | 
            +
            8 
         | 
| 780 | 
            +
            Renewable energy sources 
         | 
| 781 | 
            +
            4.35 
         | 
| 782 | 
            +
            3.02 
         | 
| 783 | 
            +
            0.37 
         | 
| 784 | 
            +
            -0.21 
         | 
| 785 | 
            +
            Q4 
         | 
| 786 | 
            +
            9 
         | 
| 787 | 
            +
            Water and energy savings 
         | 
| 788 | 
            +
            4.43 
         | 
| 789 | 
            +
            3.29 
         | 
| 790 | 
            +
            0.45 
         | 
| 791 | 
            +
            0.06 
         | 
| 792 | 
            +
            Q1 
         | 
| 793 | 
            +
            10 
         | 
| 794 | 
            +
            Public transport, bikes 
         | 
| 795 | 
            +
            4.00 
         | 
| 796 | 
            +
            3.27 
         | 
| 797 | 
            +
            0.02 
         | 
| 798 | 
            +
            0.04 
         | 
| 799 | 
            +
            Q1 
         | 
| 800 | 
            +
            11 
         | 
| 801 | 
            +
            Sustainable buildings 
         | 
| 802 | 
            +
            4.43 
         | 
| 803 | 
            +
            3.33 
         | 
| 804 | 
            +
            0.45 
         | 
| 805 | 
            +
            0.10 
         | 
| 806 | 
            +
            Q1 
         | 
| 807 | 
            +
            12 
         | 
| 808 | 
            +
            Green location 
         | 
| 809 | 
            +
            4.39 
         | 
| 810 | 
            +
            4.17 
         | 
| 811 | 
            +
            0.41 
         | 
| 812 | 
            +
            0.94 
         | 
| 813 | 
            +
            Q1 
         | 
| 814 | 
            +
            13 
         | 
| 815 | 
            +
            Community outreach programs 
         | 
| 816 | 
            +
            3.89 
         | 
| 817 | 
            +
            3.50 
         | 
| 818 | 
            +
            -0.09 
         | 
| 819 | 
            +
            0.27 
         | 
| 820 | 
            +
            Q2 
         | 
| 821 | 
            +
            14 
         | 
| 822 | 
            +
            Sustainability partnerships 
         | 
| 823 | 
            +
            3.94 
         | 
| 824 | 
            +
            3.34 
         | 
| 825 | 
            +
            -0.04 
         | 
| 826 | 
            +
            0.11 
         | 
| 827 | 
            +
            Q2 
         | 
| 828 | 
            +
            15 
         | 
| 829 | 
            +
            Green student organization(s) 
         | 
| 830 | 
            +
            3.76 
         | 
| 831 | 
            +
            2.99 
         | 
| 832 | 
            +
            -0.22 
         | 
| 833 | 
            +
            -0.24 
         | 
| 834 | 
            +
            Q3 
         | 
| 835 | 
            +
            16 
         | 
| 836 | 
            +
            Green actions, projects 
         | 
| 837 | 
            +
            3.90 
         | 
| 838 | 
            +
            3.12 
         | 
| 839 | 
            +
            -0.08 
         | 
| 840 | 
            +
            -0.11 
         | 
| 841 | 
            +
            Q3 
         | 
| 842 | 
            +
            17 
         | 
| 843 | 
            +
            Green study programmes 
         | 
| 844 | 
            +
            3.60 
         | 
| 845 | 
            +
            2.93 
         | 
| 846 | 
            +
            -0.38 
         | 
| 847 | 
            +
            -0.30 
         | 
| 848 | 
            +
            Q3 
         | 
| 849 | 
            +
            18 
         | 
| 850 | 
            +
            Green subjects/courses 
         | 
| 851 | 
            +
            3.71 
         | 
| 852 | 
            +
            3.00 
         | 
| 853 | 
            +
            -0.27 
         | 
| 854 | 
            +
            -0.23 
         | 
| 855 | 
            +
            Q3 
         | 
| 856 | 
            +
            19 
         | 
| 857 | 
            +
            Greening normal courses 
         | 
| 858 | 
            +
            3.61 
         | 
| 859 | 
            +
            3.14 
         | 
| 860 | 
            +
            -0.37 
         | 
| 861 | 
            +
            -0.09 
         | 
| 862 | 
            +
            Q3 
         | 
| 863 | 
            +
            20 
         | 
| 864 | 
            +
            Sustainability research 
         | 
| 865 | 
            +
            4.07 
         | 
| 866 | 
            +
            3.47 
         | 
| 867 | 
            +
            0.09 
         | 
| 868 | 
            +
            0.24 
         | 
| 869 | 
            +
            Q1 
         | 
| 870 | 
            +
            21 
         | 
| 871 | 
            +
            Sustainability research integration 
         | 
| 872 | 
            +
            3.72 
         | 
| 873 | 
            +
            3.11 
         | 
| 874 | 
            +
            -0.26 
         | 
| 875 | 
            +
            -0.12 
         | 
| 876 | 
            +
            Q3 
         | 
| 877 | 
            +
             
         | 
| 878 | 
            +
            Total 
         | 
| 879 | 
            +
            3.98 
         | 
| 880 | 
            +
            3.23 
         | 
| 881 | 
            +
             
         | 
| 882 | 
            +
             
         | 
| 883 | 
            +
             
         | 
| 884 | 
            +
              Notes: IMP: importance; PER: performance; Quadrants: (1) Keep up the good work  (2) Possible 
         | 
| 885 | 
            +
            overkill (3) Low priority (4) Concentrate here 
         | 
| 886 | 
            +
             
         | 
| 887 | 
            +
             | 
| 888 | 
            +
            AE 
         | 
| 889 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 890 | 
            +
            Performance Analysis 
         | 
| 891 | 
            +
             
         | 
| 892 | 
            +
            508 
         | 
| 893 | 
            +
            Amfiteatru Economic 
         | 
| 894 | 
            +
            Campus location is found to be the biggest strength. The favourable location is very 
         | 
| 895 | 
            +
            important for the students. They require that university buildings should be situated in a 
         | 
| 896 | 
            +
            quiet, green environment, and for most of them, this expectation is fully met. Separate 
         | 
| 897 | 
            +
            waste collection, which is the most important aspect of the sustainable university from the 
         | 
| 898 | 
            +
            students’ perspective, is also a major strength as students are quite satisfied with it. 
         | 
| 899 | 
            +
            Hungarian universities must communicate that they provide the infrastructure for separate 
         | 
| 900 | 
            +
            waste collection and promote this activity. 
         | 
| 901 | 
            +
            Based on our findings, it is advisable for universities to emphasize that their students are 
         | 
| 902 | 
            +
            satisfied with their efforts towards energy and water savings and appreciate their 
         | 
| 903 | 
            +
            endeavours to increase energy efficiency on campus. Also, students are content with how 
         | 
| 904 | 
            +
            sustainable the design of the university buildings is. It can also be suggested that Hungarian 
         | 
| 905 | 
            +
            higher education institutions should communicate that they promote sustainability research, 
         | 
| 906 | 
            +
            encourages the use of public transport, bikes and they have a written sustainability strategy. 
         | 
| 907 | 
            +
            Two items can be found in Q2, which is the possible overkill quadrant. It contains items 
         | 
| 908 | 
            +
            that are not important for the students, however they, the most important stakeholders of the 
         | 
| 909 | 
            +
            universities are satisfied with it (performance ratings are better than the overall average). 
         | 
| 910 | 
            +
            The performance of universities concerning community outreach programs, partnership 
         | 
| 911 | 
            +
            with governmental, non-governmental organizations, and industry is better than required. In 
         | 
| 912 | 
            +
            this case, it is suggested that universities should make a communication campaign to 
         | 
| 913 | 
            +
            increase the importance of their community outreach programs and sustainability 
         | 
| 914 | 
            +
            partnership to turn those activities into competitive advantages. 
         | 
| 915 | 
            +
            Ten items – nearly the half of the sustainable university scale items – can be found in Q3, 
         | 
| 916 | 
            +
            which represents “Low priority” attributes having low importance and low perceived 
         | 
| 917 | 
            +
            performance. The items that fall into this quadrant are respectively: 1) awareness of the 
         | 
| 918 | 
            +
            sustainability strategy; 2) regular sustainability audits; 3) information regarding 
         | 
| 919 | 
            +
            sustainability (website, newsletters, etc.); 4) sustainability-focused positioning of the 
         | 
| 920 | 
            +
            universities; 5) active green student organizations; 6) sustainability-related projects/actions; 
         | 
| 921 | 
            +
            7) study programs related to sustainability; 8) subjects/courses related to sustainability; 9) 
         | 
| 922 | 
            +
            integration of sustainability into normal/traditional courses; and finally, 10) integration of 
         | 
| 923 | 
            +
            sustainability research results into the curricula. Hungarian universities are strongly advised 
         | 
| 924 | 
            +
            to avoid any investments in those activities.  
         | 
| 925 | 
            +
            Last but not at least, two sustainable university items can be found in Q4. This is the 
         | 
| 926 | 
            +
            “Concentrate here” quadrant representing attributes that universities should immediately 
         | 
| 927 | 
            +
            improve to achieve higher student satisfaction with regard to their attempts to be more 
         | 
| 928 | 
            +
            sustainable. The items listed here have high importance and low perceived performance 
         | 
| 929 | 
            +
            suggesting that students are really dissatisfied with them in spite of the fact that those items 
         | 
| 930 | 
            +
            are really important for them. On the one hand, they do not believe that universities have 
         | 
| 931 | 
            +
            environmentally and socially responsible purchasing practices, on the other hand they are 
         | 
| 932 | 
            +
            disappointed with the use renewable energy sources (e.g. solar panels) on campus. It is 
         | 
| 933 | 
            +
            therefore suggested that universities should concentrate more on green/socially responsible 
         | 
| 934 | 
            +
            procurement and should increase the use of renewable energy sources to make students 
         | 
| 935 | 
            +
            who are concerned about sustainability more satisfied. Universities should consider more 
         | 
| 936 | 
            +
            the sustainability performance of their suppliers. They should be greening their tenders, 
         | 
| 937 | 
            +
            prefer local suppliers, and install more solar panels, etc. (Figure no. 2). 
         | 
| 938 | 
            +
             
         | 
| 939 | 
            +
             | 
| 940 | 
            +
            Sustainable University  
         | 
| 941 | 
            +
            AE 
         | 
| 942 | 
            +
             
         | 
| 943 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 944 | 
            +
            509 
         | 
| 945 | 
            +
             
         | 
| 946 | 
            +
            Figure no. 2: Importance-performance of the sustainable university scale items 
         | 
| 947 | 
            +
            As no research has been found that surveyed the perceived importance and performance of 
         | 
| 948 | 
            +
            the attributes of university sustainability, it is therefore not possible to compare the results 
         | 
| 949 | 
            +
            discussed here to the findings of previous works. However, this study fills this gap in the 
         | 
| 950 | 
            +
            literature and propose a new methodology to investigate the attributes of university 
         | 
| 951 | 
            +
            sustainability. As an answer to R3, it can be concluded that importance performance 
         | 
| 952 | 
            +
            analysis (IPA) is a strong strategic tool for university decision-makers to identify key areas 
         | 
| 953 | 
            +
            of university sustainability when combined with the sustainable university scale (SUS). 
         | 
| 954 | 
            +
            Using the results of IPA, universities could implement corrective actions to make students 
         | 
| 955 | 
            +
            as stakeholders more satisfied with their efforts to be more sustainable. 
         | 
| 956 | 
            +
            3.4. Factor analysis of the sustainable university scale items 
         | 
| 957 | 
            +
            In order to investigate patterns in perceived university sustainability, and answer R4, factor 
         | 
| 958 | 
            +
            analysis was used. The dataset of the importance of SUS items were analysed as it refers to 
         | 
| 959 | 
            +
            the students’ expectation. The very high Kaiser-Meyer-Olkin Measure of Sampling 
         | 
| 960 | 
            +
            Adequacy value (KMO=0.938) indicates that a factor analysis is a useful method with our 
         | 
| 961 | 
            +
            data. The Bartlett's Test of Sphericity (Approx. Chi-Square = 4400.484; df = 210; Sig.= 
         | 
| 962 | 
            +
            0.000) also reconfirms it (Jolliffe, 2011).  
         | 
| 963 | 
            +
            The extraction communalities are acceptable, although the lower values of Green Location 
         | 
| 964 | 
            +
            and Green Positioning show that they don't fit as well as the others. Only three factors in 
         | 
| 965 | 
            +
            the initial solution have eigenvalues greater than 1. Together, they account for almost 65% 
         | 
| 966 | 
            +
            of the variability in the original variables (Table no. 4). This suggests that three latent 
         | 
| 967 | 
            +
            influences are associated with sustainable university perceptions, but there remains room 
         | 
| 968 | 
            +
            for a lot of unexplained variation (Babbie, Wagner and Zaino, 2019). The scree plot also 
         | 
| 969 | 
            +
            confirmed the choice of three components. 
         | 
| 970 | 
            +
            Table no. 4: Total variance explained 
         | 
| 971 | 
            +
             | 
| 972 | 
            +
            greenlocation
         | 
| 973 | 
            +
            4.1
         | 
| 974 | 
            +
            separatewaste
         | 
| 975 | 
            +
            collection
         | 
| 976 | 
            +
            3.6
         | 
| 977 | 
            +
            Performance
         | 
| 978 | 
            +
            communityoutreach
         | 
| 979 | 
            +
            programs
         | 
| 980 | 
            +
            sustainabilityresearch
         | 
| 981 | 
            +
            sustainabilitypartnerships
         | 
| 982 | 
            +
            sustainablebuildings
         | 
| 983 | 
            +
            sustainabilitystrategy
         | 
| 984 | 
            +
            publictransport,bikes
         | 
| 985 | 
            +
            water andenergy savings
         | 
| 986 | 
            +
            greeningnormal courses
         | 
| 987 | 
            +
            greenactions,projects
         | 
| 988 | 
            +
            sustainability
         | 
| 989 | 
            +
            green purchasing
         | 
| 990 | 
            +
            3.1
         | 
| 991 | 
            +
            researchintegration
         | 
| 992 | 
            +
            sustainabilityinformation
         | 
| 993 | 
            +
            green subjects/courses
         | 
| 994 | 
            +
            green positioning
         | 
| 995 | 
            +
            awarenessofthesust.strategy
         | 
| 996 | 
            +
            renewableenergysources
         | 
| 997 | 
            +
            green studentorganization(s)
         | 
| 998 | 
            +
            greenstudyprogranmimes
         | 
| 999 | 
            +
            sustainabilityaudits
         | 
| 1000 | 
            +
            2.6
         | 
| 1001 | 
            +
            3.4
         | 
| 1002 | 
            +
            3.6
         | 
| 1003 | 
            +
            3.8
         | 
| 1004 | 
            +
            4
         | 
| 1005 | 
            +
            4.2
         | 
| 1006 | 
            +
            4.4
         | 
| 1007 | 
            +
            4.6
         | 
| 1008 | 
            +
            ImportanceAE 
         | 
| 1009 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 1010 | 
            +
            Performance Analysis 
         | 
| 1011 | 
            +
             
         | 
| 1012 | 
            +
            510 
         | 
| 1013 | 
            +
            Amfiteatru Economic 
         | 
| 1014 | 
            +
            Compo-
         | 
| 1015 | 
            +
            nent 
         | 
| 1016 | 
            +
            Initial Eigenvalues 
         | 
| 1017 | 
            +
            Extraction Sums of 
         | 
| 1018 | 
            +
            Squared Loadings 
         | 
| 1019 | 
            +
            Rotation Sums of Squared 
         | 
| 1020 | 
            +
            Loadings 
         | 
| 1021 | 
            +
            Total 
         | 
| 1022 | 
            +
            % of 
         | 
| 1023 | 
            +
            Variance 
         | 
| 1024 | 
            +
            Cumulative 
         | 
| 1025 | 
            +
            % 
         | 
| 1026 | 
            +
            Total 
         | 
| 1027 | 
            +
            % of 
         | 
| 1028 | 
            +
            Variance 
         | 
| 1029 | 
            +
            Cumulative 
         | 
| 1030 | 
            +
            % 
         | 
| 1031 | 
            +
            Total % of 
         | 
| 1032 | 
            +
            Variance 
         | 
| 1033 | 
            +
            Cumulative 
         | 
| 1034 | 
            +
            % 
         | 
| 1035 | 
            +
            1 
         | 
| 1036 | 
            +
            10.648 50.706 
         | 
| 1037 | 
            +
            50.706 
         | 
| 1038 | 
            +
            10.648 50.706 
         | 
| 1039 | 
            +
            50.706 
         | 
| 1040 | 
            +
            5.782 27.535 
         | 
| 1041 | 
            +
            27.535 
         | 
| 1042 | 
            +
            2 
         | 
| 1043 | 
            +
            1.650 7.856 
         | 
| 1044 | 
            +
            58.563 
         | 
| 1045 | 
            +
            1.650 7.856 
         | 
| 1046 | 
            +
            58.563 
         | 
| 1047 | 
            +
            3.937 18.746 
         | 
| 1048 | 
            +
            46.281 
         | 
| 1049 | 
            +
            3 
         | 
| 1050 | 
            +
            1.333 6.346 
         | 
| 1051 | 
            +
            64.909 
         | 
| 1052 | 
            +
            1.333 6.346 
         | 
| 1053 | 
            +
            64.909 
         | 
| 1054 | 
            +
            3.912 18.628 
         | 
| 1055 | 
            +
            64.909 
         | 
| 1056 | 
            +
            4 
         | 
| 1057 | 
            +
            .916 4.360 
         | 
| 1058 | 
            +
            69.269 
         | 
| 1059 | 
            +
             
         | 
| 1060 | 
            +
             
         | 
| 1061 | 
            +
             
         | 
| 1062 | 
            +
             
         | 
| 1063 | 
            +
             
         | 
| 1064 | 
            +
             
         | 
| 1065 | 
            +
            21 
         | 
| 1066 | 
            +
            .139 .663 
         | 
| 1067 | 
            +
            100.000 
         | 
| 1068 | 
            +
             
         | 
| 1069 | 
            +
             
         | 
| 1070 | 
            +
             
         | 
| 1071 | 
            +
             
         | 
| 1072 | 
            +
             
         | 
| 1073 | 
            +
             
         | 
| 1074 | 
            +
            Notes: Extraction Method: Principal Component Analysis. 
         | 
| 1075 | 
            +
            To rotate the factor components, Varimax rotation with Kaiser normalization was used. The 
         | 
| 1076 | 
            +
            first rotated factor component is most highly correlated with community outreach 
         | 
| 1077 | 
            +
            programs, sustainability partnerships, green study programmes, green subjects/courses, 
         | 
| 1078 | 
            +
            greening normal courses, sustainability research and sustainability research integration 
         | 
| 1079 | 
            +
            items (Table no. 5). These variables are not particularly correlated with the other two factor 
         | 
| 1080 | 
            +
            components, and each of them refers to actions towards meeting sustainability objectives, 
         | 
| 1081 | 
            +
            or related to education or research, it is therefore the first component called as Sustainable 
         | 
| 1082 | 
            +
            Actions, Education & Research (SAER).  
         | 
| 1083 | 
            +
            Table no. 5: Rotated component matrix 
         | 
| 1084 | 
            +
            Items 
         | 
| 1085 | 
            +
            1. Sust. Actions, 
         | 
| 1086 | 
            +
            Education & 
         | 
| 1087 | 
            +
            Research 
         | 
| 1088 | 
            +
            2. Sust. 
         | 
| 1089 | 
            +
            Operation/ 
         | 
| 1090 | 
            +
            Infrastructure 
         | 
| 1091 | 
            +
            3. Sust. 
         | 
| 1092 | 
            +
            Strategy 
         | 
| 1093 | 
            +
            Type 
         | 
| 1094 | 
            +
            Sustainability strategy 
         | 
| 1095 | 
            +
            0.20 
         | 
| 1096 | 
            +
            0.23 
         | 
| 1097 | 
            +
            0.76 
         | 
| 1098 | 
            +
            ST1 
         | 
| 1099 | 
            +
            Awareness of the sust. strategy 
         | 
| 1100 | 
            +
            0.24 
         | 
| 1101 | 
            +
            0.24 
         | 
| 1102 | 
            +
            0.80 
         | 
| 1103 | 
            +
            ST2 
         | 
| 1104 | 
            +
            Sustainability audits  
         | 
| 1105 | 
            +
            0.39 
         | 
| 1106 | 
            +
            0.06 
         | 
| 1107 | 
            +
            0.73 
         | 
| 1108 | 
            +
            ST3 
         | 
| 1109 | 
            +
            Sustainability information 
         | 
| 1110 | 
            +
            0.25 
         | 
| 1111 | 
            +
            0.32 
         | 
| 1112 | 
            +
            0.74 
         | 
| 1113 | 
            +
            ST4 
         | 
| 1114 | 
            +
            Green positioning 
         | 
| 1115 | 
            +
            0.31 
         | 
| 1116 | 
            +
            0.29 
         | 
| 1117 | 
            +
            0.48 
         | 
| 1118 | 
            +
            ST5 
         | 
| 1119 | 
            +
            Green purchasing 
         | 
| 1120 | 
            +
            0.51 
         | 
| 1121 | 
            +
            0.37 
         | 
| 1122 | 
            +
            0.44 
         | 
| 1123 | 
            +
            PU1 
         | 
| 1124 | 
            +
            Separate waste collection  
         | 
| 1125 | 
            +
            0.15 
         | 
| 1126 | 
            +
            0.78 
         | 
| 1127 | 
            +
            0.24 
         | 
| 1128 | 
            +
            WE1 
         | 
| 1129 | 
            +
            Renewable energy sources 
         | 
| 1130 | 
            +
            0.26 
         | 
| 1131 | 
            +
            0.75 
         | 
| 1132 | 
            +
            0.30 
         | 
| 1133 | 
            +
            WE2 
         | 
| 1134 | 
            +
            Water and energy savings 
         | 
| 1135 | 
            +
            0.13 
         | 
| 1136 | 
            +
            0.82 
         | 
| 1137 | 
            +
            0.31 
         | 
| 1138 | 
            +
            WE3 
         | 
| 1139 | 
            +
            Public transport, bikes 
         | 
| 1140 | 
            +
            0.50 
         | 
| 1141 | 
            +
            0.56 
         | 
| 1142 | 
            +
            -0.01 
         | 
| 1143 | 
            +
            WE4 
         | 
| 1144 | 
            +
            Sustainable buildings 
         | 
| 1145 | 
            +
            0.28 
         | 
| 1146 | 
            +
            0.73 
         | 
| 1147 | 
            +
            0.26 
         | 
| 1148 | 
            +
            WE5 
         | 
| 1149 | 
            +
            Green location 
         | 
| 1150 | 
            +
            0.39 
         | 
| 1151 | 
            +
            0.49 
         | 
| 1152 | 
            +
            0.08 
         | 
| 1153 | 
            +
            LO1 
         | 
| 1154 | 
            +
            Community outreach programs  
         | 
| 1155 | 
            +
            0.60 
         | 
| 1156 | 
            +
            0.31 
         | 
| 1157 | 
            +
            0.33 
         | 
| 1158 | 
            +
            SA1 
         | 
| 1159 | 
            +
            Sustainability partnerships 
         | 
| 1160 | 
            +
            0.68 
         | 
| 1161 | 
            +
            0.25 
         | 
| 1162 | 
            +
            0.33 
         | 
| 1163 | 
            +
            SA2 
         | 
| 1164 | 
            +
            Green student organization(s) 
         | 
| 1165 | 
            +
            0.57 
         | 
| 1166 | 
            +
            0.33 
         | 
| 1167 | 
            +
            0.41 
         | 
| 1168 | 
            +
            SA3 
         | 
| 1169 | 
            +
            Green actions, projects  
         | 
| 1170 | 
            +
            0.63 
         | 
| 1171 | 
            +
            0.28 
         | 
| 1172 | 
            +
            0.45 
         | 
| 1173 | 
            +
            SA4 
         | 
| 1174 | 
            +
            Green study programmes 
         | 
| 1175 | 
            +
            0.83 
         | 
| 1176 | 
            +
            0.16 
         | 
| 1177 | 
            +
            0.19 
         | 
| 1178 | 
            +
            SER1 
         | 
| 1179 | 
            +
            Green subjects/courses 
         | 
| 1180 | 
            +
            0.82 
         | 
| 1181 | 
            +
            0.17 
         | 
| 1182 | 
            +
            0.21 
         | 
| 1183 | 
            +
            SER2 
         | 
| 1184 | 
            +
            Greening normal courses 
         | 
| 1185 | 
            +
            0.71 
         | 
| 1186 | 
            +
            0.16 
         | 
| 1187 | 
            +
            0.27 
         | 
| 1188 | 
            +
            SER3 
         | 
| 1189 | 
            +
            Sustainability research 
         | 
| 1190 | 
            +
            0.71 
         | 
| 1191 | 
            +
            0.34 
         | 
| 1192 | 
            +
            0.30 
         | 
| 1193 | 
            +
            SER4 
         | 
| 1194 | 
            +
            Sustainability research 
         | 
| 1195 | 
            +
            0.78 
         | 
| 1196 | 
            +
            0.22 
         | 
| 1197 | 
            +
            0.26 
         | 
| 1198 | 
            +
            SER5 
         | 
| 1199 | 
            +
             | 
| 1200 | 
            +
            Sustainable University  
         | 
| 1201 | 
            +
            AE 
         | 
| 1202 | 
            +
             
         | 
| 1203 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 1204 | 
            +
            511 
         | 
| 1205 | 
            +
            Items 
         | 
| 1206 | 
            +
            1. Sust. Actions, 
         | 
| 1207 | 
            +
            Education & 
         | 
| 1208 | 
            +
            Research 
         | 
| 1209 | 
            +
            2. Sust. 
         | 
| 1210 | 
            +
            Operation/ 
         | 
| 1211 | 
            +
            Infrastructure 
         | 
| 1212 | 
            +
            3. Sust. 
         | 
| 1213 | 
            +
            Strategy 
         | 
| 1214 | 
            +
            Type 
         | 
| 1215 | 
            +
            integration 
         | 
| 1216 | 
            +
            Notes: (1) Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser 
         | 
| 1217 | 
            +
            Normalization. Rotation converged in 6 iterations. (2) ST: Strategy, commitment & monitoring; PU: 
         | 
| 1218 | 
            +
            Purchasing; WE: Waste & energy; LO: Location; SA: Sustainability actions; SER: Sustainable 
         | 
| 1219 | 
            +
            education & research 
         | 
| 1220 | 
            +
            The second factor component, which is called Sustainable Operation/Infrastructure, are 
         | 
| 1221 | 
            +
            made up of separate waste collection, renewable energy sources, water and energy savings 
         | 
| 1222 | 
            +
            and sustainable buildings. All those items are related to the domain of waste and energy. 
         | 
| 1223 | 
            +
            The third component, Sustainable Strategy, has been named after the items that correlated 
         | 
| 1224 | 
            +
            with it the most. All of them are related to the sustainability strategy including the written 
         | 
| 1225 | 
            +
            sustainability strategy, and its awareness, regular sustainability audits and sustainability 
         | 
| 1226 | 
            +
            information. Because of their moderately large correlations with the first and the third 
         | 
| 1227 | 
            +
            components, green student organizations and green action/projects bridges Sustainable 
         | 
| 1228 | 
            +
            Actions, Education & Research and Sustainable Strategy. Public transport, bikes and green 
         | 
| 1229 | 
            +
            location variables bridge the first and the second components, whereas green positioning 
         | 
| 1230 | 
            +
            and green purchasing are highly correlated with all the three factor components.  
         | 
| 1231 | 
            +
            These results suggest that students form expectations about the three main domains of 
         | 
| 1232 | 
            +
            university sustainability: 1) sustainable strategy, 2) sustainable operations/infrastructure, 
         | 
| 1233 | 
            +
            and 3) sustainable actions/education/research. These are the main topics of the university 
         | 
| 1234 | 
            +
            sustainability in the mind of the most important stakeholder. These findings are not in line 
         | 
| 1235 | 
            +
            with those of previous studies (Nejati and Nejati, 2013; Dagiliute, Liobikiene and 
         | 
| 1236 | 
            +
            Minelgaite, 2018). In both of the earlier studies, the number of factor components was 
         | 
| 1237 | 
            +
            higher, and the structure of the component was different from our results. 
         | 
| 1238 | 
            +
            It is proposed that universities should deal with all the three components separately, and it 
         | 
| 1239 | 
            +
            would be beneficial for them to assign managers in charge to each domain to fully meet 
         | 
| 1240 | 
            +
            student expectations.  
         | 
| 1241 | 
            +
            3.5. Reliability of the sustainable university scale 
         | 
| 1242 | 
            +
            In order to test H2 and to investigate whether all the 21 items of the sustainable university 
         | 
| 1243 | 
            +
            scale reliably measure the same latent variable, a Cronbach's alpha was run on both SUS 
         | 
| 1244 | 
            +
            importance and SUS performance datasets.  
         | 
| 1245 | 
            +
            In the reliability statistics table of SUS importance, Cronbach's alpha was 0.95, which 
         | 
| 1246 | 
            +
            indicates a very high level of internal consistency for our scale with this specific sample 
         | 
| 1247 | 
            +
            (DeVellis, 2017.). The "Cronbach's Alpha “If Item Deleted" column showed that removal 
         | 
| 1248 | 
            +
            of any item would result in a lower Cronbach's alpha, so no items were removed from the 
         | 
| 1249 | 
            +
            21 item-scale. In the reliability statistics table of SUS performance dataset, Cronbach's 
         | 
| 1250 | 
            +
            alpha was even higher (0.985), which indicates an even higher level of internal consistency. 
         | 
| 1251 | 
            +
            Here also no items were removed as the “If Item Deleted" column showed that removal of 
         | 
| 1252 | 
            +
            any item would result in a lower Cronbach's alpha.  
         | 
| 1253 | 
            +
            Also, a reliability analysis was run in order to ensure internal consistency of the identified 
         | 
| 1254 | 
            +
            constructs after the principle component analysis. The high Cronbach’s alpha values 
         | 
| 1255 | 
            +
            confirmed the reliability of the constructs (α Sustainable Strategy = 0.850, no. of items = 5; 
         | 
| 1256 | 
            +
             | 
| 1257 | 
            +
            AE 
         | 
| 1258 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 1259 | 
            +
            Performance Analysis 
         | 
| 1260 | 
            +
             
         | 
| 1261 | 
            +
            512 
         | 
| 1262 | 
            +
            Amfiteatru Economic 
         | 
| 1263 | 
            +
            α Sustainable Operation & Infrastructure = 0.861, no. of items = 6; and α Sustainable 
         | 
| 1264 | 
            +
            Actions, Education & Research= 0.938, no. of items =10). 
         | 
| 1265 | 
            +
            All these findings support H2. It is therefore accepted that the sustainable university scale 
         | 
| 1266 | 
            +
            (SUS) is a reliable construct to measure perceived university sustainability. 
         | 
| 1267 | 
            +
              
         | 
| 1268 | 
            +
            Conclusions 
         | 
| 1269 | 
            +
            The stakeholder theory suggests that organizations should fully meet stakeholders’ 
         | 
| 1270 | 
            +
            expectations to be successful (Freeman, 2010). Students are one of the biggest and most 
         | 
| 1271 | 
            +
            important stakeholders of universities (Degtjarjova, Lapina and Freidenfelds, 2018), and 
         | 
| 1272 | 
            +
            could have a significant impact on the environment (Emanuel and Adams, 2011). 
         | 
| 1273 | 
            +
            Nowadays, the public demand for more sustainable universities is growing (Md Shahbudin,  
         | 
| 1274 | 
            +
            et al., 2011.). More and more students want to study about sustainability, expect the 
         | 
| 1275 | 
            +
            integration of sustainability research into curricula and prefer universities that make efforts 
         | 
| 1276 | 
            +
            to operate in a more sustainable manner (Dagiliute, Liobikiene and Minelgaite, 2018). 
         | 
| 1277 | 
            +
            University decision-makers (Rector, Chancellor, Deans and the Senate) should consider 
         | 
| 1278 | 
            +
            sustainability issues to a greater extent when developing organizational strategy. This study 
         | 
| 1279 | 
            +
            extends the knowledge of the above decision-makers regarding students’ perception of 
         | 
| 1280 | 
            +
            university sustainability in many aspects. 
         | 
| 1281 | 
            +
            The current study found that separate waste collection on campus is the most important 
         | 
| 1282 | 
            +
            student expectation about sustainability. However, it is not in line with the result of 
         | 
| 1283 | 
            +
            previous studies. Dagiliute, Liobikiene and Minelgaite (2018) found recycling less 
         | 
| 1284 | 
            +
            important for students. Nonetheless, our findings are consistent with those of other studies 
         | 
| 1285 | 
            +
            suggesting that students expect water and energy savings and energy efficient, sustainable 
         | 
| 1286 | 
            +
            university buildings in a sustainable university. Also, it is important for the students that the 
         | 
| 1287 | 
            +
            buildings should be located in a green environment. Universities are therefore advised to 
         | 
| 1288 | 
            +
            promote separate waste collection, save water and energy, and maintain sustainable, energy 
         | 
| 1289 | 
            +
            efficient buildings that are situated in green parks (R1).  
         | 
| 1290 | 
            +
            In the current study, the low value of general satisfaction with the performance of 
         | 
| 1291 | 
            +
            universities towards sustainability (3.23) confirmed H1 and suggests that students are not 
         | 
| 1292 | 
            +
            satisfied with it and consider Hungarian universities rather unsustainable. Students’ 
         | 
| 1293 | 
            +
            perceptions of university sustainability are in line with the weak positions of the Hungarian 
         | 
| 1294 | 
            +
            higher education institution in green rankings (Greenmetric, 2019). Our findings show that 
         | 
| 1295 | 
            +
            students are most satisfied with the location of the university buildings, which suggests that 
         | 
| 1296 | 
            +
            Hungarian universities have preferred locations. Also, students are content with the 
         | 
| 1297 | 
            +
            opportunity to collect waste separately on campus, the community outreach programs that 
         | 
| 1298 | 
            +
            universities offer, and the promotion of research on sustainability (R2). 
         | 
| 1299 | 
            +
            The findings of this research confirmed H3. By combining the importance-performance 
         | 
| 1300 | 
            +
            analysis (IPA) with the sustainable university scale (SUS), a simple but powerful strategic 
         | 
| 1301 | 
            +
            managerial tool can be developed. It could be widely used by university decision-makers to 
         | 
| 1302 | 
            +
            investigate the key areas of university sustainability. IPA helps to identify competitive 
         | 
| 1303 | 
            +
            advantages and major weaknesses in the domains of sustainability and make it possible for 
         | 
| 1304 | 
            +
            decision-makers to implement corrective actions to make students as stakeholders more 
         | 
| 1305 | 
            +
            satisfied with the university's efforts to address sustainability. Two major weaknesses were 
         | 
| 1306 | 
            +
            found in our study. Hungarian universities perform poorly in sustainable purchasing and 
         | 
| 1307 | 
            +
             | 
| 1308 | 
            +
            Sustainable University  
         | 
| 1309 | 
            +
            AE 
         | 
| 1310 | 
            +
             
         | 
| 1311 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 1312 | 
            +
            513 
         | 
| 1313 | 
            +
            use less renewable energy (e.g. solar panels) on campus than it is expected by their 
         | 
| 1314 | 
            +
            students. It is therefore suggested that universities should immediately make both their 
         | 
| 1315 | 
            +
            energy use and purchasing process more sustainable. On the other hand, it was also found 
         | 
| 1316 | 
            +
            that campus location and separate waste collection are the major competitive advantages. It 
         | 
| 1317 | 
            +
            is suggested that the major strengths are used in the marketing campaigns of universities to 
         | 
| 1318 | 
            +
            make their green positioning more effective and to build the sustainable university brand 
         | 
| 1319 | 
            +
            image. Strategy, energy and water savings, public transport, sustainable buildings and 
         | 
| 1320 | 
            +
            research are also strengths of the Hungarian universities that should be communicated (R3). 
         | 
| 1321 | 
            +
            The three main domains of university sustainability were also identified. These are the 
         | 
| 1322 | 
            +
            strategy towards sustainability, actions to promote sustainability including education and 
         | 
| 1323 | 
            +
            research, and the sustainable infrastructure/operations. This is a unique structure and 
         | 
| 1324 | 
            +
            different from those presented in earlier studies (Nejati and Nejati, 2013; Dagiliute, 
         | 
| 1325 | 
            +
            Liobikiene and Minelgaite, 2018), which suggests that Hungarian universities should use a 
         | 
| 1326 | 
            +
            nation-specific approach to university sustainability. Future studies on this topic are 
         | 
| 1327 | 
            +
            therefore recommended to investigate it in different cultural and national contexts (R4). 
         | 
| 1328 | 
            +
            The sustainable university scale (SUS) was found to be a reliable construct to measure 
         | 
| 1329 | 
            +
            perceived university sustainability (H2 accepted). The adaptation of this construct is 
         | 
| 1330 | 
            +
            therefore proposed to both researchers and university decision-makers to investigate how 
         | 
| 1331 | 
            +
            students do perceive the efforts that universities make towards sustainability. Combined 
         | 
| 1332 | 
            +
            with IPA, it could be a powerful benchmarking tool, which is an important practical 
         | 
| 1333 | 
            +
            implication (R5). 
         | 
| 1334 | 
            +
            Further research should be done to compare the perceived university sustainability of green 
         | 
| 1335 | 
            +
            and non-green universities in different cultural settings. 
         | 
| 1336 | 
            +
             
         | 
| 1337 | 
            +
            References 
         | 
| 1338 | 
            +
            Adams, R., Martin, S. and Boom, K., 2018. University culture and sustainability: Designing 
         | 
| 1339 | 
            +
            and implementing an enabling framework. Journal of Cleaner Production, 171, pp.434-
         | 
| 1340 | 
            +
            445.  
         | 
| 1341 | 
            +
            Avila, L.V., Filho, W.L., Brandli, L., Macgregor, C.J., Molthan-Hill, P., Özuyar, P.G. and 
         | 
| 1342 | 
            +
            Moreira, R.M., 2017. Barriers to innovation and sustainability at universities around the 
         | 
| 1343 | 
            +
            world. Journal of Cleaner Production, 164, pp.1268-1278. 
         | 
| 1344 | 
            +
            Babbie, E.R., Wagner, W.E. and Zaino, J., 2019. Adventures in social research: data 
         | 
| 1345 | 
            +
            analysis using IBM® SPSS® statistics. Los Angeles, CA: Sage. 
         | 
| 1346 | 
            +
            Carroll, A.B., and Buchholtz, A.K., 2014. Business and society: ethics, sustainability and 
         | 
| 1347 | 
            +
            stakeholder management. Cengage Learning.  
         | 
| 1348 | 
            +
            Chapleo, C. and Sims, C., 2017. Stakeholder analysis in higher education: a case study of 
         | 
| 1349 | 
            +
            the University of Portsmouth. Perspectives: Policy and Practice in Higher Education 
         | 
| 1350 | 
            +
            14(1), pp. 12-20. 
         | 
| 1351 | 
            +
            Dagiliūtė, R., Liobikienė, G. and Minelgaitė, A., 2018. Sustainability at universities: 
         | 
| 1352 | 
            +
            Students’ perceptions from Green and Non-Green universities. Journal of Cleaner 
         | 
| 1353 | 
            +
            Production, 181, pp.473-482. 
         | 
| 1354 | 
            +
             | 
| 1355 | 
            +
            AE 
         | 
| 1356 | 
            +
            Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
         | 
| 1357 | 
            +
            Performance Analysis 
         | 
| 1358 | 
            +
             
         | 
| 1359 | 
            +
            514 
         | 
| 1360 | 
            +
            Amfiteatru Economic 
         | 
| 1361 | 
            +
            Degtjarjova, I., Lapina, I., and Freidenfelds, D., 2018. Student as stakeholder: "voice of 
         | 
| 1362 | 
            +
            customer" in higher education quality development. Marketing and Management of 
         | 
| 1363 | 
            +
            Innovations, 2, pp. 388-398.  
         | 
| 1364 | 
            +
            DeVellis, R.F., 2017. Scale Development: theory and applications. Los Angeles: Sage. 
         | 
| 1365 | 
            +
            Emanuel, R. and Adams, J., 2011. College students’ perceptions of campus sustainability. 
         | 
| 1366 | 
            +
            International Journal of Sustainability in Higher Education, 12(1), pp.79-92. 
         | 
| 1367 | 
            +
            Filho, W.L., Manolas, E. and Pace, P., 2015. The future we want. International Journal of 
         | 
| 1368 | 
            +
            Sustainability in Higher Education, 16(1), pp.112-129. 
         | 
| 1369 | 
            +
            Filho, W.L., Shiel, C., Paço, A., Mifsud, M., Ávila, L.V., Brandli, L.L., Molthan-Hill, P., 
         | 
| 1370 | 
            +
            Pace, P., Azeiteiro, U.M., Vargas, V.R. and Caeiro, S., 2019. Sustainable Development 
         | 
| 1371 | 
            +
            Goals and sustainability teaching at universities: Falling behind or getting ahead of the 
         | 
| 1372 | 
            +
            pack? Journal of Cleaner Production, 232, pp.285-294. 
         | 
| 1373 | 
            +
            Freeman, R.E., 1984. Strategic Management: A Stakeholder Approach. Boston: Pitman. 
         | 
| 1374 | 
            +
            Freeman, R.E., 2010. Strategic Management: A Stakeholder Approach. Cambridge 
         | 
| 1375 | 
            +
            University Press. 
         | 
| 1376 | 
            +
            Friedman, M., 1965. Capitalism and freedom. Chicago: University of Chicago Press.  
         | 
| 1377 | 
            +
            Grecu, V. and Ipiña, N., 2014. The Sustainable University – A Model for the Sustainable 
         | 
| 1378 | 
            +
            Organization. Management of Sustainable Development, 6(2), pp.15-24. 
         | 
| 1379 | 
            +
            Greenmetric, 2019. UI Greenmetric World University Rankings Overall Rankings [online] 
         | 
| 1380 | 
            +
            Available at: <https://greenmetric.ui.ac.id/overall-rankings-2019/> [Accessed 20 
         | 
| 1381 | 
            +
            December 2019]. 
         | 
| 1382 | 
            +
            Jolliffe, I.T., 2011. Principal component analysis. New York: Springer. 
         | 
| 1383 | 
            +
            Kakabadse, N. K., Rozules, C. and Davies, L.L., 2005. Corporate social responsibility and 
         | 
| 1384 | 
            +
            stakeholder approach: A conceptual review. International Journal of Business 
         | 
| 1385 | 
            +
            Governance and Ethics, 1(4), pp. 277-302. 
         | 
| 1386 | 
            +
            Kim, J.-R., Jeon, E.-C., Cho, S. and Kim, H., 2018. The Promotion of Environmental 
         | 
| 1387 | 
            +
            Management in the South Korean Health Sector—Case Study. Sustainability, 10(6), 
         | 
| 1388 | 
            +
            p.2081. 
         | 
| 1389 | 
            +
            Li, Y., Gu, Y. and Liu, C., 2018. Prioritising performance indicators for sustainable 
         | 
| 1390 | 
            +
            construction and development of university campuses using an integrated assessment 
         | 
| 1391 | 
            +
            approach. Journal of Cleaner Production, 202, pp.959-968. 
         | 
| 1392 | 
            +
            Lukovics, M. and Zuti, B., 2017. New Functions of Universities in Century XXI Towards 
         | 
| 1393 | 
            +
            “Fourth Generation” Universities. academia.edu 9: Paper ID: 20371078. San 
         | 
| 1394 | 
            +
            Francisco, California.  
         | 
| 1395 | 
            +
            Nejati, M. and Nejati, M., 2013. Assessment of sustainable university factors from the 
         | 
| 1396 | 
            +
            perspective of university students. Journal of Cleaner Production, 48, pp.101-107. 
         | 
| 1397 | 
            +
            Mainardes, E.W., Alves, H. and Raposo, M., 2010. An Exploratory Research on the 
         | 
| 1398 | 
            +
            Stakeholders of a University. Journal of Management and Strategy, 1(1), pp. 76-88. 
         | 
| 1399 | 
            +
            Martilla, J.A. and James, J.C., 1977. Importance-Performance Analysis. Journal of 
         | 
| 1400 | 
            +
            Marketing, 41(1), pp.77-79. 
         | 
| 1401 | 
            +
            Md Shahbudin, A., Nejati, M., Amran, A., 2011. Sustainability-based knowledge management 
         | 
| 1402 | 
            +
            performance evaluation system (SKMPES): linking the higher learning institutes with the 
         | 
| 1403 | 
            +
            bottom billions. African Journal of Business Management, 5(22), pp. 9530-9540. 
         | 
| 1404 | 
            +
             | 
| 1405 | 
            +
            Sustainable University  
         | 
| 1406 | 
            +
            AE 
         | 
| 1407 | 
            +
             
         | 
| 1408 | 
            +
            Vol. 22 • No. 54 • May 2020 
         | 
| 1409 | 
            +
            515 
         | 
| 1410 | 
            +
            Nagy, S., 2018. A környezettudatos cselekvések elemzése. Vezetéstudomány – Budapest 
         | 
| 1411 | 
            +
            Management Review, 49(10-11), pp. 45-55.  
         | 
| 1412 | 
            +
            Nicolescu, O., Pleșoianu, G. and Cîrstea, A.C., 2017. New approaches and tendencies in 
         | 
| 1413 | 
            +
            entrepreneurial management: international conference proceedings. Newcastle upon 
         | 
| 1414 | 
            +
            Tyne, UK: Cambridge Scholars Publishing. 
         | 
| 1415 | 
            +
            Olalla, C.B. and Merino, A., 2019. Competences for sustainability in undergraduate 
         | 
| 1416 | 
            +
            business studies: A content analysis of value-based course syllabi in Spanish 
         | 
| 1417 | 
            +
            universities. The International Journal of Management Education, 17(2), pp.239-253. 
         | 
| 1418 | 
            +
            Paletta, A., Fava, F., Ubertini, F., Bastioli, C., Gregori, G., Camera, F.L. and Douvan, A.R., 
         | 
| 1419 | 
            +
            2019. Universities, industries and sustainable development: Outcomes of the 2017 G7 
         | 
| 1420 | 
            +
            Environment Ministerial Meeting. Sustainable Production and Consumption, 19, pp.1-10. 
         | 
| 1421 | 
            +
            Papp-Váry, Á. and Lukács, R. 2019. Is sustainability a value element of higher education? 
         | 
| 1422 | 
            +
            CASE III-1. In: Rekettye, G., Value Creation 4.0. London: Transnational Press, pp. 179-183. 
         | 
| 1423 | 
            +
            Pawłowski, K., 2009. The ‘Fourth Generation University’ as a Creator of the Local and 
         | 
| 1424 | 
            +
            Regional Development. Higher Education in Europe, 34(1), pp.51-64. 
         | 
| 1425 | 
            +
            Polónyi, I. and Kozma, T., 2019. Az egyetemfejlesztés alternatívái. (Alternatives to 
         | 
| 1426 | 
            +
            university development). Magyar Tudomány, 180(9), pp. 1326-1336. 
         | 
| 1427 | 
            +
            Ragazzi, M. and Ghidini, F., 2017. Environmental sustainability of universities: critical 
         | 
| 1428 | 
            +
            analysis of a green ranking. Energy Procedia, 119, pp.111-120. 
         | 
| 1429 | 
            +
            Shuqin, C., Minyan, L., Hongwei, T., Xiaoyu, L. and Jian, G., 2019. Assessing 
         | 
| 1430 | 
            +
            sustainability on Chinese university campuses: Development of a campus sustainability 
         | 
| 1431 | 
            +
            evaluation system and its application with a case study. Journal of Building 
         | 
| 1432 | 
            +
            Engineering, 24, p.100747. 
         | 
| 1433 | 
            +
            Soini, K., Jurgilevich, A., Pietikäinen, J. and Korhonen-Kurki, K., 2018. Universities 
         | 
| 1434 | 
            +
            responding to the call for sustainability: A typology of sustainability centres. Journal of 
         | 
| 1435 | 
            +
            Cleaner Production, 170, pp.1423-1432. 
         | 
| 1436 | 
            +
            Sterling, S., 2014. The sustainable university: challenge and response. The sustainable 
         | 
| 1437 | 
            +
            university: progress and prospects. London: Routledge. 
         | 
| 1438 | 
            +
            United Nations, 2019. Sustainable Development Goals. [online] Available at: 
         | 
| 1439 | 
            +
            <http://un.org/sustainabledevelopment/> [Accessed 28 October 2019]. 
         | 
| 1440 | 
            +
            Yuvinatileng, M., Utomo, W.H. and Latuperissa, R., 2013. Analysis of Service Quality 
         | 
| 1441 | 
            +
            using Servqual Method and Importance Performance Analysis (IPA) in Population 
         | 
| 1442 | 
            +
            Department, Tomohon City. International Journal of Computer Applications, 70(19), 
         | 
| 1443 | 
            +
            pp.23-30. 
         | 
| 1444 | 
            +
            Wakkee, I., Sijde, P.V.D., Vaupell, C. and Ghuman, K., 2019. The universities role in 
         | 
| 1445 | 
            +
            sustainable 
         | 
| 1446 | 
            +
            development: 
         | 
| 1447 | 
            +
            Activating 
         | 
| 1448 | 
            +
            entrepreneurial 
         | 
| 1449 | 
            +
            scholars 
         | 
| 1450 | 
            +
            as 
         | 
| 1451 | 
            +
            agents 
         | 
| 1452 | 
            +
            of 
         | 
| 1453 | 
            +
            change. Technological Forecasting and Social Change, 141, pp.195-205. 
         | 
| 1454 | 
            +
            Walkenbach, J., 2016. Microsoft® Excel® 2016 bible. Indianapolis: Wiley. 
         | 
| 1455 | 
            +
            Wright, T., 2010. University presidents’ conceptualizations of sustainability in higher 
         | 
| 1456 | 
            +
            education. International Journal of Sustainability in Higher Education, 11(1), pp.61-73. 
         | 
| 1457 | 
            +
            Wyród-Wróbel, J. and Biesok, G., 2017. Decision making on various approaches to 
         | 
| 1458 | 
            +
            Importance-Performance Analysis (IPA). European Journal of Business Science and 
         | 
| 1459 | 
            +
            Technology, 3(2), pp. 123-131.  
         | 
| 1460 | 
            +
             | 
    	
        IdAzT4oBgHgl3EQfU_z6/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        JdFAT4oBgHgl3EQfvB7v/content/tmp_files/2301.08674v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,625 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            1 
         | 
| 2 | 
            +
             
         | 
| 3 | 
            +
            Phonon-mediated room-temperature quantum Hall transport in graphene 
         | 
| 4 | 
            +
            Daniel Vaquero1,†, Vito Clericò1,† , Michael Schmitz2,3, Juan Antonio Delgado-Notario1,4, Adrian Martín-Ramos1, 
         | 
| 5 | 
            +
            Juan Salvador-Sánchez1, Claudius S. A. Müller5,6, Km Rubi5,6, Kenji Watanabe7, Takashi Taniguchi8, Bernd 
         | 
| 6 | 
            +
            Beschoten2, Christoph Stampfer2,3, Enrique Diez1, Mikhail I. Katsnelson6, Uli Zeitler5,6, Steffen Wiedmann5,6, 
         | 
| 7 | 
            +
            Sergio Pezzini9,* 
         | 
| 8 | 
            +
            1Nanotechnology Group, USAL–Nanolab, Universidad de Salamanca, E-37008 Salamanca, Spain. 
         | 
| 9 | 
            +
            2JARA-FIT and 2nd Institute of Physics, RWTH Aachen University, 52074 Aachen, Germany. 
         | 
| 10 | 
            +
            3Peter Grünberg Institute (PGI-9), Forschungszentrum Jülich, 52425 Jülich, Germany. 
         | 
| 11 | 
            +
            4CENTERA Laboratories, Institute of High Pressure Physics, Polish Academy of Sciences, 29/37 Sokołowska Str, Warsaw, 
         | 
| 12 | 
            +
            Poland. 
         | 
| 13 | 
            +
            5High Field Magnet Laboratory (HFML-EMFL), Radboud University, Toernooiveld 7, 6525 ED Nijmegen, The Netherlands. 
         | 
| 14 | 
            +
            6Radboud University, Institute for Molecules and Materials, Heyendaalseweg 135, 6525 AJ Nijmegen, The Netherlands. 
         | 
| 15 | 
            +
            7Research Center for Functional Materials, National Institute for Materials Science, 1-1 Namiki Tsukuba, Ibaraki 305-0044, 
         | 
| 16 | 
            +
            Japan. 
         | 
| 17 | 
            +
            8International Center for Materials Nanoarchitectonics, National Institute for Materials Science, 1-1 Namiki Tsukuba, 
         | 
| 18 | 
            +
            Ibaraki 305-0044, Japan. 
         | 
| 19 | 
            +
            9NEST, Istituto Nanoscienze-CNR and Scuola Normale Superiore, Piazza San Silvestro 12, 56127 Pisa, Italy. 
         | 
| 20 | 
            +
             
         | 
| 21 | 
            +
             
         | 
| 22 | 
            +
            †These authors contributed equally to this work 
         | 
| 23 | 
            +
            *email: [email protected] 
         | 
| 24 | 
            +
             
         | 
| 25 | 
            +
            Abstract 
         | 
| 26 | 
            +
            The quantum Hall (QH) effect in two-dimensional electron systems (2DESs) is conventionally observed at liquid-
         | 
| 27 | 
            +
            helium temperatures, where lattice vibrations are strongly suppressed and bulk carrier scattering is dominated 
         | 
| 28 | 
            +
            by disorder. However, due to large Landau level (LL) separation (~2000 K at B = 30 T), graphene can support the 
         | 
| 29 | 
            +
            QH effect up to room temperature (RT), concomitant with a non-negligible population of acoustic phonons 
         | 
| 30 | 
            +
            with a wave-vector commensurate to the inverse electronic magnetic length. Here, we demonstrate that 
         | 
| 31 | 
            +
            graphene encapsulated in hexagonal boron nitride (hBN) realizes a novel transport regime, where dissipation in 
         | 
| 32 | 
            +
            the QH phase is governed predominantly by electron-phonon scattering. Investigating thermally-activated 
         | 
| 33 | 
            +
            transport at filling factor 2 up to RT in an ensemble of back-gated devices, we show that the high B-field 
         | 
| 34 | 
            +
             | 
| 35 | 
            +
            2 
         | 
| 36 | 
            +
             
         | 
| 37 | 
            +
            behaviour correlates with their zero B-field transport mobility. By this means, we extend the well-accepted 
         | 
| 38 | 
            +
            notion of phonon-limited resistivity in ultra-clean graphene to a hitherto unexplored high-field realm. 
         | 
| 39 | 
            +
             
         | 
| 40 | 
            +
            Introduction 
         | 
| 41 | 
            +
            Van der Waals heterostructures of graphene and hBN have recently granted experimental access to novel 
         | 
| 42 | 
            +
            phenomena in condensed matter [1]. The use of hBN as atomically-flat encapsulating dielectric, in particular, 
         | 
| 43 | 
            +
            permits a drastic reduction of extrinsic disorder in graphene devices [2], leading to the observation of zero-field 
         | 
| 44 | 
            +
            transport regimes dominated by either electron-electron [3], electron-hole [4] or electron-phonon (e-ph) 
         | 
| 45 | 
            +
            interaction [5], which manifest over different carrier density and temperature ranges. Toward RT (T ~ 300 K), 
         | 
| 46 | 
            +
            the scattering of electrons with acoustic phonons was theoretically identified as the main intrinsic contribution 
         | 
| 47 | 
            +
            to the electrical resistivity in graphene [6–8], implying a carrier mobility exceeding 105 cm2V-1s-1 at low carrier 
         | 
| 48 | 
            +
            concentration (n < 1012 cm-2). While such figures could already be inferred from early data on disordered SiO2-
         | 
| 49 | 
            +
            supported graphene (~104 cm2V-1s-1 mobility) [9, 10], at present, the reach of the zero-field acoustic-phonon-
         | 
| 50 | 
            +
            limit is firmly established as a generic property of high-quality graphene devices [5], also when encapsulated in 
         | 
| 51 | 
            +
            hBN crystals from different sources [11] or engineered to high doping levels (n > 1013 cm-2) [12]. Notable 
         | 
| 52 | 
            +
            exceptions to the cleanness-implies-high-RT-mobility scenario are suspended graphene samples, where flexural 
         | 
| 53 | 
            +
            phonons dramatically contribute to carrier scattering leading to a T2 behaviour of the resistivity [13], and 
         | 
| 54 | 
            +
            rotationally faulted graphene bilayers close to magic-angle, showing strong phonon-driven T-linear resistivity 
         | 
| 55 | 
            +
            [14]. The difference between freely suspended graphene and graphene encapsulated in hBN is due to the fact 
         | 
| 56 | 
            +
            that in the latter case van der Waals interaction between graphene and substrate makes flexural phonons 
         | 
| 57 | 
            +
            harder, suppressing an intrinsic rippling instability [15]. 
         | 
| 58 | 
            +
            In this work, we address the fundamental question whether the e-ph mechanism in clean graphene could also 
         | 
| 59 | 
            +
            govern the electrical transport in the QH regime [16] at temperatures close to RT. In this sense, we note that 
         | 
| 60 | 
            +
             | 
| 61 | 
            +
            3 
         | 
| 62 | 
            +
             
         | 
| 63 | 
            +
            previous literature on the RT-QH effect in graphene [17–20] exclusively includes experiments on SiO2-
         | 
| 64 | 
            +
            supported devices, precluding such investigation.  
         | 
| 65 | 
            +
             
         | 
| 66 | 
            +
            Results 
         | 
| 67 | 
            +
            The QH effect in 2DESs manifests when the Fermi level (EF) lies on the localised states between two LLs, formed 
         | 
| 68 | 
            +
            in a perpendicular magnetic field and separated by an energy gap ΔLL. The interplay between this energy scale 
         | 
| 69 | 
            +
            and the thermal energy kT governs the basic phenomenology of the electrical transport in the QH regime. 
         | 
| 70 | 
            +
            When 𝑘𝑇 ≪ 𝛥𝐿𝐿, no conduction takes place in the 2D bulk, while 1D chiral edge states carry the electrical 
         | 
| 71 | 
            +
            current ballistically, leading to zero longitudinal resistivity (ρxx) when measured in four-probe configuration 
         | 
| 72 | 
            +
            (Figure 1a, upper panel). As the temperature increases and 𝑘𝑇~𝛥𝐿𝐿, thermal excitation of extended bulk states 
         | 
| 73 | 
            +
            (close to the LLs centre) exponentially restores bulk conduction and carrier scattering (Figure 1a, lower panel), 
         | 
| 74 | 
            +
            resulting in a finite value of the longitudinal resistivity minimum according to 𝜌𝑥𝑥 = 𝜌0 exp (− 𝛥𝐿𝐿 2𝑘𝑇
         | 
| 75 | 
            +
            ⁄
         | 
| 76 | 
            +
            ). This 
         | 
| 77 | 
            +
            relation is vastly employed to estimate the inter-LL separation via T-dependent measurements of the local 
         | 
| 78 | 
            +
            resistivity minimum (under the precaution that the activation energy underestimates ΔLL due to disorder-
         | 
| 79 | 
            +
            broadening of the LLs [21]). The pre-factor to the exponential term, ρ0, which is often not considered explicitly, 
         | 
| 80 | 
            +
            determines the magnitude of the T-activated resistivity (shaded yellow area Figure 1a, lower) and contains 
         | 
| 81 | 
            +
            information regarding the disorder potential [22, 23]. In perpendicular magnetic fields, e-ph scattering requires 
         | 
| 82 | 
            +
            lattice vibrations with a wave-vector in the order of the inverse of the magnetic length (𝑙𝐵~ 25 nm √𝐵[T]
         | 
| 83 | 
            +
            ⁄
         | 
| 84 | 
            +
            ) 
         | 
| 85 | 
            +
            [24], which defines a third energy scale relevant to our problem 𝐸𝑝ℎ = ℏv𝑠 𝑙𝐵
         | 
| 86 | 
            +
            ⁄
         | 
| 87 | 
            +
             (where vs is the sound velocity in 
         | 
| 88 | 
            +
            the material). In conventional 2DESs, the small ΔLL leads to a complete suppression of the QH effect within a 
         | 
| 89 | 
            +
            few K [25], where the Eph-controlled phonon population can be considered negligible. Although the low 
         | 
| 90 | 
            +
            electronic mass in 2DESs such as InSb [26] and HgTe [27–29] enables the observation of the QHE up to liquid-
         | 
| 91 | 
            +
            nitrogen temperature, this is insufficient to ensure 𝑘𝑇 ≫ 𝐸𝑝ℎ and therefore insufficient to realize a 
         | 
| 92 | 
            +
            predominance of e-ph interaction. This condition, as sketched in Figure 1b, is instead fulfilled by graphene in 
         | 
| 93 | 
            +
             | 
| 94 | 
            +
            4 
         | 
| 95 | 
            +
             
         | 
| 96 | 
            +
            the RT-QH regime (the field dependence of Eph and the corresponding T-dependent excitation probability for 
         | 
| 97 | 
            +
            acoustic phonons in graphene at B = 30 T are shown in SI Figure S1). Under this circumstance, the T-activated 
         | 
| 98 | 
            +
            resistivity (shaded dark cyan area in Figure 1b) should directly relate to e-ph scattering [24]. 
         | 
| 99 | 
            +
            Figure 1c shows a representative measurement of the RT-QH effect, acquired at B = 30 T in a 
         | 
| 100 | 
            +
            hBN/graphene/hBN back-gated Hall bar (sample D2). The Hall conductivity (σxy) presents weak slope changes 
         | 
| 101 | 
            +
            around filling factors ν = ±2 (Vg ~ ±20 V), while the shelves-like features at low carrier concentration originate 
         | 
| 102 | 
            +
            from the onset of electron-hole coexistence in the highly-degenerate N = 0 LL [30]. ρxx, in addition to the 
         | 
| 103 | 
            +
            pronounced maximum around the charge neutrality point (CNP), shows two sizable minima (Figure 1c, inset), 
         | 
| 104 | 
            +
            indicative of T-activated QH states. Notably, the overall robustness of the RT-QH signatures dramatically differs 
         | 
| 105 | 
            +
            in high-mobility graphene with respect to SiO2-supported samples [17]; we thoroughly address this striking 
         | 
| 106 | 
            +
            observation in a separate work, where we study the suppression of the σxy plateaus in ultra-high-quality 
         | 
| 107 | 
            +
            devices at temperatures significantly lower than RT. In the following, we will focus on the magnitude of ρxx in 
         | 
| 108 | 
            +
            the RT-QH regime and identify the underlying mechanism employing a collection of dry-assembled hBN/ 
         | 
| 109 | 
            +
            graphene/hBN heterostructures. 
         | 
| 110 | 
            +
             
         | 
| 111 | 
            +
            In Figure 2 we present the main transport characteristics of our devices (details on the fabrication are given in 
         | 
| 112 | 
            +
            Methods), measured at zero magnetic field and at elevated temperatures. Figure 2a shows the RT mobility of 
         | 
| 113 | 
            +
            three hBN-encapsulated devices, calculated according to the Drude model ( 𝜇 = 1 (𝑛𝑒𝜌𝑥𝑥)
         | 
| 114 | 
            +
            ⁄
         | 
| 115 | 
            +
             ), as a function of 
         | 
| 116 | 
            +
            the carrier density n. All the mobility curves are well above the typical values for SiO2-supported graphene 
         | 
| 117 | 
            +
            (grey shaded area) over the whole n range. Importantly, sample D3 shows a μ(n) dependence comparable to 
         | 
| 118 | 
            +
            the data of Ref. [5] (dash-dotted line), demonstrating the standard fingerprint of phonon-limited RT mobility in 
         | 
| 119 | 
            +
            zero magnetic field [11, 12] (as confirmed by temperature-dependent resistivity data shown in SI Figure S2). 
         | 
| 120 | 
            +
            We note that, although Wang et al. employed a 15 μm-wide van der Pauw device, e-ph scattering imposes a ~1 
         | 
| 121 | 
            +
            μm upper bound to the electronic mean free path at B = 0 and RT [5]. Therefore, the zero-field e-ph limit can 
         | 
| 122 | 
            +
            also be realized using narrow Hall bars, provided that their channel width exceeds 1 μm (1.5 μm to 2.3 μm in 
         | 
| 123 | 
            +
             | 
| 124 | 
            +
            5 
         | 
| 125 | 
            +
             
         | 
| 126 | 
            +
            our devices). The overall high quality of the samples is also supported by the observation of fractional QH 
         | 
| 127 | 
            +
            states at liquid-helium temperature (see data for sample D2 in SI Figure S3, and Ref. [31] for sample D4, 
         | 
| 128 | 
            +
            fabricated using CVD-grown graphene). In Figure 2b we explore the correlation between the carrier mobility 
         | 
| 129 | 
            +
            (calculated using the field-effect formula [32]) and the charge inhomogeneity in the CNP region, estimated as 
         | 
| 130 | 
            +
            the usual n* parameter [33] (see Figure 2b inset for an example of the extraction). We consider data at T = 220 
         | 
| 131 | 
            +
            K, where clear thermal activation is observed in the RT-QH regime. n* values above the intrinsic CNP thermal 
         | 
| 132 | 
            +
            broadening (~2.6 × 1010 cm-2 at 220 K, beginning of the x-axis in Figure 2b) quantify the residual disorder, 
         | 
| 133 | 
            +
            which, in our devices, remains well below the typical observations for graphene on SiO2 (n* in the few-1011 cm-2 
         | 
| 134 | 
            +
            range).  In addition, as for Refs. [33, 34], the linear μ-1(n*) dependence (see shaded area in Figure 2b) indicates 
         | 
| 135 | 
            +
            scattering from long-range potentials, attributed to random strain variations generic to graphene on substrates 
         | 
| 136 | 
            +
            [35]. We can therefore conclude that the devices at disposal (i) span a low-disorder range unexplored in 
         | 
| 137 | 
            +
            previous RT-QH experiments, and (ii) present a well-defined disorder type, with increasing impact along the D4-
         | 
| 138 | 
            +
            to-D1 sequence. 
         | 
| 139 | 
            +
             
         | 
| 140 | 
            +
            We then employ the sample temperature as an experimental knob to control the excitation of both phonons 
         | 
| 141 | 
            +
            (see SI Figure S1) and bulk-extended electronic states in strong magnetic fields. In Figure 3a we sketch the 
         | 
| 142 | 
            +
            effect of increasing T on the Landau-quantized electrons in graphene at B = 30 T. Toward RT, the broadening of 
         | 
| 143 | 
            +
            the Fermi-Dirac distribution around EF (experimentally set by Vg) ensures excited charge carriers from both the 
         | 
| 144 | 
            +
            N = 0 and N = 1 LLs, across the giant gap ΔLL. Accordingly, the local resistivity minimum at filling factor ν = 2 
         | 
| 145 | 
            +
            leaves zero and displays increasing finite values, as shown in the experimental curves of Figure 3b. In Figure 3c, 
         | 
| 146 | 
            +
            we present a complete picture of the T-dependence of ρxx (ν = 2) for samples D1-4, at selected magnetic fields 
         | 
| 147 | 
            +
            (30 T and 25 T in the main panel and inset, respectively; data at ν = -2 are shown in SI Figure S4). In addition to 
         | 
| 148 | 
            +
            our data, we show reference points from Ref. [20] (black diamonds, ρxx (ν = 2) in graphene on SiO2), and two 
         | 
| 149 | 
            +
            theoretical calculations defining different dissipation limits (continuous lines). In both cases we take an 
         | 
| 150 | 
            +
            activation energy equal to ΔLL/2: this was shown to be accurate for high B-fields in Ref. [20] and should hold 
         | 
| 151 | 
            +
             | 
| 152 | 
            +
            6 
         | 
| 153 | 
            +
             
         | 
| 154 | 
            +
            true for clean graphene with reduced LL broadening. The upper line (yellow) assumes the universal 
         | 
| 155 | 
            +
            conductivity pre-factor due to long-range disorder (2e2/h) [23], multiplied by a factor 4 to take into account the 
         | 
| 156 | 
            +
            LL degeneracy of graphene. The lower line (dark cyan) is based on the work by Alexeev et al. [24], who 
         | 
| 157 | 
            +
            calculated the conductivity mediated by two-phonon scattering for graphene in the RT-QH regime. The 
         | 
| 158 | 
            +
            relevant e-ph process conserves the LL number, but modifies the in-plane electronic momentum. We note that 
         | 
| 159 | 
            +
            this phenomenology is fundamentally different from that of magneto-phonons oscillations, recently discovered 
         | 
| 160 | 
            +
            in extra-wide graphene devices [36], which rely on resonant inter-LL scattering at T < 200 K. Here, two-phonon 
         | 
| 161 | 
            +
            scattering within each LL contributes with a conductivity pre-factor σ0 = σN(T/300 K)(B/10 T)1/2 , which depends 
         | 
| 162 | 
            +
            both on temperature and magnetic field (in contrast to the constant pre-factor commonly assumed in QH 
         | 
| 163 | 
            +
            studies). In the ν = 2 state, the predominant contribution to the σN terms comes from the N = 0 LL (0.65 e2/h, 
         | 
| 164 | 
            +
            one order of magnitude larger with respect to N = 1, 0.06 e2/h) [24]. Strikingly, the resulting activated 
         | 
| 165 | 
            +
            behaviour, not including any free parameter, is well approximated by our devices, while the reference data 
         | 
| 166 | 
            +
            from graphene on SiO2 follow the long-range disorder limit. The qualitative agreement between theoretical 
         | 
| 167 | 
            +
            calculations and experimental data, together with the contrasting behaviour with respect to previous reports 
         | 
| 168 | 
            +
            [20], indicate that graphene/hBN heterostructures support an e-ph-dominated transport in the RT-QH regime. 
         | 
| 169 | 
            +
            Arrhenius-type fits to the conductivity [37], shown in SI Figure S5, confirm the contrasting magnitude of the 
         | 
| 170 | 
            +
            pre-factor for the two generations of graphene devices (as well as the correctness of the assumed gap size). 
         | 
| 171 | 
            +
              
         | 
| 172 | 
            +
            Despite the presence of long-range potentials (Figure 2b), our data clearly indicate that the e-ph pre-factor 
         | 
| 173 | 
            +
            does not simply add up to the standard long-range disorder term. To elucidate this point, we quantitatively 
         | 
| 174 | 
            +
            analyse the deviation from the phonon-mediated limit in the different devices. We proceed by fitting the data 
         | 
| 175 | 
            +
            from samples D1-3 (only two high T curves are acquired for D4 due to experimental limitations) with a 
         | 
| 176 | 
            +
            generalized relation (Figure 4, inset), which adds to the theoretical e-ph dependence from Ref. [24] an 
         | 
| 177 | 
            +
            activation part with a constant pre-factor (ρD). This term is intended to account for the effect of residual 
         | 
| 178 | 
            +
            disorder, and it is the only free parameter in the fits. In Figure 4 we plot the extracted ρD for the three samples 
         | 
| 179 | 
            +
             | 
| 180 | 
            +
            7 
         | 
| 181 | 
            +
             
         | 
| 182 | 
            +
            at different magnetic fields, as a function of the n* parameter (averaged between the electron and hole-side). 
         | 
| 183 | 
            +
            The linear ρD(n*) behaviour observed here (shaded area in Figure 4) indicates that the random strain variations 
         | 
| 184 | 
            +
            inducing the CNP broadening are also responsible for ρxx exceeding the e-ph limit in the RT-QH regime. Notably, 
         | 
| 185 | 
            +
            the only device to display an exact e-ph-type dependence (D3, ρD ~ 0), is also the one to show a Drude mobility 
         | 
| 186 | 
            +
            comparable to the zero-field e-ph limit [5]. Taking into account the sample-dependent correction due to 
         | 
| 187 | 
            +
            residual disorder, in SI (Figure S6) we proceed to a quantitative investigation of the field and temperature 
         | 
| 188 | 
            +
            dependence of the conductivity pre-factor in our samples, revealing the expected B1/2 behaviour of the e-ph 
         | 
| 189 | 
            +
            term. However, we note that the simplified pre-factor proposed in Ref. [24] is the result of several 
         | 
| 190 | 
            +
            approximations and, more importantly, it neglects the effect of disorder. To better understand the interplay 
         | 
| 191 | 
            +
            between the different scattering mechanisms underlying the activated resistivity, in SI (Figures S7 and S8) we 
         | 
| 192 | 
            +
            discuss additional data at lower temperature (down to 50 K) and magnetic field (down to 1 T). We find that ρD 
         | 
| 193 | 
            +
            drastically increases toward low T, with the activated resistivity exceeding the e-ph limit by more than one 
         | 
| 194 | 
            +
            order of magnitude in a clean sample. However, as the temperature and magnetic field are increased, ρD 
         | 
| 195 | 
            +
            progressively drops (i. e., the activated resistivity tends toward the e-ph limit), suggesting a temperature-driven 
         | 
| 196 | 
            +
            crossover between regimes dominated by either disorder or e-ph interaction (the latter being realized only 
         | 
| 197 | 
            +
            close to RT). While it is not surprising that the e-ph limit works as a lower bound to the activated resistivity of 
         | 
| 198 | 
            +
            real samples, the non-universality (i.e., the sample and temperature dependence) of the disorder contribution 
         | 
| 199 | 
            +
            deserves particular attention in future theoretical treatments of the RT-QH in graphene.  
         | 
| 200 | 
            +
             
         | 
| 201 | 
            +
            Discussion 
         | 
| 202 | 
            +
            The physics of graphene is essentially determined by its deviations from flatness (that is, ripples), due to either 
         | 
| 203 | 
            +
            thermal fluctuations associated to flexural phonons for freely suspended samples or to roughness of substrate 
         | 
| 204 | 
            +
            like for graphene on SiO2 [15]. In both cases, ripples induce inhomogeneity of electron density with electron 
         | 
| 205 | 
            +
            and hole puddles in the vicinity of the CNP [38, 39]. In particular, for the case of graphene on SiO2 the 
         | 
| 206 | 
            +
             | 
| 207 | 
            +
            8 
         | 
| 208 | 
            +
             
         | 
| 209 | 
            +
            amplitude of induced inhomogeneity of charge-carrier density is estimated as 3×1011 cm-2 [39], in agreement 
         | 
| 210 | 
            +
            with the above cited experimental values of n*. This makes the system strongly disordered, and any intrinsic 
         | 
| 211 | 
            +
            scattering mechanisms become irrelevant. Oppositely, the hBN substrate is atomically flat [1] and at the same 
         | 
| 212 | 
            +
            time suppresses intrinsic ripples which increases the RT carrier mobility by an order of magnitude and makes 
         | 
| 213 | 
            +
            intrinsic scattering mechanisms dominant [15]. Indeed, experimentally measured n* for our samples is an 
         | 
| 214 | 
            +
            order-of-magnitude smaller than what is supposed to be induced by ripples at RT. This results in an essentially 
         | 
| 215 | 
            +
            different picture of QH physics at high enough temperatures. 
         | 
| 216 | 
            +
             
         | 
| 217 | 
            +
            In conclusion, we showed experimental evidence of predominant e-ph scattering in the QH regime. This is 
         | 
| 218 | 
            +
            realized by uniquely combining strong magnetic fields, high temperatures and hBN-encapsulation of graphene. 
         | 
| 219 | 
            +
            Although the RT-QH in graphene has long been known, we showed that mitigation of disorder via van der 
         | 
| 220 | 
            +
            Waals engineering provides novel insights on the transport mechanisms in this phenomenon. 
         | 
| 221 | 
            +
             
         | 
| 222 | 
            +
             
         | 
| 223 | 
            +
             
         | 
| 224 | 
            +
             
         | 
| 225 | 
            +
             
         | 
| 226 | 
            +
             
         | 
| 227 | 
            +
             
         | 
| 228 | 
            +
             
         | 
| 229 | 
            +
             
         | 
| 230 | 
            +
             
         | 
| 231 | 
            +
             
         | 
| 232 | 
            +
             
         | 
| 233 | 
            +
             
         | 
| 234 | 
            +
             
         | 
| 235 | 
            +
             
         | 
| 236 | 
            +
             | 
| 237 | 
            +
            9 
         | 
| 238 | 
            +
             
         | 
| 239 | 
            +
            Methods 
         | 
| 240 | 
            +
            Graphene-hBN van der Waals assembly and device fabrication 
         | 
| 241 | 
            +
            hBN/graphene/hBN samples D1-3 are assembled using the standard van der Waals dry pick-up [5], starting 
         | 
| 242 | 
            +
            from micromechanically exfoliated graphene flakes previously identified by optical and Raman microscopy. 
         | 
| 243 | 
            +
            Sample D4 is obtained by CVD growth on Cu foil and direct hBN-mediated pick-up after controlled decoupling 
         | 
| 244 | 
            +
            via Cu surface oxidation [31]. All the devices are fabricated making use of electron beam lithography, reactive 
         | 
| 245 | 
            +
            ion etching and e-beam evaporation of Cr/Au 1D edge contacts [5]. 
         | 
| 246 | 
            +
            Magnetotransport measurements 
         | 
| 247 | 
            +
            We use standard lock-in acquisition at low frequency (13 Hz), with simultaneous ρxx and ρxy measurements in 
         | 
| 248 | 
            +
            four-probe configuration, either under a constant current excitation (12.5 nA, sample D1-D3) or a constant 
         | 
| 249 | 
            +
            voltage bias (300 µV, sample D4). The devices are mounted in a VTI system with low-pressure 4He serving as 
         | 
| 250 | 
            +
            exchange gas, coupling the samples to a liquid-N2 reservoir. The cryogenic system is accommodated in the 
         | 
| 251 | 
            +
            access bore of a resistive Bitter magnet at HFML-EMFL, with a maximum field of 33 T. 
         | 
| 252 | 
            +
             
         | 
| 253 | 
            +
            Data Availability 
         | 
| 254 | 
            +
            The data presented in this study are available at https://doi.org/10.5281/zenodo.7352031 . 
         | 
| 255 | 
            +
             
         | 
| 256 | 
            +
            References 
         | 
| 257 | 
            +
            [1] Yankowitz, M., Ma, Q., Jarillo-Herrero, P. & LeRoy B. J. van der Waals heterostructures combining graphene 
         | 
| 258 | 
            +
            and hexagonal boron nitride. Nat. Rev. Phys. 1, 112–125 (2019). 
         | 
| 259 | 
            +
            [2] Rhodes, D., Chae, S. H., Ribeiro-Palau, R. & Hone, J. Disorder in van der Waals heterostructures of 2D 
         | 
| 260 | 
            +
            materials. Nat. Mater. 18, 541–549 (2019). 
         | 
| 261 | 
            +
            [3] Bandurin, D. A. et al. Negative local resistance caused by viscous electron backflow in graphene. Science 
         | 
| 262 | 
            +
            351, 1055-1058 (2016). 
         | 
| 263 | 
            +
             | 
| 264 | 
            +
            10 
         | 
| 265 | 
            +
             
         | 
| 266 | 
            +
            [4] Crossno, J. et al. Observation of the Dirac fluid and the breakdown of the Wiedemann–Franz law in 
         | 
| 267 | 
            +
            graphene. Science 351, 1058–1061 (2016). 
         | 
| 268 | 
            +
            [5] Wang, L. et al. One-Dimensional Electrical Contact to a Two-Dimensional Material. Science 342, 614-617 
         | 
| 269 | 
            +
            (2013). 
         | 
| 270 | 
            +
            [6] Hwang, E. H. & Das Sarma, S. Acoustic phonon scattering limited carrier mobility in two-dimensional 
         | 
| 271 | 
            +
            extrinsic graphene. Phys. Rev. B 77, 115449 (2008). 
         | 
| 272 | 
            +
            [7] Sohier, T. et al. Phonon-limited resistivity of graphene by first-principles calculations: Electron-phonon 
         | 
| 273 | 
            +
            interactions, strain-induced gauge field, and Boltzmann equation. Phys. Rev. B 90, 125414 (2014). 
         | 
| 274 | 
            +
            [8] Park, C.-H. et al. Electron–Phonon Interactions and the Intrinsic Electrical Resistivity of Graphene. Nano Lett. 
         | 
| 275 | 
            +
            14, 1113–1119 (2014). 
         | 
| 276 | 
            +
            [9] Morozov, S. V. et al. Giant Intrinsic Carrier Mobilities in Graphene and Its Bilayer. Phys. Rev. Lett. 
         | 
| 277 | 
            +
            100, 016602 (2007). 
         | 
| 278 | 
            +
            [10] Chen, J.-H., Jang, C., Xiao, S., Ishigami, M. & Fuhrer, M. S. Intrinsic and extrinsic performance limits of 
         | 
| 279 | 
            +
            graphene devices on SiO2. Nat. Nanotechnol. 3, 206 (2008). 
         | 
| 280 | 
            +
            [11] Sonntag, J. et al. Excellent electronic transport in heterostructures of graphene and monoisotopic boron-
         | 
| 281 | 
            +
            nitride grown at atmospheric pressure. 2D Mater. 7, 031009 (2020). 
         | 
| 282 | 
            +
            [12] Shi, W. et al. Reversible writing of high-mobility and high-carrier-density doping patterns in two-
         | 
| 283 | 
            +
            dimensional van der Waals heterostructures. Nat. Electron. 3, 99–105 (2020). 
         | 
| 284 | 
            +
            [13] Castro, E. V. et al. Limits on Charge Carrier Mobility in Suspended Graphene due to Flexural Phonons. Phys. 
         | 
| 285 | 
            +
            Rev. Lett. 105, 266601 (2010). 
         | 
| 286 | 
            +
            [14] Polshyn, H. et al. Large linear-in-temperature resistivity in twisted bilayer graphene. Nat. Phys. 15, 1011–
         | 
| 287 | 
            +
            1016 (2019). 
         | 
| 288 | 
            +
            [15] Katsnelson, M. I. The Physics of Graphene, 2nd ed. (Cambridge University Press, 2020).  
         | 
| 289 | 
            +
            [16] v. Klitzing, K., Dorda, G. & Pepper, M. New Method for High-Accuracy Determination of the Fine-Structure 
         | 
| 290 | 
            +
            Constant Based on Quantized Hall Resistance. Phys. Rev. Lett. 45, 494 (1980). 
         | 
| 291 | 
            +
             | 
| 292 | 
            +
            11 
         | 
| 293 | 
            +
             
         | 
| 294 | 
            +
            [17] Novoselov, K. S. et al. Room-Temperature Quantum Hall Effect in Graphene. Science 315, 1379 (2007). 
         | 
| 295 | 
            +
            [18] Jiang, Z., Zhang, Y., Tan, Y.-W., Stormer, H. L. & Kim, P. Quantum Hall effect in graphene. Solid State 
         | 
| 296 | 
            +
            Commun. 143, 14-19 (2007). 
         | 
| 297 | 
            +
            [19] Jiang, Z., Zhang, Y., Tan, Y.-W., Stormer, H. L. & Kim, P. Quantum Hall States near the Charge-Neutral Dirac 
         | 
| 298 | 
            +
            Point in Graphene. Phys. Rev. Lett. 99, 106802 (2007). 
         | 
| 299 | 
            +
            [20] Giesbers, A. J. M. et al. Quantum-Hall Activation Gaps in Graphene. Phys. Rev. Lett. 99, 206803 (2007). 
         | 
| 300 | 
            +
            [21] Ando, T., Fowler, A. B. & Stern, F. Electronic properties of two-dimensional systems. Rev. Mod. Phys. 54, 
         | 
| 301 | 
            +
            437 (1982). 
         | 
| 302 | 
            +
            [22] Polyakov, D. G. & Shklovskii, B. I. Activated Conductivity in the Quantum Hall Effect. Phys. Rev. Lett. 73, 
         | 
| 303 | 
            +
            1150 (1994). 
         | 
| 304 | 
            +
            [23] Polyakov, D. G. & Shklovskii, B. I. Universal Prefactor of Activated Conductivity in the Quantum Hall Effect. 
         | 
| 305 | 
            +
            Phys. Rev. Lett. 74, 150 (1995). 
         | 
| 306 | 
            +
            [24] Alexeev, A. M., Hartmann, R. R. & Portnoi, M. E. Two-phonon scattering in graphene in the quantum Hall 
         | 
| 307 | 
            +
            regime. Phys. Rev. B 92, 195431 (2015). 
         | 
| 308 | 
            +
            [25] Das Sarma, S. & Pinczuk, A. Perspectives in Quantum Hall Effects (Wiley, New York, 1997). 
         | 
| 309 | 
            +
            [26] Murphy, S. Q. et al. Studies of the quantum Hall to quantum Hall insulator transition in InSb-based 2DESs. 
         | 
| 310 | 
            +
            Physica E 6, 293 (2000). 
         | 
| 311 | 
            +
            [27] Landwehr, G. et al. Quantum transport in n-type and p-type modulation-doped mercury telluride quantum 
         | 
| 312 | 
            +
            wells. Physica E 6, 713 (2000). 
         | 
| 313 | 
            +
            [28] Kozlov, D. A. et al. Quantum Hall effect in HgTe quantum wells at nitrogen temperatures. Appl. Phys. Lett. 
         | 
| 314 | 
            +
            105, 132102 (2014). 
         | 
| 315 | 
            +
            [29] Khouri, T. et al. High-temperature quantum Hall effect in finite gapped HgTe quantum wells. Phys. Rev. B 
         | 
| 316 | 
            +
            93, 125308 (2016). 
         | 
| 317 | 
            +
            [30] Wiedmann, S. et al. Coexistence of electron and hole transport in graphene. Phys Rev B 84, 115314 (2011). 
         | 
| 318 | 
            +
            [31] Schmitz, M. et al. Fractional quantum Hall effect in CVD-grown graphene. 2D Mater. 7, 041007 (2020). 
         | 
| 319 | 
            +
             | 
| 320 | 
            +
            12 
         | 
| 321 | 
            +
             
         | 
| 322 | 
            +
            [32] Kim, S. et al. Realization of a high mobility dual-gated graphene field-effect transistor with Al2O3 dielectric. 
         | 
| 323 | 
            +
            Appl. Phys. Lett. 94, 062107 (2009). 
         | 
| 324 | 
            +
            [33] Couto, N. J. G. et al. Random Strain Fluctuations as Dominant Disorder Source for High-Quality On-
         | 
| 325 | 
            +
            Substrate Graphene Devices. Phys. Rev. X 4, 041019 (2014). 
         | 
| 326 | 
            +
            [34] Wang, L. P. et al. Mobility enhancement in graphene by in situ reduction of random strain fluctuations. 
         | 
| 327 | 
            +
            Phys. Rev. Lett.  124, 157701 (2020). 
         | 
| 328 | 
            +
            [35] Neumann, C. et al. Raman spectroscopy as probe of nanometer-scale strain variations in graphene. Nat. 
         | 
| 329 | 
            +
            Commun. 6, 8429 (2015). 
         | 
| 330 | 
            +
            [36] Kumaravadivel, P. et al. Strong magnetophonon oscillations in extra-large graphene. Nat. Commun. 10, 
         | 
| 331 | 
            +
            3334 (2019). 
         | 
| 332 | 
            +
            [37] Usher, A. et al. Observation of magnetic excitons and spin waves in activation studies of a two-dimensional 
         | 
| 333 | 
            +
            electron gas. Phys Rev B 41, 1129 (1990). 
         | 
| 334 | 
            +
            [38] Gibertini, M., Tomadin, A., Polini, M., Fasolino, A. & Katsnelson, M. I. Electron density distribution and 
         | 
| 335 | 
            +
            screening in rippled graphene sheets. Phys. Rev. B 81, 125437 (2010). 
         | 
| 336 | 
            +
            [39] Gibertini, M., Tomadin, A., Guinea, F., Katsnelson, M. I. & Polini, M. Electron-hole puddles in the absence 
         | 
| 337 | 
            +
            of charge impurities. Phys. Rev. B 85, 201405(R) (2012). 
         | 
| 338 | 
            +
             
         | 
| 339 | 
            +
             
         | 
| 340 | 
            +
            Acknowledgements 
         | 
| 341 | 
            +
            We acknowledge technical support from Y. Lechaux and J. Quereda. This work has been supported by 
         | 
| 342 | 
            +
            Ministerio de Ciencia e Innovación (Grant PID2019-106820RB-C2-2) and Junta de Castilla y León (Grants 
         | 
| 343 | 
            +
            SA256P18 and SA121P20, including EU/FEDER funds). This work was supported by HFML-RU/NWO-I, member 
         | 
| 344 | 
            +
            of the European Magnetic Field Laboratory (EMFL). This work was also supported by CENTERA Laboratories in 
         | 
| 345 | 
            +
            the frame of the International Research Agendas Program for the Foundation for Polish Sciences co-financed by 
         | 
| 346 | 
            +
             | 
| 347 | 
            +
            13 
         | 
| 348 | 
            +
             
         | 
| 349 | 
            +
            the European Union under the European Regional Development Fund (no. MAB/2018/9). D.V. acknowledges 
         | 
| 350 | 
            +
            financial support from the Ministry of Universities (Spain) (Ph.D. contract FPU19/04224). J.A.D-N thanks the 
         | 
| 351 | 
            +
            support from the Universidad de Salamanca for the María Zambrano postdoctoral grant funded by the Next 
         | 
| 352 | 
            +
            Generation EU Funding for the Requalification of the Spanish University System 2021–23, Spanish Ministry of 
         | 
| 353 | 
            +
            Universities. K.W. and T.T. acknowledge support from the Elemental Strategy Initiative conducted by the MEXT, 
         | 
| 354 | 
            +
            Japan (Grant Number JPMXP0112101001) and JSPS KAKENHI (Grant Numbers 19H05790, 20H00354 and 
         | 
| 355 | 
            +
            21H05233). 
         | 
| 356 | 
            +
             
         | 
| 357 | 
            +
            This version of the article has been accepted for publication, after peer review, but is not the Version of Record 
         | 
| 358 | 
            +
            and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available 
         | 
| 359 | 
            +
            online at: https://doi.org/10.1038/s41467-023-35986-3 . 
         | 
| 360 | 
            +
             
         | 
| 361 | 
            +
            Author Contributions Statement 
         | 
| 362 | 
            +
            U.Z., S.W. and S.P. conceived the experiment and coordinated the collaboration. D.V., V.C. and M.S. fabricated 
         | 
| 363 | 
            +
            the graphene devices and performed the transport measurements. J.A.D.-N., A.M.-R. and J.S.-S. provided 
         | 
| 364 | 
            +
            technical assistance in the cleanroom processing. C.S.A.M. and K.R. provided technical assistance during the 
         | 
| 365 | 
            +
            high-field experiments. K.W. and T.T. provided single crystals of hBN. B.B., C.S. and E.D. supervised the 
         | 
| 366 | 
            +
            experimental work. D.V., V.C., M.S., and S.P. performed the data analysis. M.I.K. provided theoretical input for 
         | 
| 367 | 
            +
            the interpretation of the results. S.P. wrote the manuscript with input from all the co-authors. 
         | 
| 368 | 
            +
             
         | 
| 369 | 
            +
            Competing Interests Statement 
         | 
| 370 | 
            +
            The authors declare no competing interests. 
         | 
| 371 | 
            +
             
         | 
| 372 | 
            +
             
         | 
| 373 | 
            +
             | 
| 374 | 
            +
            14 
         | 
| 375 | 
            +
             
         | 
| 376 | 
            +
            Figures and Captions 
         | 
| 377 | 
            +
             
         | 
| 378 | 
            +
            Figure 1 | Dissipation regimes in the quantum Hall phase: high-quality graphene at RT. a, Schematics of 
         | 
| 379 | 
            +
            temperature-dependent transport in conventional quantum Hall systems, such as 2DESs in semiconductors. At 
         | 
| 380 | 
            +
            low T (relative to the LL separation, upper part), the electrical current is carried by chiral edge states, leading to 
         | 
| 381 | 
            +
            zero longitudinal resistance. At higher T (lower part), thermally-excited bulk states give a finite resistivity due to 
         | 
| 382 | 
            +
            disorder scattering (yellow shading), with negligible contribution from lattice vibrations. b, At RT, graphene 
         | 
| 383 | 
            +
            supports both the QH effect (due to large inter-LL spacing) and predominant e-ph scattering in high-mobility 
         | 
| 384 | 
            +
            samples, enabling the realization of a different transport regime, with phonon-mediated dissipation at high 
         | 
| 385 | 
            +
            magnetic fields (dark cyan shading). c, ρxx (black) and σxy (red) as a function of the back-gate voltage (corrected 
         | 
| 386 | 
            +
            by a 5.2 V offset from the CNP), measured in hBN-encapsulated sample D2 at B = 30 T and T = 295 K. Inset: 
         | 
| 387 | 
            +
            zoom-in of ρxx in the vicinity of filling factor ν = 2 (the dark cyan shading indicates the finite value of the 
         | 
| 388 | 
            +
            resistivity minimum). 
         | 
| 389 | 
            +
             
         | 
| 390 | 
            +
             | 
| 391 | 
            +
            a
         | 
| 392 | 
            +
            kT << △LL
         | 
| 393 | 
            +
            c
         | 
| 394 | 
            +
            kT<Eph
         | 
| 395 | 
            +
            ballistic edge transport
         | 
| 396 | 
            +
            0.4
         | 
| 397 | 
            +
            25
         | 
| 398 | 
            +
            conventional quantum
         | 
| 399 | 
            +
            2
         | 
| 400 | 
            +
            Hall systems 
         | 
| 401 | 
            +
            (Uy)
         | 
| 402 | 
            +
            0.2
         | 
| 403 | 
            +
            Pxx
         | 
| 404 | 
            +
            20
         | 
| 405 | 
            +
            Pxx
         | 
| 406 | 
            +
            kT ~ △LL
         | 
| 407 | 
            +
            1
         | 
| 408 | 
            +
            disorder-mediated
         | 
| 409 | 
            +
            kT<Eph
         | 
| 410 | 
            +
            0.0!
         | 
| 411 | 
            +
            dissipation
         | 
| 412 | 
            +
            2V
         | 
| 413 | 
            +
            0xy
         | 
| 414 | 
            +
            (Uy)
         | 
| 415 | 
            +
            15
         | 
| 416 | 
            +
            0
         | 
| 417 | 
            +
             (e2/h)
         | 
| 418 | 
            +
            Pxx
         | 
| 419 | 
            +
            0
         | 
| 420 | 
            +
            Pxx
         | 
| 421 | 
            +
            10
         | 
| 422 | 
            +
            B = 30 T
         | 
| 423 | 
            +
            -1
         | 
| 424 | 
            +
            b
         | 
| 425 | 
            +
            T= 295 K
         | 
| 426 | 
            +
            kT~ △LL
         | 
| 427 | 
            +
            phonon-mediated
         | 
| 428 | 
            +
             clean graphene
         | 
| 429 | 
            +
            dissipatior
         | 
| 430 | 
            +
            5
         | 
| 431 | 
            +
            D2
         | 
| 432 | 
            +
            at RT
         | 
| 433 | 
            +
            Pxx
         | 
| 434 | 
            +
            -2
         | 
| 435 | 
            +
            V
         | 
| 436 | 
            +
            0
         | 
| 437 | 
            +
            Pxx
         | 
| 438 | 
            +
            -30
         | 
| 439 | 
            +
            -20
         | 
| 440 | 
            +
            -10
         | 
| 441 | 
            +
            0
         | 
| 442 | 
            +
            10
         | 
| 443 | 
            +
            20
         | 
| 444 | 
            +
            30
         | 
| 445 | 
            +
            Vg (V)15 
         | 
| 446 | 
            +
             
         | 
| 447 | 
            +
             
         | 
| 448 | 
            +
             
         | 
| 449 | 
            +
            Figure 2 | Phonon-limited transport and residual disorder at zero magnetic field. a, RT carrier mobility 
         | 
| 450 | 
            +
            (calculated according to the Drude model) as a function of the carrier concentration, for three hBN-
         | 
| 451 | 
            +
            encapsulated devices. The reference dash-dotted line are data from Ref. [5], indicating a carrier mobility 
         | 
| 452 | 
            +
            limited by electron-acoustic phonon scattering. The grey-shaded area shows the typical mobility for SiO2-
         | 
| 453 | 
            +
            supported graphene devices, 1-2 × 104 cm2V-1s-1. b, Inverse of the high-temperature (220 K) field-effect mobility 
         | 
| 454 | 
            +
            as a function of charge inhomogeneity n*, for hBN/graphene/hBN devices D1-4. The shaded area covers a 
         | 
| 455 | 
            +
            linear fit to the data, as in Ref. [33], ± one standard error on the best-fit intercept and slope. Inset: Log-Log plot 
         | 
| 456 | 
            +
            of the longitudinal conductivity of sample D1 as a function of the carrier density, exemplifying the extraction of 
         | 
| 457 | 
            +
            n* (black arrow). 
         | 
| 458 | 
            +
             | 
| 459 | 
            +
            a
         | 
| 460 | 
            +
            b
         | 
| 461 | 
            +
            1.5
         | 
| 462 | 
            +
            2.0
         | 
| 463 | 
            +
            · Ref. [5]
         | 
| 464 | 
            +
            T = 295 K
         | 
| 465 | 
            +
            D1
         | 
| 466 | 
            +
            100
         | 
| 467 | 
            +
            Oxx
         | 
| 468 | 
            +
            D1
         | 
| 469 | 
            +
            e'
         | 
| 470 | 
            +
            D2
         | 
| 471 | 
            +
            (e2/h)
         | 
| 472 | 
            +
            D3
         | 
| 473 | 
            +
            1.5
         | 
| 474 | 
            +
             (105 cm²V-1s-1)
         | 
| 475 | 
            +
            1.0
         | 
| 476 | 
            +
            : 10
         | 
| 477 | 
            +
            1
         | 
| 478 | 
            +
            10
         | 
| 479 | 
            +
            100
         | 
| 480 | 
            +
            n (1010 cm2)
         | 
| 481 | 
            +
            D1
         | 
| 482 | 
            +
            1.0
         | 
| 483 | 
            +
            D2
         | 
| 484 | 
            +
            ≥0.5
         | 
| 485 | 
            +
            h+
         | 
| 486 | 
            +
            D3
         | 
| 487 | 
            +
            D4 
         | 
| 488 | 
            +
            A
         | 
| 489 | 
            +
            口
         | 
| 490 | 
            +
            D1
         | 
| 491 | 
            +
            D2
         | 
| 492 | 
            +
            0.5
         | 
| 493 | 
            +
            T = 220 K
         | 
| 494 | 
            +
            graphene on SiO,/Si
         | 
| 495 | 
            +
            e'
         | 
| 496 | 
            +
            △
         | 
| 497 | 
            +
            D3
         | 
| 498 | 
            +
            D4
         | 
| 499 | 
            +
            0.0
         | 
| 500 | 
            +
            0.0
         | 
| 501 | 
            +
            0.5
         | 
| 502 | 
            +
            1.0
         | 
| 503 | 
            +
            1.5
         | 
| 504 | 
            +
            2.0
         | 
| 505 | 
            +
            4
         | 
| 506 | 
            +
            6
         | 
| 507 | 
            +
            8
         | 
| 508 | 
            +
            n (1012 cm-2)
         | 
| 509 | 
            +
            n* (1010 cm2)16 
         | 
| 510 | 
            +
             
         | 
| 511 | 
            +
             
         | 
| 512 | 
            +
            Figure 3 | Temperature-activated resistivity and phonon-mediated dissipation in the quantum Hall effect. a, 
         | 
| 513 | 
            +
            Density of states (DOS) of graphene as a function of energy, at B = 30 T (with a realistic value of LL broadening 
         | 
| 514 | 
            +
            of 15 K). On top of the DOS we show the Fermi-Dirac distribution, with EF positioned in the middle of the N = 0 
         | 
| 515 | 
            +
            and N = 1 LL, at two different temperatures, representative of the experimental range considered. b, 
         | 
| 516 | 
            +
            Temperature-activated longitudinal resistivity in the vicinity of ν = 2, measured in sample D1. c, Minimum of ρxx 
         | 
| 517 | 
            +
            at ν = 2 as a function of temperature, for the hBN-encapsulated devices. The reference data (black diamonds) 
         | 
| 518 | 
            +
            are from Ref. [20]. The yellow and dark cyan continuous line are theoretical calculations based on Ref. [23] and 
         | 
| 519 | 
            +
            Ref. [24], respectively (the shading covers resistivity values within the two theoretical calculations). The 
         | 
| 520 | 
            +
            magnetic field is 30 T (25 T) in the main panel (inset). 
         | 
| 521 | 
            +
             
         | 
| 522 | 
            +
             
         | 
| 523 | 
            +
             
         | 
| 524 | 
            +
             | 
| 525 | 
            +
            a
         | 
| 526 | 
            +
            c
         | 
| 527 | 
            +
            1.5
         | 
| 528 | 
            +
            EF
         | 
| 529 | 
            +
            B= 30 T
         | 
| 530 | 
            +
            B = 30 T
         | 
| 531 | 
            +
            B=25 T
         | 
| 532 | 
            +
            (arb. units)
         | 
| 533 | 
            +
            Pxx
         | 
| 534 | 
            +
            DOS
         | 
| 535 | 
            +
            ALL
         | 
| 536 | 
            +
            295K
         | 
| 537 | 
            +
            1.0
         | 
| 538 | 
            +
            disorder-
         | 
| 539 | 
            +
            1.0
         | 
| 540 | 
            +
            ((v= 2) (kΩ)
         | 
| 541 | 
            +
            mediated
         | 
| 542 | 
            +
            125K
         | 
| 543 | 
            +
            -2
         | 
| 544 | 
            +
            0
         | 
| 545 | 
            +
            2
         | 
| 546 | 
            +
            0.5
         | 
| 547 | 
            +
            E (103 K)
         | 
| 548 | 
            +
            () (Z =4) d
         | 
| 549 | 
            +
            b
         | 
| 550 | 
            +
            B = 30 T
         | 
| 551 | 
            +
            0.0
         | 
| 552 | 
            +
            0.6
         | 
| 553 | 
            +
            0.5
         | 
| 554 | 
            +
            300
         | 
| 555 | 
            +
            250
         | 
| 556 | 
            +
            200
         | 
| 557 | 
            +
            150
         | 
| 558 | 
            +
            T (K)
         | 
| 559 | 
            +
            0.4
         | 
| 560 | 
            +
            283 K
         | 
| 561 | 
            +
            (Uy) d
         | 
| 562 | 
            +
            Ref. [20]
         | 
| 563 | 
            +
            0.2
         | 
| 564 | 
            +
            口
         | 
| 565 | 
            +
            D1
         | 
| 566 | 
            +
            D2
         | 
| 567 | 
            +
            0.0
         | 
| 568 | 
            +
            phonon-
         | 
| 569 | 
            +
            125 K
         | 
| 570 | 
            +
            D3
         | 
| 571 | 
            +
            mediated
         | 
| 572 | 
            +
            D1
         | 
| 573 | 
            +
            D4
         | 
| 574 | 
            +
            0.0
         | 
| 575 | 
            +
            18
         | 
| 576 | 
            +
            20
         | 
| 577 | 
            +
            22
         | 
| 578 | 
            +
            24
         | 
| 579 | 
            +
            300
         | 
| 580 | 
            +
            250
         | 
| 581 | 
            +
            200
         | 
| 582 | 
            +
            150
         | 
| 583 | 
            +
            Vg (V)
         | 
| 584 | 
            +
            T (K)17 
         | 
| 585 | 
            +
             
         | 
| 586 | 
            +
             
         | 
| 587 | 
            +
            Figure 4 | Sample-dependent disorder contribution to the activated resistivity. Correlation between the T-
         | 
| 588 | 
            +
            independent pre-factor to the activated resistivity and n*(220 K) for devices D1-3. The shaded area is defined 
         | 
| 589 | 
            +
            as in Figure 2b. The error bars correspond to ± one standard error from the fits shown in the inset. Inset: fit to 
         | 
| 590 | 
            +
            the minimum resistivity as a function of temperature (continuous lines), using the generalized formula 
         | 
| 591 | 
            +
            including both e-ph and disorder contributions, at B = 25 T. 
         | 
| 592 | 
            +
             | 
| 593 | 
            +
            0.4
         | 
| 594 | 
            +
            B = 25 T
         | 
| 595 | 
            +
            0.3
         | 
| 596 | 
            +
            Pxx (v= 2) (k2)
         | 
| 597 | 
            +
            0.2
         | 
| 598 | 
            +
            0.1
         | 
| 599 | 
            +
            0.0
         | 
| 600 | 
            +
            300
         | 
| 601 | 
            +
            250
         | 
| 602 | 
            +
            200
         | 
| 603 | 
            +
            150
         | 
| 604 | 
            +
            Pp (h/e2)
         | 
| 605 | 
            +
            0.2
         | 
| 606 | 
            +
            T (K)
         | 
| 607 | 
            +
            口
         | 
| 608 | 
            +
            D1
         | 
| 609 | 
            +
            20 T
         | 
| 610 | 
            +
            0
         | 
| 611 | 
            +
            D2
         | 
| 612 | 
            +
            D3
         | 
| 613 | 
            +
            D1
         | 
| 614 | 
            +
            25 T
         | 
| 615 | 
            +
            D2
         | 
| 616 | 
            +
            D3
         | 
| 617 | 
            +
            ATAI
         | 
| 618 | 
            +
            0.0
         | 
| 619 | 
            +
            D1
         | 
| 620 | 
            +
            30 T
         | 
| 621 | 
            +
            D2
         | 
| 622 | 
            +
            4
         | 
| 623 | 
            +
            6
         | 
| 624 | 
            +
            8
         | 
| 625 | 
            +
            n* (1010 cm2)
         | 
    	
        NdFLT4oBgHgl3EQfOC8n/content/tmp_files/2301.12022v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1399 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.12022v1  [cs.AI]  27 Jan 2023
         | 
| 2 | 
            +
            ǫ-Identifiability of Causal Quantities
         | 
| 3 | 
            +
            Ang Li , Scott Mueller and Judea Pearl
         | 
| 4 | 
            +
            Cognitive Systems Laboratory, Department of Computer Science,
         | 
| 5 | 
            +
            University of California, Los Angeles,
         | 
| 6 | 
            +
            Los Angeles, California, USA.
         | 
| 7 | 
            +
            {angli, scott, judea}@cs.ucla.edu
         | 
| 8 | 
            +
            Abstract
         | 
| 9 | 
            +
            Identifying the effects of causes and causes of ef-
         | 
| 10 | 
            +
            fects is vital in virtually every scientific field. Of-
         | 
| 11 | 
            +
            ten, however, the needed probabilities may not be
         | 
| 12 | 
            +
            fully identifiable from the data sources available.
         | 
| 13 | 
            +
            This paper shows how partial identifiability is still
         | 
| 14 | 
            +
            possible for several probabilities of causation. We
         | 
| 15 | 
            +
            term this ǫ-identifiability and demonstrate its use-
         | 
| 16 | 
            +
            fulness in cases where the behavior of certain sub-
         | 
| 17 | 
            +
            populations can be restricted to within some nar-
         | 
| 18 | 
            +
            row bounds. In particular, we show how unidentifi-
         | 
| 19 | 
            +
            able causal effects and counterfactual probabilities
         | 
| 20 | 
            +
            can be narrowly bounded when such allowances are
         | 
| 21 | 
            +
            made. Often those allowances are easily measured
         | 
| 22 | 
            +
            and reasonably assumed. Finally, ǫ-identifiability
         | 
| 23 | 
            +
            is applied to the unit selection problem.
         | 
| 24 | 
            +
            1
         | 
| 25 | 
            +
            Introduction
         | 
| 26 | 
            +
            Both Effects of Causes (EoC) and Causes of Effects (CoE)
         | 
| 27 | 
            +
            play an important role in several fields, such as health
         | 
| 28 | 
            +
            science, social science, and business.
         | 
| 29 | 
            +
            For example, the
         | 
| 30 | 
            +
            causal effects identified by the adjustment [Pearl, 1993]
         | 
| 31 | 
            +
            formula helps decision-maker avoid randomized controlled
         | 
| 32 | 
            +
            trial using purely observational data.
         | 
| 33 | 
            +
            For another exam-
         | 
| 34 | 
            +
            ple, probabilities of causation have been proven critical in
         | 
| 35 | 
            +
            personalized decision-making [Mueller and Pearl, 2022]. Be-
         | 
| 36 | 
            +
            sides, a linear combination of probabilities of causation
         | 
| 37 | 
            +
            has been used to solve the unit selection problem defined
         | 
| 38 | 
            +
            by Li and Pearl [Li and Pearl, 2022b; Li and Pearl, 2019;
         | 
| 39 | 
            +
            Li and Pearl, 2022d]. Causal quantities can also increase the
         | 
| 40 | 
            +
            accuracy of machine learning models by combining causal
         | 
| 41 | 
            +
            quantities with the model’s label [Li et al., 2020].
         | 
| 42 | 
            +
            The causal quantities have been studied for decades.
         | 
| 43 | 
            +
            Pearl first defined the causal quantities such as causal
         | 
| 44 | 
            +
            effects [Pearl, 1993], probability of necessity and suffi-
         | 
| 45 | 
            +
            ciency (PNS), probability of sufficiency (PS), and prob-
         | 
| 46 | 
            +
            ability of necessity (PN) [Pearl, 1999] and their identi-
         | 
| 47 | 
            +
            fiability [Pearl, 2009] using the structural causal model
         | 
| 48 | 
            +
            (SCM) [Galles and Pearl, 1998; Halpern, 2000]. Pearl also
         | 
| 49 | 
            +
            proposed the identification conditions of the causal ef-
         | 
| 50 | 
            +
            fects (i.e., back-door and front-door criteria) [Pearl, 1993].
         | 
| 51 | 
            +
            Pearl, Bareinboim, etc.
         | 
| 52 | 
            +
            have studied more conditions for
         | 
| 53 | 
            +
            identifying the causal effects [Bareinboim and Pearl, 2012;
         | 
| 54 | 
            +
            Shpitser and Pearl, 2009]. If the causal effects are not iden-
         | 
| 55 | 
            +
            tifiable, the informative bounds are given by Li and Pearl
         | 
| 56 | 
            +
            using non-linear programming [Li and Pearl, 2022c]. Then,
         | 
| 57 | 
            +
            Tian and Pearl proposed the identification conditions of
         | 
| 58 | 
            +
            the binary probabilities of causation (i.e., monotonicity)
         | 
| 59 | 
            +
            [Tian and Pearl, 2000]. If the probabilities of causation are
         | 
| 60 | 
            +
            not identifiable, Tian and Pearl [Tian and Pearl, 2000] also
         | 
| 61 | 
            +
            have informative tight bounds for them using Balke’s Linear
         | 
| 62 | 
            +
            programming [Balke and Pearl, 1997]. Mueller, Li, and Pearl
         | 
| 63 | 
            +
            [Mueller et al., 2021], as well as Dawid [Dawid et al., 2017],
         | 
| 64 | 
            +
            increased those bounds using additional covariate informa-
         | 
| 65 | 
            +
            tion and the corresponding causal structure. Recently, Li and
         | 
| 66 | 
            +
            Pearl also proposed the theoretical work for non-binary prob-
         | 
| 67 | 
            +
            abilities of causation [Li and Pearl, 2022a].
         | 
| 68 | 
            +
            In real-world applications, decision-makers are more likely
         | 
| 69 | 
            +
            to have identifiable cases (i.e., the causal quantities have point
         | 
| 70 | 
            +
            estimations) because the bounds under unidentifiable cases
         | 
| 71 | 
            +
            may be less informative (e.g., 0.1 ≤ PNS ≤ 0.9). Besides,
         | 
| 72 | 
            +
            estimating the bounds often requires a combination of exper-
         | 
| 73 | 
            +
            imental and observational data. So we wonder if something
         | 
| 74 | 
            +
            is sitting between the identifiable and the bounds. Inspired by
         | 
| 75 | 
            +
            the idea of the confidence interval, in this paper, we proposed
         | 
| 76 | 
            +
            the definition of ǫ-identifiability, in which more conditions
         | 
| 77 | 
            +
            of ǫ-identifiability can be found while the estimations of the
         | 
| 78 | 
            +
            causal quantities are still near point estimations.
         | 
| 79 | 
            +
            2
         | 
| 80 | 
            +
            Preliminaries
         | 
| 81 | 
            +
            Here, we review the definition of PNS, PS, and PN de-
         | 
| 82 | 
            +
            fined by Pearl [Pearl, 1999], as well as the definition of
         | 
| 83 | 
            +
            identifiable and the conditions for identifying PNS, PS, and
         | 
| 84 | 
            +
            PN [Tian and Pearl, 2000].
         | 
| 85 | 
            +
            Besides, we review the tight
         | 
| 86 | 
            +
            bounds of PNS, PS, and PN when they are unidentifiable
         | 
| 87 | 
            +
            [Tian and Pearl, 2000]. Readers who are familiar with the
         | 
| 88 | 
            +
            above knowledge may skip this section.
         | 
| 89 | 
            +
            Similarly to any works mentioned above,
         | 
| 90 | 
            +
            we used
         | 
| 91 | 
            +
            the causal language of the SCM [Galles and Pearl, 1998;
         | 
| 92 | 
            +
            Halpern, 2000].
         | 
| 93 | 
            +
            The introductory counterfactual sentence
         | 
| 94 | 
            +
            “Variable Y would have the value y, had X been x” in this
         | 
| 95 | 
            +
            language is denoted by Yx = y, and shorted as yx. We have
         | 
| 96 | 
            +
            two types of data: experimental data, which is in the form
         | 
| 97 | 
            +
            of causal effects (denoted as P(yx)), and observational data,
         | 
| 98 | 
            +
            which is in the form of a joint probability function (denoted
         | 
| 99 | 
            +
            as P(x, y)).
         | 
| 100 | 
            +
             | 
| 101 | 
            +
            First, the definition of identifiable for any causal quantities
         | 
| 102 | 
            +
            defined using SCM is as follows:
         | 
| 103 | 
            +
            Definition 1 (Identifiability). Let Q(M) be any computable
         | 
| 104 | 
            +
            quantity of a class of SCM M that is compatible with graph
         | 
| 105 | 
            +
            G. We say that Q is identifiable in M if, for any pairs of
         | 
| 106 | 
            +
            models M1 and M2 from M, Q(M1) = Q(M2) whenever
         | 
| 107 | 
            +
            PM1(v) = PM2(v), where P(v) is the statistical data over
         | 
| 108 | 
            +
            the set V of observed variables. If our observations are lim-
         | 
| 109 | 
            +
            ited and permit only a partial set FM of features (of PM(v))
         | 
| 110 | 
            +
            to be estimated, we define Q to be identifiable from FM if
         | 
| 111 | 
            +
            Q(M1) = Q(M2) whenever FM1 = FM2. [Pearl, 2009]
         | 
| 112 | 
            +
            Second, the definitions of three binary probabilities of cau-
         | 
| 113 | 
            +
            sation defined using SCM are as follow [Pearl, 1999]:
         | 
| 114 | 
            +
            Definition 2 (Probability of necessity (PN)). Let X and Y
         | 
| 115 | 
            +
            be two binary variables in a causal model M, let x and y
         | 
| 116 | 
            +
            stand for the propositions X = true and Y = true, respec-
         | 
| 117 | 
            +
            tively, and x′ and y′ for their complements. The probability
         | 
| 118 | 
            +
            of necessity is defined as the expression
         | 
| 119 | 
            +
            PN
         | 
| 120 | 
            +
            =
         | 
| 121 | 
            +
            ∆
         | 
| 122 | 
            +
            P(Yx′ = false|X = true, Y = true)
         | 
| 123 | 
            +
            =
         | 
| 124 | 
            +
            ∆
         | 
| 125 | 
            +
            P(y′
         | 
| 126 | 
            +
            x′|x, y)
         | 
| 127 | 
            +
            Definition 3 (Probability of sufficiency (PS)). Let X and Y
         | 
| 128 | 
            +
            be two binary variables in a causal model M, let x and y
         | 
| 129 | 
            +
            stand for the propositions X = true and Y = true, respec-
         | 
| 130 | 
            +
            tively, and x′ and y′ for their complements. The probability
         | 
| 131 | 
            +
            of sufficiency is defined as the expression
         | 
| 132 | 
            +
            PS =
         | 
| 133 | 
            +
            ∆ P(yx|y′, x′)
         | 
| 134 | 
            +
            Definition 4 (Probability of necessity and sufficiency (PNS)).
         | 
| 135 | 
            +
            Let X and Y be two binary variables in a causal model M, let
         | 
| 136 | 
            +
            x and y stand for the propositions X = true and Y = true,
         | 
| 137 | 
            +
            respectively, and x′ and y′ for their complements. The proba-
         | 
| 138 | 
            +
            bility of necessity and sufficiency is defined as the expression
         | 
| 139 | 
            +
            PNS =
         | 
| 140 | 
            +
            ∆ P(yx, y′
         | 
| 141 | 
            +
            x′)
         | 
| 142 | 
            +
            Third, we review the identification conditions for causal
         | 
| 143 | 
            +
            effects [Pearl, 1993; Pearl, 1995].
         | 
| 144 | 
            +
            Definition 5 (Back-door criterion). Given an ordered pair of
         | 
| 145 | 
            +
            variables (X, Y ) in a directed acyclic graph G, a set of vari-
         | 
| 146 | 
            +
            ables Z satisfies the back-door criterion relative to (X, Y ), if
         | 
| 147 | 
            +
            no node in Z is a descendant of X, and Z blocks every path
         | 
| 148 | 
            +
            between X and Y that contains an arrow into X.
         | 
| 149 | 
            +
            If a set of variables Z satisfies the back-door criterion for
         | 
| 150 | 
            +
            X and Y , the causal effects of X on Y are identifiable and
         | 
| 151 | 
            +
            given by the adjustment formula:
         | 
| 152 | 
            +
            P(yx) =
         | 
| 153 | 
            +
            �
         | 
| 154 | 
            +
            z
         | 
| 155 | 
            +
            P(y|x, z)P(z).
         | 
| 156 | 
            +
            (1)
         | 
| 157 | 
            +
            Definition 6 (Front-door criterion). A set of variables Z is
         | 
| 158 | 
            +
            said to satisfy the front-door criterion relative to an ordered
         | 
| 159 | 
            +
            pair of variables (X, Y ) if:
         | 
| 160 | 
            +
            • Z intercepts all directed paths from X to Y ;
         | 
| 161 | 
            +
            • there is no back-door path from X to Z; and
         | 
| 162 | 
            +
            • all back-door paths from Z to Y are blocked by X.
         | 
| 163 | 
            +
            If a set of variables Z satisfies the front-door criterion for
         | 
| 164 | 
            +
            X and Y , and P(x, Z) > 0, then the causal effects of X on
         | 
| 165 | 
            +
            Y are identifiable and given by the adjustment formula:
         | 
| 166 | 
            +
            P(yx) =
         | 
| 167 | 
            +
            �
         | 
| 168 | 
            +
            z
         | 
| 169 | 
            +
            P(z|x)
         | 
| 170 | 
            +
            �
         | 
| 171 | 
            +
            x′
         | 
| 172 | 
            +
            P(y|x′, z)P(x′).
         | 
| 173 | 
            +
            If causal effects are not identifiable, Tian and Pearl
         | 
| 174 | 
            +
            [Tian and Pearl, 2000] provided the following bounds for the
         | 
| 175 | 
            +
            causal effects.
         | 
| 176 | 
            +
            P(x, y) ≤ P(yx) ≤ 1 − P(x, y′).
         | 
| 177 | 
            +
            (2)
         | 
| 178 | 
            +
            Finally, we review the identification conditions for PNS,
         | 
| 179 | 
            +
            PS, and PN [Tian and Pearl, 2000].
         | 
| 180 | 
            +
            Definition 7. (Monotonicity) A Variable Y is said to be mono-
         | 
| 181 | 
            +
            tonic relative to variable X in a causal model M iff
         | 
| 182 | 
            +
            y′
         | 
| 183 | 
            +
            x ∧ yx′ = false.
         | 
| 184 | 
            +
            Theorem 8. If Y is monotonic relative to X, then PNS, PN,
         | 
| 185 | 
            +
            and PS are all identifiable, and
         | 
| 186 | 
            +
            PNS = P(yx) − P(yx′),
         | 
| 187 | 
            +
            PN = P(y) − P(yx′)
         | 
| 188 | 
            +
            P(x, y)
         | 
| 189 | 
            +
            ,
         | 
| 190 | 
            +
            PS = P(yx) − P(y)
         | 
| 191 | 
            +
            P(x′, y′)
         | 
| 192 | 
            +
            .
         | 
| 193 | 
            +
            If PNS, PN, and PS are not identifiable, informative bounds
         | 
| 194 | 
            +
            are given by Tian and Pearl [Tian and Pearl, 2000].
         | 
| 195 | 
            +
            max
         | 
| 196 | 
            +
            
         | 
| 197 | 
            +
            
         | 
| 198 | 
            +
            
         | 
| 199 | 
            +
            
         | 
| 200 | 
            +
            
         | 
| 201 | 
            +
            0,
         | 
| 202 | 
            +
            P(yx) − P(yx′),
         | 
| 203 | 
            +
            P(y) − P(yx′),
         | 
| 204 | 
            +
            P(yx) − P(y)
         | 
| 205 | 
            +
            
         | 
| 206 | 
            +
            
         | 
| 207 | 
            +
            
         | 
| 208 | 
            +
            
         | 
| 209 | 
            +
            
         | 
| 210 | 
            +
            ≤ PNS
         | 
| 211 | 
            +
            (3)
         | 
| 212 | 
            +
            min
         | 
| 213 | 
            +
            
         | 
| 214 | 
            +
            
         | 
| 215 | 
            +
            
         | 
| 216 | 
            +
            
         | 
| 217 | 
            +
            
         | 
| 218 | 
            +
            
         | 
| 219 | 
            +
            
         | 
| 220 | 
            +
            
         | 
| 221 | 
            +
            
         | 
| 222 | 
            +
            P(yx),
         | 
| 223 | 
            +
            P(y′
         | 
| 224 | 
            +
            x′),
         | 
| 225 | 
            +
            P(x, y) + P(x′, y′),
         | 
| 226 | 
            +
            P(yx) − P(yx′)+
         | 
| 227 | 
            +
            P(x, y′) + P(x′, y)
         | 
| 228 | 
            +
            
         | 
| 229 | 
            +
            
         | 
| 230 | 
            +
            
         | 
| 231 | 
            +
            
         | 
| 232 | 
            +
            
         | 
| 233 | 
            +
            
         | 
| 234 | 
            +
            
         | 
| 235 | 
            +
            
         | 
| 236 | 
            +
            
         | 
| 237 | 
            +
            ≥ PNS
         | 
| 238 | 
            +
            (4)
         | 
| 239 | 
            +
            max
         | 
| 240 | 
            +
            �
         | 
| 241 | 
            +
            0,
         | 
| 242 | 
            +
            P (y)−P (yx′)
         | 
| 243 | 
            +
            P (x,y)
         | 
| 244 | 
            +
            �
         | 
| 245 | 
            +
            ≤ PN
         | 
| 246 | 
            +
            (5)
         | 
| 247 | 
            +
            min
         | 
| 248 | 
            +
            �
         | 
| 249 | 
            +
            1,
         | 
| 250 | 
            +
            P (y′
         | 
| 251 | 
            +
            x′)−P (x′,y′)
         | 
| 252 | 
            +
            P (x,y)
         | 
| 253 | 
            +
            �
         | 
| 254 | 
            +
            ≥ PN
         | 
| 255 | 
            +
            (6)
         | 
| 256 | 
            +
            max
         | 
| 257 | 
            +
            �
         | 
| 258 | 
            +
            0,
         | 
| 259 | 
            +
            P (y′)−P (y′
         | 
| 260 | 
            +
            x)
         | 
| 261 | 
            +
            P (x′,y′)
         | 
| 262 | 
            +
            �
         | 
| 263 | 
            +
            ≤ PS
         | 
| 264 | 
            +
            (7)
         | 
| 265 | 
            +
            min
         | 
| 266 | 
            +
            �
         | 
| 267 | 
            +
            1,
         | 
| 268 | 
            +
            P (yx)−P (x,y)
         | 
| 269 | 
            +
            P (x′,y′)
         | 
| 270 | 
            +
            �
         | 
| 271 | 
            +
            ≥ PS
         | 
| 272 | 
            +
            (8)
         | 
| 273 | 
            +
            The identification conditions mentioned above (i.e., back-
         | 
| 274 | 
            +
            door and front-door criteria and monotonicity) are robust.
         | 
| 275 | 
            +
            However, it may still be hard to achieve in real-world appli-
         | 
| 276 | 
            +
            cations. In this work, we extend the definition of identifia-
         | 
| 277 | 
            +
            bility, in which a sufficiently small interval is allowed. By
         | 
| 278 | 
            +
            the new definition, the estimates of causal quantities are still
         | 
| 279 | 
            +
            near point estimations, and more conditions for identifiability
         | 
| 280 | 
            +
            could be discovered. If nothing is specified, the discussion
         | 
| 281 | 
            +
            in this paper will be restricted to binary treatment and effect
         | 
| 282 | 
            +
            (i.e., X and Y are binary).
         | 
| 283 | 
            +
             | 
| 284 | 
            +
            3
         | 
| 285 | 
            +
            Main Results
         | 
| 286 | 
            +
            First, we extend the definition of identifiability, which we call
         | 
| 287 | 
            +
            ǫ-identifiability.
         | 
| 288 | 
            +
            Definition 9 (ǫ-Identifiability). Let Q(M) be any computable
         | 
| 289 | 
            +
            quantity of a class of SCM M that is compatible with graph
         | 
| 290 | 
            +
            G. We say that Q is ǫ-identifiable in M (and ǫ-identified to
         | 
| 291 | 
            +
            q) if, there exists q s.t. for any model m from M, Q(m) ∈
         | 
| 292 | 
            +
            [q − ǫ, q + ǫ] with statistical data PM(v), where P(v) is the
         | 
| 293 | 
            +
            statistical data over the set V of observed variables. If our
         | 
| 294 | 
            +
            observations are limited and permit only a partial set FM
         | 
| 295 | 
            +
            of features (of PM(v)) to be estimated, we define Q to be ǫ-
         | 
| 296 | 
            +
            identifiable from FM if Q(m) ∈ [q − ǫ, q + ǫ] with statistical
         | 
| 297 | 
            +
            data FM.
         | 
| 298 | 
            +
            With the above definition, the causal quantity is at a max-
         | 
| 299 | 
            +
            imum distance of ǫ from its true value. We will use the in-
         | 
| 300 | 
            +
            fix operator symbol ≈ǫ to represent its left-hand side being
         | 
| 301 | 
            +
            within ǫ of its right-hand side:
         | 
| 302 | 
            +
            r ≈ǫ q ⇐⇒ r ∈ [q − ǫ, q + ǫ].
         | 
| 303 | 
            +
            (9)
         | 
| 304 | 
            +
            The
         | 
| 305 | 
            +
            following
         | 
| 306 | 
            +
            sections
         | 
| 307 | 
            +
            explicate
         | 
| 308 | 
            +
            conditions
         | 
| 309 | 
            +
            for
         | 
| 310 | 
            +
            ǫ-
         | 
| 311 | 
            +
            identifiability of causal effects, PNS, PS, and PN.
         | 
| 312 | 
            +
            3.1
         | 
| 313 | 
            +
            ǫ-Identifiability of Causal Effects
         | 
| 314 | 
            +
            The causal effect P(YX) can be ǫ-identified with information
         | 
| 315 | 
            +
            about the observational joint distribution P(X, Y ). This can
         | 
| 316 | 
            +
            be seen by rewriting Equation (2) as:
         | 
| 317 | 
            +
            P(x, y) ⩽ P(yx) ⩽ P(x, y) + P(x′).
         | 
| 318 | 
            +
            (10)
         | 
| 319 | 
            +
            Here, P(yx) is ǫ-identified to P(x, y) + ǫ when P(x′) ⩽ 2ǫ.
         | 
| 320 | 
            +
            This ǫ-identification indicates a lower bound of P(x, y) and
         | 
| 321 | 
            +
            an upper bound of P(x, y) + 2ǫ. Since P(x′) ⩽ 2ǫ, these
         | 
| 322 | 
            +
            bounds are equivalent to (10). Notably, only P(x, y) and an
         | 
| 323 | 
            +
            upper bound on P(x′) are necessary to ǫ-identify P(yx). This
         | 
| 324 | 
            +
            is generalized in Theorem 10, without any assumptions of the
         | 
| 325 | 
            +
            causal structure.
         | 
| 326 | 
            +
            Theorem 10. The causal effect P(YX) is ǫ-identified as fol-
         | 
| 327 | 
            +
            lows:
         | 
| 328 | 
            +
            P(yx) ≈ǫ P(x, y) + ǫ
         | 
| 329 | 
            +
            if P(x′) ⩽ 2ǫ,
         | 
| 330 | 
            +
            (11)
         | 
| 331 | 
            +
            P(y′
         | 
| 332 | 
            +
            x) ≈ǫ P(x, y′) + ǫ
         | 
| 333 | 
            +
            if P(x′) ⩽ 2ǫ,
         | 
| 334 | 
            +
            (12)
         | 
| 335 | 
            +
            P(yx′) ≈ǫ P(x′, y) + ǫ
         | 
| 336 | 
            +
            if P(x) ⩽ 2ǫ,
         | 
| 337 | 
            +
            (13)
         | 
| 338 | 
            +
            P(y′
         | 
| 339 | 
            +
            x′) ≈ǫ P(x′, y′) + ǫ
         | 
| 340 | 
            +
            if P(x) ⩽ 2ǫ.
         | 
| 341 | 
            +
            (14)
         | 
| 342 | 
            +
            Proof. See Appendix 8.1.
         | 
| 343 | 
            +
            When the complete distribution P(X, Y ) is known, The-
         | 
| 344 | 
            +
            orem 10 provides no extra precision over Equation (10). Its
         | 
| 345 | 
            +
            power comes from when only part of the distribution is known
         | 
| 346 | 
            +
            and only an upper bound on P(X) is available or able to be
         | 
| 347 | 
            +
            assumed.
         | 
| 348 | 
            +
            Knowledge of a causal structure can aid ǫ-identification. In
         | 
| 349 | 
            +
            Figure 1, there is a binary confounder U. If the full joint dis-
         | 
| 350 | 
            +
            tribution P(X, Y, U) was available, the causal effect P(YX)
         | 
| 351 | 
            +
            could be computed simply through the backdoor adjustment
         | 
| 352 | 
            +
            formula. In the absence of the full joint distribution, Theo-
         | 
| 353 | 
            +
            rem 11 allows ǫ-identification of P(yx) with only knowledge
         | 
| 354 | 
            +
            of P(x) and the conditional probability P(y|x) as well as an
         | 
| 355 | 
            +
            upper bound on P(u).
         | 
| 356 | 
            +
            U
         | 
| 357 | 
            +
            X
         | 
| 358 | 
            +
            Y
         | 
| 359 | 
            +
            Figure 1: The causal graph, where X is a binary treatment, Y is a
         | 
| 360 | 
            +
            binary effect, and U is a binary confounder.
         | 
| 361 | 
            +
            Theorem 11. Given the causal graph in Figure 1 and
         | 
| 362 | 
            +
            P(u) ≤ P(x) − c for some constant c, where 0 < c ⩽ P(x),
         | 
| 363 | 
            +
            P(yx) ≈ǫ P(y|x) +
         | 
| 364 | 
            +
            P(x) − c
         | 
| 365 | 
            +
            2cP(x) + P(x) + c · ǫ
         | 
| 366 | 
            +
            if P(u) ≤
         | 
| 367 | 
            +
            2cP(x)
         | 
| 368 | 
            +
            2cP(x) + P(x) + c · ǫ.
         | 
| 369 | 
            +
            (15)
         | 
| 370 | 
            +
            Specifically, if P(x) ≥ 0.5, then the causal effect P(yx) is
         | 
| 371 | 
            +
            ǫ-identified to P(y|x) +
         | 
| 372 | 
            +
            ǫ
         | 
| 373 | 
            +
            13 if P(u) <
         | 
| 374 | 
            +
            4
         | 
| 375 | 
            +
            13ǫ.
         | 
| 376 | 
            +
            Proof. See Appendix 8.2.
         | 
| 377 | 
            +
            Note that x ∈ {x, x′}, y ∈ {y, y′}, and u ∈ {u, u′} in
         | 
| 378 | 
            +
            Theorem 11. The constant c should be maximized satisfying
         | 
| 379 | 
            +
            both c ⩽ P(x) − P(u) and the condition in Equation (15) for
         | 
| 380 | 
            +
            a given ǫ. The larger c is, the closer P(yx) is ǫ-identified to
         | 
| 381 | 
            +
            P(y|x). This needs to be balanced with minimizing ǫ.
         | 
| 382 | 
            +
            As an example, if P(x) ≥ 0.5 and P(u) ⩽ 0.1, then the
         | 
| 383 | 
            +
            causal effect P(yx) is ǫ-identified to P(y|x) +
         | 
| 384 | 
            +
            ǫ
         | 
| 385 | 
            +
            13 if P(u) ⩽
         | 
| 386 | 
            +
            4
         | 
| 387 | 
            +
            13ǫ.
         | 
| 388 | 
            +
            Essentially, P(yx) is ǫ-identified to P(y|x) plus some frac-
         | 
| 389 | 
            +
            tion of ǫ when P(u) is sufficiently small.
         | 
| 390 | 
            +
            Therefore, the
         | 
| 391 | 
            +
            causal effect P(yx) is near P(y|x) if P(U) is specific (i.e.,
         | 
| 392 | 
            +
            P(u) or P(u′) is minimal). In this case, Theorem 11 can be
         | 
| 393 | 
            +
            advantageous over the backdoor adjustment formula to com-
         | 
| 394 | 
            +
            pute P(yx), even when data on X, Y , and U are available,
         | 
| 395 | 
            +
            because P(Y |X, U), required for the adjustment formula, is
         | 
| 396 | 
            +
            impractical to estimate with P(U) close to 0.
         | 
| 397 | 
            +
            3.2
         | 
| 398 | 
            +
            ǫ-Identifiability of PNS
         | 
| 399 | 
            +
            Even though Tian and Pearl derived tight bounds on PNS
         | 
| 400 | 
            +
            [Tian and Pearl, 2000], the PNS can be potentially further
         | 
| 401 | 
            +
            narrowed when taking into account particular upper bound
         | 
| 402 | 
            +
            assumptions on causal effects or observational probabilities.
         | 
| 403 | 
            +
            This can be seen by analyzing the bounds of PNS in Equa-
         | 
| 404 | 
            +
            tions (3) and (4). Picking any of the arguments to the max
         | 
| 405 | 
            +
            function of the lower bound and any of the arguments to the
         | 
| 406 | 
            +
            min function of the upper bound, we can make a condition
         | 
| 407 | 
            +
            that the range of those two values is less than 2ǫ. For ex-
         | 
| 408 | 
            +
            ample, let us pick the second argument of the max function,
         | 
| 409 | 
            +
            P(yx) − P(yx′), and the first argument of the min function,
         | 
| 410 | 
            +
            P(yx):
         | 
| 411 | 
            +
            P(yx) − [P(yx) − P(yx′)] ⩽ 2ǫ,
         | 
| 412 | 
            +
            P(yx′) ⩽ 2ǫ.
         | 
| 413 | 
            +
            (16)
         | 
| 414 | 
            +
            Equation (16) is the assumption and the PNS is the
         | 
| 415 | 
            +
            ǫ-identified to ǫ above the lower bound or ǫ below the upper
         | 
| 416 | 
            +
            bound:
         | 
| 417 | 
            +
            PNS ≈ǫ P(yx) − P(yx′) + ǫ, or
         | 
| 418 | 
            +
            (17)
         | 
| 419 | 
            +
            PNS ≈ǫ P(yx) − ǫ.
         | 
| 420 | 
            +
            (18)
         | 
| 421 | 
            +
             | 
| 422 | 
            +
            Since it is assumed that P(yx′) ⩽ 2ǫ, Equation (17) is equiv-
         | 
| 423 | 
            +
            alent to Equation (18). The complete set of ǫ-identifications
         | 
| 424 | 
            +
            and associated conditions are stated in Theorem 12.
         | 
| 425 | 
            +
            Theorem 12. The PNS is ǫ-identified as follows:
         | 
| 426 | 
            +
            PNS ≈ǫ ǫ
         | 
| 427 | 
            +
            if P(yx) ⩽ 2ǫ,
         | 
| 428 | 
            +
            (19)
         | 
| 429 | 
            +
            PNS ≈ǫ ǫ
         | 
| 430 | 
            +
            if P(y′
         | 
| 431 | 
            +
            x′) ⩽ 2ǫ,
         | 
| 432 | 
            +
            (20)
         | 
| 433 | 
            +
            PNS ≈ǫ ǫ
         | 
| 434 | 
            +
            if P(x, y) + P(x′, y′) ⩽ 2ǫ,
         | 
| 435 | 
            +
            (21)
         | 
| 436 | 
            +
            PNS ≈ǫ ǫ
         | 
| 437 | 
            +
            if P(yx) − P(yx′)+
         | 
| 438 | 
            +
            P(x, y′) + P(x′, y) ⩽ 2ǫ,
         | 
| 439 | 
            +
            (22)
         | 
| 440 | 
            +
            PNS ≈ǫ P(yx) − ǫ
         | 
| 441 | 
            +
            if P(yx′) ⩽ 2ǫ,
         | 
| 442 | 
            +
            (23)
         | 
| 443 | 
            +
            PNS ≈ǫ P(y′
         | 
| 444 | 
            +
            x′) − ǫ
         | 
| 445 | 
            +
            if P(y′
         | 
| 446 | 
            +
            x) ⩽ 2ǫ,
         | 
| 447 | 
            +
            (24)
         | 
| 448 | 
            +
            PNS ≈ǫ P(yx)−
         | 
| 449 | 
            +
            P(yx′) + ǫ
         | 
| 450 | 
            +
            if P(x, y′) + P(x′, y) ⩽ 2ǫ,
         | 
| 451 | 
            +
            (25)
         | 
| 452 | 
            +
            PNS ≈ǫ P(yx)−
         | 
| 453 | 
            +
            P(yx′) + ǫ
         | 
| 454 | 
            +
            if P(yx′) − P(yx)+
         | 
| 455 | 
            +
            P(x, y) + P(x′, y′) ⩽ 2ǫ,
         | 
| 456 | 
            +
            (26)
         | 
| 457 | 
            +
            PNS ≈ǫ P(x, y)−
         | 
| 458 | 
            +
            P(x′, y′) − ǫ
         | 
| 459 | 
            +
            if P(yx′) − P(yx)+
         | 
| 460 | 
            +
            P(x, y) + P(x′, y′) ⩽ 2ǫ,
         | 
| 461 | 
            +
            (27)
         | 
| 462 | 
            +
            PNS ≈ǫ P(y′
         | 
| 463 | 
            +
            x′) − ǫ
         | 
| 464 | 
            +
            if P(y′) ⩽ 2ǫ,
         | 
| 465 | 
            +
            (28)
         | 
| 466 | 
            +
            PNS ≈ǫ P(yx) − ǫ
         | 
| 467 | 
            +
            if P(yx) + P(yx′)−
         | 
| 468 | 
            +
            P(y) ⩽ 2ǫ,
         | 
| 469 | 
            +
            (29)
         | 
| 470 | 
            +
            PNS ≈ǫ P(y) − P(yx′) + ǫ
         | 
| 471 | 
            +
            if P(yx) + P(yx′)−
         | 
| 472 | 
            +
            P(y) ⩽ 2ǫ,
         | 
| 473 | 
            +
            (30)
         | 
| 474 | 
            +
            PNS ≈ǫ P(x, y)+
         | 
| 475 | 
            +
            P(x′, y′) − ǫ
         | 
| 476 | 
            +
            if P(x′, y′) + P(yx′)−
         | 
| 477 | 
            +
            P(x′, y) ⩽ 2ǫ,
         | 
| 478 | 
            +
            (31)
         | 
| 479 | 
            +
            PNS ≈ǫ P(y) − P(yx′) + ǫ
         | 
| 480 | 
            +
            if P(x′, y′) + P(yx′)−
         | 
| 481 | 
            +
            P(x′, y) ⩽ 2ǫ,
         | 
| 482 | 
            +
            (32)
         | 
| 483 | 
            +
            PNS ≈ǫ P(y) − P(yx′) + ǫ
         | 
| 484 | 
            +
            if P(x′, y) + P(y′
         | 
| 485 | 
            +
            x′)−
         | 
| 486 | 
            +
            P(x′, y′) ⩽ 2ǫ,
         | 
| 487 | 
            +
            (33)
         | 
| 488 | 
            +
            PNS ≈ǫ P(yx) − ǫ
         | 
| 489 | 
            +
            if P(y) ⩽ 2ǫ,
         | 
| 490 | 
            +
            (34)
         | 
| 491 | 
            +
            PNS ≈ǫ P(y′
         | 
| 492 | 
            +
            x′) − ǫ
         | 
| 493 | 
            +
            if P(y′
         | 
| 494 | 
            +
            x′) − P(yx)+
         | 
| 495 | 
            +
            P(y) ⩽ 2ǫ,
         | 
| 496 | 
            +
            (35)
         | 
| 497 | 
            +
            PNS ≈ǫ P(y) − P(yx′) + ǫ
         | 
| 498 | 
            +
            if P(y′
         | 
| 499 | 
            +
            x′) − P(yx)+
         | 
| 500 | 
            +
            P(y) ⩽ 2ǫ,
         | 
| 501 | 
            +
            (36)
         | 
| 502 | 
            +
            PNS ≈ǫ P(x, y)+
         | 
| 503 | 
            +
            P(x′, y′) − ǫ
         | 
| 504 | 
            +
            if P(x, y) + P(y′
         | 
| 505 | 
            +
            x)−
         | 
| 506 | 
            +
            P(x, y′) ⩽ 2ǫ,
         | 
| 507 | 
            +
            (37)
         | 
| 508 | 
            +
            PNS ≈ǫ P(yx) − P(y) + ǫ
         | 
| 509 | 
            +
            if P(x, y) + P(y′
         | 
| 510 | 
            +
            x)−
         | 
| 511 | 
            +
            P(x, y′) ⩽ 2ǫ,
         | 
| 512 | 
            +
            (38)
         | 
| 513 | 
            +
            PNS ≈ǫ P(yx) − P(y) + ǫ
         | 
| 514 | 
            +
            if P(x′, y) + P(y′
         | 
| 515 | 
            +
            x′)−
         | 
| 516 | 
            +
            P(x′, y′) ⩽ 2ǫ.
         | 
| 517 | 
            +
            (39)
         | 
| 518 | 
            +
            Proof. See Appendix 8.3.
         | 
| 519 | 
            +
            Note that in the above theorem, eight conditions consist
         | 
| 520 | 
            +
            solely of experimental probabilities or solely of observational
         | 
| 521 | 
            +
            probabilities. This potentially eliminates the need for some
         | 
| 522 | 
            +
            types of studies, at least partially, even when estimating
         | 
| 523 | 
            +
            a counterfactual quantity such as PNS. For example, if a
         | 
| 524 | 
            +
            decision-maker knows that P(y) is large (P(y) ⩾ 0.95), they
         | 
| 525 | 
            +
            can immediately conclude PNS ≈0.05 P(y′
         | 
| 526 | 
            +
            x′) − 0.05 with-
         | 
| 527 | 
            +
            out knowing the specific value of P(y). Thus, only a control
         | 
| 528 | 
            +
            group study would be sufficient.
         | 
| 529 | 
            +
            3.3
         | 
| 530 | 
            +
            ǫ-Identifiability of PN and PS
         | 
| 531 | 
            +
            Tian and Pearl derived tight bounds on PN and PS in addi-
         | 
| 532 | 
            +
            tion to PNS. Similar to the derivation of Theorem 12, we can
         | 
| 533 | 
            +
            potentially narrow those bounds by taking into account upper
         | 
| 534 | 
            +
            bound assumptions on causal effects or observational proba-
         | 
| 535 | 
            +
            bilities. The set of ǫ-identifications and associated conditions
         | 
| 536 | 
            +
            are stated in Theorems 13 and 14.
         | 
| 537 | 
            +
            Theorem 13. The PN is ǫ-identified as follows:
         | 
| 538 | 
            +
            PN ≈ǫ ǫ
         | 
| 539 | 
            +
            if P(y′
         | 
| 540 | 
            +
            x′) − P(x′, y′)
         | 
| 541 | 
            +
            ⩽ 2ǫP(x, y),
         | 
| 542 | 
            +
            (40)
         | 
| 543 | 
            +
            PN ≈ǫ 1 − ǫ
         | 
| 544 | 
            +
            if P(yx′) − P(x′, y)
         | 
| 545 | 
            +
            ⩽ 2ǫP(x, y),
         | 
| 546 | 
            +
            (41)
         | 
| 547 | 
            +
            PN ≈ǫ
         | 
| 548 | 
            +
            P(y) − P(yx′)
         | 
| 549 | 
            +
            P(x, y)
         | 
| 550 | 
            +
            + ǫ
         | 
| 551 | 
            +
            if P(yx′) − P(x′, y)
         | 
| 552 | 
            +
            ⩽ 2ǫP(x, y),
         | 
| 553 | 
            +
            (42)
         | 
| 554 | 
            +
            PN ≈ǫ
         | 
| 555 | 
            +
            P(y′
         | 
| 556 | 
            +
            x′) − P(x′, y′)
         | 
| 557 | 
            +
            P(x, y)
         | 
| 558 | 
            +
            − ǫ
         | 
| 559 | 
            +
            if P(x, y′)
         | 
| 560 | 
            +
            ⩽ 2ǫP(x, y),
         | 
| 561 | 
            +
            (43)
         | 
| 562 | 
            +
            PN ≈ǫ
         | 
| 563 | 
            +
            P(y) − P(yx′)
         | 
| 564 | 
            +
            P(x, y)
         | 
| 565 | 
            +
            + ǫ
         | 
| 566 | 
            +
            if P(x, y′)
         | 
| 567 | 
            +
            ⩽ 2ǫP(x, y).
         | 
| 568 | 
            +
            (44)
         | 
| 569 | 
            +
            Proof. See Appendix 8.4.
         | 
| 570 | 
            +
             | 
| 571 | 
            +
            Table 1: Results of an observational study with 1500 individuals
         | 
| 572 | 
            +
            who have access to the medicine, where 1260 individuals chose to
         | 
| 573 | 
            +
            receive the medicine and 240 individuals chose not to.
         | 
| 574 | 
            +
            Take the medicine
         | 
| 575 | 
            +
            Take no medicine
         | 
| 576 | 
            +
            Recovered
         | 
| 577 | 
            +
            780
         | 
| 578 | 
            +
            210
         | 
| 579 | 
            +
            Not recovered
         | 
| 580 | 
            +
            480
         | 
| 581 | 
            +
            30
         | 
| 582 | 
            +
            Theorem 14. The PS is ǫ-identified as follows:
         | 
| 583 | 
            +
            PS ≈ǫ ǫ
         | 
| 584 | 
            +
            if P(yx) − P(x, y)
         | 
| 585 | 
            +
            ⩽ 2ǫP(x′, y′),
         | 
| 586 | 
            +
            (45)
         | 
| 587 | 
            +
            PS ≈ǫ 1 − ǫ
         | 
| 588 | 
            +
            if P(y′
         | 
| 589 | 
            +
            x) − P(x, y′)
         | 
| 590 | 
            +
            ⩽ 2ǫP(x′, y′),
         | 
| 591 | 
            +
            (46)
         | 
| 592 | 
            +
            PS ≈ǫ
         | 
| 593 | 
            +
            P(y′) − P(y′
         | 
| 594 | 
            +
            x)
         | 
| 595 | 
            +
            P(x′, y′)
         | 
| 596 | 
            +
            + ǫ
         | 
| 597 | 
            +
            if P(y′
         | 
| 598 | 
            +
            x) − P(x, y′)
         | 
| 599 | 
            +
            ⩽ 2ǫP(x′, y′),
         | 
| 600 | 
            +
            (47)
         | 
| 601 | 
            +
            PS ≈ǫ
         | 
| 602 | 
            +
            P(yx) − P(x, y)
         | 
| 603 | 
            +
            P(x′, y′)
         | 
| 604 | 
            +
            − ǫ
         | 
| 605 | 
            +
            if P(x′, y)
         | 
| 606 | 
            +
            ⩽ 2ǫP(x′, y′),
         | 
| 607 | 
            +
            (48)
         | 
| 608 | 
            +
            PS ≈ǫ
         | 
| 609 | 
            +
            P(y′) − P(y′
         | 
| 610 | 
            +
            x)
         | 
| 611 | 
            +
            P(x′, y′)
         | 
| 612 | 
            +
            + ǫ
         | 
| 613 | 
            +
            if P(x′, y)
         | 
| 614 | 
            +
            ⩽ 2ǫP(x′, y′).
         | 
| 615 | 
            +
            (49)
         | 
| 616 | 
            +
            Proof. See Appendix 8.5.
         | 
| 617 | 
            +
            4
         | 
| 618 | 
            +
            Examples
         | 
| 619 | 
            +
            Here, we illustrate how to apply ǫ-Identifiability in real appli-
         | 
| 620 | 
            +
            cations by two simulated examples.
         | 
| 621 | 
            +
            4.1
         | 
| 622 | 
            +
            Causal Effects of Medicine
         | 
| 623 | 
            +
            Consider a medicine manufacturer who wants to know the
         | 
| 624 | 
            +
            causal effect of a new medicine on a disease. They conducted
         | 
| 625 | 
            +
            an observational study where 1500 patients were given access
         | 
| 626 | 
            +
            to the medicine; the results of the study are summarized in Ta-
         | 
| 627 | 
            +
            ble 1. In addition, the expert from the medicine manufacturer
         | 
| 628 | 
            +
            acknowledged that family history is the only confounder of
         | 
| 629 | 
            +
            taking medicine and recovery, and the family history of the
         | 
| 630 | 
            +
            disease is extremely rare; only 1% of the people have the fam-
         | 
| 631 | 
            +
            ily history.
         | 
| 632 | 
            +
            Let X = x denote that a patient chose to take the medicine,
         | 
| 633 | 
            +
            and X = x′ denote that a patient chose not to take the
         | 
| 634 | 
            +
            medicine. Let Y = y denote that a patient recovered, and
         | 
| 635 | 
            +
            Y = y′ denote that a patient did not recover. Let U = u de-
         | 
| 636 | 
            +
            note that a patient has the family history, and U = u′ denote
         | 
| 637 | 
            +
            that a patient has no family history.
         | 
| 638 | 
            +
            To obtain the causal effect of the medicine (i.e., using ad-
         | 
| 639 | 
            +
            justment formula (1)), we have to know the observational data
         | 
| 640 | 
            +
            associated with family history, which is difficult to obtain.
         | 
| 641 | 
            +
            Fortunately, from Table 1, we obtain that P(x) = 0.84 and
         | 
| 642 | 
            +
            P(y|x) = 0.62. We also have the prior that P(u) = 0.01.
         | 
| 643 | 
            +
            Since 0.01 = P(u) ≤ P(x) − 0.8 (let c = 0.8) and
         | 
| 644 | 
            +
            0.01 = P(u) <
         | 
| 645 | 
            +
            2c∗0.025P (x)
         | 
| 646 | 
            +
            2cP (x)+P (x)+c = 0.0113, we can ap-
         | 
| 647 | 
            +
            ply Theorem 11 to obtain that P(yx) is 0.025-identified to
         | 
| 648 | 
            +
            P(y|x)+
         | 
| 649 | 
            +
            P (x)−c
         | 
| 650 | 
            +
            2cP (x)+P (x)+c0.025 = 0.62. This means the causal
         | 
| 651 | 
            +
            effect of the medicine is very close to 0.62 (i.e., 0.025 close),
         | 
| 652 | 
            +
            which can not be 0.025 far from 0.62. Then the medicine man-
         | 
| 653 | 
            +
            ufacturer can conclude that the causal effect of the medicine
         | 
| 654 | 
            +
            is roughly 0.62 without knowing the observational data asso-
         | 
| 655 | 
            +
            ciated with the family history.
         | 
| 656 | 
            +
            Or even simpler, note that P(x) = 0.84 > 0.5 and P(u) =
         | 
| 657 | 
            +
            0.01 < 0.1, P(u) = 0.01 <
         | 
| 658 | 
            +
            4
         | 
| 659 | 
            +
            13 ∗ 0.035 = 0.0108. We obtain
         | 
| 660 | 
            +
            that P(yx) is 0.035-identified to P(y|x) + 0.035
         | 
| 661 | 
            +
            13
         | 
| 662 | 
            +
            = 0.62. The
         | 
| 663 | 
            +
            decision-maker can make the same conclusion as above.
         | 
| 664 | 
            +
            4.2
         | 
| 665 | 
            +
            PNS of Flu Shot
         | 
| 666 | 
            +
            Consider a newly invented flu shot. After a vaccination com-
         | 
| 667 | 
            +
            pany introduced a new flu shot, the number of people infected
         | 
| 668 | 
            +
            by flu reached the lowest point in 20 years (i.e., less than 5%
         | 
| 669 | 
            +
            of people infected by flu). The government concluded that
         | 
| 670 | 
            +
            the new flu shot is the key to success. However, some anti-
         | 
| 671 | 
            +
            vaccination associations believe it is because people’s physi-
         | 
| 672 | 
            +
            cal quality increases yearly. Therefore, they all want to know
         | 
| 673 | 
            +
            how many percentages of people are uninfected because of
         | 
| 674 | 
            +
            the flu shot. The PNS of the flu shot (i.e., the percentage of
         | 
| 675 | 
            +
            individuals who would not infect by the flu if they had taken
         | 
| 676 | 
            +
            the flu shot and would infect otherwise) is indeed what they
         | 
| 677 | 
            +
            want.
         | 
| 678 | 
            +
            Let X = x denote that an individual has taken the flu shot
         | 
| 679 | 
            +
            and X = x′ denote that an individual has not taken the flu
         | 
| 680 | 
            +
            shot. Let Y = y denote an individual infected by the flu and
         | 
| 681 | 
            +
            Y = y′ denote an individual not infected by the flu.
         | 
| 682 | 
            +
            If they want to apply the bounds of PNS in Equations (3)
         | 
| 683 | 
            +
            and (4), they must conduct both experimental and observa-
         | 
| 684 | 
            +
            tional studies. However, note that P(y) < 0.05, one could
         | 
| 685 | 
            +
            apply Equation (34) in Theorem 12, which PNS is 0.025-
         | 
| 686 | 
            +
            identified to P(yx)− 0.025 (i.e., PNS is very close to P(yx)).
         | 
| 687 | 
            +
            Thus, according to [Li et al., 2022], only an experimental
         | 
| 688 | 
            +
            study for the treated group with a sample size of 385 is ad-
         | 
| 689 | 
            +
            equate for estimating PNS.
         | 
| 690 | 
            +
            5
         | 
| 691 | 
            +
            ǫ-Identifiability in Unit Selection Problem
         | 
| 692 | 
            +
            One utility of the causal quantities is the unit selection prob-
         | 
| 693 | 
            +
            lem [Li and Pearl, 2022b; Li and Pearl, 2019], in which Li
         | 
| 694 | 
            +
            and Pearl defined an objective causal function to select a set
         | 
| 695 | 
            +
            of individuals that have the desired mode of behavior.
         | 
| 696 | 
            +
            Let X denote the binary treatment and Y denote the bi-
         | 
| 697 | 
            +
            nary effect. According to Li and Pearl, individuals were di-
         | 
| 698 | 
            +
            vided into four response types: Complier (i.e., P(yx, y′
         | 
| 699 | 
            +
            x′)),
         | 
| 700 | 
            +
            always-taker (i.e., P(yx, yx′)), never-taker (i.e., P(y′
         | 
| 701 | 
            +
            x, y′
         | 
| 702 | 
            +
            x′)),
         | 
| 703 | 
            +
            and defier (i.e., P(y′
         | 
| 704 | 
            +
            x, yx′)). Suppose the payoff of selecting
         | 
| 705 | 
            +
            a complier, always-taker, never-taker, and defier is β, γ, θ, δ,
         | 
| 706 | 
            +
            respectively (i.e., benefit vector). The objective function (i.e.,
         | 
| 707 | 
            +
            benefit function) that optimizes the composition of the four
         | 
| 708 | 
            +
            types over the selected set of individuals c is as follows:
         | 
| 709 | 
            +
            f(c) = βP(yx, y′
         | 
| 710 | 
            +
            x′|c) + γP(yx, yx′|c) +
         | 
| 711 | 
            +
            θP(y′
         | 
| 712 | 
            +
            x, y′
         | 
| 713 | 
            +
            x′|c) + δP(y′
         | 
| 714 | 
            +
            x, yx′|c).
         | 
| 715 | 
            +
            Li and Pearl provided two types of identifiability condi-
         | 
| 716 | 
            +
            tions for the benefit function. One is about the response type
         | 
| 717 | 
            +
            such that there is no defier in the population (i.e., monotonic-
         | 
| 718 | 
            +
            ity). Another is about the benefits vector’s relations, such that
         | 
| 719 | 
            +
            β + δ = γ + θ (i.e., gain equality). These two conditions
         | 
| 720 | 
            +
             | 
| 721 | 
            +
            Table 2: Results of an experimental study with 1500 randomly se-
         | 
| 722 | 
            +
            lected customers were forced to apply the discount, and 1500 ran-
         | 
| 723 | 
            +
            domly selected customers were forced not to.
         | 
| 724 | 
            +
            Discount
         | 
| 725 | 
            +
            No discount
         | 
| 726 | 
            +
            Bought the purchase
         | 
| 727 | 
            +
            900
         | 
| 728 | 
            +
            750
         | 
| 729 | 
            +
            No purchase
         | 
| 730 | 
            +
            600
         | 
| 731 | 
            +
            750
         | 
| 732 | 
            +
            are helpful but still too specific and challenging to satisfy in
         | 
| 733 | 
            +
            real-world applications. If the benefit function is not identifi-
         | 
| 734 | 
            +
            able, it can be bounded using experimental and observational
         | 
| 735 | 
            +
            data. Here in this paper, we extend the gain equality to the
         | 
| 736 | 
            +
            ǫ-identifiability as stated in the following theorem.
         | 
| 737 | 
            +
            Theorem 15. Given a causal diagram G and distribution
         | 
| 738 | 
            +
            compatible with G, let C be a set of variables that does not
         | 
| 739 | 
            +
            contain any descendant of X in G, then the benefit function
         | 
| 740 | 
            +
            f(c) = βP(yx, y′
         | 
| 741 | 
            +
            x′|c) + γP(yx, yx′|c) + θP(y′
         | 
| 742 | 
            +
            x, y′
         | 
| 743 | 
            +
            x′|c) +
         | 
| 744 | 
            +
            δP(yx′, y′
         | 
| 745 | 
            +
            x|c) is |β−γ−θ+δ|
         | 
| 746 | 
            +
            2
         | 
| 747 | 
            +
            -identified to (γ − δ)P(yx|c) +
         | 
| 748 | 
            +
            δP(yx′|c) + θP(y′
         | 
| 749 | 
            +
            x′|c) + β−γ−θ+δ
         | 
| 750 | 
            +
            2
         | 
| 751 | 
            +
            .
         | 
| 752 | 
            +
            One critical use case of the above theorem is that decision-
         | 
| 753 | 
            +
            makers usually only care about the sign (gain or lose) of the
         | 
| 754 | 
            +
            benefit function. Decision-makers can apply the above theo-
         | 
| 755 | 
            +
            rem before conducting any observational study to see if the
         | 
| 756 | 
            +
            sign of the benefit function can be determined, as we will il-
         | 
| 757 | 
            +
            lustrate in the next section.
         | 
| 758 | 
            +
            5.1
         | 
| 759 | 
            +
            Example: Non-immediate Profit
         | 
| 760 | 
            +
            Consider the most common example in [Li and Pearl, 2019].
         | 
| 761 | 
            +
            A sale company proposed a discount on a purchase in
         | 
| 762 | 
            +
            order to increase the total non-immediate profit.
         | 
| 763 | 
            +
            The
         | 
| 764 | 
            +
            company assessed that the profit of offering the dis-
         | 
| 765 | 
            +
            count to complier, always-taker, never-taker, and defier is
         | 
| 766 | 
            +
            $100, −$60, $0, −$140, respectively. Let X = x denote that
         | 
| 767 | 
            +
            a customer applied the discount, and X = x denote that a
         | 
| 768 | 
            +
            customer did not apply the discount. Let Y = y denote that a
         | 
| 769 | 
            +
            customer bought the purchase and Y = y′ denote that a cus-
         | 
| 770 | 
            +
            tomer did not. The benefit function is then (here c denote all
         | 
| 771 | 
            +
            customers)
         | 
| 772 | 
            +
            f(c) = 100P(yx, y′
         | 
| 773 | 
            +
            x′|c) − 60P(yx, yx′|c) +
         | 
| 774 | 
            +
            0P(y′
         | 
| 775 | 
            +
            x, y′
         | 
| 776 | 
            +
            x′|c) − 140P(y′
         | 
| 777 | 
            +
            x, yx′|c).
         | 
| 778 | 
            +
            The company conducted an experimental study where 1500
         | 
| 779 | 
            +
            randomly selected customers were forced to apply the dis-
         | 
| 780 | 
            +
            count, and 1500 randomly selected customers were forced not
         | 
| 781 | 
            +
            to. The results are summarized in Table 2. The experimental
         | 
| 782 | 
            +
            data reads P(yx|c) = 0.6 and P(yx′|c) = 0.5.
         | 
| 783 | 
            +
            Before conducting any observational study, one can con-
         | 
| 784 | 
            +
            clude that the benefit function is 10-identified to −12 using
         | 
| 785 | 
            +
            Theorem 15. This result indicates that the benefit function is
         | 
| 786 | 
            +
            at most 10 away from −12; thus, the benefit function is nega-
         | 
| 787 | 
            +
            tive regardless of the observational data. The decision-maker
         | 
| 788 | 
            +
            then can easily conclude that the discount should not offer to
         | 
| 789 | 
            +
            the customers.
         | 
| 790 | 
            +
            6
         | 
| 791 | 
            +
            Discussion
         | 
| 792 | 
            +
            We have defined the ǫ-identifiability of causal quantities and
         | 
| 793 | 
            +
            provided a list of ǫ-identifiable conditions for causal effects,
         | 
| 794 | 
            +
            PNS, PN, and PS. We still have some further discussions
         | 
| 795 | 
            +
            about the topic.
         | 
| 796 | 
            +
            First, all conditions except Theorem 11 are conditions from
         | 
| 797 | 
            +
            observational or experimental data. In other words, if some of
         | 
| 798 | 
            +
            the observational or experimental distributions satisfied a par-
         | 
| 799 | 
            +
            ticular condition, then the causal quantities are ǫ-identifiable.
         | 
| 800 | 
            +
            These conditions are advantageous in real-world applications
         | 
| 801 | 
            +
            as no specific causal graph is needed.
         | 
| 802 | 
            +
            However, we still
         | 
| 803 | 
            +
            love to discover more graphical conditions of ǫ-identifiability,
         | 
| 804 | 
            +
            such as back-door or front-door criterion.
         | 
| 805 | 
            +
            Second, the bounds of PNS, PS, PN, and the benefit func-
         | 
| 806 | 
            +
            tion can be narrowed by covariates information with their
         | 
| 807 | 
            +
            causal structure [Dawid et al., 2017; Li and Pearl, 2022d;
         | 
| 808 | 
            +
            Mueller et al., 2021].
         | 
| 809 | 
            +
            The ǫ-identifiability can also be ex-
         | 
| 810 | 
            +
            tended if covariates information and their causal structure are
         | 
| 811 | 
            +
            available, which should be an exciting direction in the future.
         | 
| 812 | 
            +
            Third, monotonicity is defined using a causal quantity, and
         | 
| 813 | 
            +
            in the meantime, monotonicity is also an identifiable condi-
         | 
| 814 | 
            +
            tion for other causal quantities (e.g., PNS). Thus, another
         | 
| 815 | 
            +
            charming direction is how the ǫ-identifiability of monotonic-
         | 
| 816 | 
            +
            ity affects the ǫ-identifiability of other causal quantities.
         | 
| 817 | 
            +
            7
         | 
| 818 | 
            +
            Conclusion
         | 
| 819 | 
            +
            In this paper, we defined the ǫ-identifiability of causal quan-
         | 
| 820 | 
            +
            tities, which is easier to satisfy in real-world applications.
         | 
| 821 | 
            +
            We provided the ǫ-identifiability conditions for causal effects,
         | 
| 822 | 
            +
            PNS, PS, and PN. We further illustrated the use cases of the
         | 
| 823 | 
            +
            proposed conditions by simulated examples.
         | 
| 824 | 
            +
            References
         | 
| 825 | 
            +
            [Balke and Pearl, 1997] Alexander A Balke and Judea Pearl.
         | 
| 826 | 
            +
            Probabilistic counterfactuals:
         | 
| 827 | 
            +
            Semantics, computation,
         | 
| 828 | 
            +
            and applications. Technical report, UCLA Dept. of Com-
         | 
| 829 | 
            +
            puter Science, 1997.
         | 
| 830 | 
            +
            [Bareinboim and Pearl, 2012] E. Bareinboim and J. Pearl.
         | 
| 831 | 
            +
            Causal
         | 
| 832 | 
            +
            inference
         | 
| 833 | 
            +
            by
         | 
| 834 | 
            +
            surrogate
         | 
| 835 | 
            +
            experiments:
         | 
| 836 | 
            +
            z-
         | 
| 837 | 
            +
            identifiability.
         | 
| 838 | 
            +
            In Nando de Freitas and Kevin Murphy,
         | 
| 839 | 
            +
            editors, Proceedings of the Twenty-Eighth Conference
         | 
| 840 | 
            +
            on Uncertainty in Artificial Intelligence, pages 113–120,
         | 
| 841 | 
            +
            Corvallis, OR, 2012. AUAI Press.
         | 
| 842 | 
            +
            [Dawid et al., 2017] Philip Dawid,
         | 
| 843 | 
            +
            Monica Musio,
         | 
| 844 | 
            +
            and
         | 
| 845 | 
            +
            Rossella Murtas. The probability of causation. Law, Prob-
         | 
| 846 | 
            +
            ability and Risk, (16):163–179, 2017.
         | 
| 847 | 
            +
            [Galles and Pearl, 1998] David Galles and Judea Pearl. An
         | 
| 848 | 
            +
            axiomatic characterization of causal counterfactuals. Foun-
         | 
| 849 | 
            +
            dations of Science, 3(1):151–182, 1998.
         | 
| 850 | 
            +
            [Halpern, 2000] Joseph Y Halpern.
         | 
| 851 | 
            +
            Axiomatizing causal
         | 
| 852 | 
            +
            reasoning.
         | 
| 853 | 
            +
            Journal of Artificial Intelligence Research,
         | 
| 854 | 
            +
            12:317–337, 2000.
         | 
| 855 | 
            +
            [Li and Pearl, 2019] Ang Li and Judea Pearl.
         | 
| 856 | 
            +
            Unit selec-
         | 
| 857 | 
            +
            tion based on counterfactual logic.
         | 
| 858 | 
            +
            In Proceedings of
         | 
| 859 | 
            +
            the Twenty-Eighth International Joint Conference on Ar-
         | 
| 860 | 
            +
            tificial Intelligence, IJCAI-19, pages 1793–1799. Interna-
         | 
| 861 | 
            +
            tional Joint Conferences on Artificial Intelligence Organi-
         | 
| 862 | 
            +
            zation, 7 2019.
         | 
| 863 | 
            +
             | 
| 864 | 
            +
            [Li and Pearl, 2022a] A.
         | 
| 865 | 
            +
            Li
         | 
| 866 | 
            +
            and
         | 
| 867 | 
            +
            J.
         | 
| 868 | 
            +
            Pearl.
         | 
| 869 | 
            +
            Prob-
         | 
| 870 | 
            +
            abilities
         | 
| 871 | 
            +
            of
         | 
| 872 | 
            +
            causation
         | 
| 873 | 
            +
            with
         | 
| 874 | 
            +
            non-binary
         | 
| 875 | 
            +
            treat-
         | 
| 876 | 
            +
            ment
         | 
| 877 | 
            +
            and
         | 
| 878 | 
            +
            effect.
         | 
| 879 | 
            +
            Technical
         | 
| 880 | 
            +
            Report
         | 
| 881 | 
            +
            R-516,
         | 
| 882 | 
            +
            <http://ftp.cs.ucla.edu/pub/stat ser/r516.pdf>,
         | 
| 883 | 
            +
            De-
         | 
| 884 | 
            +
            partment of Computer Science, University of California,
         | 
| 885 | 
            +
            Los Angeles, CA, 2022.
         | 
| 886 | 
            +
            [Li and Pearl, 2022b] A. Li and J. Pearl.
         | 
| 887 | 
            +
            Unit selection
         | 
| 888 | 
            +
            with nonbinary treatment and effect.
         | 
| 889 | 
            +
            Technical Report
         | 
| 890 | 
            +
            R-517, <http://ftp.cs.ucla.edu/pub/stat ser/r517.pdf>, De-
         | 
| 891 | 
            +
            partment of Computer Science, University of California,
         | 
| 892 | 
            +
            Los Angeles, CA, 2022.
         | 
| 893 | 
            +
            [Li and Pearl, 2022c] Ang Li and Judea Pearl. Bounds on
         | 
| 894 | 
            +
            causal effects and application to high dimensional data. In
         | 
| 895 | 
            +
            Proceedings of the AAAI Conference on Artificial Intelli-
         | 
| 896 | 
            +
            gence, volume 36, pages 5773–5780, 2022.
         | 
| 897 | 
            +
            [Li and Pearl, 2022d] Ang Li and Judea Pearl. Unit selec-
         | 
| 898 | 
            +
            tion with causal diagram. In Proceedings of the AAAI Con-
         | 
| 899 | 
            +
            ference on Artificial Intelligence, volume 36, pages 5765–
         | 
| 900 | 
            +
            5772, 2022.
         | 
| 901 | 
            +
            [Li et al., 2020] Ang Li, Suming J. Chen, Jingzheng Qin,
         | 
| 902 | 
            +
            and Zhen Qin.
         | 
| 903 | 
            +
            Training machine learning models with
         | 
| 904 | 
            +
            causal logic. In Companion Proceedings of the Web Con-
         | 
| 905 | 
            +
            ference 2020, pages 557–561, 2020.
         | 
| 906 | 
            +
            [Li et al., 2022] A. Li, R. Mao, and J. Pearl.
         | 
| 907 | 
            +
            Prob-
         | 
| 908 | 
            +
            abilities of causation:
         | 
| 909 | 
            +
            Adequate size of experimen-
         | 
| 910 | 
            +
            tal and observational samples.
         | 
| 911 | 
            +
            Technical Report R-
         | 
| 912 | 
            +
            518, <http://ftp.cs.ucla.edu/pub/stat ser/r518.pdf>, De-
         | 
| 913 | 
            +
            partment of Computer Science, University of California,
         | 
| 914 | 
            +
            Los Angeles, CA, 2022.
         | 
| 915 | 
            +
            [Mueller and Pearl, 2022] Mueller and Pearl. Personalized
         | 
| 916 | 
            +
            decision making – a conceptual introduction. Technical
         | 
| 917 | 
            +
            Report R-513, Department of Computer Science, Univer-
         | 
| 918 | 
            +
            sity of California, Los Angeles, CA, 2022.
         | 
| 919 | 
            +
            [Mueller et al., 2021] S. Mueller,
         | 
| 920 | 
            +
            A. Li,
         | 
| 921 | 
            +
            and J. Pearl.
         | 
| 922 | 
            +
            Causes
         | 
| 923 | 
            +
            of
         | 
| 924 | 
            +
            effects:
         | 
| 925 | 
            +
            Learning
         | 
| 926 | 
            +
            individual
         | 
| 927 | 
            +
            responses
         | 
| 928 | 
            +
            from
         | 
| 929 | 
            +
            population
         | 
| 930 | 
            +
            data.
         | 
| 931 | 
            +
            Technical
         | 
| 932 | 
            +
            Report
         | 
| 933 | 
            +
            R-505,
         | 
| 934 | 
            +
            <http://ftp.cs.ucla.edu/pub/stat ser/r505.pdf>,
         | 
| 935 | 
            +
            De-
         | 
| 936 | 
            +
            partment of Computer Science, University of California,
         | 
| 937 | 
            +
            Los Angeles, CA, 2021.
         | 
| 938 | 
            +
            Forthcoming, Proceedings of
         | 
| 939 | 
            +
            IJCAI-2022.
         | 
| 940 | 
            +
            [Pearl, 1993] J Pearl. Aspects of graphical models connected
         | 
| 941 | 
            +
            with causality. Proceedings of the 49th Session of the inter-
         | 
| 942 | 
            +
            national Statistical Institute, Italy, pages 399–401, 1993.
         | 
| 943 | 
            +
            [Pearl, 1995] Judea Pearl. Causal diagrams for empirical re-
         | 
| 944 | 
            +
            search. Biometrika, 82(4):669–688, 1995.
         | 
| 945 | 
            +
            [Pearl, 1999] Judea Pearl. Probabilities of causation: Three
         | 
| 946 | 
            +
            counterfactual interpretations and their identification. Syn-
         | 
| 947 | 
            +
            these, pages 93–149, 1999.
         | 
| 948 | 
            +
            [Pearl, 2009] Judea Pearl. Causality. Cambridge university
         | 
| 949 | 
            +
            press, 2nd edition, 2009.
         | 
| 950 | 
            +
            [Shpitser and Pearl, 2009] I. Shpitser and J Pearl.
         | 
| 951 | 
            +
            Effects
         | 
| 952 | 
            +
            of treatment on the treated: Identification and generaliza-
         | 
| 953 | 
            +
            tion. In Proceedings of the Twenty-Fifth Conference on Un-
         | 
| 954 | 
            +
            certainty in Artificial Intelligence, pages 514–521. AUAI
         | 
| 955 | 
            +
            Press, Montreal, Quebec, 2009.
         | 
| 956 | 
            +
            [Tian and Pearl, 2000] Jin Tian and Judea Pearl. Probabili-
         | 
| 957 | 
            +
            ties of causation: Bounds and identification. Annals of
         | 
| 958 | 
            +
            Mathematics and Artificial Intelligence, 28(1-4):287–313,
         | 
| 959 | 
            +
            2000.
         | 
| 960 | 
            +
             | 
| 961 | 
            +
            8
         | 
| 962 | 
            +
            Appendix
         | 
| 963 | 
            +
            8.1
         | 
| 964 | 
            +
            Proof of Theorem 10
         | 
| 965 | 
            +
            Proof. From Equation (2) we have,
         | 
| 966 | 
            +
            P(x, y) ≤ P(yx) ≤ 1 − P(x, y′).
         | 
| 967 | 
            +
            Let 1 − P(x, y′) − P(x, y) ≤ 2ǫ, we obtain P(x′) ≤ 2ǫ.
         | 
| 968 | 
            +
            Therefore, P(yx) is ǫ-identified to P(x, y) + ǫ if P(x′) ≤ 2ǫ,
         | 
| 969 | 
            +
            Equation (11) holds. Similarily, we can substitute x, y with
         | 
| 970 | 
            +
            x′, y′, respectively. Equations (12) to (14) hold.
         | 
| 971 | 
            +
            8.2
         | 
| 972 | 
            +
            Proof of Theorem 11
         | 
| 973 | 
            +
            Proof. First, by adjustment formula in Equation (1), we have,
         | 
| 974 | 
            +
            P(yx) = P(y|x, u)P(u) + P(y|x, u′)P(u′).
         | 
| 975 | 
            +
            Thus,
         | 
| 976 | 
            +
            P(yx)
         | 
| 977 | 
            +
            ≥
         | 
| 978 | 
            +
            P(y|x, u′)P(u′)
         | 
| 979 | 
            +
            =
         | 
| 980 | 
            +
            P(y|x, u′)(1 − P(u))
         | 
| 981 | 
            +
            =
         | 
| 982 | 
            +
            P(x, y, u′)
         | 
| 983 | 
            +
            P(x, u′) (1 − P(u))
         | 
| 984 | 
            +
            ≥
         | 
| 985 | 
            +
            P(x, y) − P(u)
         | 
| 986 | 
            +
            P(x)
         | 
| 987 | 
            +
            (1 − P(u))
         | 
| 988 | 
            +
            =
         | 
| 989 | 
            +
            P(y|x) − P(y|x)P(u) − P(u)
         | 
| 990 | 
            +
            P(x) + P 2(u)
         | 
| 991 | 
            +
            P(x)
         | 
| 992 | 
            +
            ≥
         | 
| 993 | 
            +
            P(y|x) − P(u) − P(u)
         | 
| 994 | 
            +
            P(x)
         | 
| 995 | 
            +
            =
         | 
| 996 | 
            +
            P(y|x) − (1 +
         | 
| 997 | 
            +
            1
         | 
| 998 | 
            +
            P(x))P(u).
         | 
| 999 | 
            +
            Also if P(x) ≥ P(u) + c for some constant c > 0, we have,
         | 
| 1000 | 
            +
            P(yx)
         | 
| 1001 | 
            +
            ≤
         | 
| 1002 | 
            +
            P(u) + P(y|x, u′)(1 − P(u))
         | 
| 1003 | 
            +
            ≤
         | 
| 1004 | 
            +
            P(u) + P(x, y, u′)
         | 
| 1005 | 
            +
            P(x, u′) (1 − P(u))
         | 
| 1006 | 
            +
            ≤
         | 
| 1007 | 
            +
            P(u) +
         | 
| 1008 | 
            +
            P(x, y)
         | 
| 1009 | 
            +
            P(x) − P(u)(1 − P(u))
         | 
| 1010 | 
            +
            ≤
         | 
| 1011 | 
            +
            P(u) +
         | 
| 1012 | 
            +
            P(x, y)
         | 
| 1013 | 
            +
            P(x) − P(u)
         | 
| 1014 | 
            +
            =
         | 
| 1015 | 
            +
            P(u) +
         | 
| 1016 | 
            +
            P(x, y)
         | 
| 1017 | 
            +
            P(x)(1 − P (u)
         | 
| 1018 | 
            +
            P (x))
         | 
| 1019 | 
            +
            =
         | 
| 1020 | 
            +
            P(u) +
         | 
| 1021 | 
            +
            P(x, y)(1 − P (u)
         | 
| 1022 | 
            +
            P (x)) + P(y|x)P(u)
         | 
| 1023 | 
            +
            P(x)(1 − P (u)
         | 
| 1024 | 
            +
            P (x))
         | 
| 1025 | 
            +
            =
         | 
| 1026 | 
            +
            P(u) + P(y|x) + P(y|x)P(u)
         | 
| 1027 | 
            +
            P(x) − P(u)
         | 
| 1028 | 
            +
            ≤
         | 
| 1029 | 
            +
            P(y|x) + P(u) +
         | 
| 1030 | 
            +
            P(u)
         | 
| 1031 | 
            +
            P(x) − P(u)
         | 
| 1032 | 
            +
            ≤
         | 
| 1033 | 
            +
            P(y|x) + P(u) + P(u)
         | 
| 1034 | 
            +
            c
         | 
| 1035 | 
            +
            =
         | 
| 1036 | 
            +
            P(y|x) + P(u)(1 + 1
         | 
| 1037 | 
            +
            c )
         | 
| 1038 | 
            +
            Therefore, we have,
         | 
| 1039 | 
            +
            P(y|x) − (1 +
         | 
| 1040 | 
            +
            1
         | 
| 1041 | 
            +
            P(x))P(u) ≤ P(yx) ≤ P(y|x) + (1 + 1
         | 
| 1042 | 
            +
            c)P(u).
         | 
| 1043 | 
            +
            Let
         | 
| 1044 | 
            +
            (1 + 1
         | 
| 1045 | 
            +
            c)P(u) + (1 +
         | 
| 1046 | 
            +
            1
         | 
| 1047 | 
            +
            P(x))P(u) ≤ 2ǫ.
         | 
| 1048 | 
            +
            We have,
         | 
| 1049 | 
            +
            P(u)
         | 
| 1050 | 
            +
            ≤
         | 
| 1051 | 
            +
            2
         | 
| 1052 | 
            +
            2 + 1
         | 
| 1053 | 
            +
            c +
         | 
| 1054 | 
            +
            1
         | 
| 1055 | 
            +
            P (x)
         | 
| 1056 | 
            +
            ǫ
         | 
| 1057 | 
            +
            =
         | 
| 1058 | 
            +
            2cP(x)
         | 
| 1059 | 
            +
            2cP(x) + P(x) + cǫ.
         | 
| 1060 | 
            +
            Then we know that if P(u) ≤
         | 
| 1061 | 
            +
            2cP (x)
         | 
| 1062 | 
            +
            2cP (x)+P (x)+cǫ,
         | 
| 1063 | 
            +
            P(y|x) − (1 +
         | 
| 1064 | 
            +
            1
         | 
| 1065 | 
            +
            P(x))
         | 
| 1066 | 
            +
            2cP(x)
         | 
| 1067 | 
            +
            2cP(x) + P(x) + cǫ ≤
         | 
| 1068 | 
            +
            P(yx),
         | 
| 1069 | 
            +
            P(y|x) + (1 + 1
         | 
| 1070 | 
            +
            c )
         | 
| 1071 | 
            +
            2cP(x)
         | 
| 1072 | 
            +
            2cP(x) + P(x) + cǫ ≥
         | 
| 1073 | 
            +
            P(yx),
         | 
| 1074 | 
            +
            P(y|x) −
         | 
| 1075 | 
            +
            2cP(x) + 2c
         | 
| 1076 | 
            +
            2cP(x) + P(x) + cǫ ≤
         | 
| 1077 | 
            +
            P(yx),
         | 
| 1078 | 
            +
            P(y|x) +
         | 
| 1079 | 
            +
            2cP(x) + 2P(x)
         | 
| 1080 | 
            +
            2cP(x) + P(x) + cǫ ≥
         | 
| 1081 | 
            +
            P(yx).
         | 
| 1082 | 
            +
            Therefore, P(yx) is ǫ-identified to P(y|x)−
         | 
| 1083 | 
            +
            2cP (x)+2c
         | 
| 1084 | 
            +
            2cP (x)+P (x)+cǫ+
         | 
| 1085 | 
            +
            ǫ = P(y|x) +
         | 
| 1086 | 
            +
            P (x)−c
         | 
| 1087 | 
            +
            2cP (x)+P (x)+cǫ.
         | 
| 1088 | 
            +
            Besides, if P(x) ≥ 0.5 and P(u) ≤ 0.1, let c = 0.4, we have
         | 
| 1089 | 
            +
            P(y|x) − (1 +
         | 
| 1090 | 
            +
            1
         | 
| 1091 | 
            +
            P(x))P(u) ≤ P(yx),
         | 
| 1092 | 
            +
            P(y|x) + (1 + 1
         | 
| 1093 | 
            +
            c )P(u) ≥ P(yx).
         | 
| 1094 | 
            +
            P(y|x) − (1 + 1
         | 
| 1095 | 
            +
            0.5)P(u) ≤ P(yx),
         | 
| 1096 | 
            +
            P(y|x) + (1 + 1
         | 
| 1097 | 
            +
            0.4)P(u) ≥ P(yx).
         | 
| 1098 | 
            +
            P(y|x) − 3P(u) ≤ P(yx) ≤ P(y|x) + 3.5P(u).
         | 
| 1099 | 
            +
            Let 3.5P(u) + 3P(u) ≤ 2ǫ, we have P(u) ≤
         | 
| 1100 | 
            +
            4
         | 
| 1101 | 
            +
            13ǫ, and
         | 
| 1102 | 
            +
            P(y|x) − 12
         | 
| 1103 | 
            +
            13ǫ ≤
         | 
| 1104 | 
            +
            P(yx)
         | 
| 1105 | 
            +
            ≤ P(y|x) + 14
         | 
| 1106 | 
            +
            13ǫ.
         | 
| 1107 | 
            +
            Therefore, P(yx) is ǫ-identified to P(y|x) − 12
         | 
| 1108 | 
            +
            13ǫ + ǫ =
         | 
| 1109 | 
            +
            P(y|x) +
         | 
| 1110 | 
            +
            ǫ
         | 
| 1111 | 
            +
            13.
         | 
| 1112 | 
            +
            8.3
         | 
| 1113 | 
            +
            Proof of Theorem 12
         | 
| 1114 | 
            +
            Proof. From the bounds of PNS in Equations (3) and (4) is
         | 
| 1115 | 
            +
            as follows:
         | 
| 1116 | 
            +
            max
         | 
| 1117 | 
            +
            
         | 
| 1118 | 
            +
            
         | 
| 1119 | 
            +
            
         | 
| 1120 | 
            +
            
         | 
| 1121 | 
            +
            
         | 
| 1122 | 
            +
            0,
         | 
| 1123 | 
            +
            P(yx) − P(yx′),
         | 
| 1124 | 
            +
            P(y) − P(yx′),
         | 
| 1125 | 
            +
            P(yx) − P(y)
         | 
| 1126 | 
            +
            
         | 
| 1127 | 
            +
            
         | 
| 1128 | 
            +
            
         | 
| 1129 | 
            +
            
         | 
| 1130 | 
            +
            
         | 
| 1131 | 
            +
            ≤ PNS
         | 
| 1132 | 
            +
            min
         | 
| 1133 | 
            +
            
         | 
| 1134 | 
            +
            
         | 
| 1135 | 
            +
            
         | 
| 1136 | 
            +
            
         | 
| 1137 | 
            +
            
         | 
| 1138 | 
            +
            
         | 
| 1139 | 
            +
            
         | 
| 1140 | 
            +
            
         | 
| 1141 | 
            +
            
         | 
| 1142 | 
            +
            P(yx),
         | 
| 1143 | 
            +
            P(y′
         | 
| 1144 | 
            +
            x′),
         | 
| 1145 | 
            +
            P(x, y) + P(x′, y′),
         | 
| 1146 | 
            +
            P(yx) − P(yx′)+
         | 
| 1147 | 
            +
            +P(x, y′) + P(x′, y)
         | 
| 1148 | 
            +
            
         | 
| 1149 | 
            +
            
         | 
| 1150 | 
            +
            
         | 
| 1151 | 
            +
            
         | 
| 1152 | 
            +
            
         | 
| 1153 | 
            +
            
         | 
| 1154 | 
            +
            
         | 
| 1155 | 
            +
            
         | 
| 1156 | 
            +
            
         | 
| 1157 | 
            +
            ≥ PNS.
         | 
| 1158 | 
            +
             | 
| 1159 | 
            +
            Let P(yx) − 0 ≤ 2ǫ, we obtain that PNS is ǫ-identified to ǫ if
         | 
| 1160 | 
            +
            P(yx) ≤ 2ǫ, Equation (19) holds.
         | 
| 1161 | 
            +
            Similarly, the rest of 20 equations can be obtained by letting
         | 
| 1162 | 
            +
            P(y′
         | 
| 1163 | 
            +
            x′) − 0
         | 
| 1164 | 
            +
            ≤
         | 
| 1165 | 
            +
            2ǫ,
         | 
| 1166 | 
            +
            P(x, y) + P(x′, y′) − 0
         | 
| 1167 | 
            +
            ≤
         | 
| 1168 | 
            +
            2ǫ,
         | 
| 1169 | 
            +
            P(yx) − P(yx′) + P(x, y′) + P(x′, y) − 0
         | 
| 1170 | 
            +
            ≤
         | 
| 1171 | 
            +
            2ǫ,
         | 
| 1172 | 
            +
            P(yx) − (P(yx) − P(yx′))
         | 
| 1173 | 
            +
            ≤
         | 
| 1174 | 
            +
            2ǫ,
         | 
| 1175 | 
            +
            P(y′
         | 
| 1176 | 
            +
            x′) − (P(yx) − P(yx′))
         | 
| 1177 | 
            +
            ≤
         | 
| 1178 | 
            +
            2ǫ,
         | 
| 1179 | 
            +
            P(x, y) + P(x′, y′) − (P(yx) − P(yx′))
         | 
| 1180 | 
            +
            ≤
         | 
| 1181 | 
            +
            2ǫ,
         | 
| 1182 | 
            +
            P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
         | 
| 1183 | 
            +
            (P(yx) − P(yx′))
         | 
| 1184 | 
            +
            ≤
         | 
| 1185 | 
            +
            2ǫ,
         | 
| 1186 | 
            +
            P(yx) − (P(y) − P(yx′))
         | 
| 1187 | 
            +
            ≤
         | 
| 1188 | 
            +
            2ǫ,
         | 
| 1189 | 
            +
            P(y′
         | 
| 1190 | 
            +
            x′) − (P(y) − P(yx′))
         | 
| 1191 | 
            +
            ≤
         | 
| 1192 | 
            +
            2ǫ,
         | 
| 1193 | 
            +
            P(x, y) + P(x′, y′) − (P(y) − P(yx′))
         | 
| 1194 | 
            +
            ≤
         | 
| 1195 | 
            +
            2ǫ,
         | 
| 1196 | 
            +
            P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
         | 
| 1197 | 
            +
            (P(y) − P(yx′))
         | 
| 1198 | 
            +
            ≤
         | 
| 1199 | 
            +
            2ǫ,
         | 
| 1200 | 
            +
            P(yx) − (P(yx) − P(y))
         | 
| 1201 | 
            +
            ≤
         | 
| 1202 | 
            +
            2ǫ,
         | 
| 1203 | 
            +
            P(y′
         | 
| 1204 | 
            +
            x′) − (P(yx) − P(y))
         | 
| 1205 | 
            +
            ≤
         | 
| 1206 | 
            +
            2ǫ,
         | 
| 1207 | 
            +
            P(x, y) + P(x′, y′) − (P(yx) − P(y))
         | 
| 1208 | 
            +
            ≤
         | 
| 1209 | 
            +
            2ǫ,
         | 
| 1210 | 
            +
            P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
         | 
| 1211 | 
            +
            (P(yx) − P(y))
         | 
| 1212 | 
            +
            ≤
         | 
| 1213 | 
            +
            2ǫ.
         | 
| 1214 | 
            +
            8.4
         | 
| 1215 | 
            +
            Proof of Theorem 13
         | 
| 1216 | 
            +
            Proof. From the bounds of PN in Equations (5) and (6) is as
         | 
| 1217 | 
            +
            follows:
         | 
| 1218 | 
            +
            max
         | 
| 1219 | 
            +
            �
         | 
| 1220 | 
            +
            0,
         | 
| 1221 | 
            +
            P (y)−P (yx′)
         | 
| 1222 | 
            +
            P (x,y)
         | 
| 1223 | 
            +
            �
         | 
| 1224 | 
            +
            ≤ PN ≤ min
         | 
| 1225 | 
            +
            �
         | 
| 1226 | 
            +
            1,
         | 
| 1227 | 
            +
            P (y′
         | 
| 1228 | 
            +
            x′)−P (x′,y′)
         | 
| 1229 | 
            +
            P (x,y)
         | 
| 1230 | 
            +
            �
         | 
| 1231 | 
            +
            Let
         | 
| 1232 | 
            +
            P (y′
         | 
| 1233 | 
            +
            x′)−P (x′,y′)
         | 
| 1234 | 
            +
            P (x,y)
         | 
| 1235 | 
            +
            −0 ≤ 2ǫ, we obtain that PN is ǫ-identified
         | 
| 1236 | 
            +
            to ǫ if P(y′
         | 
| 1237 | 
            +
            x′) − P(x′, y′) ≤ 2P(x, y)ǫ, Equation (40) holds.
         | 
| 1238 | 
            +
            Similarly, the rest of 4 equations can be obtained by letting
         | 
| 1239 | 
            +
            1 − P(y) − P(yx′)
         | 
| 1240 | 
            +
            P(x, y)
         | 
| 1241 | 
            +
            ≤
         | 
| 1242 | 
            +
            2ǫ,
         | 
| 1243 | 
            +
            P(y′
         | 
| 1244 | 
            +
            x′) − P(x′, y′)
         | 
| 1245 | 
            +
            P(x, y)
         | 
| 1246 | 
            +
            − P(y) − P(yx′)
         | 
| 1247 | 
            +
            P(x, y)
         | 
| 1248 | 
            +
            ≤
         | 
| 1249 | 
            +
            2ǫ.
         | 
| 1250 | 
            +
            8.5
         | 
| 1251 | 
            +
            Proof of Theorem 14
         | 
| 1252 | 
            +
            Proof. From the bounds of PS in Equations (7) and (8) is as
         | 
| 1253 | 
            +
            follows:
         | 
| 1254 | 
            +
            max
         | 
| 1255 | 
            +
            �
         | 
| 1256 | 
            +
            0,
         | 
| 1257 | 
            +
            P (y′)−P (y′
         | 
| 1258 | 
            +
            x)
         | 
| 1259 | 
            +
            P (x′,y′)
         | 
| 1260 | 
            +
            �
         | 
| 1261 | 
            +
            ≤ PS ≤ min
         | 
| 1262 | 
            +
            �
         | 
| 1263 | 
            +
            1,
         | 
| 1264 | 
            +
            P (yx)−P (x,y)
         | 
| 1265 | 
            +
            P (x′,y′)
         | 
| 1266 | 
            +
            �
         | 
| 1267 | 
            +
            Let P (yx)−P (x,y)
         | 
| 1268 | 
            +
            P (x′,y′)
         | 
| 1269 | 
            +
            − 0 ≤ 2ǫ, we obtain that PS is ǫ-identified
         | 
| 1270 | 
            +
            to ǫ if P(yx) − P(x, y) ≤ 2P(x′, y′)ǫ, Equation (45).
         | 
| 1271 | 
            +
            Similarly, the rest of 4 conditions can be obtained by letting
         | 
| 1272 | 
            +
            1 − P(y′) − P(y′
         | 
| 1273 | 
            +
            x)
         | 
| 1274 | 
            +
            P(x′, y′)
         | 
| 1275 | 
            +
            ≤
         | 
| 1276 | 
            +
            2ǫ,
         | 
| 1277 | 
            +
            P(yx) − P(x, y)
         | 
| 1278 | 
            +
            P(x′, y′)
         | 
| 1279 | 
            +
            − P(y′) − P(y′
         | 
| 1280 | 
            +
            x)
         | 
| 1281 | 
            +
            P(x′, y′)
         | 
| 1282 | 
            +
            ≤
         | 
| 1283 | 
            +
            2ǫ.
         | 
| 1284 | 
            +
            8.6
         | 
| 1285 | 
            +
            Proof of Theorem 15
         | 
| 1286 | 
            +
            Proof.
         | 
| 1287 | 
            +
            f(c)
         | 
| 1288 | 
            +
            =
         | 
| 1289 | 
            +
            βP(yx, y′
         | 
| 1290 | 
            +
            x′|c) + γP(yx, yx′|c) +
         | 
| 1291 | 
            +
            θP(y′
         | 
| 1292 | 
            +
            x, y′
         | 
| 1293 | 
            +
            x′|c) + δP(y′
         | 
| 1294 | 
            +
            x, yx′|c)
         | 
| 1295 | 
            +
            =
         | 
| 1296 | 
            +
            βP(yx, y′
         | 
| 1297 | 
            +
            x′|c) + γ[P(yx|c) − P(yx, y′
         | 
| 1298 | 
            +
            x′|c)] +
         | 
| 1299 | 
            +
            θ[P(y′
         | 
| 1300 | 
            +
            x′) − P(yx, y′
         | 
| 1301 | 
            +
            x′|c)] + δP(y′
         | 
| 1302 | 
            +
            x, yx′|c)
         | 
| 1303 | 
            +
            =
         | 
| 1304 | 
            +
            γP(yx|c) + θP(y′
         | 
| 1305 | 
            +
            x′|c) + (β − γ − θ)P(yx, y′
         | 
| 1306 | 
            +
            x′|c) +
         | 
| 1307 | 
            +
            δP(y′
         | 
| 1308 | 
            +
            x, yx′|c).
         | 
| 1309 | 
            +
            (50)
         | 
| 1310 | 
            +
            Note that, we have,
         | 
| 1311 | 
            +
            P(y′
         | 
| 1312 | 
            +
            x, yx′|c) = P(yx, y′
         | 
| 1313 | 
            +
            x′|c) − P(yx|c) + P(yx′|c).
         | 
| 1314 | 
            +
            (51)
         | 
| 1315 | 
            +
            Substituting Equation (51) into Equation (50), we have,
         | 
| 1316 | 
            +
            f(c)
         | 
| 1317 | 
            +
            =
         | 
| 1318 | 
            +
            γP(yx|c) + θP(y′
         | 
| 1319 | 
            +
            x′|c) + (β − γ − θ)P(yx, y′
         | 
| 1320 | 
            +
            x′|c) +
         | 
| 1321 | 
            +
            δP(y′
         | 
| 1322 | 
            +
            x, yx′|c)
         | 
| 1323 | 
            +
            =
         | 
| 1324 | 
            +
            γP(yx|c) + θP(y′
         | 
| 1325 | 
            +
            x′|c) + (β − γ − θ)P(yx, y′
         | 
| 1326 | 
            +
            x′|c) +
         | 
| 1327 | 
            +
            δ[P(yx, y′
         | 
| 1328 | 
            +
            x′|c) − P(yx|c) + P(yx′|c)]
         | 
| 1329 | 
            +
            =
         | 
| 1330 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1331 | 
            +
            x′|c) +
         | 
| 1332 | 
            +
            (β − γ − θ + δ)P(yx, y′
         | 
| 1333 | 
            +
            x′|c).
         | 
| 1334 | 
            +
            Case 1: If β − γ − θ + δ ≥ 0,
         | 
| 1335 | 
            +
            f(c)
         | 
| 1336 | 
            +
            ≤
         | 
| 1337 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1338 | 
            +
            x′|c) +
         | 
| 1339 | 
            +
            β − γ − θ + δ
         | 
| 1340 | 
            +
            2
         | 
| 1341 | 
            +
            + |β − γ − θ + δ|
         | 
| 1342 | 
            +
            2
         | 
| 1343 | 
            +
            =
         | 
| 1344 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1345 | 
            +
            x′|c) +
         | 
| 1346 | 
            +
            β − γ − θ + δ.
         | 
| 1347 | 
            +
            and,
         | 
| 1348 | 
            +
            f(c)
         | 
| 1349 | 
            +
            ≥
         | 
| 1350 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1351 | 
            +
            x′|c) +
         | 
| 1352 | 
            +
            β − γ − θ + δ
         | 
| 1353 | 
            +
            2
         | 
| 1354 | 
            +
            − |β − γ − θ + δ|
         | 
| 1355 | 
            +
            2
         | 
| 1356 | 
            +
            =
         | 
| 1357 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1358 | 
            +
            x′|c).
         | 
| 1359 | 
            +
            Therefore, f(c) is |β−γ−θ+δ|
         | 
| 1360 | 
            +
            2
         | 
| 1361 | 
            +
            -identified to (γ − δ)P(yx|c) +
         | 
| 1362 | 
            +
            δP(yx′|c) + θP(y′
         | 
| 1363 | 
            +
            x′|c) + β−γ−θ+δ
         | 
| 1364 | 
            +
            2
         | 
| 1365 | 
            +
            .
         | 
| 1366 | 
            +
            Case 2: If β − γ − θ + δ < 0,
         | 
| 1367 | 
            +
            f(c)
         | 
| 1368 | 
            +
            ≤
         | 
| 1369 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1370 | 
            +
            x′|c) +
         | 
| 1371 | 
            +
            β − γ − θ + δ
         | 
| 1372 | 
            +
            2
         | 
| 1373 | 
            +
            + |β − γ − θ + δ|
         | 
| 1374 | 
            +
            2
         | 
| 1375 | 
            +
            =
         | 
| 1376 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1377 | 
            +
            x′|c).
         | 
| 1378 | 
            +
            and,
         | 
| 1379 | 
            +
            f(c)
         | 
| 1380 | 
            +
            ≥
         | 
| 1381 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1382 | 
            +
            x′|c) +
         | 
| 1383 | 
            +
            β − γ − θ + δ
         | 
| 1384 | 
            +
            2
         | 
| 1385 | 
            +
            − |β − γ − θ + δ|
         | 
| 1386 | 
            +
            2
         | 
| 1387 | 
            +
            =
         | 
| 1388 | 
            +
            (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
         | 
| 1389 | 
            +
            x′|c) +
         | 
| 1390 | 
            +
            β − γ − θ + δ.
         | 
| 1391 | 
            +
             | 
| 1392 | 
            +
            Therefore, f(c) is |β−γ−θ+δ|
         | 
| 1393 | 
            +
            2
         | 
| 1394 | 
            +
            -identified to (γ − δ)P(yx|c) +
         | 
| 1395 | 
            +
            δP(yx′|c) + θP(y′
         | 
| 1396 | 
            +
            x′|c) + β−γ−θ+δ
         | 
| 1397 | 
            +
            2
         | 
| 1398 | 
            +
            .
         | 
| 1399 | 
            +
             | 
    	
        NdFLT4oBgHgl3EQfOC8n/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        TNE3T4oBgHgl3EQfzgsS/content/tmp_files/2301.04728v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1074 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.04728v1  [cs.LO]  11 Jan 2023
         | 
| 2 | 
            +
            Submitted to MFPS 22
         | 
| 3 | 
            +
            Patch Locale of a Spectral Locale
         | 
| 4 | 
            +
            in
         | 
| 5 | 
            +
            Univalent Type Theory
         | 
| 6 | 
            +
            Ayberk Tosuna,1
         | 
| 7 | 
            +
            Mart´ın H. Escard´oa,2
         | 
| 8 | 
            +
            a School of Computer Science
         | 
| 9 | 
            +
            University of Birmingham
         | 
| 10 | 
            +
            Birmingham, United Kingdom
         | 
| 11 | 
            +
            Abstract
         | 
| 12 | 
            +
            Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof
         | 
| 13 | 
            +
            in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily
         | 
| 14 | 
            +
            translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without
         | 
| 15 | 
            +
            resizing axioms, by working with large, locally small, and small complete frames with small bases. This turns out to be
         | 
| 16 | 
            +
            nontrivial and involves predicative reformulations of several fundamental concepts of locale theory.
         | 
| 17 | 
            +
            Keywords:
         | 
| 18 | 
            +
            locale theory, pointfree topology, patch locale, spectral locale, stone space, univalent type theory
         | 
| 19 | 
            +
            1
         | 
| 20 | 
            +
            Introduction
         | 
| 21 | 
            +
            The category Stone of Stone locales together with continuous maps forms a coreflective subcategory of
         | 
| 22 | 
            +
            the category Spec of spectral locales and perfect maps i.e. maps preserving compact opens. A proof in the
         | 
| 23 | 
            +
            internal language of an elementary topos was previously constructed in [8,10], defining the patch frame as
         | 
| 24 | 
            +
            the frame of Scott continuous nuclei on a given frame.
         | 
| 25 | 
            +
            The objective of this paper is to carry out this construction in predicative, constructive univalent
         | 
| 26 | 
            +
            foundations. In the presence of Voevodsky’s resizing axioms [15], it is straightforward to translate the
         | 
| 27 | 
            +
            above proof to univalent type theory. However, at the time of writing, there is no known constructive
         | 
| 28 | 
            +
            interpretation of the resizing axioms. In such a predicative situation, the usual approach to locale theory
         | 
| 29 | 
            +
            is to work with presentations of locales, known as formal topologies [2, 3, 13]. However, we show that
         | 
| 30 | 
            +
            it is possible to work with locales directly, if we adopt large, locally small, and small complete frames
         | 
| 31 | 
            +
            with small bases [6]. This requires a number of substantial modifications to the proofs and constructions
         | 
| 32 | 
            +
            of [8,10]:
         | 
| 33 | 
            +
            (i) The patch is defined as the frame of Scott continuous nuclei in [8,10]. In order to prove that this is
         | 
| 34 | 
            +
            indeed a frame, one starts with the frame of all nuclei, and then exhibits the Scott continuous nuclei
         | 
| 35 | 
            +
            as a subframe. However, this procedure does not seem to be possible in our predicative setting as
         | 
| 36 | 
            +
            1 Email: [email protected]
         | 
| 37 | 
            +
            2 Email: [email protected]
         | 
| 38 | 
            +
            MFPS 22 Proceedings will appear in Electronic Notes in Theoretical Informatics and Computer Science
         | 
| 39 | 
            +
             | 
| 40 | 
            +
            Tosun and Escard´o
         | 
| 41 | 
            +
            it is not clear whether all nuclei form a frame; so we construct the frame of Scott continuous nuclei
         | 
| 42 | 
            +
            directly, which requires reformulations of all proofs about it inherited from the frame of all nuclei.
         | 
| 43 | 
            +
            (ii) In the impredicative setting, any frame has all Heyting implications, which is needed to construct
         | 
| 44 | 
            +
            open nuclei. Again, this does not seem to be the case in the predicative setting. We show, however,
         | 
| 45 | 
            +
            that it is possible to construct Heyting implications in locally small frames with small bases, by an
         | 
| 46 | 
            +
            application of the Adjoint Functor Theorem for posets.
         | 
| 47 | 
            +
            (iii) Similar to (ii), we use the Adjoint Functor Theorem for posets to define the right adjoint of a frame
         | 
| 48 | 
            +
            homomorphism, using which we define the notion of a perfect map, namely, a map whose defining
         | 
| 49 | 
            +
            frame homomorphism’s right adjoint is Scott continuous. This notion is used in [8,10].
         | 
| 50 | 
            +
            For the purposes of this work, a spectral locale is a locale in which the compact opens form a small
         | 
| 51 | 
            +
            basis closed under finite meets.
         | 
| 52 | 
            +
            A continuous map of spectral locales is spectral if its defining frame
         | 
| 53 | 
            +
            homomorphism preserves compact opens. A Stone locale is one that is compact and zero-dimensional (i.e.
         | 
| 54 | 
            +
            whose clopens form a basis). Every Stone locale is spectral since the clopens coincide with the compact
         | 
| 55 | 
            +
            opens in Stone locales. The patch frame construction is the right adjoint to the inclusion Stone ֒→ Spec.
         | 
| 56 | 
            +
            The main contribution of our work is the construction of this right adjoint in the predicative context
         | 
| 57 | 
            +
            of univalent type theory.
         | 
| 58 | 
            +
            We have also formalised the development of this paper in the Agda proof
         | 
| 59 | 
            +
            assistant [1], though our presentation here is self-contained and can be followed independently of the
         | 
| 60 | 
            +
            formalisation. Although we have omitted some proofs for lack of space, we have included all the crucial
         | 
| 61 | 
            +
            differences from [8,10] in full.
         | 
| 62 | 
            +
            The organisation of this paper is as follows. In Section 2, we present the type-theoretical context in
         | 
| 63 | 
            +
            which we work. In Section 3, we present our definitions of spectral and Stone locales that provide a suitable
         | 
| 64 | 
            +
            basis for a predicative development. In Section 4, we present a predicative version of the Adjoint Functor
         | 
| 65 | 
            +
            Theorem for the simplified context of locales that is central to our development. In Section 5, we define
         | 
| 66 | 
            +
            the meet-semilattice of perfect nuclei as preparation for the complete lattice of perfect nuclei, which we
         | 
| 67 | 
            +
            then construct in Section 6. Finally in Section 7, we prove the desired universal property, namely, that
         | 
| 68 | 
            +
            the patch locale exhibits the category Stone as a coreflective subcategory of Spec.
         | 
| 69 | 
            +
            2
         | 
| 70 | 
            +
            Foundations
         | 
| 71 | 
            +
            In this section, we present the type-theoretical setting in which we work and then provide the type-
         | 
| 72 | 
            +
            theoretical formulations of some of the preliminary notions that form the basis of our work. Our type-
         | 
| 73 | 
            +
            theoretical conventions follow those of de Jong and Escard´o [5] and the Univalent Foundations Programme
         | 
| 74 | 
            +
            [14].
         | 
| 75 | 
            +
            We work in Martin-L¨of Type Theory with binary sums −+−, dependent products �, dependent sums
         | 
| 76 | 
            +
            �, the identity type − = −, and inductive types including the empty type 0, the unit type 1, and the
         | 
| 77 | 
            +
            type List(A) of lists over any type A. We adhere to the convention of [14] of using − ≡ − for judgemental
         | 
| 78 | 
            +
            equality and − = − for the identity type.
         | 
| 79 | 
            +
            We work explicitly with universes, for which we adopt the convention of using the variables U, V, W,
         | 
| 80 | 
            +
            and T . The ground universe is denoted U0 and the successor of a given universe U is denoted U+. The
         | 
| 81 | 
            +
            least upper bound of two universes is given by the operator − ⊔ − which is assumed to be associative,
         | 
| 82 | 
            +
            commutative, and idempotent. Furthermore, (−)+ is assumed to distribute over − ⊔ −. Universes are
         | 
| 83 | 
            +
            computed for the given type formers as follows:
         | 
| 84 | 
            +
            • Given types X : U and Y : V, the type X + Y inhabits universe U ⊔ V.
         | 
| 85 | 
            +
            • Given a type X : U and an X-indexed family, Y : X → V, both �
         | 
| 86 | 
            +
            x:X Y (x) and �
         | 
| 87 | 
            +
            x:X Y (x) inhabit the
         | 
| 88 | 
            +
            universe U ⊔ V.
         | 
| 89 | 
            +
            • Given a type X : U and inhabitants x, y : X, the identity type x = y inhabits universe U.
         | 
| 90 | 
            +
            • The type N of natural numbers inhabits U0.
         | 
| 91 | 
            +
            • The empty type 0 and the unit type 1 have copies in every universe U, which we occasionally make
         | 
| 92 | 
            +
            explicit using the notations 0U and 1U.
         | 
| 93 | 
            +
            • Given a type A : U, the type List(A) inhabits U.
         | 
| 94 | 
            +
            We assume only function extensionality, propositional extensionality and quotients, and do not need
         | 
| 95 | 
            +
            2
         | 
| 96 | 
            +
             | 
| 97 | 
            +
            Tosun and Escard´o
         | 
| 98 | 
            +
            full univalence for our development. We always maintain a distinction between structure and property,
         | 
| 99 | 
            +
            and reserve logical connectives for propositional types i.e. types A satisfying isProp (A) := �
         | 
| 100 | 
            +
            x,y:A x = y.
         | 
| 101 | 
            +
            We denote by ΩU the type of propositional types in universe U i.e. ΩU := ΣA:UisProp (A).
         | 
| 102 | 
            +
            We assume the existence of propositional truncation, given by a type former ∥−∥ : U → U and a unit
         | 
| 103 | 
            +
            operation |−| : A → ∥A∥. The existential quantification operator is defined using propositional truncation
         | 
| 104 | 
            +
            as:
         | 
| 105 | 
            +
            ∃
         | 
| 106 | 
            +
            x:A
         | 
| 107 | 
            +
            B(x)
         | 
| 108 | 
            +
            :=
         | 
| 109 | 
            +
            �����
         | 
| 110 | 
            +
            �
         | 
| 111 | 
            +
            x:A
         | 
| 112 | 
            +
            B(x)
         | 
| 113 | 
            +
            ����� .
         | 
| 114 | 
            +
            When presenting proofs informally, we adopt the following conventions for avoiding ambiguity between
         | 
| 115 | 
            +
            propositional and non-propositional types:
         | 
| 116 | 
            +
            • For the anonymous inhabitation |A| of a type, we say that A is inhabited.
         | 
| 117 | 
            +
            • For truncated Σ types, we use the terminologies there is and there exists;
         | 
| 118 | 
            +
            2.1
         | 
| 119 | 
            +
            Directed families
         | 
| 120 | 
            +
            We now proceed to define some preliminary notions in the type-theoretical setting that we have just
         | 
| 121 | 
            +
            presented.
         | 
| 122 | 
            +
            Definition 2.1 (Family) A U-family on a type A is a pair (I, f) where I : U and f : I → A. We denote
         | 
| 123 | 
            +
            the type of U-families on type A by FamU(A) i.e. FamU (A) := �
         | 
| 124 | 
            +
            (I:U) I → A.
         | 
| 125 | 
            +
            We often use the shorthand {xi}i:I for families. In other words, instead of writing (I, f) for a family,
         | 
| 126 | 
            +
            we write {xi}i:I where xi denotes the application f(i).
         | 
| 127 | 
            +
            Definition 2.2 (Subfamily) By a subfamily of some U-family (I, f) we mean a family (J, f ◦ g) where
         | 
| 128 | 
            +
            (J, g) is itself a U-family on I.
         | 
| 129 | 
            +
            When considering a subfamily J of some family {xi}i:I, we often use the abbreviation {xj | j ∈ J}.
         | 
| 130 | 
            +
            As mentioned in the introduction, Scott continuity plays a central role in our development. To define
         | 
| 131 | 
            +
            Scott continuity, we define the notion of a directed family. The definition that we work with (also used by
         | 
| 132 | 
            +
            de Jong and Escard´o [5]) is the following:
         | 
| 133 | 
            +
            Definition 2.3 (Directed family) Let {xi}i:I be a family in some type A that is equipped with a preorder
         | 
| 134 | 
            +
            − ≤ −. The family {xi}i:I is called directed if (1) I is inhabited, and (2) for every i, j : I, there exists
         | 
| 135 | 
            +
            some k : I such that xk is the upper bound of {xi, xj}.
         | 
| 136 | 
            +
            2.2
         | 
| 137 | 
            +
            Definition of locale
         | 
| 138 | 
            +
            A locale is a notion of space characterised solely by its frame of opens.
         | 
| 139 | 
            +
            Our definition of a frame is
         | 
| 140 | 
            +
            parameterised by three universes: (1) for the carrier set, (2) for the order, and (3) for the index type of
         | 
| 141 | 
            +
            families on which the join operation is defined. We adopt the convention of using the universe variables
         | 
| 142 | 
            +
            U, V, and W for these respectively. We often omit universe levels in contexts where they are not relevant
         | 
| 143 | 
            +
            to the discussion. In cases where only the index universe W is relevant, we speak of a W-locale for the
         | 
| 144 | 
            +
            sake of brevity and omit universes U and V.
         | 
| 145 | 
            +
            Definition 2.4 (Frame) A (U, V, W)-frame L consists of:
         | 
| 146 | 
            +
            • a set |L| : U,
         | 
| 147 | 
            +
            • a partial order − ≤ − : |L| → |L| → ΩV,
         | 
| 148 | 
            +
            • a top element ⊤ : |L|,
         | 
| 149 | 
            +
            • an operation − ∧ − : |L| → |L| → |L| giving the greatest lower bound U ∧ V of any two U, V : |L|,
         | 
| 150 | 
            +
            • an operation �
         | 
| 151 | 
            +
            : FamW (|L|) → |L| giving the least upper bound �
         | 
| 152 | 
            +
            i:I Ui of any W-family {Ui}i:I,
         | 
| 153 | 
            +
            such that binary meets distribute over arbitrary joins, i.e.
         | 
| 154 | 
            +
            U ∧
         | 
| 155 | 
            +
            �
         | 
| 156 | 
            +
            i:I
         | 
| 157 | 
            +
            Vi =
         | 
| 158 | 
            +
            �
         | 
| 159 | 
            +
            i:I
         | 
| 160 | 
            +
            U ∧ Vi
         | 
| 161 | 
            +
            3
         | 
| 162 | 
            +
             | 
| 163 | 
            +
            Tosun and Escard´o
         | 
| 164 | 
            +
            for every U : |L| and W-family {Vi}i:I in |L|.
         | 
| 165 | 
            +
            It follows automatically from the antisymmetry condition for partial orders that the underlying type
         | 
| 166 | 
            +
            of a frame is a set. Finally, we note that most of our results are restricted to (U+, U, U)-frames for a fixed
         | 
| 167 | 
            +
            universe U, which we refer to as large, locally small, and small complete frames. Even though some of our
         | 
| 168 | 
            +
            results apply to frames of a more general form, we refrain from presenting the specific level of generality
         | 
| 169 | 
            +
            for the sake of brevity. For the precise universe levels, we refer the reader to the formalisation.
         | 
| 170 | 
            +
            Definition 2.5 (Frame homomorphism) Let K and L be a (U, V, W)-frame and a (U′, V′, W)-frame
         | 
| 171 | 
            +
            respectively. A function h : |K| → |L| is called a frame homomorphism if it preserves the top element,
         | 
| 172 | 
            +
            binary meets, and joins of W-families. We denote the category of frames and their homomorphisms by
         | 
| 173 | 
            +
            Frm.
         | 
| 174 | 
            +
            We adopt the notational conventions of [12]. A locale is a frame considered in the opposite category
         | 
| 175 | 
            +
            called Loc := Frmop. To highlight this, we adopt the standard convention of using the letters X, Y, Z, . . .
         | 
| 176 | 
            +
            (or sometimes A, B, C, . . .) for locales and denoting by O(X) the frame corresponding to a locale X. For
         | 
| 177 | 
            +
            variables that range over the frame of opens of a locale X, we use the letters U, V, W, . . . We use the letters
         | 
| 178 | 
            +
            f and g for continuous maps X → Y of locales. A continuous map f : X → Y is given by a frame
         | 
| 179 | 
            +
            homomorphism f ∗ : O(Y ) → O(X).
         | 
| 180 | 
            +
            Definition 2.6 (Nucleus) A nucleus on a locale X is an endofunction j : O(X) → O(X) that is infla-
         | 
| 181 | 
            +
            tionary, idempotent, and preserves binary meets.
         | 
| 182 | 
            +
            In Section 6, we will work with inflationary and binary-meet-preserving functions that are not neces-
         | 
| 183 | 
            +
            sarily idempotent. Such functions are called prenuclei. We also note that, to show a prenucleus j to be
         | 
| 184 | 
            +
            idempotent, it suffices to show j(j(U)) ≤ j(U) as the other direction follows from inflationarity. In fact,
         | 
| 185 | 
            +
            the notion of a nucleus could be defined as a prenucleus satisfying the inequality j(j(U)) ≤ j(U), but we
         | 
| 186 | 
            +
            define it as in Definition 2.6 for the sake of simplicity and make implicit use of this fact in our proofs of
         | 
| 187 | 
            +
            idempotency.
         | 
| 188 | 
            +
            3
         | 
| 189 | 
            +
            Spectral and Stone locales
         | 
| 190 | 
            +
            We start by defining the notion of a small basis for a frame. This is crucial not just for the definitions of
         | 
| 191 | 
            +
            spectral and Stone locales that we use in our development, but also for the Adjoint Functor Theorem that
         | 
| 192 | 
            +
            we present in Section 4.
         | 
| 193 | 
            +
            Definition 3.1 (Small basis) Given a W-locale X, a W-family {Bi}i:I of opens of X is said to form a
         | 
| 194 | 
            +
            basis for O(X) if
         | 
| 195 | 
            +
            �
         | 
| 196 | 
            +
            U:O(X)
         | 
| 197 | 
            +
            ∃
         | 
| 198 | 
            +
            J:FamW(I)
         | 
| 199 | 
            +
            U =
         | 
| 200 | 
            +
            �
         | 
| 201 | 
            +
            {Bj | j ∈ J}.
         | 
| 202 | 
            +
            A W-locale X is then said to have a small basis if there exists a W-family {Bi}i:I in O(X) that forms a
         | 
| 203 | 
            +
            basis for O(X).
         | 
| 204 | 
            +
            Given an open U : O(X) with a small basis, we refer to the family {Bj | j ∈ J} giving U as its join as
         | 
| 205 | 
            +
            the basic covering family for U.
         | 
| 206 | 
            +
            It is important to note here that we use propositional truncation when defining the notion of a locale
         | 
| 207 | 
            +
            having a basis. So even though we often speak of a “locale with some small basis {Bi}i:I”, the existence of
         | 
| 208 | 
            +
            this basis is a property meaning we have access to it only in contexts where the goal is itself a proposition.
         | 
| 209 | 
            +
            We often need covering families given by a basis to be directed. This is easy to achieve if we work with
         | 
| 210 | 
            +
            bases closed under finite joins, which we can do without loss of generality, as this closure produces another
         | 
| 211 | 
            +
            basis.
         | 
| 212 | 
            +
            The standard impredicative definition of a spectral locale is as one in which the compact opens form
         | 
| 213 | 
            +
            a basis closed under binary meets. To talk about compactness, we define the way below relation:
         | 
| 214 | 
            +
            Definition 3.2 (Way below) Given a W-locale X and opens U, V : O(X), U is said to be way below
         | 
| 215 | 
            +
            V , written U ≪ V , if �
         | 
| 216 | 
            +
            (I,f):FamW(O(X))(I, f) directed → V ≤ �(I, f) → ∃i:I U ≤ f(i).
         | 
| 217 | 
            +
            Proposition 3.3 Given any two opens U and V of a locale, the type U ≪ V is a proposition.
         | 
| 218 | 
            +
            4
         | 
| 219 | 
            +
             | 
| 220 | 
            +
            Tosun and Escard´o
         | 
| 221 | 
            +
            The statement U ≪ V is thought of as expressing that U is compact relative to V . An open is said to
         | 
| 222 | 
            +
            be compact if it is compact relative to itself:
         | 
| 223 | 
            +
            Definition 3.4 (Compact open of a locale) An open U : O(X) is called compact if U ≪ U.
         | 
| 224 | 
            +
            We denote the type of compact opens of a locale X by K(X). We adopt the convention of using letters
         | 
| 225 | 
            +
            C, D, . . . : K(X) for compact opens.
         | 
| 226 | 
            +
            Definition 3.5 (Compact locale) A locale X is called compact if its top element ⊤ : O(X) is compact.
         | 
| 227 | 
            +
            The standard definition of a spectral locale as one in which the compact opens form a basis closed under
         | 
| 228 | 
            +
            finite meets is problematic in our predicative setting, as it is not always the case that the type of compact
         | 
| 229 | 
            +
            opens of a (U, V, W)-locale lives in W. In particular, the type of compact opens of a (U+, U, U)-locale
         | 
| 230 | 
            +
            lives in U+ and it is accordingly said to be large. To address this problem, we restrict attention to locales
         | 
| 231 | 
            +
            with small bases and express the notion of spectrality by imposing the conditions of interest on the basic
         | 
| 232 | 
            +
            elements instead.
         | 
| 233 | 
            +
            Definition 3.6 (Spectral locale) A locale X is said to be spectral if there exists a small basis {Bi}i:I
         | 
| 234 | 
            +
            such that:
         | 
| 235 | 
            +
            (i) every Bi is compact, and
         | 
| 236 | 
            +
            (ii) {Bi}i:I is closed under finite meets i.e. there is t : I with Bt = ⊤ and for any two i, j : I, there is
         | 
| 237 | 
            +
            k : I such that Bk = Bi ∧ Bj.
         | 
| 238 | 
            +
            We have previously remarked that we can assume without loss of generality that bases of locales are
         | 
| 239 | 
            +
            closed under finite joins. Note here that this assumption can also be made for bases of spectral locales as
         | 
| 240 | 
            +
            compact opens are also closed under finite joins.
         | 
| 241 | 
            +
            Spectral locales together with spectral maps constitute the category Spec. We now define the notion
         | 
| 242 | 
            +
            of a spectral map.
         | 
| 243 | 
            +
            Definition 3.7 (Spectral map) A continuous map f : X → Y between spectral locales X and Y is
         | 
| 244 | 
            +
            called spectral if f ∗(V ) : O(X) is a compact open of X whenever V is a compact open of Y .
         | 
| 245 | 
            +
            A natural question to ask about our definition of spectral space is whether it corresponds to the previous
         | 
| 246 | 
            +
            informal definition: can there be compact opens that do not fall in the basis?
         | 
| 247 | 
            +
            Proposition 3.8 For any spectral locale X, every compact open of X falls in the basis.
         | 
| 248 | 
            +
            Proof. Let X be a spectral locale and denote by {Bi}i:I its basis closed under finite joins. Let C : O(X)
         | 
| 249 | 
            +
            be a compact open and let {Bj}j∈J be the covering family for C. Because the basis is closed under finite
         | 
| 250 | 
            +
            joins, this family is directed. As C ≤ �
         | 
| 251 | 
            +
            i:I Bi there must be some k : I by the compactness of C such that
         | 
| 252 | 
            +
            C ≤ Bk. It is also clearly the case that Bk ≤ C and so Bk = C, meaning C falls in the basis.
         | 
| 253 | 
            +
            ✷
         | 
| 254 | 
            +
            3.1
         | 
| 255 | 
            +
            Zero-dimensional and regular locales
         | 
| 256 | 
            +
            Clopenness is central to the notion of a zero-dimensional locale, similar to the fundamental role played by
         | 
| 257 | 
            +
            the notion of a compact open in the definition of a spectral space. To define the clopens, we first define
         | 
| 258 | 
            +
            the well inside relation.
         | 
| 259 | 
            +
            Definition 3.9 (Well inside relation) Given a locale X and opens U, V : O(X), U is said to be well
         | 
| 260 | 
            +
            inside V (written U ⪕ V ) if
         | 
| 261 | 
            +
            ∃
         | 
| 262 | 
            +
            W :O(X)
         | 
| 263 | 
            +
            (U ∧ W = ⊥) × (V ∨ W = ⊤) .
         | 
| 264 | 
            +
            Definition 3.10 (Clopen) An open U is called a clopen if it is well inside itself, which amounts to
         | 
| 265 | 
            +
            saying that it has a Boolean complement.
         | 
| 266 | 
            +
            Before we proceed to defining zero-dimensionality, we record the following important fact about the
         | 
| 267 | 
            +
            well inside relation:
         | 
| 268 | 
            +
            Proposition 3.11 Given opens U, V, W : O(X) of a locale X,
         | 
| 269 | 
            +
            (i) if U ⪕ V and V ≤ W then U ⪕ W; and
         | 
| 270 | 
            +
            5
         | 
| 271 | 
            +
             | 
| 272 | 
            +
            Tosun and Escard´o
         | 
| 273 | 
            +
            (ii) if U ≤ V and V ⪕ W then U ⪕ W.
         | 
| 274 | 
            +
            Our definition of zero-dimensionality is analogous to the definition of a spectral locale where conditions
         | 
| 275 | 
            +
            of interest apply only to basic opens.
         | 
| 276 | 
            +
            Definition 3.12 (Zero-dimensional frame) A locale is called zero-dimensional if it has a small basis
         | 
| 277 | 
            +
            {Bi}i:I with each Bi clopen.
         | 
| 278 | 
            +
            Zero-dimensionality can in fact be viewed as a special case of regularity. For purposes of our develop-
         | 
| 279 | 
            +
            ment, we need the result that U ≪ V implies U ⪕ V in any zero-dimensional locale [11, Lemma VII.3.5,
         | 
| 280 | 
            +
            pg. 303]. As this can be strengthened to apply to the more general case of regular locales, we now define
         | 
| 281 | 
            +
            the notion of regularity, using which we obtain a result slightly more general than needed.
         | 
| 282 | 
            +
            Definition 3.13 (Regular locale) A locale is called regular if it has some basis {Bi}i:I such that for
         | 
| 283 | 
            +
            any open U, every Bj in the covering family for U is well inside U.
         | 
| 284 | 
            +
            Similar to the case of spectral locales, the basis of a regular locale can be assumed to be closed under
         | 
| 285 | 
            +
            finite joins without loss of generality as every basis can be closed under finite joins to obtain another basis
         | 
| 286 | 
            +
            satisfying the regularity condition of Definition 3.13.
         | 
| 287 | 
            +
            Proposition 3.14 Every zero-dimensional locale is regular.
         | 
| 288 | 
            +
            Proof. Let X be a zero-dimensional locale and call its basis {Bi}i:I. Consider some U : O(X). There
         | 
| 289 | 
            +
            must be a basic covering U = �
         | 
| 290 | 
            +
            i∈J Bj such that each Bj is clopen for every j ∈ J. Clearly, Bj ≤ U so we
         | 
| 291 | 
            +
            have Bj ⪕ Bj ≤ U which implies Bj ⪕ U (by Proposition 3.11.(i)).
         | 
| 292 | 
            +
            ✷
         | 
| 293 | 
            +
            The following two propositions are needed to prove that compact opens and clopens coincide in Stone
         | 
| 294 | 
            +
            locales, which we will need later. They are adaptations of standard proofs [11, pg. 303, Lemma VII.3.5]
         | 
| 295 | 
            +
            into our predicative setting.
         | 
| 296 | 
            +
            Proposition 3.15 In any regular locale, U ≪ V implies U ⪕ V for any two opens U, V .
         | 
| 297 | 
            +
            Proof. Let {Bi}i:I be the basis, closed under finite joins, of a regular locale X, let U, V : O(X) such
         | 
| 298 | 
            +
            that U ≪ V , and let {Bj}j∈J be the basic family covering V . As V ≤ �
         | 
| 299 | 
            +
            j∈J Bj there must exist some
         | 
| 300 | 
            +
            k ∈ J such that U ≤ Bk by the fact that U ≪ V . We then have U ≤ Bk ⪕ V which implies U ⪕ V by
         | 
| 301 | 
            +
            Proposition 3.11.
         | 
| 302 | 
            +
            ✷
         | 
| 303 | 
            +
            Proposition 3.16 In any compact locale, U ⪕ V implies U ≪ V for any two opens U, V .
         | 
| 304 | 
            +
            The proof of Proposition 3.16 is omitted as it is exactly the same as in [11, pg. 303].
         | 
| 305 | 
            +
            Definition 3.17 (Stone locale) A Stone locale is one that is compact and zero-dimensional.
         | 
| 306 | 
            +
            Proposition 3.18 In any Stone locale, an open is compact iff it is clopen.
         | 
| 307 | 
            +
            Proof. By propositions 3.15 and 3.16 and the fact that every zero-dimensional locale is regular (Propo-
         | 
| 308 | 
            +
            sition 3.14).
         | 
| 309 | 
            +
            ✷
         | 
| 310 | 
            +
            4
         | 
| 311 | 
            +
            Adjoint Functor Theorem for frames with small bases
         | 
| 312 | 
            +
            We start with the definition of the notion of an adjunction in the simplified context of posetal categories.
         | 
| 313 | 
            +
            Definition 4.1 Let P and Q be two posets. An adjunction between P and Q consists of a pair of monotonic
         | 
| 314 | 
            +
            maps f : P → Q and g : Q → P satisfying f ⊣ g := �
         | 
| 315 | 
            +
            x:P
         | 
| 316 | 
            +
            �
         | 
| 317 | 
            +
            y:Q f(x) ≤ y ↔ x ≤ g(y).
         | 
| 318 | 
            +
            In locale theory, it is standard convention to denote by f∗ : O(X) → O(Y ) the right adjoint of a
         | 
| 319 | 
            +
            frame homomorphism f ∗ : O(Y ) → O(X) corresponding to a continuous map of locales f : X → Y . The
         | 
| 320 | 
            +
            right adjoint of a frame homomorphism is defined using the Adjoint Functor Theorem which amounts
         | 
| 321 | 
            +
            to the definition: f∗ := U �→ �{V : O(Y ) | f ∗(V ) ≤ U}.
         | 
| 322 | 
            +
            In the predicative setting of type theory
         | 
| 323 | 
            +
            however, it is not clear how the right adjoint of a frame homomorphism would be defined as the family
         | 
| 324 | 
            +
            {V : O(Y ) | f ∗(V ) ≤ U} might be too big in general, meaning it is not clear a priori that its join in O(X)
         | 
| 325 | 
            +
            exists. To resolve this problem, we restrict attention once again to frames with small bases in which we
         | 
| 326 | 
            +
            circumvent this problem by quantifying over the basic elements.
         | 
| 327 | 
            +
            6
         | 
| 328 | 
            +
             | 
| 329 | 
            +
            Tosun and Escard´o
         | 
| 330 | 
            +
            Theorem 4.2 (AFT) Let X and Y be two large, locally small, and small complete locales and let f ∗ :
         | 
| 331 | 
            +
            O(Y ) → O(X) be a monotone map. Assume that Y has a small basis {Bi}i:I. The map f ∗ has a right
         | 
| 332 | 
            +
            adjoint iff f ∗(�
         | 
| 333 | 
            +
            i Ui) = �
         | 
| 334 | 
            +
            i f ∗(Ui) for any small family {Ui}i:I in O(Y ).
         | 
| 335 | 
            +
            Proof. Let f ∗ : O(Y ) → O(X) be a monotone map from frame O(Y ) to frame O(Y ) and assume that Y
         | 
| 336 | 
            +
            has a small basis {Bi}i:I.
         | 
| 337 | 
            +
            The forward direction is easy: suppose f ∗ : O(Y ) → O(X) has a right adjoint f∗ : O(X) → O(Y ).
         | 
| 338 | 
            +
            Let {Ui}i:I be a family in O(Y ). By the uniqueness of joins, it is sufficient to show that f ∗(�
         | 
| 339 | 
            +
            i Ui) is the
         | 
| 340 | 
            +
            join of {f ∗(Ui)}i:I. It is clearly an upper bound by the fact that f ∗ is monotone. Given any other upper
         | 
| 341 | 
            +
            bound V of {f ∗(Ui)}i:I, we have that f ∗(�
         | 
| 342 | 
            +
            i Ui) ≤ V since f ∗(�
         | 
| 343 | 
            +
            i Ui) ≤ V ↔ (�
         | 
| 344 | 
            +
            i Ui) ≤ f∗(V ) meaning it
         | 
| 345 | 
            +
            is sufficient to show Ui ≤ f∗(V ) for each Ui. Since Ui ≤ f∗(V ) iff f ∗(Ui) ≤ V , we are done as the latter
         | 
| 346 | 
            +
            can be seen to hold directly from the fact that V is an upper bound of {f ∗(Ui)}i:I.
         | 
| 347 | 
            +
            For the converse, suppose f ∗(�
         | 
| 348 | 
            +
            i Ui) = �
         | 
| 349 | 
            +
            i:I f ∗(Ui) for every family {Ui}i:I. We define the right adjoint
         | 
| 350 | 
            +
            of f ∗ as:
         | 
| 351 | 
            +
            f∗(V )
         | 
| 352 | 
            +
            :=
         | 
| 353 | 
            +
            �
         | 
| 354 | 
            +
            {Bi | i : I, f ∗(Bi) ≤ V } .
         | 
| 355 | 
            +
            We need to show that f∗ is the right adjoint of f ∗ i.e. that f ∗(U) ≤ V ↔ U ≤ f∗(V ) for any two
         | 
| 356 | 
            +
            U, V : O(X). For the forward direction, assume f ∗(U) ≤ V . We know that there exists a covering family
         | 
| 357 | 
            +
            {Bj}j∈J for U with U = �
         | 
| 358 | 
            +
            j∈J Bj so it suffices to show that Bj ≤ f∗(V ) for every j ∈ J. It remains to
         | 
| 359 | 
            +
            show that f ∗(Bj) ≤ V . This follows from the fact that f ∗(Bj) ≤ f ∗(�
         | 
| 360 | 
            +
            j∈J Bj) ≤ f ∗(U) ≤ V . For the
         | 
| 361 | 
            +
            backward direction, let U ≤ f∗(V ). We have:
         | 
| 362 | 
            +
            f ∗(U)
         | 
| 363 | 
            +
            ≤
         | 
| 364 | 
            +
            f ∗(f∗(V ))
         | 
| 365 | 
            +
            ≡
         | 
| 366 | 
            +
            f ∗ ��
         | 
| 367 | 
            +
            {Bi | f ∗(Bi) ≤ V }
         | 
| 368 | 
            +
            �
         | 
| 369 | 
            +
            ≤
         | 
| 370 | 
            +
            �
         | 
| 371 | 
            +
            {f ∗(Bi) | f ∗(Bi) ≤ V }
         | 
| 372 | 
            +
            [since f ∗ preserves joins]
         | 
| 373 | 
            +
            ≤
         | 
| 374 | 
            +
            V.
         | 
| 375 | 
            +
            ✷
         | 
| 376 | 
            +
            Our primary use case for the Adjoint Functor Theorem is the construction of Heyting implications in
         | 
| 377 | 
            +
            locally small frames with small bases.
         | 
| 378 | 
            +
            Definition 4.3 (Heyting implication) Let X be a large, locally small, and small complete locale with a
         | 
| 379 | 
            +
            small basis and let U : O(X). As the map −∧U : O(X) → O(X) preserves joins by the frame distributivity
         | 
| 380 | 
            +
            law, it must have a right adjoint h : O(X) → O(X), by Theorem 4.2, that satisfies W ∧U ≤ V ↔ W ≤ h(V )
         | 
| 381 | 
            +
            for all W, V : O(X). We then define the Heyting implication as: U ⇒ V := h(V ).
         | 
| 382 | 
            +
            The Adjoint Functor Theorem also allows us to define the notion of a perfect frame homomorphism.
         | 
| 383 | 
            +
            Definition 4.4 (Perfect frame homomorphism) Let X and Y be two large, locally small, and small
         | 
| 384 | 
            +
            complete locales and assume that Y has a small basis. A continuous map f : X → Y is said to be perfect
         | 
| 385 | 
            +
            if the right adjoint f∗ of its defining frame homomorphism f ∗ is Scott continuous.
         | 
| 386 | 
            +
            Proposition 4.5 Let f : X → Y be a perfect map where Y is a locale with small basis.
         | 
| 387 | 
            +
            The frame
         | 
| 388 | 
            +
            homomorphism f ∗ respects the way below relation, that is, U ≪ V implies f ∗(U) ≪ f ∗(V ), for any two
         | 
| 389 | 
            +
            U, V : O(Y ).
         | 
| 390 | 
            +
            A proof of Proposition 4.5 can be found in [8]. Our proof is mostly the same, once it is ensured that
         | 
| 391 | 
            +
            the Heyting implication exists through the small basis assumption. We thus omit the proof.
         | 
| 392 | 
            +
            Corollary 4.6 Perfect maps are spectral as they preserve compact opens.
         | 
| 393 | 
            +
            In fact, the converse is also true in the case of spectral locales so Corollary 4.6 can be strengthened to
         | 
| 394 | 
            +
            an equivalence in this case.
         | 
| 395 | 
            +
            Proposition 4.7 Let X and Y be two large, locally small, and small complete spectral locales and assume
         | 
| 396 | 
            +
            that Y has a small basis. A continuous map f : X → Y is perfect iff it is spectral.
         | 
| 397 | 
            +
            7
         | 
| 398 | 
            +
             | 
| 399 | 
            +
            Tosun and Escard´o
         | 
| 400 | 
            +
            Proof. The forward direction is given by Corollary 4.6. For the backward direction, assume f : X →
         | 
| 401 | 
            +
            Y to be a spectral map.
         | 
| 402 | 
            +
            We have to show that the right adjoint f∗ : O(X) → O(Y ) of its defining
         | 
| 403 | 
            +
            frame homomorphism is Scott continuous. Let {Ui}i:I be a directed family in O(X). We have to show
         | 
| 404 | 
            +
            f∗(�
         | 
| 405 | 
            +
            i:I Ui) = �
         | 
| 406 | 
            +
            i:I f∗(Ui). The �
         | 
| 407 | 
            +
            i:I f∗(Ui) ≤ f∗(�
         | 
| 408 | 
            +
            i:I Ui) direction is immediate. For the f∗(�
         | 
| 409 | 
            +
            i:I Ui) ≤
         | 
| 410 | 
            +
            �
         | 
| 411 | 
            +
            i:I f∗(Ui) direction, let C be a compact open such that C ≤ f∗(�
         | 
| 412 | 
            +
            i:I Ui). By the fact that f ∗ ⊣ f∗, it must
         | 
| 413 | 
            +
            be the case that f ∗(C) ≤ �
         | 
| 414 | 
            +
            i:I Ui and since f ∗(C) is compact, by the spectrality assumption of f ∗, there
         | 
| 415 | 
            +
            must exist some l : I such that f ∗(C) ≤ Ul. Again by adjointness, C ≤ f∗(Ul) so clearly C ≤ �
         | 
| 416 | 
            +
            i:I f∗(Ui).✷
         | 
| 417 | 
            +
            5
         | 
| 418 | 
            +
            Meet-semilattice of Scott continuous nuclei
         | 
| 419 | 
            +
            In this section, we take the first step towards constructing the defining frame of the patch locale on a
         | 
| 420 | 
            +
            spectral locale i.e. the frame of Scott continuous nuclei. We construct the meet-semilattice of all nuclei on
         | 
| 421 | 
            +
            a frame.
         | 
| 422 | 
            +
            Proposition 5.1 The type of nuclei on a given frame O(X) forms a meet-semilattice under the pointwise
         | 
| 423 | 
            +
            order.
         | 
| 424 | 
            +
            Proof. We need to show that the type O(X) has all finite meets. The top nucleus is defined as − �→ ⊤
         | 
| 425 | 
            +
            and the meet of two nuclei as j ∧ k := U �→ j(U) ∧ k(U). It is easy to see that j ∧ k is the greatest lower
         | 
| 426 | 
            +
            bound of j and k so it remains to show that j ∧ k satisfies the nucleus laws.
         | 
| 427 | 
            +
            The inflation property can be seen to be satisfied from the inflation properties of j and k combined
         | 
| 428 | 
            +
            with the fact that j(U)∧k(U) is the greatest lower bound of j(U) and k(U). To see that meet preservation
         | 
| 429 | 
            +
            holds, let U, V : O(X); we have:
         | 
| 430 | 
            +
            (j ∧ k)(U ∧ V )
         | 
| 431 | 
            +
            ≡
         | 
| 432 | 
            +
            j(U ∧ V ) ∧ k(U ∧ V )
         | 
| 433 | 
            +
            =
         | 
| 434 | 
            +
            j(U) ∧ j(V ) ∧ k(U) ∧ k(V )
         | 
| 435 | 
            +
            =
         | 
| 436 | 
            +
            (j(U) ∧ k(U)) ∧ (j(V ) ∧ k(V ))
         | 
| 437 | 
            +
            ≡
         | 
| 438 | 
            +
            (j ∧ k)(U) ∧ (j ∧ k)(V ).
         | 
| 439 | 
            +
            For idempotency, let U : O(X). We have:
         | 
| 440 | 
            +
            (j ∧ k)((j ∧ k)(U))
         | 
| 441 | 
            +
            ≡
         | 
| 442 | 
            +
            j(j(U) ∧ k(U)) ∧ k(j(U) ∧ k(U))
         | 
| 443 | 
            +
            =
         | 
| 444 | 
            +
            j(j(U)) ∧ j(k(U)) ∧ k(j(U)) ∧ k(k(U))
         | 
| 445 | 
            +
            ≤
         | 
| 446 | 
            +
            j(j(U)) ∧ k(k(U))
         | 
| 447 | 
            +
            =
         | 
| 448 | 
            +
            j(U) ∧ k(U)
         | 
| 449 | 
            +
            ≡
         | 
| 450 | 
            +
            (j ∧ k)(U).
         | 
| 451 | 
            +
            ✷
         | 
| 452 | 
            +
            We now show that this meet-semilattice can be refined to only those nuclei that are Scott continuous
         | 
| 453 | 
            +
            (i.e. the perfect nuclei).
         | 
| 454 | 
            +
            Proposition 5.2 The Scott continuous nuclei on any locale form a meet-semilattice.
         | 
| 455 | 
            +
            Proof. Let X be a locale. The construction is the same as the one from Proposition 5.1; the top element
         | 
| 456 | 
            +
            is − �→ ⊤ which is trivially Scott continuous so it remains to show that the meet of two Scott continuous
         | 
| 457 | 
            +
            nuclei is Scott continuous. Consider two Scott continuous nuclei j and k on O(X) and a directed small
         | 
| 458 | 
            +
            8
         | 
| 459 | 
            +
             | 
| 460 | 
            +
            Tosun and Escard´o
         | 
| 461 | 
            +
            family {Ui}i:I. We then have:
         | 
| 462 | 
            +
            (j ∧ k)
         | 
| 463 | 
            +
            ��
         | 
| 464 | 
            +
            i:I
         | 
| 465 | 
            +
            Ui
         | 
| 466 | 
            +
            �
         | 
| 467 | 
            +
            ≡
         | 
| 468 | 
            +
            j
         | 
| 469 | 
            +
            ��
         | 
| 470 | 
            +
            i:I
         | 
| 471 | 
            +
            Ui
         | 
| 472 | 
            +
            �
         | 
| 473 | 
            +
            ∧ k
         | 
| 474 | 
            +
            
         | 
| 475 | 
            +
            �
         | 
| 476 | 
            +
            j:I
         | 
| 477 | 
            +
            Uj
         | 
| 478 | 
            +
            
         | 
| 479 | 
            +
            
         | 
| 480 | 
            +
            =
         | 
| 481 | 
            +
            ��
         | 
| 482 | 
            +
            i:I
         | 
| 483 | 
            +
            j(Ui)
         | 
| 484 | 
            +
            �
         | 
| 485 | 
            +
            ∧
         | 
| 486 | 
            +
            
         | 
| 487 | 
            +
            �
         | 
| 488 | 
            +
            j:I
         | 
| 489 | 
            +
            k(Uj)
         | 
| 490 | 
            +
            
         | 
| 491 | 
            +
            
         | 
| 492 | 
            +
            [Scott continuity of j and k]
         | 
| 493 | 
            +
            =
         | 
| 494 | 
            +
            �
         | 
| 495 | 
            +
            (i,j):I×I
         | 
| 496 | 
            +
            j(Ui) ∧ k(Uj)
         | 
| 497 | 
            +
            [distributivity]
         | 
| 498 | 
            +
            =
         | 
| 499 | 
            +
            �
         | 
| 500 | 
            +
            i:I
         | 
| 501 | 
            +
            j(Ui) ∧ k(Ui)
         | 
| 502 | 
            +
            [†]
         | 
| 503 | 
            +
            ≡
         | 
| 504 | 
            +
            �
         | 
| 505 | 
            +
            i:I
         | 
| 506 | 
            +
            (j ∧ k)(Ui)
         | 
| 507 | 
            +
            [meet preservation]
         | 
| 508 | 
            +
            where, for the † step, we use antisymmetry. The backwards direction is immediate. For the forwards
         | 
| 509 | 
            +
            direction, we need to show that �
         | 
| 510 | 
            +
            (i,j):I×I j(Ui) ∧ k(Uj) ≤ �
         | 
| 511 | 
            +
            i:I j(Ui) ∧ k(Ui), for which it suffices to show
         | 
| 512 | 
            +
            that �
         | 
| 513 | 
            +
            i:I j(Ui)∧k(Ui) is an upper bound of {j(Ui)∧k(Uj)}(i,j):I×I. Let m, n : I be two indices. As {Ui}i:I
         | 
| 514 | 
            +
            is directed, there must exist some o such that Uo is an upper bound of {Um, Un}. Using the monotonicity
         | 
| 515 | 
            +
            of j and k, we get j(Um) ∧ k(Un) ≤ j(Uo) ∧ k(Uo) ≤ �
         | 
| 516 | 
            +
            i:I j(Ui) ∧ k(Ui) as desired.
         | 
| 517 | 
            +
            ✷
         | 
| 518 | 
            +
            6
         | 
| 519 | 
            +
            Joins in the frame of Scott continuous nuclei
         | 
| 520 | 
            +
            The nontrivial component of the patch frame construction is the join of a family {ki}i:I of perfect nuclei, as
         | 
| 521 | 
            +
            the pointwise join fails to be idempotent in general, and not inflationary when the family in consideration
         | 
| 522 | 
            +
            is empty.
         | 
| 523 | 
            +
            A construction of the join, given in [9], is based on the idea that, if we start with a family {ki}i:I of
         | 
| 524 | 
            +
            nuclei, we can consider the family
         | 
| 525 | 
            +
            {ki0 ◦ · · · ◦ kin}(i0,··· ,in):List(I) ,
         | 
| 526 | 
            +
            whose index type is the type of lists of indices in I, that will always be directed. We will use the following
         | 
| 527 | 
            +
            notation for lists over a type X:
         | 
| 528 | 
            +
            • ε denotes the empty list,
         | 
| 529 | 
            +
            • x :: s, with x : X and s : List(X), denotes the list with first element x followed by the elements of s,
         | 
| 530 | 
            +
            • s t denotes the concatentation of lists s and t.
         | 
| 531 | 
            +
            To define the join operation, we will use the iterated composition function o that we define as follows:
         | 
| 532 | 
            +
            Definition 6.1 (Iterated composition of nuclei) Given a small family K := {ki}i:I of nuclei on a
         | 
| 533 | 
            +
            given locale X, we denote by K∗ the family (List(I), o) where o is defined as follows:
         | 
| 534 | 
            +
            o(ε)
         | 
| 535 | 
            +
            :=
         | 
| 536 | 
            +
            id;
         | 
| 537 | 
            +
            o(i :: s)
         | 
| 538 | 
            +
            :=
         | 
| 539 | 
            +
            o(s) ◦ ki.
         | 
| 540 | 
            +
            By an easy proof by induction, we have the following.
         | 
| 541 | 
            +
            Proposition 6.2 For any family K := {ki}i:I of prenuclei on a locale and any s, t : List(I), we have that
         | 
| 542 | 
            +
            o(s t) = o(s) ◦ o(t).
         | 
| 543 | 
            +
            Proposition 6.3 Given a family K := {ki}i:I of nuclei on a locale, every α ∈ K∗ is a prenucleus, that
         | 
| 544 | 
            +
            is, for every s : List(I), the function o(s) is a prenucleus.
         | 
| 545 | 
            +
            9
         | 
| 546 | 
            +
             | 
| 547 | 
            +
            Tosun and Escard´o
         | 
| 548 | 
            +
            Proof. If s = ε, we are done as it is immediate that the identity function id is a prenucleus. If s = i :: s′,
         | 
| 549 | 
            +
            we need to show that o(s′) ◦ ki is a prenucleus. For meet preservation, let U, V : O(X). We have that:
         | 
| 550 | 
            +
            (o(s′) ◦ ki)(U ∧ V )
         | 
| 551 | 
            +
            ≡
         | 
| 552 | 
            +
            o(s′)(ki(U ∧ V ))
         | 
| 553 | 
            +
            =
         | 
| 554 | 
            +
            o(s′)(ki(U) ∧ ki(V ))
         | 
| 555 | 
            +
            [ki is a nucleus]
         | 
| 556 | 
            +
            =
         | 
| 557 | 
            +
            o(s′)(ki(U)) ∧ o(s′)(ki(V ))
         | 
| 558 | 
            +
            [inductive hypothesis]
         | 
| 559 | 
            +
            ≡
         | 
| 560 | 
            +
            (o(s′) ◦ ki)(U) ∧ (o(s′) ◦ ki)(V ).
         | 
| 561 | 
            +
            For the inflation property, consider some U : O(X). We have that U ≤ ki(U) ≤ o(s′)(ki(U)), by the
         | 
| 562 | 
            +
            inflation property of ki and the inductive hypothesis.
         | 
| 563 | 
            +
            ✷
         | 
| 564 | 
            +
            Proposition 6.4 Given a nucleus j and a family K := {ki}i:I of nuclei on a locale, if j is an upper bound
         | 
| 565 | 
            +
            of K then it is also an upper bound of K∗.
         | 
| 566 | 
            +
            Proof. Let j and K := {ki}i:I be, respectively, a nucleus and a family of nuclei on a locale. Let s : List(I).
         | 
| 567 | 
            +
            We denote by {αs}s:List(S) the family K∗. We proceed by induction on s. If s = ε, we have that id(U) ≡
         | 
| 568 | 
            +
            U ≤ j(U). If s = i :: s′, we then have:
         | 
| 569 | 
            +
            αs′(ki(U))
         | 
| 570 | 
            +
            ≤
         | 
| 571 | 
            +
            αs′(j(U))
         | 
| 572 | 
            +
            [monotonicity of αs′ (Prop. 6.3 and monotonicity of prenuclei)]
         | 
| 573 | 
            +
            ≤
         | 
| 574 | 
            +
            j(j(U))
         | 
| 575 | 
            +
            [inductive hypothesis]
         | 
| 576 | 
            +
            ≤
         | 
| 577 | 
            +
            j(U)
         | 
| 578 | 
            +
            [idempotency of j].
         | 
| 579 | 
            +
            ✷
         | 
| 580 | 
            +
            Proposition 6.5 Given a family {ki}i:I of Scott continuous nuclei on a locale, every prenucleus α ∈ K∗
         | 
| 581 | 
            +
            is Scott continuous.
         | 
| 582 | 
            +
            Proof. Any composition of finitely many Scott continuous functions is Scott continuous.
         | 
| 583 | 
            +
            ✷
         | 
| 584 | 
            +
            Proposition 6.6 Given a family K :≡ {ki}i:I of nuclei on a locale, the family K∗ is directed.
         | 
| 585 | 
            +
            Proof. K∗ is indeed always inhabited by the identity nucleus. The upper bound of nuclei o(s) and o(t) is
         | 
| 586 | 
            +
            given by o(s t), which is o(s) ◦o(t) by Proposition 6.2. The fact that this is an upper bound of {o(s), o(t)}
         | 
| 587 | 
            +
            follows from monotonicity and inflationarity.
         | 
| 588 | 
            +
            ✷
         | 
| 589 | 
            +
            Proposition 6.7 Let j be a nucleus and K := {ki}i:I a family of nuclei on a locale. Denote by {αs}s:List(I)
         | 
| 590 | 
            +
            the family K∗ and by {βs}s:List(I) the family {j ∧ k | k ∈ K}∗. We have that βs is a lower bound of {αs, j}
         | 
| 591 | 
            +
            for every s : List(I).
         | 
| 592 | 
            +
            We are now ready to construct the join operation in the meet-semilattice of Scott continuous nuclei
         | 
| 593 | 
            +
            hence defining the patch frame O(Patch(X)) of the frame of a locale X.
         | 
| 594 | 
            +
            Theorem 6.8 (Join of Scott continuous nuclei) Let K := {ki}i:I be a family of Scott continuous
         | 
| 595 | 
            +
            nuclei. The join of K can be calculated as �N K := U �→ �
         | 
| 596 | 
            +
            α∈K∗ α(U).
         | 
| 597 | 
            +
            Proof. It must be checked that this is (1) indeed the join, (2) is a Scott continuous nucleus i.e. it is
         | 
| 598 | 
            +
            inflationary, binary-meet-preserving, idempotent, and Scott continuous. The inflation property is direct.
         | 
| 599 | 
            +
            10
         | 
| 600 | 
            +
             | 
| 601 | 
            +
            Tosun and Escard´o
         | 
| 602 | 
            +
            For meet preservation, consider some U, V : O(X). We have:
         | 
| 603 | 
            +
            � N
         | 
| 604 | 
            +
            �
         | 
| 605 | 
            +
            i:I
         | 
| 606 | 
            +
            ki
         | 
| 607 | 
            +
            �
         | 
| 608 | 
            +
            (U ∧ V )
         | 
| 609 | 
            +
            ≡
         | 
| 610 | 
            +
            �
         | 
| 611 | 
            +
            α∈K∗
         | 
| 612 | 
            +
            α(U ∧ V )
         | 
| 613 | 
            +
            =
         | 
| 614 | 
            +
            �
         | 
| 615 | 
            +
            α∈K∗
         | 
| 616 | 
            +
            α(U) ∧ α(V )
         | 
| 617 | 
            +
            [Proposition 6.5]
         | 
| 618 | 
            +
            =
         | 
| 619 | 
            +
            �
         | 
| 620 | 
            +
            β,γ∈K∗
         | 
| 621 | 
            +
            β(U) ∧ γ(V )
         | 
| 622 | 
            +
            [†]
         | 
| 623 | 
            +
            =
         | 
| 624 | 
            +
            
         | 
| 625 | 
            +
             �
         | 
| 626 | 
            +
            β∈K∗
         | 
| 627 | 
            +
            β(U)
         | 
| 628 | 
            +
            
         | 
| 629 | 
            +
             ∧
         | 
| 630 | 
            +
            
         | 
| 631 | 
            +
             �
         | 
| 632 | 
            +
            γ∈K∗
         | 
| 633 | 
            +
            γ(V )
         | 
| 634 | 
            +
            
         | 
| 635 | 
            +
            
         | 
| 636 | 
            +
            [distributivity]
         | 
| 637 | 
            +
            ≡
         | 
| 638 | 
            +
            � N
         | 
| 639 | 
            +
            �
         | 
| 640 | 
            +
            i:I
         | 
| 641 | 
            +
            ki
         | 
| 642 | 
            +
            �
         | 
| 643 | 
            +
            (U) ∧
         | 
| 644 | 
            +
            � N
         | 
| 645 | 
            +
            �
         | 
| 646 | 
            +
            i:I
         | 
| 647 | 
            +
            ki
         | 
| 648 | 
            +
            �
         | 
| 649 | 
            +
            (V ),
         | 
| 650 | 
            +
            where the step (†) uses antisymmetry. The �
         | 
| 651 | 
            +
            α∈K∗ α(U) ∧ α(V ) ≤ �
         | 
| 652 | 
            +
            β,γ∈K∗ β(U) ∧ γ(V ) direction is direct
         | 
| 653 | 
            +
            whereas for the �
         | 
| 654 | 
            +
            β,γ∈K∗ β(U) ∧ γ(V ) ≤ �
         | 
| 655 | 
            +
            α∈K∗ α(U) ∧ α(V ) direction we show that �
         | 
| 656 | 
            +
            α∈K∗ α(U) ∧ α(V ) is
         | 
| 657 | 
            +
            an upper bound of the set {β(U)∧γ(V ) | β, γ ∈ K∗}. Consider arbitrary β, γ ∈ K∗. By the directedness of
         | 
| 658 | 
            +
            K∗ we know that there exists some δ ∈ K∗ that is an upper bound of {β, γ}. We then have: β(U)∧γ(V ) ≤
         | 
| 659 | 
            +
            δ(U) ∧ δ(V ) ≤ �
         | 
| 660 | 
            +
            α∈K∗ α(U) ∧ α(V ). For idempotency, let U : O(X). We have that:
         | 
| 661 | 
            +
            � N
         | 
| 662 | 
            +
            �
         | 
| 663 | 
            +
            i
         | 
| 664 | 
            +
            ki
         | 
| 665 | 
            +
            � �� N
         | 
| 666 | 
            +
            �
         | 
| 667 | 
            +
            i
         | 
| 668 | 
            +
            ki
         | 
| 669 | 
            +
            �
         | 
| 670 | 
            +
            (U)
         | 
| 671 | 
            +
            �
         | 
| 672 | 
            +
            ≡
         | 
| 673 | 
            +
            �
         | 
| 674 | 
            +
            α∈K∗
         | 
| 675 | 
            +
            α
         | 
| 676 | 
            +
            
         | 
| 677 | 
            +
             �
         | 
| 678 | 
            +
            β∈K∗
         | 
| 679 | 
            +
            β(U)
         | 
| 680 | 
            +
            
         | 
| 681 | 
            +
            
         | 
| 682 | 
            +
            =
         | 
| 683 | 
            +
            �
         | 
| 684 | 
            +
            α∈K∗
         | 
| 685 | 
            +
            �
         | 
| 686 | 
            +
            β∈K∗
         | 
| 687 | 
            +
            α(β(U))
         | 
| 688 | 
            +
            [Proposition 6.5]
         | 
| 689 | 
            +
            ≤
         | 
| 690 | 
            +
            �
         | 
| 691 | 
            +
            α,β∈K∗
         | 
| 692 | 
            +
            α(β(U))
         | 
| 693 | 
            +
            [flattening joins]
         | 
| 694 | 
            +
            ≤
         | 
| 695 | 
            +
            �
         | 
| 696 | 
            +
            α∈K∗
         | 
| 697 | 
            +
            α(U)
         | 
| 698 | 
            +
            [†]
         | 
| 699 | 
            +
            ≡
         | 
| 700 | 
            +
            � N
         | 
| 701 | 
            +
            �
         | 
| 702 | 
            +
            i
         | 
| 703 | 
            +
            ki
         | 
| 704 | 
            +
            �
         | 
| 705 | 
            +
            (U),
         | 
| 706 | 
            +
            where for the step (†) it suffices to show that �
         | 
| 707 | 
            +
            α∈K∗ α(U) is an upper bound of the family
         | 
| 708 | 
            +
            {α(β(U)) | (α, β) ∈ K∗ × K∗}.
         | 
| 709 | 
            +
            Consider arbitrary α, β ∈ K∗.
         | 
| 710 | 
            +
            There must be lists s and t of indices
         | 
| 711 | 
            +
            of K such that α ≡ o(s) and β ≡ o(t). Picking δ := o(s t) then gives a δ ∈ K∗, is then an upper bound
         | 
| 712 | 
            +
            for o(s) and o(t) (as in Proposition 6.6). By Proposition 6.2, we have that o(s)(o(t)(U)) ≡ o(s t)(U) ≡
         | 
| 713 | 
            +
            δ(U) ≤ �
         | 
| 714 | 
            +
            α∈K∗ α(U).
         | 
| 715 | 
            +
            11
         | 
| 716 | 
            +
             | 
| 717 | 
            +
            Tosun and Escard´o
         | 
| 718 | 
            +
            For Scott continuity, let {Uj}j:J be a directed family over O(X). The result then follows as:
         | 
| 719 | 
            +
            � N
         | 
| 720 | 
            +
            �
         | 
| 721 | 
            +
            K
         | 
| 722 | 
            +
            � 
         | 
| 723 | 
            +
            �
         | 
| 724 | 
            +
            j:J
         | 
| 725 | 
            +
            Uj
         | 
| 726 | 
            +
            
         | 
| 727 | 
            +
            
         | 
| 728 | 
            +
            ≡
         | 
| 729 | 
            +
            �
         | 
| 730 | 
            +
            α∈K∗
         | 
| 731 | 
            +
            α
         | 
| 732 | 
            +
            
         | 
| 733 | 
            +
            �
         | 
| 734 | 
            +
            j:J
         | 
| 735 | 
            +
            Uj
         | 
| 736 | 
            +
            
         | 
| 737 | 
            +
            
         | 
| 738 | 
            +
            =
         | 
| 739 | 
            +
            �
         | 
| 740 | 
            +
            α∈K∗
         | 
| 741 | 
            +
            �
         | 
| 742 | 
            +
            j:J
         | 
| 743 | 
            +
            α(Uj)
         | 
| 744 | 
            +
            [Proposition 6.5]
         | 
| 745 | 
            +
            =
         | 
| 746 | 
            +
            �
         | 
| 747 | 
            +
            j:J
         | 
| 748 | 
            +
            �
         | 
| 749 | 
            +
            α∈K∗
         | 
| 750 | 
            +
            α(Uj)
         | 
| 751 | 
            +
            [joins commute]
         | 
| 752 | 
            +
            ≡
         | 
| 753 | 
            +
            �
         | 
| 754 | 
            +
            j:J
         | 
| 755 | 
            +
            � N
         | 
| 756 | 
            +
            �
         | 
| 757 | 
            +
            K
         | 
| 758 | 
            +
            �
         | 
| 759 | 
            +
            (Uj)
         | 
| 760 | 
            +
            as required.
         | 
| 761 | 
            +
            The fact that �N
         | 
| 762 | 
            +
            i ki is an upper bound of K is easy to verify: given some ki and U : O(X), ki(U) ∈
         | 
| 763 | 
            +
            {α(U) | α ∈ K∗} since ki ∈ K∗. To see that it is the least upper bound, consider a Scott continuous
         | 
| 764 | 
            +
            nucleus j that is an upper bound of K. Let U : O(X). We need to show that (�N
         | 
| 765 | 
            +
            i ki)(U) ≤ j(U). We
         | 
| 766 | 
            +
            know by Proposition 6.4 that j is an upper bound of K∗, since it is an upper bound of K, which is to
         | 
| 767 | 
            +
            say K∗
         | 
| 768 | 
            +
            s(U) ≤ j(U) for every s : List(I) i.e. j(U) is an upper bound of the family {α(U) | α ∈ K∗}. Since
         | 
| 769 | 
            +
            (�N
         | 
| 770 | 
            +
            i ki)(U) is the least upper bound of this family by definition, it follows that it is below j(U).
         | 
| 771 | 
            +
            ✷
         | 
| 772 | 
            +
            We use Proposition 6.7 to prove the following.
         | 
| 773 | 
            +
            Proposition 6.9 (Distributivity) For any Scott continuous nucleus j and any family {ki}i:I of Scott
         | 
| 774 | 
            +
            continuous nuclei, we have that
         | 
| 775 | 
            +
            j ∧
         | 
| 776 | 
            +
            ��
         | 
| 777 | 
            +
            i:I
         | 
| 778 | 
            +
            ki
         | 
| 779 | 
            +
            �
         | 
| 780 | 
            +
            =
         | 
| 781 | 
            +
            �
         | 
| 782 | 
            +
            i:I
         | 
| 783 | 
            +
            j ∧ ki.
         | 
| 784 | 
            +
            It follows that the Scott continuous nuclei form a frame.
         | 
| 785 | 
            +
            Definition 6.10 (Patch locale of a spectral locale) Let X be a large, locally small, and small com-
         | 
| 786 | 
            +
            plete spectral locale. The patch locale of X, written Patch(X), is given by the frame of Scott continuous
         | 
| 787 | 
            +
            nuclei on X.
         | 
| 788 | 
            +
            Note that we do not assume that locale X is spectral in Definition 6.10. This is to highlight the fact
         | 
| 789 | 
            +
            that the construction of the patch frame does not rely on this assumption in a crucial way. However,
         | 
| 790 | 
            +
            the reader is reminded that the patch construction is meaningful only on spectral locales, as its universal
         | 
| 791 | 
            +
            property can be proved only for spectral locales.
         | 
| 792 | 
            +
            Definition 6.10 gives rise to a problem that we need to address: the patch of a locally small locale does
         | 
| 793 | 
            +
            not yield a locally small locale. Starting with a (U+, U, U)-locale X, Patch(X) is a (U+, U+, U)-locale since
         | 
| 794 | 
            +
            the pointwise ordering of nuclei (defined in Proposition 5.1) quantifies over arbitrary opens. In most of
         | 
| 795 | 
            +
            our development, we have restricted attention to only locally small frames meaning we run into problems
         | 
| 796 | 
            +
            if Patch(X) is not locally small (e.g. applying the Adjoint Functor Theorem). We circumvent this by using
         | 
| 797 | 
            +
            the following small version of the same relation:
         | 
| 798 | 
            +
            Definition 6.11 (Basic nuclei ordering on spectral locales) Let X be a spectral locale and denote
         | 
| 799 | 
            +
            its basis by {Bi}i:I. Let j, k : O(X) → O(X) be two nuclei. We define the basic nuclei ordering − ≤K −
         | 
| 800 | 
            +
            as
         | 
| 801 | 
            +
            j ≤K k
         | 
| 802 | 
            +
            :=
         | 
| 803 | 
            +
            �
         | 
| 804 | 
            +
            i:I
         | 
| 805 | 
            +
            j(Bi) ≤ k(Bi).
         | 
| 806 | 
            +
            Given two nuclei j and k on a (U, V, W)-locale, the relation j ≤K k lives in universe V ∨ W meaning,
         | 
| 807 | 
            +
            in the case of a (U+, U, U)-locale, it lives in U as desired.
         | 
| 808 | 
            +
            Proposition 6.12 The basic nuclei ordering defined in Definition 6.11 is logically equivalent to the point-
         | 
| 809 | 
            +
            wise ordering of nuclei.
         | 
| 810 | 
            +
            12
         | 
| 811 | 
            +
             | 
| 812 | 
            +
            Tosun and Escard´o
         | 
| 813 | 
            +
            Proof. The usual pointwise ordering obviously implies the basic ordering so we address the other direction.
         | 
| 814 | 
            +
            Let j and k be two Scott continuous nuclei on a spectral locale X and assume that j ≤K k. We need to
         | 
| 815 | 
            +
            show that j(U) ≤ k(U) for every open U. It must be the case that U = �
         | 
| 816 | 
            +
            l∈L Bl where {Bl}l∈L is the basic
         | 
| 817 | 
            +
            covering family of compact opens covering U that is directed. We then have j(�
         | 
| 818 | 
            +
            l∈L Bl) = �
         | 
| 819 | 
            +
            l∈L j(Bl) by
         | 
| 820 | 
            +
            Scott continuity and �
         | 
| 821 | 
            +
            l∈L j(Bl) ≤ �
         | 
| 822 | 
            +
            l∈L k(Bl) since j(Bl) ≤ k(Bl) for every l : L.
         | 
| 823 | 
            +
            ✷
         | 
| 824 | 
            +
            Thanks to Proposition 6.12 our theorems that have the local smallness assumption apply to the patch
         | 
| 825 | 
            +
            frame as we know that Patch(X) always has an equivalent version that is locally small. We also note that
         | 
| 826 | 
            +
            we will not be precise in distinguishing between the basic order and the regular order on nuclei and will
         | 
| 827 | 
            +
            freely switch between the two, making implicit use of Proposition 6.12.
         | 
| 828 | 
            +
            7
         | 
| 829 | 
            +
            The coreflection property of Patch
         | 
| 830 | 
            +
            We prove in this section that our construction of Patch has the desired universal property: it exhibits
         | 
| 831 | 
            +
            Stone as a coreflective subcategory of Spec. We also note that when we talk about Stone and spectral
         | 
| 832 | 
            +
            locales in this section, we implicitly assume them to be large, locally small, and small complete, and refrain
         | 
| 833 | 
            +
            from explicitly stating this assumption.
         | 
| 834 | 
            +
            The notions of closed and open nuclei are crucial for proving the universal property. We start with the
         | 
| 835 | 
            +
            definitions of these. Let U be an open of a locale X;
         | 
| 836 | 
            +
            (i) The closed nucleus induced by U is the map V �→ U ∨ V ;
         | 
| 837 | 
            +
            (ii) The open nucleus induced by U is the map V �→ U ⇒ V .
         | 
| 838 | 
            +
            We denote the closed nucleus by ‘U’ and, because the open nucleus is the Boolean complement of the closed
         | 
| 839 | 
            +
            nucleus, we denote it by ¬‘U’. This follows the notation of [8,10]. We now prove the Scott continuity of
         | 
| 840 | 
            +
            these nuclei.
         | 
| 841 | 
            +
            Lemma 7.1 For any spectral locale X and any monotone map h : O(X) → O(X), if for every U : O(X)
         | 
| 842 | 
            +
            and compact C : O(X) with C ≤ h(U), there is some compact D ≤ U such that C ≤ h(D), then h is Scott
         | 
| 843 | 
            +
            continuous
         | 
| 844 | 
            +
            Lemma 7.2 Let X be a spectral locale. The closed nucleus ‘U’ on X is Scott continuous for any open U,
         | 
| 845 | 
            +
            whereas the open nucleus is Scott continuous if the open U is compact.
         | 
| 846 | 
            +
            Proof.
         | 
| 847 | 
            +
            Closed nucleus. Let U be an open of a locale and let {Vi}i:I be a directed family of opens. We need to
         | 
| 848 | 
            +
            show that ‘U’(�
         | 
| 849 | 
            +
            i:I Vi) = �
         | 
| 850 | 
            +
            i:I ‘U’(Vi). It is clear that U ∨(�
         | 
| 851 | 
            +
            i:I Vi) is an upper bound of {U ∨Vi}i:I. Let W
         | 
| 852 | 
            +
            be an arbitrary upper bound of {U ∨ Vi}i:I. It suffices to show that W is an upper bound of {U, (�
         | 
| 853 | 
            +
            i:I Vi)}.
         | 
| 854 | 
            +
            For the case of �
         | 
| 855 | 
            +
            i:I Vi, we have that �
         | 
| 856 | 
            +
            i:I Vi ≤ �
         | 
| 857 | 
            +
            i:I U ∨ Vi ≤ W. For the case of U, we use the fact that Vi
         | 
| 858 | 
            +
            directed. Since Vi is directed it must be inhabited by some Vk. We then have U ≤ U ∨ Vk ≤ W as W is
         | 
| 859 | 
            +
            an upper bound of {U ∨ Vi}i:I.
         | 
| 860 | 
            +
            Open nucleus. Let U be a compact open of a locale. By Lemma 7.1, it is sufficient to show that
         | 
| 861 | 
            +
            for any open V and any compact open C1 with C1 ≤ U ⇒ V , there exists some compact C2 ≤ U such
         | 
| 862 | 
            +
            that C1 ≤ U ⇒ C2. Let V and C1 be two opens with C1 compact and satisfying C1 ≤ U ⇒ V . Pick
         | 
| 863 | 
            +
            C2 := U ∧ C1. We know that this is compact by spectrality. It remains to check (1) C2 ≤ V and (2)
         | 
| 864 | 
            +
            C1 ≤ U ⇒ C2, both of which are direct.
         | 
| 865 | 
            +
            ✷
         | 
| 866 | 
            +
            In Lemma 7.5, we prove that the map whose inverse image sends an open U to the closed nucleus ‘U’
         | 
| 867 | 
            +
            is perfect. Before Lemma 7.5, we record two auxiliary lemmas that are needed in the proof.
         | 
| 868 | 
            +
            Lemma 7.3 Let X be a spectral locale with a small basis. The right adjoint ε∗ : O(Patch(X)) → O(X)
         | 
| 869 | 
            +
            of ‘−’ is given by the assignment j �→ j(⊥) i.e. ε∗(j) = j(⊥) for every Scott continuous nucleus j on X.
         | 
| 870 | 
            +
            Lemma 7.4 Given a directed family {ki}i:I of Scott continuous nuclei, their join is computed pointwise,
         | 
| 871 | 
            +
            that is, (�
         | 
| 872 | 
            +
            i:I ki) (U) = �
         | 
| 873 | 
            +
            i:I ki(U).
         | 
| 874 | 
            +
            Proofs of Lemma 7.3 and Lemma 7.4 can be found in [8]. They are omitted here as they are mostly
         | 
| 875 | 
            +
            unchanged in our type-theoretical setting.
         | 
| 876 | 
            +
            13
         | 
| 877 | 
            +
             | 
| 878 | 
            +
            Tosun and Escard´o
         | 
| 879 | 
            +
            Lemma 7.5 The function that sends an open U to the closed nucleus ‘U’ is a perfect frame homomorphism
         | 
| 880 | 
            +
            O(X) → O(Patch(X)).
         | 
| 881 | 
            +
            Proof. We have to show that the right adjoint ε∗ of ‘−’ is Scott continuous. Let {ki}i:I be a directed family
         | 
| 882 | 
            +
            of Scott continuous nuclei. By Lemma 7.3, it suffices to show (�
         | 
| 883 | 
            +
            i:I ki) (⊥) = �
         | 
| 884 | 
            +
            i:I ε∗(ki). By Lemma 7.4,
         | 
| 885 | 
            +
            we have that (�
         | 
| 886 | 
            +
            i:I ki) (⊥) = �
         | 
| 887 | 
            +
            i:I ki(⊥). The desired result of �
         | 
| 888 | 
            +
            i:I ki(⊥) = �
         | 
| 889 | 
            +
            i:I ε∗(ki) is then immediate
         | 
| 890 | 
            +
            by Lemma 7.3.
         | 
| 891 | 
            +
            ✷
         | 
| 892 | 
            +
            This function defines a continuous map ε : Patch(X) → X, which we we will show to be the counit of
         | 
| 893 | 
            +
            the coreflection in consideration.
         | 
| 894 | 
            +
            7.1
         | 
| 895 | 
            +
            Patch is Stone
         | 
| 896 | 
            +
            Before we proceed to showing that the Patch locale has the desired universal property, we first need to
         | 
| 897 | 
            +
            show that Patch(X) is Stone (as given in Definition 3.17) for any spectral locale X. We start by addressing
         | 
| 898 | 
            +
            the question of zero-dimensionality.
         | 
| 899 | 
            +
            To show that Patch(X) is zero-dimensional, we need to construct a basis consisting of clopens. We will
         | 
| 900 | 
            +
            use the following fact, which was already mentioned above:
         | 
| 901 | 
            +
            Proposition 7.6 The open nucleus ¬‘U’ is the Boolean complement of the closed nucleus ‘U’.
         | 
| 902 | 
            +
            Lemma 7.7 The patch of any spectral locale X with a basis {Bi}i:I of compact opens is zero-dimensional,
         | 
| 903 | 
            +
            with a basis of clopens of the form �
         | 
| 904 | 
            +
            (m,n)∈M×N ‘Bm’ ∧ ¬‘Bn’ with M and N finite, which is clearly closed
         | 
| 905 | 
            +
            under finite joins.
         | 
| 906 | 
            +
            More precisely, if the given basis of X is the family B : I → O(X), then the constructed basis of Patch(X)
         | 
| 907 | 
            +
            is the family C : List(I × I) → O(Patch(X)) defined by
         | 
| 908 | 
            +
            C([(n0, m0), . . . , (nk−1, mk−1)]) :=
         | 
| 909 | 
            +
            �
         | 
| 910 | 
            +
            0≤i<k
         | 
| 911 | 
            +
            ‘Bmi’ ∧ ¬‘Bni’.
         | 
| 912 | 
            +
            That is, the index set of the basis consists of formal expressions for finite joins.
         | 
| 913 | 
            +
            Proof. We need to show that this (1) consists of clopens, and (2) indeed forms a basis. For (1), ‘B1’∧¬‘B2’
         | 
| 914 | 
            +
            has complement ¬‘B1’∨‘B2’, by Proposition 7.6, and finite unions of complemented sets are complemented.
         | 
| 915 | 
            +
            For (2), let j : O(X) → O(X) be a perfect nucleus on O(X). We need to show that there exists a subfamily
         | 
| 916 | 
            +
            of B that yields j as its join. For this we pick the subfamily Bj := {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}.
         | 
| 917 | 
            +
            The fact that j is the least upper bound of Bj follows from Lemma 7.8 and Lemma 7.9:
         | 
| 918 | 
            +
            j
         | 
| 919 | 
            +
            =
         | 
| 920 | 
            +
            �
         | 
| 921 | 
            +
            n:I
         | 
| 922 | 
            +
            ‘j(Bn)’ ∧ ¬‘Bn’
         | 
| 923 | 
            +
            [Lemma 7.8]
         | 
| 924 | 
            +
            =
         | 
| 925 | 
            +
            �
         | 
| 926 | 
            +
            {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}
         | 
| 927 | 
            +
            [Lemma 7.9]
         | 
| 928 | 
            +
            ✷
         | 
| 929 | 
            +
            The following is adapted from Johnstone [11, Proposition II.2.7].
         | 
| 930 | 
            +
            Lemma 7.8 Given any perfect nucleus j : Patch(X), we have that j = � {‘j(Bn)’ ∧ ¬‘Bn’ | n : I}.
         | 
| 931 | 
            +
            Lemma 7.9 Let X be a spectral locale.
         | 
| 932 | 
            +
            Given any perfect nucleus j
         | 
| 933 | 
            +
            : Patch(X), we have that
         | 
| 934 | 
            +
            � {‘j(Bn)’ ∧ ¬‘Bn’ | n : I} = � {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}.
         | 
| 935 | 
            +
            Theorem 7.10 Given any spectral locale X, we have that Patch(X) is a Stone locale.
         | 
| 936 | 
            +
            Proof. Zero-dimensionality is given by Lemma 7.7 so it only remains to show compactness. Recall that
         | 
| 937 | 
            +
            the top element ⊤ of Patch(X) is defined as ⊤ := − �→ ⊤X. Because ε is a frame homomorphism, it must
         | 
| 938 | 
            +
            be the case that ⊤ = ε(⊤X) meaning what we want to show is ε(⊤X) ≪ ε(⊤X). By Proposition 4.5, it
         | 
| 939 | 
            +
            suffices to show ⊤X ≪ ⊤X which is immediate as spectral locales are compact.
         | 
| 940 | 
            +
            ✷
         | 
| 941 | 
            +
            14
         | 
| 942 | 
            +
             | 
| 943 | 
            +
            Tosun and Escard´o
         | 
| 944 | 
            +
            7.2
         | 
| 945 | 
            +
            The universal property of the patch construction
         | 
| 946 | 
            +
            We now prove the universal property of Patch corresponding to the fact that it is the right adjoint to the
         | 
| 947 | 
            +
            inclusion Stone ֒→ Spec. For this purpose, we use the following lemma, which is not needed in [8, 10]
         | 
| 948 | 
            +
            thanks to the existence of the frame of all nuclei in the impredicative setting.
         | 
| 949 | 
            +
            Lemma 7.11 Let L, L′ be two spectral frames and B a small Boolean algebra embedded in L such that
         | 
| 950 | 
            +
            (i) L is generated by A, and
         | 
| 951 | 
            +
            (ii) B contains all compact opens of L.
         | 
| 952 | 
            +
            Then for any lattice homomorphism h : B → L′, there is a unique frame homomorphism ¯h : L → L′
         | 
| 953 | 
            +
            satisfying h = ¯h ◦ η, where η : B ֒→ L denotes the embedding of B into L, as illustrated in the following
         | 
| 954 | 
            +
            diagram:
         | 
| 955 | 
            +
            B
         | 
| 956 | 
            +
            L
         | 
| 957 | 
            +
            L′.
         | 
| 958 | 
            +
            h
         | 
| 959 | 
            +
            η
         | 
| 960 | 
            +
            ¯h
         | 
| 961 | 
            +
            (†)
         | 
| 962 | 
            +
            Proof. Define ¯h(x) := � {h(b) | η(b) ≤ x, b : B}. We need to show that (1) ¯h is a frame homomorphism,
         | 
| 963 | 
            +
            and (2) is the unique map satisfying h = ¯h ◦ η.
         | 
| 964 | 
            +
            (1) It is clear that ¯h preserves ⊥, ⊤, and joins of directed families. To show that it preserves binary
         | 
| 965 | 
            +
            joins, we make use of the fact that for any b ≤ x ∨ y with b compact (in any spectral locale), there exist
         | 
| 966 | 
            +
            compact opens c ≤ x and d ≤ y such that b ≤ c ∨ d. As it preserves both binary joins and directed joins,
         | 
| 967 | 
            +
            it must preserve arbitrary joins.
         | 
| 968 | 
            +
            (2) It is easy to see that ¯h satisfies the equation h = ¯h ◦ η. Uniqueness follows from the fact that η is
         | 
| 969 | 
            +
            injective.
         | 
| 970 | 
            +
            ✷
         | 
| 971 | 
            +
            We can now present the universal property.
         | 
| 972 | 
            +
            Theorem 7.12 Given any spectral map f : X → A from a Stone locale into a spectral locale, there exists
         | 
| 973 | 
            +
            a unique spectral map ¯f : X → Patch(A) satisfying ε ◦ ¯f = f, as illustrated in the following diagram in the
         | 
| 974 | 
            +
            category of spectral locales:
         | 
| 975 | 
            +
            X
         | 
| 976 | 
            +
            A
         | 
| 977 | 
            +
            Patch(A)
         | 
| 978 | 
            +
            f
         | 
| 979 | 
            +
            ¯f
         | 
| 980 | 
            +
            ε
         | 
| 981 | 
            +
            Proof. We apply Lemma 7.11 with L := O(Patch(A)), L′ := O(X), B := K(Patch(A)) and h defined by
         | 
| 982 | 
            +
            h
         | 
| 983 | 
            +
            
         | 
| 984 | 
            +
            
         | 
| 985 | 
            +
            �
         | 
| 986 | 
            +
            (j,k)∈J×K
         | 
| 987 | 
            +
            ‘Bj’ ∧ ¬‘Bk’
         | 
| 988 | 
            +
            
         | 
| 989 | 
            +
            
         | 
| 990 | 
            +
            :=
         | 
| 991 | 
            +
            �
         | 
| 992 | 
            +
            (j,k)∈J×K
         | 
| 993 | 
            +
            f ∗(Bj) ∧ ¬f ∗(Bk).
         | 
| 994 | 
            +
            It is easy to see that h is well-defined, in the sense that if the same clopen is expressed in two different
         | 
| 995 | 
            +
            ways as a finite join of binary meets, then h gives the same value for them. It is easy to check that the
         | 
| 996 | 
            +
            embedding K(Patch(A)) ֒→ O(Patch(A)) satisfies the premise of the lemma. We then take ¯f ∗ to be ¯h as
         | 
| 997 | 
            +
            constructed in the lemma. We need to show that this satisfies ¯f ∗(‘U’) = f ∗(U) for all U : O(A). It suffices
         | 
| 998 | 
            +
            to consider the case where U is a compact open C, as the compact opens form a basis. Because C can be
         | 
| 999 | 
            +
            written as �{‘C’ ∧ ¬‘⊥’}, we have that
         | 
| 1000 | 
            +
            ¯f ∗(‘C’) = h
         | 
| 1001 | 
            +
            ��
         | 
| 1002 | 
            +
            {‘C’ ∧ ¬‘⊥’}
         | 
| 1003 | 
            +
            �
         | 
| 1004 | 
            +
            =
         | 
| 1005 | 
            +
            �
         | 
| 1006 | 
            +
            {f ∗(C) ∧ ¬f ∗(⊥)} =
         | 
| 1007 | 
            +
            �
         | 
| 1008 | 
            +
            {f ∗(C) ∧ ⊤} = f ∗(C),
         | 
| 1009 | 
            +
            as required.
         | 
| 1010 | 
            +
            ✷
         | 
| 1011 | 
            +
            15
         | 
| 1012 | 
            +
             | 
| 1013 | 
            +
            Tosun and Escard´o
         | 
| 1014 | 
            +
            8
         | 
| 1015 | 
            +
            Summary and discussion
         | 
| 1016 | 
            +
            We have constructed the patch locale of a spectral locale in the predicative and constructive setting of
         | 
| 1017 | 
            +
            univalent type theory, using only propositional and functional extensionality. Furthermore, we have shown
         | 
| 1018 | 
            +
            that the patch construction Patch : Spec → Stone is the right adjoint to the inclusion Stone ֒→ Spec
         | 
| 1019 | 
            +
            which is to say that patch exhibits the category Stone as a coreflective subcategory of Spec.
         | 
| 1020 | 
            +
            As we have elaborated in Section 3, answering this question in a predicative setting has involved the
         | 
| 1021 | 
            +
            reformulation of several fundamental concepts of locale theory. In particular, we have reformulated notions
         | 
| 1022 | 
            +
            of spectrality, zero-dimensionality, and regularity, and have shown that crucial facts about these notions
         | 
| 1023 | 
            +
            remain valid in the predicative setting.
         | 
| 1024 | 
            +
            We have also formalised almost all of our development, most importantly Theorem 7.10 and
         | 
| 1025 | 
            +
            Lemma 7.11. The formalisation has been carried out by the first-named author as part 3 of the second-
         | 
| 1026 | 
            +
            named author’s TypeTopology library [7]. Almost all of the presented results have already been imple-
         | 
| 1027 | 
            +
            mented, including:
         | 
| 1028 | 
            +
            (i) All of Section 3 in the module Locales.CompactRegular;
         | 
| 1029 | 
            +
            (ii) The Adjoint Functor Theorem and its application to define Heyting implications in frames (Sec-
         | 
| 1030 | 
            +
            tion 4) in modules Locales.GaloisConnection, Locales.AdjointFunctorTheoremForFrames, and
         | 
| 1031 | 
            +
            Locales.HeytingImplication;
         | 
| 1032 | 
            +
            (iii) All of Section 5 and Section 6 in module Locales.PatchLocale; and
         | 
| 1033 | 
            +
            (iv) The extension lemma (Lemma 7.11) from Section 7.2 in Locales.BooleanAlgebra.
         | 
| 1034 | 
            +
            The only result that remains to be formalised is the universal property which we have proved using
         | 
| 1035 | 
            +
            Lemma 7.11. The formalisation of this result is work in progress and is soon to be completed.
         | 
| 1036 | 
            +
            In previous work [8,10], that forms the basis of the present work, the patch construction was used to
         | 
| 1037 | 
            +
            (i) exhibit Stone as a coreflective subcategory of Spec, which we have addressed here, and
         | 
| 1038 | 
            +
            (ii) exhibit the category of compact regular locales and continuous maps as a coreflective subcategory of
         | 
| 1039 | 
            +
            of stably compact locales and perfect maps, which we leave for future work.
         | 
| 1040 | 
            +
            Coquand and Zhang [4] tackled (ii) using formal topology. We conjecture that it should be possible to
         | 
| 1041 | 
            +
            instead use the approach we have presented here, namely, working with locales with small bases and
         | 
| 1042 | 
            +
            constructing the patch as the frame of Scott continuous nuclei.
         | 
| 1043 | 
            +
            References
         | 
| 1044 | 
            +
            [1] Agda development team, The Agda Proof Assistant (version 2.6.2).
         | 
| 1045 | 
            +
            URL https://agda.readthedocs.io/en/v2.6.2/team.html
         | 
| 1046 | 
            +
            [2] Coquand, T., G. Sambin, J. Smith and S. Valentini, Inductively generated formal topologies 124, pp. 71–106.
         | 
| 1047 | 
            +
            [3] Coquand, T. and A. Tosun, Formal Topology and Univalent Foundations, in: Proof and Computation II, WORLD
         | 
| 1048 | 
            +
            SCIENTIFIC pp. 255–266.
         | 
| 1049 | 
            +
            [4] Coquand, T. and G.-Q. Zhang, A representation of stably compact spaces, and patch topology 305, pp. 77–84.
         | 
| 1050 | 
            +
            [5] de Jong, T. and M. H. Escard´o, Domain theory in constructive and predicative univalent foundations, in: C. Baier
         | 
| 1051 | 
            +
            and J. Goubault-Larrecq, editors, 29th EACSL Annual Conference on Computer Science Logic (CSL 2021), Leibniz
         | 
| 1052 | 
            +
            International Proceedings in Informatics (LIPIcs) 183, pp. 28:1–28:18.
         | 
| 1053 | 
            +
            [6] de Jong, T. and M. H. Escard´o, Predicative Aspects of Order Theory in Univalent Foundations, in: N. Kobayashi, editor,
         | 
| 1054 | 
            +
            6th International Conference on Formal Structures for Computation and Deduction (FSCD 2021), Leibniz International
         | 
| 1055 | 
            +
            Proceedings in Informatics (LIPIcs) 195, pp. 8:1–8:18.
         | 
| 1056 | 
            +
            [7] Escard´o, M., and contributors, TypeTopology, Agda library.
         | 
| 1057 | 
            +
            URL https://github.com/martinescardo/TypeTopology
         | 
| 1058 | 
            +
            [8] Escard´o, M. H., On the Compact-regular Coreflection of a Stably Compact Locale 20, pp. 213–228.
         | 
| 1059 | 
            +
            3 The HTML rendering of the Agda code can be browsed here https://www.cs.bham.ac.uk/∼mhe/TypeTopology/Locales.index.html
         | 
| 1060 | 
            +
            16
         | 
| 1061 | 
            +
             | 
| 1062 | 
            +
            Tosun and Escard´o
         | 
| 1063 | 
            +
            [9] Escard´o, M. H., Properly injective spaces and function spaces 89, pp. 75–120.
         | 
| 1064 | 
            +
            [10] Escard´o, M. H., The regular locally compact coreflection of a stably locally compact locale 157, pp. 41–55.
         | 
| 1065 | 
            +
            [11] Johnstone, P. T., “Stone Spaces,” Cambridge Univ. Press.
         | 
| 1066 | 
            +
            [12] Mac Lane, S. and I. Moerdijk, “Sheaves in Geometry and Logic: A First Introduction to Topos Theory,” Universitext,
         | 
| 1067 | 
            +
            Springer-Verlag.
         | 
| 1068 | 
            +
            [13] Sambin, G., Intuitionistic Formal Spaces — A First Communication, in: D. G. Skordev, editor, Mathematical Logic and
         | 
| 1069 | 
            +
            Its Applications, Springer US pp. 187–204.
         | 
| 1070 | 
            +
            [14] UFP, “Homotopy Type Theory: Univalent Foundations of Mathematics,” .
         | 
| 1071 | 
            +
            URL https://homotopytypetheory.org/book
         | 
| 1072 | 
            +
            [15] Voevodsky, V., Resizing Rules — their use and semantic justification, invited talk at TYPES 2011, Bergen, Norway.
         | 
| 1073 | 
            +
            17
         | 
| 1074 | 
            +
             | 
    	
        TNE3T4oBgHgl3EQfzgsS/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        VdFJT4oBgHgl3EQfOSwV/content/tmp_files/2301.11481v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,2665 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.11481v1  [cs.GT]  27 Jan 2023
         | 
| 2 | 
            +
            Are Equivariant Equilibrium Approximators Beneficial?
         | 
| 3 | 
            +
            Zhijian Duan1, Yunxuan Ma1, Xiaotie Deng1,2
         | 
| 4 | 
            +
            1Center on Frontiers of Computing Studies, Peking University
         | 
| 5 | 
            +
            2Center for Multi-Agent Research, Institute for AI, Peking University
         | 
| 6 | 
            +
            {zjduan,charmingmyx,xiaotie}@pku.edu.cn
         | 
| 7 | 
            +
            Abstract
         | 
| 8 | 
            +
            Recently, remarkable progress has been made by approximating Nash equilibrium (NE), corre-
         | 
| 9 | 
            +
            lated equilibrium (CE), and coarse correlated equilibrium (CCE) through function approximation
         | 
| 10 | 
            +
            that trains a neural network to predict equilibria from game representations. Furthermore, equiv-
         | 
| 11 | 
            +
            ariant architectures are widely adopted in designing such equilibrium approximators in normal-
         | 
| 12 | 
            +
            form games. In this paper, we theoretically characterize benefits and limitations of equivariant
         | 
| 13 | 
            +
            equilibrium approximators. For the benefits, we show that they enjoy better generalizability than
         | 
| 14 | 
            +
            general ones and can achieve better approximations when the payoff distribution is permutation-
         | 
| 15 | 
            +
            invariant. For the limitations, we discuss their drawbacks in terms of equilibrium selection and
         | 
| 16 | 
            +
            social welfare. Together, our results help to understand the role of equivariance in equilibrium
         | 
| 17 | 
            +
            approximators.
         | 
| 18 | 
            +
            1
         | 
| 19 | 
            +
            Introduction
         | 
| 20 | 
            +
            The equivariant equilibrium property states that, given a Nash Equilibrium (NE) solution of a
         | 
| 21 | 
            +
            game, the permuted solution is also an NE for the game whose actions of representation are permuted
         | 
| 22 | 
            +
            in the same way. The same property also holds in correlated equilibrium (CE) and coarse correlated
         | 
| 23 | 
            +
            equilibrium (CCE), as well as the approximate solutions for all three solution concepts.
         | 
| 24 | 
            +
            In this paper, we are interested in understanding the equivariant equilibrium property in designing
         | 
| 25 | 
            +
            neural networks that predict equilibria from game payoffs, following such recent approaches in de-
         | 
| 26 | 
            +
            signing equivariant equilibrium approximators [Feng et al., 2021, Marris et al., 2022] in normal-form
         | 
| 27 | 
            +
            games. Informally, such equivariant approximators keep the same permutation of the output strate-
         | 
| 28 | 
            +
            gies (represented as vectors or tensors) when the input game representations (e.g., the game payoff
         | 
| 29 | 
            +
            tensors) are permuted 1. While equivariant approximators achieved empirical success, little work has
         | 
| 30 | 
            +
            theoretically discussed whether they are beneficial.
         | 
| 31 | 
            +
            We theoretically characterize benefits and limitations of equivariant NE, CE and CCE approx-
         | 
| 32 | 
            +
            imators. For the benefits, we first show that equivariant approximators enjoy better generalizabil-
         | 
| 33 | 
            +
            ity, where we evaluate the approximators using the maximum exploitability [Lockhart et al., 2019,
         | 
| 34 | 
            +
            Goktas and Greenwald, 2022] over all players. To get such a result, we derive the generalization bounds
         | 
| 35 | 
            +
            and the sample complexities of the NE, CE, and CCE approximators: The generalization bounds offer
         | 
| 36 | 
            +
            confidence intervals on the expected testing approximations based on the empirical training approxi-
         | 
| 37 | 
            +
            mations; The sample complexities describe how many training samples the equilibrium approximators
         | 
| 38 | 
            +
            need to achieve desirable generalizability. The generalization bounds and sample complexities include
         | 
| 39 | 
            +
            the covering numbers [Shalev-Shwartz and Ben-David, 2014], which measure the representativeness of
         | 
| 40 | 
            +
            the approximators’ function classes. Afterward, we prove that the equivariant approximators have
         | 
| 41 | 
            +
            lower covering numbers than the general models, therefore have lower generalization bounds and sam-
         | 
| 42 | 
            +
            ple complexities. We then show that the equivariant approximators can achieve better approximation
         | 
| 43 | 
            +
            when the payoff distribution is permutation-invariant.
         | 
| 44 | 
            +
            As for the limitations, we find the equivariant approximators unable to find all the equilibria of
         | 
| 45 | 
            +
            some normal-form games. Such a result is caused by the limited representativeness of the equivariant
         | 
| 46 | 
            +
            approximators’ function class. Besides, we find that the equivariant NE approximator may lose social
         | 
| 47 | 
            +
            welfare. Specifically, in an example we constructed, while the maximum NE social welfare is large, the
         | 
| 48 | 
            +
            maximum social welfare of NEs that the equivariant NE approximators could find can be arbitrary
         | 
| 49 | 
            +
            1We will provide a formal definition of equivariance equilibrium approximators in Section 3
         | 
| 50 | 
            +
            1
         | 
| 51 | 
            +
             | 
| 52 | 
            +
            close to zero. Such a negative result inspires us to balance generalizability and social welfare when we
         | 
| 53 | 
            +
            design the approximators’ architectures.
         | 
| 54 | 
            +
            1.1
         | 
| 55 | 
            +
            Further Related Work
         | 
| 56 | 
            +
            Solving (approximate) NE, CE, and CCE for a single game are well studied [Fudenberg et al., 1998,
         | 
| 57 | 
            +
            Cesa-Bianchi and Lugosi, 2006]. However, many similar games often need to be solved [Harris et al.,
         | 
| 58 | 
            +
            2022] , both in practice and in some multi-agent learning algorithms [Marris et al., 2021, Liu et al.,
         | 
| 59 | 
            +
            2022]. For instance, in repeated traffic routing games [Sessa et al., 2020], the payoffs of games de-
         | 
| 60 | 
            +
            pend on the capacity of the underlying network, which can vary with time and weather condi-
         | 
| 61 | 
            +
            tions.
         | 
| 62 | 
            +
            In repeated sponsored search auctions, advertisers value different keywords based on the
         | 
| 63 | 
            +
            current marketing environment [Nekipelov et al., 2015].
         | 
| 64 | 
            +
            In many multi-agent learning algorithms
         | 
| 65 | 
            +
            such as Nash Q-learning [Hu and Wellman, 2003], Correlated-Q learning [Greenwald et al., 2003], V-
         | 
| 66 | 
            +
            learning [Jin et al., 2022] and PSRO [Lanctot et al., 2017], an NE, CE or CCE of a normal-form game
         | 
| 67 | 
            +
            need to be solved in every update step.
         | 
| 68 | 
            +
            In these settings, it is preferred to accelerate the speed of game solving by function approximation:
         | 
| 69 | 
            +
            Marris et al. [2022] introduces a neural equilibrium approximator to approximate CE and CCE for n-
         | 
| 70 | 
            +
            player normal-form games; Feng et al. [2021] proposes a neural NE approximator in PSRO [Lanctot et al.,
         | 
| 71 | 
            +
            2017]; Wu and Lisser [2022] designs a CNN-based NE approximator for zero-sum bimatrix games. Dif-
         | 
| 72 | 
            +
            ferentiable approximators have also been developed to learn QREs [Ling et al., 2018], NE in chance-
         | 
| 73 | 
            +
            constrained games [Wu and Lisser, 2023], and opponent’s strategy [Hartford et al., 2016].
         | 
| 74 | 
            +
            Equivariance is an ideal property of the equilibrium approximator. We will discuss the literates of
         | 
| 75 | 
            +
            equivariant approximators after formally defining them in Section 3.
         | 
| 76 | 
            +
            2
         | 
| 77 | 
            +
            Preliminary
         | 
| 78 | 
            +
            In this section, we introduce the preliminary and notations of our paper. We also provide a brief
         | 
| 79 | 
            +
            introduction to equilibrium approximators.
         | 
| 80 | 
            +
            2.1
         | 
| 81 | 
            +
            Game Theory
         | 
| 82 | 
            +
            Normal-Form Game
         | 
| 83 | 
            +
            Let a normal-form game with joint payoff u be Γu = (n, A, u), in which
         | 
| 84 | 
            +
            • n ∈ N≥2 is the number of players. Each player is represented by the index i ∈ [n].
         | 
| 85 | 
            +
            • A = ×i∈[n]Ai is the product action space of all players, where Ai = {1, 2, . . ., mi}. For player
         | 
| 86 | 
            +
            i ∈ [n], let ai ∈ Ai be a specific action of i (An action is also referred to as a pure strategy). A
         | 
| 87 | 
            +
            joint action a = (a1, a2, . . . , an) ∈ A represents one play of the game in which the player i takes
         | 
| 88 | 
            +
            action ai. The action space A is a Cartesian product that contains all possible joint actions. We
         | 
| 89 | 
            +
            have |A| = �
         | 
| 90 | 
            +
            i∈[n] |Ai| = �
         | 
| 91 | 
            +
            i∈[n] mi.
         | 
| 92 | 
            +
            • u = (ui)i∈[n] is the joint payoff or utility of the game. ui is an n-dimensional tensor (or matrix
         | 
| 93 | 
            +
            if n = 2) describing player i’s payoff on each joint action.
         | 
| 94 | 
            +
            In our paper, following previous
         | 
| 95 | 
            +
            literatures [Tsaknakis and Spirakis, 2007, Deligkas et al., 2022], we normalize all the elements of
         | 
| 96 | 
            +
            payoff into [0, 1].
         | 
| 97 | 
            +
            A joint (mixed) strategy is a distribution over A. Let σ = ×i∈[n]σi be a product strategy and
         | 
| 98 | 
            +
            π ∈ ∆A be a joint (possibly correlated) strategy. Denote πi as the marginal strategy of player i in π.
         | 
| 99 | 
            +
            The expected utility of player i under π is
         | 
| 100 | 
            +
            ui(π) = Ea∼π[ui(a)] =
         | 
| 101 | 
            +
            �
         | 
| 102 | 
            +
            a∈A
         | 
| 103 | 
            +
            π(a)ui(a).
         | 
| 104 | 
            +
            Besides, on behalf of player i, the other players’ joint strategy is denoted as π−i, so as a−i and σ−i.
         | 
| 105 | 
            +
            2
         | 
| 106 | 
            +
             | 
| 107 | 
            +
            Nash Equilibrium (NE)
         | 
| 108 | 
            +
            We say a product strategy σ∗ = (σ∗
         | 
| 109 | 
            +
            1, σ∗
         | 
| 110 | 
            +
            2, . . . , σ∗
         | 
| 111 | 
            +
            n) is a NE if each player’s
         | 
| 112 | 
            +
            strategy is the best response given the strategies of others, i.e.,
         | 
| 113 | 
            +
            ui(σi, σ∗
         | 
| 114 | 
            +
            −i) ≤ ui(σ∗
         | 
| 115 | 
            +
            i , σ∗
         | 
| 116 | 
            +
            −i), ∀i ∈ [n], σi ∈ ∆Ai.
         | 
| 117 | 
            +
            (NE)
         | 
| 118 | 
            +
            Computing NE for even general 2-player or 3-player games is PPAD-hard [Chen et al., 2009, Daskalakis et al.,
         | 
| 119 | 
            +
            2009], which leads to research on approximate solutions. For arbitrary ǫ > 0, we say a product strat-
         | 
| 120 | 
            +
            egy ˆσ is an ǫ-approximate Nash equilibrium (ǫ-NE) if no one can achieve more than ǫ utility gain by
         | 
| 121 | 
            +
            deviating from her current strategy. Formally,
         | 
| 122 | 
            +
            ui(σi, ˆσ−i) ≤ ui(ˆσi, ˆσ−i) + ǫ, ∀i ∈ [n], σi ∈ ∆Ai.
         | 
| 123 | 
            +
            (ǫ-NE)
         | 
| 124 | 
            +
            The definition of ǫ-NE reflects the idea that players might not be willing to deviate from their strategies
         | 
| 125 | 
            +
            when the amount of utility they could gain by doing so is tiny (not more than ǫ).
         | 
| 126 | 
            +
            Coarse Correlated Equilibrium (CCE)
         | 
| 127 | 
            +
            We say a joint (possibly correlated) strategy π∗ is a CCE
         | 
| 128 | 
            +
            if no player can receive a higher payoff by acting independently, i.e.,
         | 
| 129 | 
            +
            ui(σi, π∗
         | 
| 130 | 
            +
            −i) ≤ ui(π∗), ∀i ∈ [n], σi ∈ ∆Ai,
         | 
| 131 | 
            +
            (CCE)
         | 
| 132 | 
            +
            and we say ˆπ is an ǫ-approximate coarse correlated equilibrium (ǫ-CCE) for ǫ > 0 if
         | 
| 133 | 
            +
            ui(σi, ˆπ−i) ≤ ui(ˆπ) + ǫ, ∀i ∈ [n], σi ∈ ∆Ai,
         | 
| 134 | 
            +
            (ǫ-CCE)
         | 
| 135 | 
            +
            The difference between NE and CCE is that in an NE, players execute their strategy individu-
         | 
| 136 | 
            +
            ally in a decentralized way, while in a CCE, players’ strategies are possibly correlated.
         | 
| 137 | 
            +
            A stan-
         | 
| 138 | 
            +
            dard technique to correlate the strategy is sending each player a signal from a centralized controller
         | 
| 139 | 
            +
            [Shoham and Leyton-Brown, 2008].
         | 
| 140 | 
            +
            Correlated Equilibrium (CE)
         | 
| 141 | 
            +
            CE is similar to CCE, except that in a CE, each player can observe
         | 
| 142 | 
            +
            her recommended action before she acts. Thus, player i deviates her strategy through strategy mod-
         | 
| 143 | 
            +
            ification φi : Ai → Ai. φi maps actions in Ai to possibly different actions in Ai. Based on strategy
         | 
| 144 | 
            +
            modification, we say a joint (possibly correlated) strategy π∗ is a CE if
         | 
| 145 | 
            +
            �
         | 
| 146 | 
            +
            a∈A
         | 
| 147 | 
            +
            π∗(a)ui(φi(ai), a−i) ≤ ui(π∗), ∀i, ∀φi,
         | 
| 148 | 
            +
            (CE)
         | 
| 149 | 
            +
            and a joint strategy ˆπ is an ǫ-approximate correlated equilibrium (ǫ-CE) for ǫ > 0 if
         | 
| 150 | 
            +
            �
         | 
| 151 | 
            +
            a∈A
         | 
| 152 | 
            +
            ˆπ(a)ui(φi(ai), a−i) ≤ ui(ˆπ) + ǫ, ∀i, ∀φi,
         | 
| 153 | 
            +
            (ǫ-CE)
         | 
| 154 | 
            +
            Note that for a finite n-player normal-form game, at least one NE, CE, and CCE must exist. This
         | 
| 155 | 
            +
            is because NE always exists [Nash et al., 1950] and NE ⊆ CE ⊆ CCE.
         | 
| 156 | 
            +
            Equilibrium Approximation
         | 
| 157 | 
            +
            To evaluate the quality of a joint strategy to approximate an equilib-
         | 
| 158 | 
            +
            rium, we define approximation based on exploitability [Lockhart et al., 2019, Goktas and Greenwald,
         | 
| 159 | 
            +
            2022].
         | 
| 160 | 
            +
            Definition 2.1 (Exploitability and Approximation). Given a joint strategy π, the exploitability (or
         | 
| 161 | 
            +
            regret) Ei(π, u) of player i is the maximum payoff gain of i by deviating from her current strategy, i.e.,
         | 
| 162 | 
            +
            Ei(π, u) := max
         | 
| 163 | 
            +
            σ′
         | 
| 164 | 
            +
            i
         | 
| 165 | 
            +
            ui(σ′
         | 
| 166 | 
            +
            i, π−i) − ui(π) = max
         | 
| 167 | 
            +
            a′
         | 
| 168 | 
            +
            i
         | 
| 169 | 
            +
            ui(a′
         | 
| 170 | 
            +
            i, π−i) − ui(π)
         | 
| 171 | 
            +
            and the exploitability under strategy modification ECE
         | 
| 172 | 
            +
            i
         | 
| 173 | 
            +
            (π, u) of player i is the maximum payoff gain of
         | 
| 174 | 
            +
            i by deviating through strategy modification, i.e.,
         | 
| 175 | 
            +
            ECE
         | 
| 176 | 
            +
            i
         | 
| 177 | 
            +
            (π, u) := max
         | 
| 178 | 
            +
            φi
         | 
| 179 | 
            +
            �
         | 
| 180 | 
            +
            a∈A
         | 
| 181 | 
            +
            π(a)ui(φi(ai), a−i) − ui(π).
         | 
| 182 | 
            +
            3
         | 
| 183 | 
            +
             | 
| 184 | 
            +
            Algorithm 1 Example: learning NE/CCE approximator via minibatch SGD
         | 
| 185 | 
            +
            1: Input: Training set S
         | 
| 186 | 
            +
            2: Parameters: Number of iterations T > 0, batch size B > 0, learning rate η > 0, initial parameters
         | 
| 187 | 
            +
            w0 ∈ Rd of the approximator model.
         | 
| 188 | 
            +
            3: for t = 0 to T do
         | 
| 189 | 
            +
            4:
         | 
| 190 | 
            +
            Receive minibatch St = {u(1), . . . , u(B)} ⊂ S
         | 
| 191 | 
            +
            5:
         | 
| 192 | 
            +
            Compute the empirical average approximation of St:
         | 
| 193 | 
            +
            6:
         | 
| 194 | 
            +
            LSt(f wt) ← 1
         | 
| 195 | 
            +
            B
         | 
| 196 | 
            +
            �B
         | 
| 197 | 
            +
            i=1 E(f wt(u(i)), u(i))
         | 
| 198 | 
            +
            7:
         | 
| 199 | 
            +
            Update model parameters:
         | 
| 200 | 
            +
            8:
         | 
| 201 | 
            +
            wt+1 ← wt − η∇wtLSt(f wt)
         | 
| 202 | 
            +
            9: end for
         | 
| 203 | 
            +
            The equilibrium approximation is defined as the maximum exploitability over all players 2, i.e.,
         | 
| 204 | 
            +
            E(π, u) :=
         | 
| 205 | 
            +
            �
         | 
| 206 | 
            +
            maxi∈[n] Ei(π, u)
         | 
| 207 | 
            +
            , for NE and CCE
         | 
| 208 | 
            +
            maxi∈[n] ECE
         | 
| 209 | 
            +
            i
         | 
| 210 | 
            +
            (π, u)
         | 
| 211 | 
            +
            , for CE
         | 
| 212 | 
            +
            Based on approximation, we can restate the definition of solution concepts. A product strategy σ
         | 
| 213 | 
            +
            is an NE of game Γu if E(σ, u) = 0 and is an ǫ-NE if E(σ, u) ≤ ǫ. A joint strategy π is a (C)CE of Γu
         | 
| 214 | 
            +
            if E(π, u) = 0 and is an ǫ-(C)CE if E(π, u) ≤ ǫ.
         | 
| 215 | 
            +
            2.2
         | 
| 216 | 
            +
            Equilibrium Approximator
         | 
| 217 | 
            +
            The equilibrium approximators, including NE, CE, and CCE approximators, aim to predict solution
         | 
| 218 | 
            +
            concepts from game representations. In our paper, we fix the number of players n and action space A.
         | 
| 219 | 
            +
            We denote by U the set of all the possible game payoffs. The NE approximator f NE : U → ×i∈[n]∆Ai
         | 
| 220 | 
            +
            maps a game payoff to a product strategy, where f NE(u)i ∈ ∆Ai is player i’s predicted strategy. We
         | 
| 221 | 
            +
            define FNE as the function class of the NE approximator. Similarly, we define (C)CE approximator
         | 
| 222 | 
            +
            as f (C)CE : U → ∆A and (C)CE approximator class as F(C)CE.
         | 
| 223 | 
            +
            An equilibrium approximator can be learned through machine learning paradigms based on empir-
         | 
| 224 | 
            +
            ical data. For instance, Feng et al. [2021] learn the NE approximator using the game payoffs generated
         | 
| 225 | 
            +
            in the learning process of PSRO, and optimize the approximator by gradient descent in exploitability.
         | 
| 226 | 
            +
            Marris et al. [2022] learn the CE and CCE approximators using the games i.i.d. generated from a
         | 
| 227 | 
            +
            manually designed distribution, and optimize the approximators using maximum welfare minimum
         | 
| 228 | 
            +
            relative entropy loss. Such a loss balances the equilibrium approximation, the social welfare, and the
         | 
| 229 | 
            +
            relative entropy of the joint strategy. Additionally, another simple way to learn NE or CCE equilibrium
         | 
| 230 | 
            +
            approximator is to apply minibatch stochastic gradient descent (SGD) on approximation. Specifically,
         | 
| 231 | 
            +
            we denote w ∈ Rd as the d-dimensional parameter of the approximator, such as the weights of the
         | 
| 232 | 
            +
            neural network. We can optimize w by the standard minibatch SGD algorithm on approximation (See
         | 
| 233 | 
            +
            Algorithm 1).
         | 
| 234 | 
            +
            3
         | 
| 235 | 
            +
            Equivariant Equilibrium Approximator
         | 
| 236 | 
            +
            In this section, we introduce the equivariance of the equilibrium approximators and the way how
         | 
| 237 | 
            +
            we apply orbit averaging [Elesedy and Zaidi, 2021] to construct equivariant approximators. Equiv-
         | 
| 238 | 
            +
            ariant approximator has been developed in many literatures [Hartford et al., 2016, Feng et al., 2021,
         | 
| 239 | 
            +
            Marris et al., 2022, Wu and Lisser, 2022], which we will discuss latter.
         | 
| 240 | 
            +
            We first define the permutation of a game. Let ρi : Ai → Ai be a permutation function of player i,
         | 
| 241 | 
            +
            which is a bijection from Ai to Ai itself. Define Gi ∋ ρi as the class of permutation function for player
         | 
| 242 | 
            +
            i, which forms an Abelian group.
         | 
| 243 | 
            +
            Definition 3.1 (Permutation of a game). For a normal-form game Γu = (n, u, A), we define the
         | 
| 244 | 
            +
            ρi-permutation of payoff tensor u as ρiu = (ρiuj)j∈[n], in which
         | 
| 245 | 
            +
            (ρiuj)(ai, a−i) = uj(ρ−1
         | 
| 246 | 
            +
            i
         | 
| 247 | 
            +
            (ai), a−i), ∀a ∈ A.
         | 
| 248 | 
            +
            2A similar metric of equilibrium approximation is called Nikaido-Isoda function [Nikaidˆo and Isoda, 1955] or Nash-
         | 
| 249 | 
            +
            Conv [Lockhart et al., 2019], which is the sum of exploitability over all players, i.e., �
         | 
| 250 | 
            +
            i∈[n] Ei(π, u).
         | 
| 251 | 
            +
            4
         | 
| 252 | 
            +
             | 
| 253 | 
            +
            We also define the ρi-permutation of joint strategy π as ρiπ, where
         | 
| 254 | 
            +
            (ρiπ)(ai, a−i) = π(ρ−1
         | 
| 255 | 
            +
            i
         | 
| 256 | 
            +
            (ai), a−i), ∀a ∈ A,
         | 
| 257 | 
            +
            and the ρi-permutation of product strategy σ as ρiσ = (ρiσj)j∈[n], where
         | 
| 258 | 
            +
            ∀aj ∈ Aj, ρiσj(aj) =
         | 
| 259 | 
            +
            �
         | 
| 260 | 
            +
            σj(aj)
         | 
| 261 | 
            +
            , if j ̸= i
         | 
| 262 | 
            +
            σi(ρ−1
         | 
| 263 | 
            +
            i ai)
         | 
| 264 | 
            +
            , if j = i
         | 
| 265 | 
            +
            Equivariant NE Approximator
         | 
| 266 | 
            +
            Considering the relationship of ρi-permuted game and ρi-permuted
         | 
| 267 | 
            +
            product strategy, we have the following result for NE:
         | 
| 268 | 
            +
            Lemma 3.2. In a normal-form game Γu = (n, u, A), for arbitrary player i ∈ [n] and any (ǫ-)NE
         | 
| 269 | 
            +
            strategy σ = (σi, σ−i), ρiσ = (ρiσi, σ−i) is also an (ǫ-)NE for the ρi-permuted game Γρiu.
         | 
| 270 | 
            +
            Lemma 3.2 tells the unimportance of action order with respect to NE approximation. Based on it,
         | 
| 271 | 
            +
            we can summarize two ideal properties for NE approximators, which are defined as follows:
         | 
| 272 | 
            +
            Definition 3.3 (Player-Permutation-Equivariance, PPE). We say an NE approximator f NE satisfies
         | 
| 273 | 
            +
            player i permutation-equivariant (i-PE) if for arbitrary permutation function ρi ∈ Gi we have
         | 
| 274 | 
            +
            f NE(ρiu)i = ρif NE(u)i,
         | 
| 275 | 
            +
            (i-PE)
         | 
| 276 | 
            +
            Moreover, we say f NE is player-permutation-equivariant (PPE) if f NE satisfies i-PE for all player
         | 
| 277 | 
            +
            i ∈ [n].
         | 
| 278 | 
            +
            Definition 3.4 (Opponent-Permutation-Invariance, OPI). We say an NE approximator f NE is oppo-
         | 
| 279 | 
            +
            nent i permutation-invariant (i-PI) if for any other player j ∈ [n] − {i} and arbitrary permutation
         | 
| 280 | 
            +
            function ρi ∈ Gi we have
         | 
| 281 | 
            +
            f NE(ρiu)j = f NE(u)j, ∀j ̸= i
         | 
| 282 | 
            +
            (i-PI)
         | 
| 283 | 
            +
            and we say f NE is opponent-permutation-invariant (OPI) if f NE satisfies i-PI for all player i ∈ [n].
         | 
| 284 | 
            +
            Equivariant (C)CE approximator
         | 
| 285 | 
            +
            Considering the relationship of ρi-permuted game and ρi-
         | 
| 286 | 
            +
            permuted joint strategy, we have a similar result for CE and CCE:
         | 
| 287 | 
            +
            Lemma 3.5. In a normal-form game Γu = (n, u, A), for an arbitrary player i ∈ [n] and any (ε-)CE
         | 
| 288 | 
            +
            or (ǫ-)CCE strategy π, ρiπ is also an (ε-)CE or (ǫ-)CCE for the ρi-permuted game Γρiu.
         | 
| 289 | 
            +
            Inspired by Lemma 3.5, we can also summarize an ideal property for CE and CCE approximators
         | 
| 290 | 
            +
            defined as follows.
         | 
| 291 | 
            +
            Definition 3.6 (Permutation-Equivariance,PE). We say an (C)CE approximator f (C)CE is player i
         | 
| 292 | 
            +
            permutation-equivariant (i-PE) if for permutation function ρi ∈ Gi we have
         | 
| 293 | 
            +
            f (C)CE(ρiu) = ρif (C)CE(u),
         | 
| 294 | 
            +
            and we say f (C)CE is permutation-equivariant (PE) if f (C)CE satisfies i-PE for all player i ∈ [n].
         | 
| 295 | 
            +
            Equivariant Approximators in Literature
         | 
| 296 | 
            +
            For two-player games, Feng et al. [2021] propose an
         | 
| 297 | 
            +
            MLP-based NE approximator that satisfies both PPE and OPI for zero-sum games. Additionally, they
         | 
| 298 | 
            +
            also design a Conv1d-based NE approximator that satisfies PPE only. Hartford et al. [2016] give a PPE
         | 
| 299 | 
            +
            approximator to predict players’ strategies. The traditional algorithms Tsaknakis and Spirakis [2007]
         | 
| 300 | 
            +
            and Deligkas et al. [2022], which approximate NE by optimization, are also PPE and OPI to payoff
         | 
| 301 | 
            +
            and the initial strategies. For n-player general games, Marris et al. [2022] provide a permutation-
         | 
| 302 | 
            +
            equivariant approximator to approximate CE and CCE. Equivariant architectures are also adopted
         | 
| 303 | 
            +
            in optimal auction design [Rahme et al., 2021, Duan et al., 2022, Ivanov et al., 2022], and Qin et al.
         | 
| 304 | 
            +
            [2022] theoretically characterize the benefits of permutation-equivariant in auction mechanisms. We
         | 
| 305 | 
            +
            follow the rough idea of Qin et al. [2022] when we analyze the benefits of equivariant equilibrium
         | 
| 306 | 
            +
            approximators.
         | 
| 307 | 
            +
            5
         | 
| 308 | 
            +
             | 
| 309 | 
            +
            3.1
         | 
| 310 | 
            +
            Orbit Averaging
         | 
| 311 | 
            +
            Orbit averaging is a well-known method to enforce equivariance or invariance for a function [Schulz-Mirbach,
         | 
| 312 | 
            +
            1994]. It averages the inputs of a function over the orbit of a group (e.g., the permutation group in
         | 
| 313 | 
            +
            our paper).
         | 
| 314 | 
            +
            Orbit Averaging for NE Approximator
         | 
| 315 | 
            +
            For an NE approximator f NE and any player i ∈ [n],
         | 
| 316 | 
            +
            we can construct a i-PI or i-PE NE approximator by averaging with respect to all the permutations
         | 
| 317 | 
            +
            of player i. Specifically, we construct an i-PI NE approximator by operator Oi with
         | 
| 318 | 
            +
            (Oif NE)(u)j =
         | 
| 319 | 
            +
            �
         | 
| 320 | 
            +
            f NE(u)i
         | 
| 321 | 
            +
            , if j = i
         | 
| 322 | 
            +
            1
         | 
| 323 | 
            +
            |Ai|!
         | 
| 324 | 
            +
            �
         | 
| 325 | 
            +
            ρi∈Gi f NE(ρiu)j
         | 
| 326 | 
            +
            , otherwise
         | 
| 327 | 
            +
            and we construct an i-PE NE approximator by operator Pi with:
         | 
| 328 | 
            +
            (Pif NE)(u)j =
         | 
| 329 | 
            +
            �
         | 
| 330 | 
            +
            1
         | 
| 331 | 
            +
            |Ai|!
         | 
| 332 | 
            +
            �
         | 
| 333 | 
            +
            ρi∈Gi ρ−1
         | 
| 334 | 
            +
            i f NE(ρiu)i
         | 
| 335 | 
            +
            , if j = i
         | 
| 336 | 
            +
            f NE(u)j
         | 
| 337 | 
            +
            , otherwise
         | 
| 338 | 
            +
            Lemma 3.7. Oif NE is i-PI and Pif NE is i-PE. Specially, if f NE is already i-PI or i-PE, then we
         | 
| 339 | 
            +
            have Oif NE = f NE or Pif NE = f NE, respectively.
         | 
| 340 | 
            +
            To construct a PPE or OPI NE approximator, we composite the operators with respect to all
         | 
| 341 | 
            +
            players. Let O = O1 ◦ O2 ◦ · · · ◦ On and P = P1 ◦ P2 ◦ · · · ◦ Pn, we get the following corollary:
         | 
| 342 | 
            +
            Lemma 3.8. Of NE is OPI and Pf NE is PPE. If f NE is already OPI or PPE, we have Of NE = f NE
         | 
| 343 | 
            +
            or Pf NE = f NE, respectively.
         | 
| 344 | 
            +
            Furthermore, we can also compose P ◦O to construct a NE approximator with both PPE and OPI.
         | 
| 345 | 
            +
            Orbit Averaging for (C)CE Approximator
         | 
| 346 | 
            +
            For CE or CCE approximator f, we define Qi-
         | 
| 347 | 
            +
            project for player i ∈ [n] to construct an i-PE approximator, which averages with respect to all the
         | 
| 348 | 
            +
            permutations of player i.
         | 
| 349 | 
            +
            (Qif (C)CE)(u) =
         | 
| 350 | 
            +
            1
         | 
| 351 | 
            +
            |Ai|!
         | 
| 352 | 
            +
            �
         | 
| 353 | 
            +
            ρi∈Gi
         | 
| 354 | 
            +
            ρ−1
         | 
| 355 | 
            +
            i f (C)CE(ρiu)
         | 
| 356 | 
            +
            Similarly, we define Q = Q1 ◦ Q2 ◦ · · · ◦ Qn as the composite operator.
         | 
| 357 | 
            +
            Lemma 3.9. Qif (C)CE is i-PE and Qf (C)CE is PE. Specifically, If f (C)CE is already i-PE or PE,
         | 
| 358 | 
            +
            then we have Qif (C)CE = f (C)CE or Qf (C)CE = f (C)CE, respectively.
         | 
| 359 | 
            +
            Combined with Lemma 3.7, Lemma 3.8 and Lemma 3.9, we can have the following corollary directly.
         | 
| 360 | 
            +
            Corollary 3.10. O2 = O, P2 = P, Q2 = Q.
         | 
| 361 | 
            +
            The benefit of using orbit averaging is shown in the following lemma:
         | 
| 362 | 
            +
            Lemma 3.11. Denote X as an idempotent operator, i.e. X 2 = X (e.g. O, P or Q). For function
         | 
| 363 | 
            +
            class F of NE, CE or CCE approximator, let FX be any subset of F that is closed under X, then XFX
         | 
| 364 | 
            +
            is the largest subset of FX that is invariant under X.
         | 
| 365 | 
            +
            According to Lemma 3.8, Lemma 3.9 and Lemma 3.11, OFNE(or PFNE/QF(C)CE) is the largest
         | 
| 366 | 
            +
            subset of FNE(or FNE/F(C)CE) with the corresponding property (OPI, PPE, or PE) if FNE(or
         | 
| 367 | 
            +
            FNE/F(C)CE) is closed operator under O(or P/Q). The result tells that the orbit averaging oper-
         | 
| 368 | 
            +
            ators, while enforcing the operated function to be equivariance or invariance, keep as large capacity
         | 
| 369 | 
            +
            of the function class as possible. Therefore, we believe that orbit averaging is an ideal approach to
         | 
| 370 | 
            +
            constructing equivariant or invariant functions.
         | 
| 371 | 
            +
            6
         | 
| 372 | 
            +
             | 
| 373 | 
            +
            4
         | 
| 374 | 
            +
            Theoretical Analysis of Benefits
         | 
| 375 | 
            +
            In this section, we theoretically analyze the benefits of equivariant approximators with respect to
         | 
| 376 | 
            +
            generalizability and approximation.
         | 
| 377 | 
            +
            4.1
         | 
| 378 | 
            +
            Benefits for Generalization
         | 
| 379 | 
            +
            We first derive the generalization bound and sample complexity for general approximator classes,
         | 
| 380 | 
            +
            and then we show the benefits of equivariant approximators by applying orbit averaging to the ap-
         | 
| 381 | 
            +
            proximators.
         | 
| 382 | 
            +
            The representativeness of an approximator class is measured by the covering numbers [Shalev-Shwartz and Ben-David,
         | 
| 383 | 
            +
            2014] under ℓ∞-distance, which are defined as follows:
         | 
| 384 | 
            +
            Definition 4.1 (ℓ∞-distance). The ℓ∞-distance between two equilibrium approximators f, g is:
         | 
| 385 | 
            +
            ℓ∞(f, g) = max
         | 
| 386 | 
            +
            u∈U ∥f(u) − g(u)∥,
         | 
| 387 | 
            +
            where we define the distance of two product strategies σ and σ′ as
         | 
| 388 | 
            +
            ∥σ1 − σ2∥ = max
         | 
| 389 | 
            +
            i∈[n]
         | 
| 390 | 
            +
            �
         | 
| 391 | 
            +
            ai∈Ai
         | 
| 392 | 
            +
            |σ1
         | 
| 393 | 
            +
            i (ai) − σ2
         | 
| 394 | 
            +
            i (ai)|
         | 
| 395 | 
            +
            and the distance of two joint strategy π and π′ as
         | 
| 396 | 
            +
            ∥π1 − π2∥ =
         | 
| 397 | 
            +
            �
         | 
| 398 | 
            +
            a∈A
         | 
| 399 | 
            +
            |π1(a) − π2(a)|
         | 
| 400 | 
            +
            Definition 4.2 (r-covering number). For r > 0, we say function class Fr r-covers another function
         | 
| 401 | 
            +
            class F under ℓ∞-distance if for all function f ∈ F, there exists fr ∈ Fr such that ∥f − fr∥∞ ≤ r. The
         | 
| 402 | 
            +
            r-covering number N∞(F, r) of F is the cardinality of the smallest function class Fr that r-covers F
         | 
| 403 | 
            +
            under ℓ∞-distance.
         | 
| 404 | 
            +
            Based on covering numbers, we provide the generalization bounds of NE, CE and CCE approxima-
         | 
| 405 | 
            +
            tors. The bounds describe the difference between the expected testing approximation and empirical
         | 
| 406 | 
            +
            training approximation.
         | 
| 407 | 
            +
            Theorem 4.3 (Generalization bound). For function class F of NE, CE or CCE approximator, with
         | 
| 408 | 
            +
            probability at least 1 − δ over draw of the training set S (with size m) from payoff distribution D, for
         | 
| 409 | 
            +
            all approximator f ∈ F we have
         | 
| 410 | 
            +
            Eu∼D[E(f(u), u)] − 1
         | 
| 411 | 
            +
            m
         | 
| 412 | 
            +
            �
         | 
| 413 | 
            +
            u∈S
         | 
| 414 | 
            +
            E(f(u), u) ≤ 2 · inf
         | 
| 415 | 
            +
            r>0{
         | 
| 416 | 
            +
            �
         | 
| 417 | 
            +
            2 ln N∞(F, r)
         | 
| 418 | 
            +
            m
         | 
| 419 | 
            +
            + Lr} + 4
         | 
| 420 | 
            +
            �
         | 
| 421 | 
            +
            2 ln(4/δ)
         | 
| 422 | 
            +
            m
         | 
| 423 | 
            +
            ,
         | 
| 424 | 
            +
            where L = 2n for NE approximator, and L = 2 for CE and CCE approximators.
         | 
| 425 | 
            +
            To get the theorem, we first show that all three equilibrium approximations are Lipschitz continuous
         | 
| 426 | 
            +
            with respect to strategies. Afterward, we derive the Rademacher complexity [Bartlett and Mendelson,
         | 
| 427 | 
            +
            2002] of the expected approximation based on the Lipschitz continuity and covering numbers. See
         | 
| 428 | 
            +
            Appendix A.6 for the detailed proof.
         | 
| 429 | 
            +
            We can see from Theorem 4.3 that, with a large enough training set, the generalization gaps of
         | 
| 430 | 
            +
            equilibrium approximators go to zero if the covering number N∞(F, r) is bounded. As a result, we
         | 
| 431 | 
            +
            can estimate the expected testing performance through the empirical training performance.
         | 
| 432 | 
            +
            We can also derive the sample complexities of equilibrium approximators to achieve the desirable
         | 
| 433 | 
            +
            generalizability.
         | 
| 434 | 
            +
            Theorem 4.4 (Sample complexity). For ǫ, δ ∈ (0, 1), function class F of NE, CE or CCE approxi-
         | 
| 435 | 
            +
            mator and distribution D, with probability at least 1 − δ over draw of the training set S with
         | 
| 436 | 
            +
            m ≥
         | 
| 437 | 
            +
            9
         | 
| 438 | 
            +
            2ǫ2
         | 
| 439 | 
            +
            �
         | 
| 440 | 
            +
            ln 2
         | 
| 441 | 
            +
            δ + ln N∞(F, ǫ
         | 
| 442 | 
            +
            3L)
         | 
| 443 | 
            +
            �
         | 
| 444 | 
            +
            7
         | 
| 445 | 
            +
             | 
| 446 | 
            +
            games sampled from D, ∀f ∈ F we have
         | 
| 447 | 
            +
            Eu∼D[E(f(u), u)] ≤ 1
         | 
| 448 | 
            +
            m
         | 
| 449 | 
            +
            �
         | 
| 450 | 
            +
            u∈S
         | 
| 451 | 
            +
            E(f(u), u) + ǫ,
         | 
| 452 | 
            +
            where L = 2n for NE approximators, and L = 2 for CE and CCE approximators.
         | 
| 453 | 
            +
            The proof is based on the Lipschitz continuity of approximation, uniform bound, and concentration
         | 
| 454 | 
            +
            inequality. See Appendix A.7 for details. Theorem 4.4 is also called the uniform convergence of function
         | 
| 455 | 
            +
            class F, which is a sufficient condition for agnostic PAC learnable [Shalev-Shwartz and Ben-David,
         | 
| 456 | 
            +
            2014].
         | 
| 457 | 
            +
            As for the benefits of equivariant approximators for generalizability, the following result indicates
         | 
| 458 | 
            +
            that the projected equilibrium approximators have smaller covering numbers.
         | 
| 459 | 
            +
            Theorem 4.5. The O-projected, P-projected and Q-projected approximator classes have smaller cov-
         | 
| 460 | 
            +
            ering numbers, i.e., ∀r > 0 we have
         | 
| 461 | 
            +
            N∞(OFNE, r) ≤ N∞(FNE, r),
         | 
| 462 | 
            +
            N∞(PFNE, r) ≤ N∞(FNE, r),
         | 
| 463 | 
            +
            N∞(QF(C)CE, r) ≤ N∞(F(C)CE, r)
         | 
| 464 | 
            +
            The proof is done by showing all the operators are contraction mappings. See Appendix A.8 for
         | 
| 465 | 
            +
            details.
         | 
| 466 | 
            +
            Both the generalization bounds in Theorem 4.3 and the sample complexities in Theorem 4.4 decrease
         | 
| 467 | 
            +
            with the decrease of covering numbers N∞(F, r). Thus, we can see from Theorem 4.5 that both PPE
         | 
| 468 | 
            +
            and OPI can improve the generalizability of NE approximators, and PE can improve the generalizability
         | 
| 469 | 
            +
            of CE and CCE approximators.
         | 
| 470 | 
            +
            4.2
         | 
| 471 | 
            +
            Benefits for Approximation
         | 
| 472 | 
            +
            We then show the benefits of equivariance for approximation when the payoff distribution is invari-
         | 
| 473 | 
            +
            ant under permutation. The permutation-invariant distribution holds when the action is anonymous
         | 
| 474 | 
            +
            or indifferent or when we pre-train the equilibrium approximators using a manually designed distribu-
         | 
| 475 | 
            +
            tion [Marris et al., 2022].
         | 
| 476 | 
            +
            (C)CE Approximator
         | 
| 477 | 
            +
            The following theorem tells the benefit of permutation-equivariance in de-
         | 
| 478 | 
            +
            creasing the exploitability of (C)CE approximators.
         | 
| 479 | 
            +
            Theorem 4.6. When the payoff distribution D is invariant under the permutation of payoffs, the
         | 
| 480 | 
            +
            Q-projected (C)CE approximator has a smaller expected equilibrium approximation. Formally, for all
         | 
| 481 | 
            +
            f (C)CE ∈ F(C)CE and permutation-invariant distribution D, we have
         | 
| 482 | 
            +
            Eu∼D[E(Qf (C)CE(u), u)] ≤ Eu∼D[E(f (C)CE(u), u)],
         | 
| 483 | 
            +
            The proof is done by using the convexity of approximation. See Appendix A.10 for details. We can
         | 
| 484 | 
            +
            see from Theorem 4.6 that, when payoff distribution is invariant under permutation, it is beneficial to
         | 
| 485 | 
            +
            use equivariant architecture as the CE or CCE approximators.
         | 
| 486 | 
            +
            NE Approximator
         | 
| 487 | 
            +
            As for NE approximator, we have similar results.
         | 
| 488 | 
            +
            Theorem 4.7. For bimatrix constant-sum games, when the payoff distribution D is invariant under the
         | 
| 489 | 
            +
            permutation of payoffs, then the X-projected (X ∈ {O, P}) NE approximator has a smaller expected
         | 
| 490 | 
            +
            exploitability. Formally, for all f NE ∈ FNE and permutation-invariant distribution D for bimatrix
         | 
| 491 | 
            +
            constant-sum games, we have
         | 
| 492 | 
            +
            Eu∼D[
         | 
| 493 | 
            +
            �
         | 
| 494 | 
            +
            i
         | 
| 495 | 
            +
            Ei((Xf NE)(u), u)] ≤ Eu∼D[
         | 
| 496 | 
            +
            �
         | 
| 497 | 
            +
            i
         | 
| 498 | 
            +
            Ei(f NE(u), u)]
         | 
| 499 | 
            +
            8
         | 
| 500 | 
            +
             | 
| 501 | 
            +
            Theorem 4.8. When the payoff distribution D is invariant under the permutation of payoffs, and
         | 
| 502 | 
            +
            f NE satisfies OPI, then the P-projected NE approximator has a smaller expected NE approximation.
         | 
| 503 | 
            +
            Formally, for all f NE ∈ FNE that is OPI and permutation-invariant distribution D, we have
         | 
| 504 | 
            +
            Eu∼D[E((Pf NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)].
         | 
| 505 | 
            +
            Theorem 4.9. For bimatrix games, when the payoff distribution D is invariant under the permutation
         | 
| 506 | 
            +
            of payoffs, and f NE satisfies PPE, then the O-projected NE approximator has a smaller expected NE
         | 
| 507 | 
            +
            approximation. Formally, for all f NE ∈ FNE that is PPE and permutation-invariant distribution D of
         | 
| 508 | 
            +
            bimatrix games, we have
         | 
| 509 | 
            +
            Eu∼D[E((Of NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)].
         | 
| 510 | 
            +
            Theorem 4.8 and Theorem 4.9 tell that PPE and OPI approximators can achieve better approxi-
         | 
| 511 | 
            +
            mation than ones with only PPE or OPI. Meanwhile, we can see from Theorem 4.7 that for bimatrix
         | 
| 512 | 
            +
            constant-sum games (such as zero-sum games), it can be preferred to introduce PPE or OPI to the
         | 
| 513 | 
            +
            architectures.
         | 
| 514 | 
            +
            5
         | 
| 515 | 
            +
            Theoretical Analysis of Limitations
         | 
| 516 | 
            +
            As we discussed in Section 4, equivariant approximators enjoy better generalizability and better
         | 
| 517 | 
            +
            approximation sometimes. However, as we will show, they have some limitations regarding equilibrium
         | 
| 518 | 
            +
            selection and social welfare. Such limitations attribute to the limited representativeness caused by
         | 
| 519 | 
            +
            equivariance.
         | 
| 520 | 
            +
            5.1
         | 
| 521 | 
            +
            Equilibrium Selection
         | 
| 522 | 
            +
            We first show that there may be equilibria points that equivariant approximators will never find.
         | 
| 523 | 
            +
            We illustrate such limitation in permutation-invariant games, which is defined as follows:
         | 
| 524 | 
            +
            Definition 5.1 (Permutation-ρ-Invariant Game). We say a game Γu is permutation-ρ-invariant, where
         | 
| 525 | 
            +
            ρ = ◦i∈[n]ρi, if the payoff u is permutation-invariant with respect to ρ. That is, ρu = u.
         | 
| 526 | 
            +
            Permutation-ρ-invariance indicates that one cannot distinguish joint action a from ρa using only
         | 
| 527 | 
            +
            the payoff u. We’d like to provide an example to show more insight of permutation-ρ-invariant games:
         | 
| 528 | 
            +
            Example 5.2. For a 2-player game Γu = (2, u = (u1, u2), A = ([m1], [m2])) , Let ρi = (mi, mi −
         | 
| 529 | 
            +
            1, . . . , 1) and ρ = ρ1 ◦ ρ2. If one of the following conditions holds, then u is permutation-ρ-invariant:
         | 
| 530 | 
            +
            1. u1 and u2 are symmetric and persymmetric (i.e., symmetric with respect to the northeast-to-
         | 
| 531 | 
            +
            southwest diagonal) squares.
         | 
| 532 | 
            +
            2. Both u1 and u2 are centrosymmetric, i.e., ui(x, y) = ui(m1 +1−x, m2 +1−y) for i ∈ {1, 2}, x ∈
         | 
| 533 | 
            +
            [m1] and y ∈ [m2].
         | 
| 534 | 
            +
            For permutation ρ = (◦i∈[n]ρi) and player k ∈ [n], we denote the set of non-fixed actions of player
         | 
| 535 | 
            +
            k under ρk as
         | 
| 536 | 
            +
            V (ρk) := {ak|ak ∈ Ak, ρk(ak) ̸= ak}.
         | 
| 537 | 
            +
            Based on V (ρk), we find some equilibria points of permutation-ρ-invariant games that any equivariant
         | 
| 538 | 
            +
            approximators will never find.
         | 
| 539 | 
            +
            Theorem 5.3. For a permutation-ρ-invariant game Γu. if there is a pure NE a∗ = (a∗
         | 
| 540 | 
            +
            i )i∈[n] and at
         | 
| 541 | 
            +
            least one player k ∈ [n] such that a∗
         | 
| 542 | 
            +
            k ∈ V (ρk), then a∗ will never be found by any NE approximator
         | 
| 543 | 
            +
            with both PPE and OPI. Besides, a∗ (as a pure CE or CCE) will also never be found by any CE or
         | 
| 544 | 
            +
            CCE approximator with PE.
         | 
| 545 | 
            +
            We illustrate Theorem 5.3 by the following example:
         | 
| 546 | 
            +
            9
         | 
| 547 | 
            +
             | 
| 548 | 
            +
            Example 5.4. Consider a bimatrix game with identity utility
         | 
| 549 | 
            +
            u =
         | 
| 550 | 
            +
            �
         | 
| 551 | 
            +
            1, 1
         | 
| 552 | 
            +
            0, 0
         | 
| 553 | 
            +
            0, 0
         | 
| 554 | 
            +
            1, 1
         | 
| 555 | 
            +
            �
         | 
| 556 | 
            +
            There are two pure NE (bolded in the above matrix) and one mixed NE of σ1 = (0.5, 0.5) and σ2 =
         | 
| 557 | 
            +
            (0.5, 0.5). Let ρi be the unique permute function (except for identity function) of player i ∈ [2], and
         | 
| 558 | 
            +
            ρ = ρ1 ◦ ρ2. The game is permutation-ρ-invariant.
         | 
| 559 | 
            +
            Case 1: Let f be a permutation-equivariant CE or CCE approximator, and denote π = f(u). We
         | 
| 560 | 
            +
            have
         | 
| 561 | 
            +
            π = f(u)
         | 
| 562 | 
            +
            (a)
         | 
| 563 | 
            +
            = f(ρu)
         | 
| 564 | 
            +
            (b)
         | 
| 565 | 
            +
            = ρf(u),
         | 
| 566 | 
            +
            where (a) holds by permutation-ρ-invariance of u, and (b) holds by PE of f. Thus, we have π1,1 =
         | 
| 567 | 
            +
            π2,2 ∈ [0, 1
         | 
| 568 | 
            +
            2] and π1,2 = π2,1 ∈ [0, 1
         | 
| 569 | 
            +
            2]. As a result, the two pure (C)CEs cannot be found.
         | 
| 570 | 
            +
            Case 2: Let f be a NE approximator that holds PPE and OPI. Denote f(u) = (σ1, σ2), where
         | 
| 571 | 
            +
            σ1 = (p1, 1 − p1) and σ2 = (p2, 1 − p2). By PPE and OPI of f, we have
         | 
| 572 | 
            +
            f(u)1 = (p1, 1 − p1)
         | 
| 573 | 
            +
            (a)
         | 
| 574 | 
            +
            = f(ρ1ρ2u)1
         | 
| 575 | 
            +
            (b)
         | 
| 576 | 
            +
            = ρ1f(ρ2u)1
         | 
| 577 | 
            +
            (c)
         | 
| 578 | 
            +
            = ρ1f(u)1 = (1 − p1, p1),
         | 
| 579 | 
            +
            where (a) holds by permutaion-ρ-invariance of u, (b) holds by PPE of f, and (c) holds by OPI of f.
         | 
| 580 | 
            +
            As a result, the only NE that f could find is the mixed NE.
         | 
| 581 | 
            +
            As we can see from the example and Theorem 5.3, the equivariance, while introducing inductive bias
         | 
| 582 | 
            +
            to the approximator architecture, is also a strong constraint. Such a constraint is why the equivariant
         | 
| 583 | 
            +
            approximators cannot find all the equilibria points.
         | 
| 584 | 
            +
            5.2
         | 
| 585 | 
            +
            Social Welfare
         | 
| 586 | 
            +
            The social welfare of a joint strategy π is defined as the sum of all players’ utilities, i.e.,
         | 
| 587 | 
            +
            SW(π, u) =
         | 
| 588 | 
            +
            �
         | 
| 589 | 
            +
            i∈[n]
         | 
| 590 | 
            +
            ui(π).
         | 
| 591 | 
            +
            The equilibrium with higher social welfare is usually preferred [Marris et al., 2022].
         | 
| 592 | 
            +
            To analyze the social welfare of equivariant approximators, we define the worst social welfare ratio
         | 
| 593 | 
            +
            as follows:
         | 
| 594 | 
            +
            Definition 5.5. For any N, M ≥ 2 and two NE (or CE/CCE) approximator classes F1, F2 that target
         | 
| 595 | 
            +
            on games with number of players n ≤ N and |Ai| ≤ M, we define the worst social welfare ratio of F1
         | 
| 596 | 
            +
            over F2 as:
         | 
| 597 | 
            +
            SWRN,M(F1, F2) := inf
         | 
| 598 | 
            +
            D
         | 
| 599 | 
            +
            maxf1∈F1 Eu∼DSW(f1(u), u)
         | 
| 600 | 
            +
            maxf2∈F2 Eu∼DSW(f2(u), u)
         | 
| 601 | 
            +
            SWRN,M(F1, F2) measures the relative representativeness of F1 over F2 in terms of social welfare.
         | 
| 602 | 
            +
            Based on that, we have the following result for equivariant CE and CCE approximator classes:
         | 
| 603 | 
            +
            Theorem 5.6. Given N, M ≥ 2, let F(C)CE
         | 
| 604 | 
            +
            PE
         | 
| 605 | 
            +
            be the function class (target on games with number of
         | 
| 606 | 
            +
            players n ≤ N and |Ai| ≤ M) of all the (C)CE approximators with PE. Denote by F(C)CE
         | 
| 607 | 
            +
            general the function
         | 
| 608 | 
            +
            class of all the (C)CE approximators. Then we have
         | 
| 609 | 
            +
            SWRN,M(F(C)CE
         | 
| 610 | 
            +
            PE
         | 
| 611 | 
            +
            , F(C)CE
         | 
| 612 | 
            +
            general) = 1.
         | 
| 613 | 
            +
            Theorem 5.6 tells that, while the permutation-equivariant (C)CE approximator class may not be
         | 
| 614 | 
            +
            able to find all the (C)CE in a game, it can keep the social welfare of the output solutions.
         | 
| 615 | 
            +
            However, when considering equivariant NE approximators, we have the following negative result:
         | 
| 616 | 
            +
            10
         | 
| 617 | 
            +
             | 
| 618 | 
            +
            Theorem 5.7. Given N, M ≥ 2, let FNE
         | 
| 619 | 
            +
            OPI, FNE
         | 
| 620 | 
            +
            PPE and FNE
         | 
| 621 | 
            +
            both be the function classes (target on games
         | 
| 622 | 
            +
            with number of players n ≤ N and |Ai| ≤ M) of all the NE approximators with OPI, PPE and both.
         | 
| 623 | 
            +
            Denote the function class of all the NE approximators as FNE
         | 
| 624 | 
            +
            general. Then we have
         | 
| 625 | 
            +
            SWRN,M(FNE
         | 
| 626 | 
            +
            OPI, FNE
         | 
| 627 | 
            +
            general) =
         | 
| 628 | 
            +
            1
         | 
| 629 | 
            +
            M N−1 ,
         | 
| 630 | 
            +
            (1)
         | 
| 631 | 
            +
            SWRN,M(FNE
         | 
| 632 | 
            +
            PPE, FNE
         | 
| 633 | 
            +
            general) ≤ 1
         | 
| 634 | 
            +
            M ,
         | 
| 635 | 
            +
            (2)
         | 
| 636 | 
            +
            SWRN,M(FNE
         | 
| 637 | 
            +
            both, FNE
         | 
| 638 | 
            +
            general) =
         | 
| 639 | 
            +
            1
         | 
| 640 | 
            +
            M N−1 .
         | 
| 641 | 
            +
            (3)
         | 
| 642 | 
            +
            Additionally, when M ≥ 3, denote by �FNE
         | 
| 643 | 
            +
            both the function class of all the NE oracles (functions that
         | 
| 644 | 
            +
            always output exact NE solutions of the input games) with both PPE and OPI, and by �
         | 
| 645 | 
            +
            FNE
         | 
| 646 | 
            +
            general the
         | 
| 647 | 
            +
            function class of all the NE oracles. Then we have
         | 
| 648 | 
            +
            SWRN,M( �FNE
         | 
| 649 | 
            +
            both, �FNE
         | 
| 650 | 
            +
            general) = 0.
         | 
| 651 | 
            +
            (4)
         | 
| 652 | 
            +
            The proof is done by construction (See Appendix A.15 for details). As an illustration of Equa-
         | 
| 653 | 
            +
            tion (4), consider a bimatrix game with the following payoff:
         | 
| 654 | 
            +
            u =
         | 
| 655 | 
            +
            
         | 
| 656 | 
            +
            
         | 
| 657 | 
            +
            1, 1
         | 
| 658 | 
            +
            0, 0
         | 
| 659 | 
            +
            0, 1
         | 
| 660 | 
            +
            2 + ε
         | 
| 661 | 
            +
            0, 0
         | 
| 662 | 
            +
            1, 1
         | 
| 663 | 
            +
            0, 1
         | 
| 664 | 
            +
            2 + ε
         | 
| 665 | 
            +
            1
         | 
| 666 | 
            +
            2 + ε, 0
         | 
| 667 | 
            +
            1
         | 
| 668 | 
            +
            2 + ε, 0
         | 
| 669 | 
            +
            ε, ε
         | 
| 670 | 
            +
            
         | 
| 671 | 
            +
            
         | 
| 672 | 
            +
            for ǫ ∈ (0, 1
         | 
| 673 | 
            +
            2). The maximum NE (the upper-left corner of u) social welfare is 2, which can be found
         | 
| 674 | 
            +
            by at least one NE oracle in �FNE
         | 
| 675 | 
            +
            general. However, the only NE (the lower-right corner of u) that the NE
         | 
| 676 | 
            +
            oracles in �FNE
         | 
| 677 | 
            +
            both could find only has a social welfare of 2ǫ. As a result,
         | 
| 678 | 
            +
            SWR2,3( �FNE
         | 
| 679 | 
            +
            both, �FNE
         | 
| 680 | 
            +
            general) ≤ 2ǫ
         | 
| 681 | 
            +
            2 = ǫ,
         | 
| 682 | 
            +
            which goes to zero as ǫ → 0. Recall that we always have SWRN,M ≥ 0, thus Equation (4) holds when
         | 
| 683 | 
            +
            N = 2 and M = 3.
         | 
| 684 | 
            +
            Theorem 5.7 tells that equivariant NE approximators may lose some social welfare while enjoying
         | 
| 685 | 
            +
            better generalizability. Such a result inspires us to balance generalizability and social welfare when
         | 
| 686 | 
            +
            designing the NE approximator architecture.
         | 
| 687 | 
            +
            6
         | 
| 688 | 
            +
            Conclusion and Future Work
         | 
| 689 | 
            +
            In this paper, we theoretically analyze the benefits and limitations of equivariant equilibrium
         | 
| 690 | 
            +
            approximators, including player-permutation-equivariant (PPE) and opponent-permutation-invariant
         | 
| 691 | 
            +
            (OPI) NE approximator, and permutation-equivariant (PE) CE and CCE approximators. For the
         | 
| 692 | 
            +
            benefits, we first show that these equivariant approximators enjoy better generalizability. To get the
         | 
| 693 | 
            +
            result, we derive the generalization bounds and sample complexities based on covering numbers, and
         | 
| 694 | 
            +
            then we prove that the symmetric approximators have lower covering numbers. We then show that
         | 
| 695 | 
            +
            the equivariant approximators can decrease the exploitability when the payoff distribution is invariant
         | 
| 696 | 
            +
            under permutation. For the limitations, we find the equivariant approximators may fail to find some
         | 
| 697 | 
            +
            equilibria points due to their limited representativeness caused by equivariance. Besides, while equiv-
         | 
| 698 | 
            +
            ariant (C)CE approximators can keep the social welfare, the equivariant NE approximators reach a
         | 
| 699 | 
            +
            small worst social welfare ratio comparing to the general approximators. Such a result indicates that
         | 
| 700 | 
            +
            equivariance may reduce social welfare; therefore, we’d better balance the generalizability and social
         | 
| 701 | 
            +
            welfare when we design the architectures of NE approximators.
         | 
| 702 | 
            +
            As for future work, since in our paper we assume the training and testing payoff distribution are
         | 
| 703 | 
            +
            the same, an interesting topic is to study the benefits of equivariant approximators under the payoff
         | 
| 704 | 
            +
            distribution shift. Moreover, since we consider fixed and discrete action space, another interesting
         | 
| 705 | 
            +
            future direction is to analyze the benefits of equivariant approximators in varying or continuous action
         | 
| 706 | 
            +
            space.
         | 
| 707 | 
            +
            11
         | 
| 708 | 
            +
             | 
| 709 | 
            +
            References
         | 
| 710 | 
            +
            Peter L Bartlett and Shahar Mendelson. Rademacher and gaussian complexities: Risk bounds and
         | 
| 711 | 
            +
            structural results. Journal of Machine Learning Research, 3(Nov):463–482, 2002.
         | 
| 712 | 
            +
            Nicolo Cesa-Bianchi and G´abor Lugosi. Prediction, learning, and games. Cambridge university press,
         | 
| 713 | 
            +
            2006.
         | 
| 714 | 
            +
            Xi Chen, Xiaotie Deng, and Shang-Hua Teng. Settling the complexity of computing two-player Nash
         | 
| 715 | 
            +
            equilibria. Journal of the ACM (JACM), 56(3):1–57, 2009.
         | 
| 716 | 
            +
            Constantinos Daskalakis, Paul W Goldberg, and Christos H Papadimitriou. The complexity of com-
         | 
| 717 | 
            +
            puting a Nash equilibrium. SIAM Journal on Computing, 39(1):195–259, 2009.
         | 
| 718 | 
            +
            Argyrios Deligkas, Michail Fasoulakis, and Evangelos Markakis. A polynomial-time algorithm for 1/3-
         | 
| 719 | 
            +
            approximate Nash equilibria in bimatrix games. In 30th Annual European Symposium on Algorithms,
         | 
| 720 | 
            +
            ESA, 2022.
         | 
| 721 | 
            +
            Zhijian Duan, Dinghuai Zhang, Wenhan Huang, Yali Du, Jun Wang, Yaodong Yang, and Xiaotie Deng.
         | 
| 722 | 
            +
            Towards the PAC learnability of Nash equilibrium. arXiv preprint arXiv:2108.07472, 2021.
         | 
| 723 | 
            +
            Zhijian Duan, Jingwu Tang, Yutong Yin, Zhe Feng, Xiang Yan, Manzil Zaheer, and Xiaotie Deng. A
         | 
| 724 | 
            +
            context-integrated transformer-based neural network for auction design. In International Conference
         | 
| 725 | 
            +
            on Machine Learning, pages 5609–5626. PMLR, 2022.
         | 
| 726 | 
            +
            Paul D¨utting, Zhe Feng, Harikrishna Narasimhan, David Parkes, and Sai Srivatsa Ravindranath.
         | 
| 727 | 
            +
            Optimal auctions through deep learning. In International Conference on Machine Learning, pages
         | 
| 728 | 
            +
            1706–1715. PMLR, 2019.
         | 
| 729 | 
            +
            Bryn Elesedy and Sheheryar Zaidi. Provably strict generalisation benefit for equivariant models. In
         | 
| 730 | 
            +
            International Conference on Machine Learning, pages 2959–2969. PMLR, 2021.
         | 
| 731 | 
            +
            Xidong Feng, Oliver Slumbers, Ziyu Wan, Bo Liu, Stephen McAleer, Ying Wen, Jun Wang, and
         | 
| 732 | 
            +
            Yaodong Yang. Neural auto-curricula in two-player zero-sum games. Advances in Neural Information
         | 
| 733 | 
            +
            Processing Systems, 34:3504–3517, 2021.
         | 
| 734 | 
            +
            Drew Fudenberg, Fudenberg Drew, David K Levine, and David K Levine. The theory of learning in
         | 
| 735 | 
            +
            games, volume 2. MIT press, 1998.
         | 
| 736 | 
            +
            Denizalp Goktas and Amy Greenwald. Exploitability minimization in games and beyond. In Advances
         | 
| 737 | 
            +
            in Neural Information Processing Systems, 2022.
         | 
| 738 | 
            +
            Amy Greenwald, Keith Hall, Roberto Serrano, et al. Correlated Q-learning. In ICML, volume 3, pages
         | 
| 739 | 
            +
            242–249, 2003.
         | 
| 740 | 
            +
            Keegan Harris, Ioannis Anagnostides, Gabriele Farina, Mikhail Khodak, Zhiwei Steven Wu, and Tuo-
         | 
| 741 | 
            +
            mas Sandholm. Meta-learning in games. arXiv preprint arXiv:2209.14110, 2022.
         | 
| 742 | 
            +
            Jason S Hartford, James R Wright, and Kevin Leyton-Brown. Deep learning for predicting human
         | 
| 743 | 
            +
            strategic behavior. Advances in neural information processing systems, 29, 2016.
         | 
| 744 | 
            +
            Junling Hu and Michael P Wellman. Nash Q-learning for general-sum stochastic games. Journal of
         | 
| 745 | 
            +
            machine learning research, 4(Nov):1039–1069, 2003.
         | 
| 746 | 
            +
            Dmitry Ivanov, Iskander Safiulin, Igor Filippov, and Ksenia Balabaeva. Optimal-er auctions through
         | 
| 747 | 
            +
            attention. In Advances in Neural Information Processing Systems, 2022.
         | 
| 748 | 
            +
            Chi Jin, Qinghua Liu, Yuanhao Wang, and Tiancheng Yu. V-learning – a simple, efficient, decentralized
         | 
| 749 | 
            +
            algorithm for multiagent RL. In ICLR 2022 Workshop on Gamification and Multiagent Solutions,
         | 
| 750 | 
            +
            2022.
         | 
| 751 | 
            +
            Marc Lanctot, Vinicius Zambaldi, Audrunas Gruslys, Angeliki Lazaridou, Karl Tuyls, Julien P´erolat,
         | 
| 752 | 
            +
            David Silver, and Thore Graepel. A unified game-theoretic approach to multiagent reinforcement
         | 
| 753 | 
            +
            learning. Advances in neural information processing systems, 30, 2017.
         | 
| 754 | 
            +
            12
         | 
| 755 | 
            +
             | 
| 756 | 
            +
            C. Ling, Fei Fang, and J. Z. Kolter. What game are we playing? End-to-end learning in normal and
         | 
| 757 | 
            +
            extensive form games. In IJCAI, pages 396–402, 2018.
         | 
| 758 | 
            +
            Siqi Liu, Marc Lanctot, Luke Marris, and Nicolas Heess. Simplex neural population learning: Any-
         | 
| 759 | 
            +
            mixture bayes-optimality in symmetric zero-sum games. In International Conference on Machine
         | 
| 760 | 
            +
            Learning, ICML, 2022.
         | 
| 761 | 
            +
            Edward Lockhart, Marc Lanctot, Julien P´erolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Tim-
         | 
| 762 | 
            +
            bers, and Karl Tuyls. Computing approximate equilibria in sequential adversarial games by ex-
         | 
| 763 | 
            +
            ploitability descent. In Sarit Kraus, editor, IJCAI, pages 464–470. ijcai.org, 2019.
         | 
| 764 | 
            +
            Luke Marris, Paul Muller, Marc Lanctot, Karl Tuyls, and Thore Graepel. Multi-agent training be-
         | 
| 765 | 
            +
            yond zero-sum with correlated equilibrium meta-solvers. In International Conference on Machine
         | 
| 766 | 
            +
            Learning, pages 7480–7491. PMLR, 2021.
         | 
| 767 | 
            +
            Luke Marris, Ian Gemp, Thomas Anthony, Andrea Tacchetti, Siqi Liu, and Karl Tuyls. Turbocharging
         | 
| 768 | 
            +
            solution concepts: Solving NEs, CEs and CCEs with neural equilibrium solvers. In Advances in
         | 
| 769 | 
            +
            Neural Information Processing Systems, 2022.
         | 
| 770 | 
            +
            John F Nash et al. Equilibrium points in n-person games. Proceedings of the national academy of
         | 
| 771 | 
            +
            sciences, 36(1):48–49, 1950.
         | 
| 772 | 
            +
            Denis Nekipelov, Vasilis Syrgkanis, and Eva Tardos. Econometrics for learning agents. In Proceedings
         | 
| 773 | 
            +
            of the sixteenth acm conference on economics and computation, pages 1–18, 2015.
         | 
| 774 | 
            +
            Hukukane Nikaidˆo and Kazuo Isoda.
         | 
| 775 | 
            +
            Note on non-cooperative convex games.
         | 
| 776 | 
            +
            Pacific Journal of
         | 
| 777 | 
            +
            Mathematics, 5(S1):807–815, 1955.
         | 
| 778 | 
            +
            Tian Qin, Fengxiang He, Dingfeng Shi, Wenbing Huang, and Dacheng Tao. Benefits of permutation-
         | 
| 779 | 
            +
            equivariance in auction mechanisms. In Advances in Neural Information Processing Systems, 2022.
         | 
| 780 | 
            +
            Jad Rahme, Samy Jelassi, Joan Bruna, and S Matthew Weinberg. A permutation-equivariant neu-
         | 
| 781 | 
            +
            ral network architecture for auction design. In Proceedings of the AAAI Conference on Artificial
         | 
| 782 | 
            +
            Intelligence, 2021.
         | 
| 783 | 
            +
            Hanns Schulz-Mirbach. Constructing invariant features by averaging techniques. In Proceedings of the
         | 
| 784 | 
            +
            12th IAPR International Conference on Pattern Recognition, Vol. 3-Conference C: Signal Processing
         | 
| 785 | 
            +
            (Cat. No. 94CH3440-5), volume 2, pages 387–390. IEEE, 1994.
         | 
| 786 | 
            +
            Pier Giuseppe Sessa, Ilija Bogunovic, Andreas Krause, and Maryam Kamgarpour. Contextual games:
         | 
| 787 | 
            +
            Multi-agent learning with side information. Advances in Neural Information Processing Systems,
         | 
| 788 | 
            +
            33:21912–21922, 2020.
         | 
| 789 | 
            +
            Shai Shalev-Shwartz and Shai Ben-David. Understanding machine learning: From theory to algorithms.
         | 
| 790 | 
            +
            Cambridge university press, 2014.
         | 
| 791 | 
            +
            Yoav Shoham and Kevin Leyton-Brown. Multiagent systems: Algorithmic, game-theoretic, and logical
         | 
| 792 | 
            +
            foundations. Cambridge University Press, 2008.
         | 
| 793 | 
            +
            Haralampos Tsaknakis and Paul G Spirakis. An optimization approach for approximate Nash equilib-
         | 
| 794 | 
            +
            ria. In International Workshop on Web and Internet Economics, pages 42–56. Springer, 2007.
         | 
| 795 | 
            +
            Dawen Wu and Abdel Lisser. Using CNN for solving two-player zero-sum games. Expert Systems with
         | 
| 796 | 
            +
            Applications, page 117545, 2022.
         | 
| 797 | 
            +
            Dawen Wu and Abdel Lisser. CCGnet: A deep learning approach to predict Nash equilibrium of
         | 
| 798 | 
            +
            chance-constrained games. Information Sciences, 2023.
         | 
| 799 | 
            +
            13
         | 
| 800 | 
            +
             | 
| 801 | 
            +
            A
         | 
| 802 | 
            +
            Omitted Proof
         | 
| 803 | 
            +
            A.1
         | 
| 804 | 
            +
            Useful Lemma
         | 
| 805 | 
            +
            We first introduce a lemma, which will be frequently used in the following proofs.
         | 
| 806 | 
            +
            Lemma A.1. ∀i, j ∈ [n], ρi ∈ Gi we have (ρiu)j(σi, σ−i) = uj(ρ−1
         | 
| 807 | 
            +
            i σi, σ−i) and (ρiu)j(π) = uj(ρ−1
         | 
| 808 | 
            +
            i π)
         | 
| 809 | 
            +
            Proof. Define �ai := ρ−1
         | 
| 810 | 
            +
            i ai. For product strategy σ = (σi)i∈[n],
         | 
| 811 | 
            +
            (ρiu)j(σi, σ−i) =
         | 
| 812 | 
            +
            �
         | 
| 813 | 
            +
            ai∈Ai
         | 
| 814 | 
            +
            �
         | 
| 815 | 
            +
            a−i∈A−i
         | 
| 816 | 
            +
            (ρiu)j(ai, a−i) · σi(ai) · σ−i(a−i)
         | 
| 817 | 
            +
            =
         | 
| 818 | 
            +
            �
         | 
| 819 | 
            +
            ai∈Ai
         | 
| 820 | 
            +
            �
         | 
| 821 | 
            +
            a−i∈A−i
         | 
| 822 | 
            +
            uj(ρ−1
         | 
| 823 | 
            +
            i ai, a−i) · σi(ai) · σ−i(a−i)
         | 
| 824 | 
            +
            =
         | 
| 825 | 
            +
            �
         | 
| 826 | 
            +
            ai∈Ai
         | 
| 827 | 
            +
            �
         | 
| 828 | 
            +
            a−i∈A−i
         | 
| 829 | 
            +
            uj(ρ−1
         | 
| 830 | 
            +
            i ai, a−i) · (ρ−1
         | 
| 831 | 
            +
            i
         | 
| 832 | 
            +
            σi)(ρ−1
         | 
| 833 | 
            +
            i ai) · σ−i(a−i)
         | 
| 834 | 
            +
            =
         | 
| 835 | 
            +
            �
         | 
| 836 | 
            +
            �ai∈Ai
         | 
| 837 | 
            +
            �
         | 
| 838 | 
            +
            a−i∈A−i
         | 
| 839 | 
            +
            uj(�ai, a−i) · (ρ−1
         | 
| 840 | 
            +
            i
         | 
| 841 | 
            +
            σi)(�ai) · σ−i(a−i)
         | 
| 842 | 
            +
            =uj(ρ−1
         | 
| 843 | 
            +
            i σi, σ−i)
         | 
| 844 | 
            +
            For joint strategy π,
         | 
| 845 | 
            +
            (ρiu)j(π) =
         | 
| 846 | 
            +
            �
         | 
| 847 | 
            +
            ai∈Ai
         | 
| 848 | 
            +
            �
         | 
| 849 | 
            +
            a−i∈A−i
         | 
| 850 | 
            +
            (ρiuj)(ai, a−i) · π(ai, a−i)
         | 
| 851 | 
            +
            =
         | 
| 852 | 
            +
            �
         | 
| 853 | 
            +
            ai∈Ai
         | 
| 854 | 
            +
            �
         | 
| 855 | 
            +
            a−i∈A−i
         | 
| 856 | 
            +
            uj(ρ−1
         | 
| 857 | 
            +
            i ai, a−i) · π(ai, a−i)
         | 
| 858 | 
            +
            =
         | 
| 859 | 
            +
            �
         | 
| 860 | 
            +
            ai∈Ai
         | 
| 861 | 
            +
            �
         | 
| 862 | 
            +
            a−i∈A−i
         | 
| 863 | 
            +
            uj(ρ−1
         | 
| 864 | 
            +
            i ai, a−i) · (ρ−1
         | 
| 865 | 
            +
            i
         | 
| 866 | 
            +
            π)(ρ−1
         | 
| 867 | 
            +
            i
         | 
| 868 | 
            +
            ai, a−i)
         | 
| 869 | 
            +
            =
         | 
| 870 | 
            +
            �
         | 
| 871 | 
            +
            �ai∈Ai
         | 
| 872 | 
            +
            �
         | 
| 873 | 
            +
            a−i∈A−i
         | 
| 874 | 
            +
            uj(�ai, a−i) · (ρ−1
         | 
| 875 | 
            +
            i
         | 
| 876 | 
            +
            π)(�ai, a−i)
         | 
| 877 | 
            +
            =uj(ρ−1
         | 
| 878 | 
            +
            i π)
         | 
| 879 | 
            +
            A.2
         | 
| 880 | 
            +
            Proof of Lemma 3.2
         | 
| 881 | 
            +
            Proof. For player i, we have
         | 
| 882 | 
            +
            Ei(ρiσ, ρiu) = max
         | 
| 883 | 
            +
            ai∈Ai ρiui(ai, ρiσ−i) − ρiui(ρiσ) = max
         | 
| 884 | 
            +
            ai∈Ai ρiui(ai, σ−i) − ρiui(ρiσi, σ−i)
         | 
| 885 | 
            +
            = max
         | 
| 886 | 
            +
            ai∈Ai ui(ρ−1
         | 
| 887 | 
            +
            i ai, σ−i) − ui(ρ−1
         | 
| 888 | 
            +
            i ρiσi, σ−i)
         | 
| 889 | 
            +
            (a)
         | 
| 890 | 
            +
            = max
         | 
| 891 | 
            +
            ai∈Ai ui(ai, σ−i) − ui(σi, σ−i) = Ei(σ, u),
         | 
| 892 | 
            +
            where (a) holds since ρi is a bijection on Ai. For player j ̸= i, we have
         | 
| 893 | 
            +
            Ej(ρiσ, ρiu) = max
         | 
| 894 | 
            +
            aj∈A ρiuj(aj, ρiσ−j) − ρiuj(ρiσ) = max
         | 
| 895 | 
            +
            aj∈Aj uj(aj, ρ−1
         | 
| 896 | 
            +
            i ρiσ−j) − uj(ρ−1
         | 
| 897 | 
            +
            i ρiσ)
         | 
| 898 | 
            +
            = max
         | 
| 899 | 
            +
            aj∈Aj uj(aj, σ−j) − uj(σ) = Ej(σ, u)
         | 
| 900 | 
            +
            From above, we have E(ρiσ, ρiu) = E(σ, u), thus if σ is a ε-NE of Γu, then ρiσ must be a ε-NE of
         | 
| 901 | 
            +
            Γρiu.
         | 
| 902 | 
            +
            14
         | 
| 903 | 
            +
             | 
| 904 | 
            +
            A.3
         | 
| 905 | 
            +
            Proof of Lemma 3.5
         | 
| 906 | 
            +
            CCE
         | 
| 907 | 
            +
            For player i, we have
         | 
| 908 | 
            +
            Ei(ρiπ, ρiu) = max
         | 
| 909 | 
            +
            ai∈Ai(ρiui)(ai, (ρiπ)−i) − (ρiui)(ρiπi)
         | 
| 910 | 
            +
            = max
         | 
| 911 | 
            +
            ai∈Ai(ρiui)(ai, (ρiπ)−i) − ui(ρ−1
         | 
| 912 | 
            +
            i ρiπi)
         | 
| 913 | 
            +
            = max
         | 
| 914 | 
            +
            ai∈Ai(ρiui)(ai, (ρiπ)−i) − ui(πi)
         | 
| 915 | 
            +
            = max
         | 
| 916 | 
            +
            ai∈Ai
         | 
| 917 | 
            +
            �
         | 
| 918 | 
            +
            b∈A
         | 
| 919 | 
            +
            (ρiui)(ai, b−i) · (ρiπ)(b) − ui(πi)
         | 
| 920 | 
            +
            = max
         | 
| 921 | 
            +
            ai∈Ai
         | 
| 922 | 
            +
            �
         | 
| 923 | 
            +
            bi∈Ai,b−i∈A−i
         | 
| 924 | 
            +
            ui(ρ−1
         | 
| 925 | 
            +
            i
         | 
| 926 | 
            +
            ai, b−i) · π(ρ−1
         | 
| 927 | 
            +
            i
         | 
| 928 | 
            +
            bi, b−i) − ui(πi)
         | 
| 929 | 
            +
            = max
         | 
| 930 | 
            +
            ai∈Ai
         | 
| 931 | 
            +
            �
         | 
| 932 | 
            +
            bi∈Ai,b−i∈A−i
         | 
| 933 | 
            +
            ui(ai, b−i) · π(bi, b−i) − ui(πi)
         | 
| 934 | 
            +
            , ρi is a bijection on Ai
         | 
| 935 | 
            +
            =Ei(π, u)
         | 
| 936 | 
            +
            For player j ̸= i, we have
         | 
| 937 | 
            +
            Ej(ρiπ, ρiu) = max
         | 
| 938 | 
            +
            aj∈Aj(ρiuj)(aj, (ρiπ)−j) − (ρiuj)(ρiπj)
         | 
| 939 | 
            +
            = max
         | 
| 940 | 
            +
            aj∈Aj(ρiuj)(aj, (ρiπ)−j) − uj(ρ−1
         | 
| 941 | 
            +
            i ρiπj)
         | 
| 942 | 
            +
            = max
         | 
| 943 | 
            +
            aj∈Aj(ρiuj)(aj, (ρiπ)−j) − uj(πj)
         | 
| 944 | 
            +
            = max
         | 
| 945 | 
            +
            aj∈Aj
         | 
| 946 | 
            +
            �
         | 
| 947 | 
            +
            b∈A
         | 
| 948 | 
            +
            (ρiuj)(aj, b−j) · (ρiπ)(b) − uj(πj)
         | 
| 949 | 
            +
            = max
         | 
| 950 | 
            +
            aj∈Aj
         | 
| 951 | 
            +
            �
         | 
| 952 | 
            +
            bi∈Ai,b−i∈A−i
         | 
| 953 | 
            +
            uj(aj, (b−j)−i, ρ−1
         | 
| 954 | 
            +
            i bi) · π(ρ−1
         | 
| 955 | 
            +
            i
         | 
| 956 | 
            +
            bi, b−i) − uj(πj)
         | 
| 957 | 
            +
            = max
         | 
| 958 | 
            +
            aj∈Aj
         | 
| 959 | 
            +
            �
         | 
| 960 | 
            +
            bi∈Ai,b−i∈A−i
         | 
| 961 | 
            +
            uj(aj, (b−j)−i, bi) · π(bi, b−i) − uj(πj)
         | 
| 962 | 
            +
            , ρi is a bijection on Ai
         | 
| 963 | 
            +
            =Ej(π, u)
         | 
| 964 | 
            +
            Thus, we have E(ρiπ, ρiu) = E(π, u). Thus, if π is a ε-CCE of Γu, then ρiπ must be a ε-CCE of Γρiu.
         | 
| 965 | 
            +
            CE
         | 
| 966 | 
            +
            For player j ̸= i, we have
         | 
| 967 | 
            +
            ECE
         | 
| 968 | 
            +
            j
         | 
| 969 | 
            +
            (ρiπ, ρiu) =
         | 
| 970 | 
            +
            max
         | 
| 971 | 
            +
            φj:Aj→Aj
         | 
| 972 | 
            +
            �
         | 
| 973 | 
            +
            a∈A
         | 
| 974 | 
            +
            (ρiπ)(a) · (ρiuj)(φj(aj), a−j) − (ρiuj)(ρiπ)
         | 
| 975 | 
            +
            =
         | 
| 976 | 
            +
            max
         | 
| 977 | 
            +
            φj:Aj→Aj
         | 
| 978 | 
            +
            �
         | 
| 979 | 
            +
            a∈A
         | 
| 980 | 
            +
            π(ρ−1
         | 
| 981 | 
            +
            i
         | 
| 982 | 
            +
            ai, a−i) · uj(φj(aj), a−i,j, ρ−1
         | 
| 983 | 
            +
            i ai) − uj(π)
         | 
| 984 | 
            +
            =
         | 
| 985 | 
            +
            max
         | 
| 986 | 
            +
            φj:Aj→Aj
         | 
| 987 | 
            +
            �
         | 
| 988 | 
            +
            a∈A
         | 
| 989 | 
            +
            π(ai, a−i) · uj(φj(aj), a−i,j, ai) − uj(π)
         | 
| 990 | 
            +
            , ρi is a bijection on Ai
         | 
| 991 | 
            +
            =ECE
         | 
| 992 | 
            +
            j
         | 
| 993 | 
            +
            (π, u)
         | 
| 994 | 
            +
            For player i, we define operator ¯ρi as (¯ρiφi)(ai) = ρ−1
         | 
| 995 | 
            +
            i φi(ρiai). We can verify that ¯ρi is a bijection
         | 
| 996 | 
            +
            on {φi : Ai → Ai}, because ¯· is a homomorphism in the sense that ρ1
         | 
| 997 | 
            +
            i ◦ ρ2
         | 
| 998 | 
            +
            i = ρ2
         | 
| 999 | 
            +
            i ρ1
         | 
| 1000 | 
            +
            i and ¯· maps the
         | 
| 1001 | 
            +
            identity mapping of Ai to the identity mapping of {Ai → Ai}. Specifically,
         | 
| 1002 | 
            +
            ρ1
         | 
| 1003 | 
            +
            i ◦ ρ2
         | 
| 1004 | 
            +
            i φi(ai) = (ρ1
         | 
| 1005 | 
            +
            i )−1(ρ2
         | 
| 1006 | 
            +
            i φi)(ρ1
         | 
| 1007 | 
            +
            i ai) = (ρ1
         | 
| 1008 | 
            +
            i )−1(ρ2
         | 
| 1009 | 
            +
            i )−1φi(ρ2
         | 
| 1010 | 
            +
            i ρ1
         | 
| 1011 | 
            +
            i ai) = ρ2
         | 
| 1012 | 
            +
            i ρ1
         | 
| 1013 | 
            +
            i φi(ai),
         | 
| 1014 | 
            +
            and
         | 
| 1015 | 
            +
            eiφi(ai) = e−1
         | 
| 1016 | 
            +
            i φi(eiai) = φi(ai).
         | 
| 1017 | 
            +
            15
         | 
| 1018 | 
            +
             | 
| 1019 | 
            +
            Based on ¯ρi, we have
         | 
| 1020 | 
            +
            ECE
         | 
| 1021 | 
            +
            i
         | 
| 1022 | 
            +
            (ρiπ, ρiu)
         | 
| 1023 | 
            +
            =
         | 
| 1024 | 
            +
            max
         | 
| 1025 | 
            +
            φi:Ai→Ai
         | 
| 1026 | 
            +
            �
         | 
| 1027 | 
            +
            a∈A
         | 
| 1028 | 
            +
            (ρiπ)(a) · (ρiui)(φi(ai), a−i) − ui(π)
         | 
| 1029 | 
            +
            =
         | 
| 1030 | 
            +
            max
         | 
| 1031 | 
            +
            φi:Ai→Ai
         | 
| 1032 | 
            +
            �
         | 
| 1033 | 
            +
            a∈A
         | 
| 1034 | 
            +
            π(ρ−1
         | 
| 1035 | 
            +
            i ai, a−i)ui(ρ−1
         | 
| 1036 | 
            +
            i φi(ai), a−i) − ui(π)
         | 
| 1037 | 
            +
            =
         | 
| 1038 | 
            +
            max
         | 
| 1039 | 
            +
            φi:Ai→Ai
         | 
| 1040 | 
            +
            �
         | 
| 1041 | 
            +
            a∈A
         | 
| 1042 | 
            +
            π(ρ−1
         | 
| 1043 | 
            +
            i ai, a−i)ui(ρ−1
         | 
| 1044 | 
            +
            i φi(ρi(ρ−1
         | 
| 1045 | 
            +
            i ai)), a−i) − ui(π)
         | 
| 1046 | 
            +
            =
         | 
| 1047 | 
            +
            max
         | 
| 1048 | 
            +
            φi:Ai→Ai
         | 
| 1049 | 
            +
            �
         | 
| 1050 | 
            +
            a∈A
         | 
| 1051 | 
            +
            π(ai, a−i)ui(ρ−1
         | 
| 1052 | 
            +
            i φi(ρiai), a−i) − ui(π)
         | 
| 1053 | 
            +
            , ρi is a bijection on Ai
         | 
| 1054 | 
            +
            =
         | 
| 1055 | 
            +
            max
         | 
| 1056 | 
            +
            φi:Ai→Ai
         | 
| 1057 | 
            +
            �
         | 
| 1058 | 
            +
            a∈A
         | 
| 1059 | 
            +
            π(ai, a−i)ui((¯ρiφi)(ai), a−i) − ui(π)
         | 
| 1060 | 
            +
            =
         | 
| 1061 | 
            +
            max
         | 
| 1062 | 
            +
            φi:Ai→Ai
         | 
| 1063 | 
            +
            �
         | 
| 1064 | 
            +
            a∈A
         | 
| 1065 | 
            +
            π(ai, a−i)ui(φi(ai), a−i) − ui(π)
         | 
| 1066 | 
            +
            , ¯ρi is a bijection on {Ai → Ai}
         | 
| 1067 | 
            +
            =ECE
         | 
| 1068 | 
            +
            i
         | 
| 1069 | 
            +
            (π, u)
         | 
| 1070 | 
            +
            Thus, we have E(ρiπ, ρiu) = E(π, u), thus if π is a ε-CE of Γu, then ρiπ must be a ε-CE of Γρiu.
         | 
| 1071 | 
            +
            A.4
         | 
| 1072 | 
            +
            Proof of Lemma 3.7 to Lemma 3.9
         | 
| 1073 | 
            +
            Proof of Lemma 3.7. ∀j ̸= i, ρ0 ∈ Gi, for operator Oi we have
         | 
| 1074 | 
            +
            (Oif NE)(ρ0u)j =
         | 
| 1075 | 
            +
            1
         | 
| 1076 | 
            +
            |Ai|!
         | 
| 1077 | 
            +
            �
         | 
| 1078 | 
            +
            ρi∈Gi
         | 
| 1079 | 
            +
            f NE(ρiρ0u)j
         | 
| 1080 | 
            +
            (a)
         | 
| 1081 | 
            +
            =
         | 
| 1082 | 
            +
            1
         | 
| 1083 | 
            +
            |Ai|!
         | 
| 1084 | 
            +
            �
         | 
| 1085 | 
            +
            �ρi∈Gi
         | 
| 1086 | 
            +
            f NE(�ρiu)j = (Oif NE)(u)j
         | 
| 1087 | 
            +
            where in (a) we define �ρi = ρiρ0, and (a) holds since ρ0 is a bijection on Gi. As a result, Oif NE is i-PI.
         | 
| 1088 | 
            +
            For operator Pi we have
         | 
| 1089 | 
            +
            (Pif NE)(ρ0u)i =
         | 
| 1090 | 
            +
            1
         | 
| 1091 | 
            +
            |Ai|!
         | 
| 1092 | 
            +
            �
         | 
| 1093 | 
            +
            ρi∈Gi
         | 
| 1094 | 
            +
            ρ−1
         | 
| 1095 | 
            +
            i f NE(ρiρ0u)j = ρ0
         | 
| 1096 | 
            +
            1
         | 
| 1097 | 
            +
            |Ai|!
         | 
| 1098 | 
            +
            �
         | 
| 1099 | 
            +
            ρi∈Gi
         | 
| 1100 | 
            +
            ρ−1
         | 
| 1101 | 
            +
            0 ρ−1
         | 
| 1102 | 
            +
            i f NE(ρiρ0u)j
         | 
| 1103 | 
            +
            =ρ0
         | 
| 1104 | 
            +
            1
         | 
| 1105 | 
            +
            |Ai|!
         | 
| 1106 | 
            +
            �
         | 
| 1107 | 
            +
            �ρi∈Gi
         | 
| 1108 | 
            +
            �ρ−1
         | 
| 1109 | 
            +
            i f NE(�ρiu)j = ρ0(Pif NE)(u)i,
         | 
| 1110 | 
            +
            therefore Pif NE is i-PE.
         | 
| 1111 | 
            +
            If f NE is already i-PI, ∀j ̸= i we have
         | 
| 1112 | 
            +
            Oif NE(u)j =
         | 
| 1113 | 
            +
            1
         | 
| 1114 | 
            +
            |Ai|!
         | 
| 1115 | 
            +
            �
         | 
| 1116 | 
            +
            ρi∈Gi
         | 
| 1117 | 
            +
            f NE(ρiu)j =
         | 
| 1118 | 
            +
            1
         | 
| 1119 | 
            +
            |Ai|!
         | 
| 1120 | 
            +
            �
         | 
| 1121 | 
            +
            ρi∈Gi
         | 
| 1122 | 
            +
            f NE(u)j = f NE(u)j,
         | 
| 1123 | 
            +
            and Oif NE(u)i = f NE(u)i according to definition of Oi. Therefore, Oif NE = f NE for i-PI f NE.
         | 
| 1124 | 
            +
            If f NE is already i-PE, we have
         | 
| 1125 | 
            +
            Pif NE(u)i =
         | 
| 1126 | 
            +
            1
         | 
| 1127 | 
            +
            |Ai|!
         | 
| 1128 | 
            +
            �
         | 
| 1129 | 
            +
            ρi∈Gi
         | 
| 1130 | 
            +
            ρ−1
         | 
| 1131 | 
            +
            i f NE(ρiu)i =
         | 
| 1132 | 
            +
            1
         | 
| 1133 | 
            +
            |Ai|!
         | 
| 1134 | 
            +
            �
         | 
| 1135 | 
            +
            ρi∈Gi
         | 
| 1136 | 
            +
            ρ−1
         | 
| 1137 | 
            +
            i ρif NE(u)i =
         | 
| 1138 | 
            +
            1
         | 
| 1139 | 
            +
            |Ai|!
         | 
| 1140 | 
            +
            �
         | 
| 1141 | 
            +
            ρi∈Gi
         | 
| 1142 | 
            +
            f NE(u)i = f NE(u)i,
         | 
| 1143 | 
            +
            and ∀j ̸= i, Pif NE(u)j = f NE(u)j according to definition of Pi. Therefore, Pif NE = f NE for i-PE
         | 
| 1144 | 
            +
            f NE.
         | 
| 1145 | 
            +
            Proof of Lemma 3.8. A direct inference from Lemma 3.7
         | 
| 1146 | 
            +
            Proof of Lemma 3.9. ∀ρ0 ∈ Gi, we have
         | 
| 1147 | 
            +
            16
         | 
| 1148 | 
            +
             | 
| 1149 | 
            +
            (Qif (C)CE)(ρ0u) =
         | 
| 1150 | 
            +
            1
         | 
| 1151 | 
            +
            |Ai|!
         | 
| 1152 | 
            +
            �
         | 
| 1153 | 
            +
            ρi∈Gi
         | 
| 1154 | 
            +
            ρ−1
         | 
| 1155 | 
            +
            i f (C)CE(ρiρ0u) = ρ0
         | 
| 1156 | 
            +
            1
         | 
| 1157 | 
            +
            |Ai|!
         | 
| 1158 | 
            +
            �
         | 
| 1159 | 
            +
            ρi∈Gi
         | 
| 1160 | 
            +
            ρ−1
         | 
| 1161 | 
            +
            0 ρ−1
         | 
| 1162 | 
            +
            i
         | 
| 1163 | 
            +
            f (C)CE(ρiρ0u)
         | 
| 1164 | 
            +
            =ρ0
         | 
| 1165 | 
            +
            1
         | 
| 1166 | 
            +
            |Ai|!
         | 
| 1167 | 
            +
            �
         | 
| 1168 | 
            +
            �ρi∈Gi
         | 
| 1169 | 
            +
            �ρ−1
         | 
| 1170 | 
            +
            i f (C)CE(�ρiu) = ρ0(Qif (C)CE)(u)
         | 
| 1171 | 
            +
            If f (C)CE is already i-PE, we have
         | 
| 1172 | 
            +
            Qif (C)CE(u) =
         | 
| 1173 | 
            +
            1
         | 
| 1174 | 
            +
            |Ai|!
         | 
| 1175 | 
            +
            �
         | 
| 1176 | 
            +
            ρi∈Gi
         | 
| 1177 | 
            +
            ρ−1
         | 
| 1178 | 
            +
            i f (C)CE(ρiu) =
         | 
| 1179 | 
            +
            1
         | 
| 1180 | 
            +
            |Ai|!
         | 
| 1181 | 
            +
            �
         | 
| 1182 | 
            +
            ρi∈Gi
         | 
| 1183 | 
            +
            ρ−1
         | 
| 1184 | 
            +
            i ρif (C)CE(u) =
         | 
| 1185 | 
            +
            1
         | 
| 1186 | 
            +
            |Ai|!
         | 
| 1187 | 
            +
            �
         | 
| 1188 | 
            +
            ρi∈Gi
         | 
| 1189 | 
            +
            f (C)CE(u) = f (C)CE(u)
         | 
| 1190 | 
            +
            A.5
         | 
| 1191 | 
            +
            Proof of Lemma 3.11
         | 
| 1192 | 
            +
            We prove the three claims below.
         | 
| 1193 | 
            +
            1. XFX ⊆ FX .
         | 
| 1194 | 
            +
            2. X 2FX = XFX .
         | 
| 1195 | 
            +
            3. If XY = Y ⊆ FX , then Y ⊆ XFX
         | 
| 1196 | 
            +
            The first claim holds because FX is closed under X, and the second claim holds because X is
         | 
| 1197 | 
            +
            idempotent. For the third claim, from Y ⊆ FX we know XY ⊆ XFX , then Y = XY ⊆ XFX .
         | 
| 1198 | 
            +
            We immediately know XFX is the largest subset of FX that is invariant under X.
         | 
| 1199 | 
            +
            A.6
         | 
| 1200 | 
            +
            Proof of Theorem 4.3
         | 
| 1201 | 
            +
            Some of the techniques come from D¨utting et al. [2019] and Duan et al. [2021]. We first introduce
         | 
| 1202 | 
            +
            some useful lemmas. Denote ℓ : F × U → R as the loss function (such as ℓ(f, u) := E(f(u), u)). We
         | 
| 1203 | 
            +
            measure the capacity of the composite function class ℓ ◦ F using the empirical Rademacher complex-
         | 
| 1204 | 
            +
            ity [Bartlett and Mendelson, 2002] on the training set S, which is defined as:
         | 
| 1205 | 
            +
            RS(ℓ ◦ F) := 1
         | 
| 1206 | 
            +
            mEx∼{+1,−1}m
         | 
| 1207 | 
            +
            �
         | 
| 1208 | 
            +
            sup
         | 
| 1209 | 
            +
            f∈F
         | 
| 1210 | 
            +
            m
         | 
| 1211 | 
            +
            �
         | 
| 1212 | 
            +
            i=1
         | 
| 1213 | 
            +
            xi · ℓ(f, u(i))
         | 
| 1214 | 
            +
            �
         | 
| 1215 | 
            +
            ,
         | 
| 1216 | 
            +
            where x is distributed i.i.d. according to uniform distribution in {+1, −1}. We have
         | 
| 1217 | 
            +
            Lemma A.2 (Shalev-Shwartz and Ben-David [2014]). Let S be a training set of size m drawn i.i.d.
         | 
| 1218 | 
            +
            from distribution D over U. Then with probability at least 1 − δ over draw of S from D, for all f ∈ F,
         | 
| 1219 | 
            +
            Eu∼D[ℓ(f, u)] − 1
         | 
| 1220 | 
            +
            m
         | 
| 1221 | 
            +
            �
         | 
| 1222 | 
            +
            u∈S
         | 
| 1223 | 
            +
            ℓ(l, u) ≤ 2RS(ℓ ◦ F) + 4
         | 
| 1224 | 
            +
            �
         | 
| 1225 | 
            +
            2 ln(4/δ)
         | 
| 1226 | 
            +
            m
         | 
| 1227 | 
            +
            Lemma A.3. If |ℓ(·)| ≤ c for constant c > 0 and ∀f, f ′ ∈ F, |ℓ(f, u) − ℓ(f ′, u)| ≤ L∥f − f ′∥∞, then
         | 
| 1228 | 
            +
            we have
         | 
| 1229 | 
            +
            Eu∼D[ℓ(f, u)] − 1
         | 
| 1230 | 
            +
            m
         | 
| 1231 | 
            +
            �
         | 
| 1232 | 
            +
            u∈S
         | 
| 1233 | 
            +
            ℓ(l, u) ≤ 2 inf
         | 
| 1234 | 
            +
            r>0
         | 
| 1235 | 
            +
            �
         | 
| 1236 | 
            +
            c
         | 
| 1237 | 
            +
            �
         | 
| 1238 | 
            +
            2 ln N∞(F, r)
         | 
| 1239 | 
            +
            m
         | 
| 1240 | 
            +
            + Lr
         | 
| 1241 | 
            +
            �
         | 
| 1242 | 
            +
            + 4
         | 
| 1243 | 
            +
            �
         | 
| 1244 | 
            +
            2 ln(4/δ)
         | 
| 1245 | 
            +
            m
         | 
| 1246 | 
            +
            Proof. For function class F, let Fr with |Fr| = N∞(F, r) be the function class that r-covers F for
         | 
| 1247 | 
            +
            17
         | 
| 1248 | 
            +
             | 
| 1249 | 
            +
            some r > 0. Similarly, ∀f ∈ F, denote fr ∈ Fr be the function that r-covers f. We have
         | 
| 1250 | 
            +
            RS(ℓ ◦ F) = 1
         | 
| 1251 | 
            +
            mEx
         | 
| 1252 | 
            +
            �
         | 
| 1253 | 
            +
            sup
         | 
| 1254 | 
            +
            f∈F
         | 
| 1255 | 
            +
            m
         | 
| 1256 | 
            +
            �
         | 
| 1257 | 
            +
            i=1
         | 
| 1258 | 
            +
            xi · ℓ(f, u(i))
         | 
| 1259 | 
            +
            �
         | 
| 1260 | 
            +
            = 1
         | 
| 1261 | 
            +
            mEx
         | 
| 1262 | 
            +
            �
         | 
| 1263 | 
            +
            sup
         | 
| 1264 | 
            +
            f∈F
         | 
| 1265 | 
            +
            m
         | 
| 1266 | 
            +
            �
         | 
| 1267 | 
            +
            i=1
         | 
| 1268 | 
            +
            xi ·
         | 
| 1269 | 
            +
            �
         | 
| 1270 | 
            +
            ℓ(fr, u(i)) + ℓ(f, u(i)) − ℓ(fr, u(i))
         | 
| 1271 | 
            +
            ��
         | 
| 1272 | 
            +
            ≤ 1
         | 
| 1273 | 
            +
            mEx
         | 
| 1274 | 
            +
            �
         | 
| 1275 | 
            +
            sup
         | 
| 1276 | 
            +
            fr∈Fr
         | 
| 1277 | 
            +
            m
         | 
| 1278 | 
            +
            �
         | 
| 1279 | 
            +
            i=1
         | 
| 1280 | 
            +
            xi · ℓ(fr, u(i))
         | 
| 1281 | 
            +
            �
         | 
| 1282 | 
            +
            + 1
         | 
| 1283 | 
            +
            mEx
         | 
| 1284 | 
            +
            �
         | 
| 1285 | 
            +
            sup
         | 
| 1286 | 
            +
            f∈F
         | 
| 1287 | 
            +
            m
         | 
| 1288 | 
            +
            �
         | 
| 1289 | 
            +
            i=1
         | 
| 1290 | 
            +
            |xi · Lr|
         | 
| 1291 | 
            +
            �
         | 
| 1292 | 
            +
            , |ℓ(f, u) − ℓ(fr, u)| ≤ L∥f − fr∥∞ = Lr
         | 
| 1293 | 
            +
            ≤ sup
         | 
| 1294 | 
            +
            fr∈Fr
         | 
| 1295 | 
            +
            �
         | 
| 1296 | 
            +
            �
         | 
| 1297 | 
            +
            �
         | 
| 1298 | 
            +
            �
         | 
| 1299 | 
            +
            m
         | 
| 1300 | 
            +
            �
         | 
| 1301 | 
            +
            i=1
         | 
| 1302 | 
            +
            ℓ2(fr, u(i)) ·
         | 
| 1303 | 
            +
            �
         | 
| 1304 | 
            +
            2 ln N∞(F, r)
         | 
| 1305 | 
            +
            m
         | 
| 1306 | 
            +
            + Lr
         | 
| 1307 | 
            +
            m Ex∥x∥
         | 
| 1308 | 
            +
            , the first term holds by Massart’s lemma
         | 
| 1309 | 
            +
            ≤
         | 
| 1310 | 
            +
            √
         | 
| 1311 | 
            +
            c2m ·
         | 
| 1312 | 
            +
            �
         | 
| 1313 | 
            +
            2 ln N∞(F, r)
         | 
| 1314 | 
            +
            m
         | 
| 1315 | 
            +
            + Lr
         | 
| 1316 | 
            +
            m Ex∥x∥
         | 
| 1317 | 
            +
            ≤c
         | 
| 1318 | 
            +
            �
         | 
| 1319 | 
            +
            2 ln N∞(F, r)
         | 
| 1320 | 
            +
            m
         | 
| 1321 | 
            +
            + Lr,
         | 
| 1322 | 
            +
            (5)
         | 
| 1323 | 
            +
            Combining Lemma A.2 and Equation (5), we get
         | 
| 1324 | 
            +
            Eu∼D[ℓ(f, u)] − 1
         | 
| 1325 | 
            +
            m
         | 
| 1326 | 
            +
            �
         | 
| 1327 | 
            +
            u∈S
         | 
| 1328 | 
            +
            ℓ(l, u) ≤ 2 inf
         | 
| 1329 | 
            +
            r>0
         | 
| 1330 | 
            +
            �
         | 
| 1331 | 
            +
            c
         | 
| 1332 | 
            +
            �
         | 
| 1333 | 
            +
            2 ln N∞(F, r)
         | 
| 1334 | 
            +
            m
         | 
| 1335 | 
            +
            + Lr
         | 
| 1336 | 
            +
            �
         | 
| 1337 | 
            +
            + 4
         | 
| 1338 | 
            +
            �
         | 
| 1339 | 
            +
            2 ln(4/δ)
         | 
| 1340 | 
            +
            m
         | 
| 1341 | 
            +
            NE Approximator
         | 
| 1342 | 
            +
            Lemma A.4. For arbitrary product mixed strategy σ and σ′, we have
         | 
| 1343 | 
            +
            |E(σ, u) − E(σ′, u)| ≤ 2n∥σ − σ′∥,
         | 
| 1344 | 
            +
            Proof. ∀σ, σ′, we define y−j := (σ1, . . . , σj−1, σ′
         | 
| 1345 | 
            +
            j+1, . . . , σ′
         | 
| 1346 | 
            +
            n). Then, ∀i ∈ [n] we have
         | 
| 1347 | 
            +
            |ui(σ) − ui(σ′)| =|ui(σ1, σ2, . . . , σn) − ui(σ′, σ′
         | 
| 1348 | 
            +
            2, . . . , σ′
         | 
| 1349 | 
            +
            n)|
         | 
| 1350 | 
            +
            =
         | 
| 1351 | 
            +
            ���
         | 
| 1352 | 
            +
            n
         | 
| 1353 | 
            +
            �
         | 
| 1354 | 
            +
            j=1
         | 
| 1355 | 
            +
            �
         | 
| 1356 | 
            +
            ui(σ1, . . . , σj, σ′
         | 
| 1357 | 
            +
            j+1, . . . , σ′
         | 
| 1358 | 
            +
            n) − ui(σ1, . . . , σ′
         | 
| 1359 | 
            +
            j, σ′
         | 
| 1360 | 
            +
            j+1, . . . , σ′
         | 
| 1361 | 
            +
            n)
         | 
| 1362 | 
            +
            ����
         | 
| 1363 | 
            +
            =
         | 
| 1364 | 
            +
            ���
         | 
| 1365 | 
            +
            n
         | 
| 1366 | 
            +
            �
         | 
| 1367 | 
            +
            j=1
         | 
| 1368 | 
            +
            �
         | 
| 1369 | 
            +
            ui(σj, y−j) − ui(σ′
         | 
| 1370 | 
            +
            j, y−j)
         | 
| 1371 | 
            +
            ����
         | 
| 1372 | 
            +
            =
         | 
| 1373 | 
            +
            ���
         | 
| 1374 | 
            +
            n
         | 
| 1375 | 
            +
            �
         | 
| 1376 | 
            +
            j=1
         | 
| 1377 | 
            +
            �
         | 
| 1378 | 
            +
            aj
         | 
| 1379 | 
            +
            (σj(aj) − σ′
         | 
| 1380 | 
            +
            j(aj))
         | 
| 1381 | 
            +
            �
         | 
| 1382 | 
            +
            a−j
         | 
| 1383 | 
            +
            ui(aj, a−j)y−j(a−j)
         | 
| 1384 | 
            +
            ���
         | 
| 1385 | 
            +
            ≤
         | 
| 1386 | 
            +
            n
         | 
| 1387 | 
            +
            �
         | 
| 1388 | 
            +
            j=1
         | 
| 1389 | 
            +
            �
         | 
| 1390 | 
            +
            aj
         | 
| 1391 | 
            +
            ���σj(aj) − σ′
         | 
| 1392 | 
            +
            j(aj)
         | 
| 1393 | 
            +
            ���
         | 
| 1394 | 
            +
            �
         | 
| 1395 | 
            +
            a−j
         | 
| 1396 | 
            +
            ui(aj, a−j)y−j(a−j)
         | 
| 1397 | 
            +
            ≤
         | 
| 1398 | 
            +
            n
         | 
| 1399 | 
            +
            �
         | 
| 1400 | 
            +
            j=1
         | 
| 1401 | 
            +
            �
         | 
| 1402 | 
            +
            aj
         | 
| 1403 | 
            +
            ���σj(aj) − σ′
         | 
| 1404 | 
            +
            j(aj)
         | 
| 1405 | 
            +
            ���
         | 
| 1406 | 
            +
            �
         | 
| 1407 | 
            +
            a−j
         | 
| 1408 | 
            +
            y−j(a−j)
         | 
| 1409 | 
            +
            , ui(·) ∈ [0, 1]
         | 
| 1410 | 
            +
            ≤
         | 
| 1411 | 
            +
            n
         | 
| 1412 | 
            +
            �
         | 
| 1413 | 
            +
            j=1
         | 
| 1414 | 
            +
            �
         | 
| 1415 | 
            +
            aj∈Aj
         | 
| 1416 | 
            +
            ���σj(aj) − σ′
         | 
| 1417 | 
            +
            j(aj)
         | 
| 1418 | 
            +
            ��� ≤ n max
         | 
| 1419 | 
            +
            j∈[n]
         | 
| 1420 | 
            +
            �
         | 
| 1421 | 
            +
            aj∈Aj
         | 
| 1422 | 
            +
            ���σj(aj) − σ′
         | 
| 1423 | 
            +
            j(aj)
         | 
| 1424 | 
            +
            ���
         | 
| 1425 | 
            +
            =n∥σ − σ′∥,
         | 
| 1426 | 
            +
            Therefore, ∀ai ∈ Ai,
         | 
| 1427 | 
            +
            ui(ai, σ−i) − ui(σ) =ui(ai, σ−i) − ui(ai, σ′
         | 
| 1428 | 
            +
            −i) + ui(ai, σ′
         | 
| 1429 | 
            +
            −i) − ui(σ′) + ui(σ′) − ui(σ)
         | 
| 1430 | 
            +
            ≤n∥σ − σ′∥ + E(σ′, u) + n∥σ − σ′∥
         | 
| 1431 | 
            +
            =E(σ′, u) + 2n∥σ − σ′∥.
         | 
| 1432 | 
            +
            18
         | 
| 1433 | 
            +
             | 
| 1434 | 
            +
            Based on that, we get
         | 
| 1435 | 
            +
            E(σ, u) =
         | 
| 1436 | 
            +
            max
         | 
| 1437 | 
            +
            i∈N,ai∈Ai[ui(ai, σ−i) − ui(σ)] ≤ E(σ′, u) + 2n∥σ − σ′∥
         | 
| 1438 | 
            +
            Similarly, we also have
         | 
| 1439 | 
            +
            E(σ′, u) ≤ E(σ, u) + 2n∥σ − σ′∥
         | 
| 1440 | 
            +
            Based on Lemma A.4, ∀f, f ′ ∈ FNE, we have
         | 
| 1441 | 
            +
            E(f(u), u) − E(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
         | 
| 1442 | 
            +
            Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
         | 
| 1443 | 
            +
            Eu∼D[E(f NE(u), u)] − 1
         | 
| 1444 | 
            +
            m
         | 
| 1445 | 
            +
            �
         | 
| 1446 | 
            +
            u∈S
         | 
| 1447 | 
            +
            E(f NE(u), u) ≤ 2 · inf
         | 
| 1448 | 
            +
            r>0
         | 
| 1449 | 
            +
            ��
         | 
| 1450 | 
            +
            2 ln N∞(FNE, r)
         | 
| 1451 | 
            +
            m
         | 
| 1452 | 
            +
            + 2nr
         | 
| 1453 | 
            +
            �
         | 
| 1454 | 
            +
            + 4
         | 
| 1455 | 
            +
            �
         | 
| 1456 | 
            +
            2 ln(4/δ)
         | 
| 1457 | 
            +
            m
         | 
| 1458 | 
            +
            CCE Approximator
         | 
| 1459 | 
            +
            Lemma A.5. For arbitrary joint mixed strategy π and π′, we have
         | 
| 1460 | 
            +
            |E(π, u) − E(π′, u)| ≤ 2∥π − π′∥,
         | 
| 1461 | 
            +
            Proof. ∀π, π′, ∀i ∈ [n] we have
         | 
| 1462 | 
            +
            |ui(π) − ui(π′)| =
         | 
| 1463 | 
            +
            �
         | 
| 1464 | 
            +
            a∈A
         | 
| 1465 | 
            +
            (π(a) − π′(a))ui(a)
         | 
| 1466 | 
            +
            (a)
         | 
| 1467 | 
            +
            ≤
         | 
| 1468 | 
            +
            �
         | 
| 1469 | 
            +
            a∈A
         | 
| 1470 | 
            +
            |π(a) − π′(a)| = ∥π − π′∥
         | 
| 1471 | 
            +
            (6)
         | 
| 1472 | 
            +
            where (a) holds since ui(·) ∈ [0, 1]. Therefore, ∀ai ∈ Ai,
         | 
| 1473 | 
            +
            ui(ai, π−i) − ui(π) =ui(ai, π−i) − ui(ai, π′
         | 
| 1474 | 
            +
            −i) + ui(ai, π′
         | 
| 1475 | 
            +
            −i) − ui(π′) + ui(π′) − ui(π)
         | 
| 1476 | 
            +
            ≤∥π − π′∥ + E(π′, u) + ∥π − π′∥
         | 
| 1477 | 
            +
            =E(π′, u) + 2∥π − π′∥.
         | 
| 1478 | 
            +
            Based on that, we get
         | 
| 1479 | 
            +
            E(π, u) =
         | 
| 1480 | 
            +
            max
         | 
| 1481 | 
            +
            i∈N,ai∈Ai[ui(ai, π−i) − ui(π)] ≤ E(π′, u) + 2∥π − π′∥
         | 
| 1482 | 
            +
            Similarly, we also have
         | 
| 1483 | 
            +
            E(π′, u) ≤ E(π, u) + 2∥π − π′∥
         | 
| 1484 | 
            +
            Based on Lemma A.5, ∀f, f ′ ∈ FCCE, we have
         | 
| 1485 | 
            +
            E(f(u), u) − E(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
         | 
| 1486 | 
            +
            Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
         | 
| 1487 | 
            +
            Eu∼D[E(f CCE(u), u)] − 1
         | 
| 1488 | 
            +
            m
         | 
| 1489 | 
            +
            �
         | 
| 1490 | 
            +
            u∈S
         | 
| 1491 | 
            +
            E(f CCE(u), u) ≤ 2 · inf
         | 
| 1492 | 
            +
            r>0
         | 
| 1493 | 
            +
            ��
         | 
| 1494 | 
            +
            2 ln N∞(FCCE, r)
         | 
| 1495 | 
            +
            m
         | 
| 1496 | 
            +
            + 2r
         | 
| 1497 | 
            +
            �
         | 
| 1498 | 
            +
            + 4
         | 
| 1499 | 
            +
            �
         | 
| 1500 | 
            +
            2 ln(4/δ)
         | 
| 1501 | 
            +
            m
         | 
| 1502 | 
            +
            19
         | 
| 1503 | 
            +
             | 
| 1504 | 
            +
            CE Approximator
         | 
| 1505 | 
            +
            Lemma A.6. For arbitrary joint mixed strategy π and π′, we have
         | 
| 1506 | 
            +
            |ECE(π, u) − ECE(π′, u)| ≤ 2∥π − π′∥,
         | 
| 1507 | 
            +
            Proof. ∀ai ∈ Ai, ∀φi, we have
         | 
| 1508 | 
            +
            �
         | 
| 1509 | 
            +
            a∈A
         | 
| 1510 | 
            +
            π(a)ui(φ(ai), a−i) − ui(π) =
         | 
| 1511 | 
            +
            �
         | 
| 1512 | 
            +
            a∈A
         | 
| 1513 | 
            +
            π(a)ui(φ(ai), a−i) −
         | 
| 1514 | 
            +
            �
         | 
| 1515 | 
            +
            a∈A
         | 
| 1516 | 
            +
            π′(a)ui(φ(ai), a−i)
         | 
| 1517 | 
            +
            +
         | 
| 1518 | 
            +
            �
         | 
| 1519 | 
            +
            a∈A
         | 
| 1520 | 
            +
            π′(a)ui(φ(ai), a−i) − ui(π′) + ui(π′) − ui(π)
         | 
| 1521 | 
            +
            ≤∥π − π′∥ + ECE(π′, u) + ∥π − π′∥
         | 
| 1522 | 
            +
            =ECE(π′, u) + 2∥π − π′∥.
         | 
| 1523 | 
            +
            Based on that, we get
         | 
| 1524 | 
            +
            ECE(π, u) = max
         | 
| 1525 | 
            +
            i∈N max
         | 
| 1526 | 
            +
            φi
         | 
| 1527 | 
            +
            �
         | 
| 1528 | 
            +
            a∈A
         | 
| 1529 | 
            +
            π(a)ui(φ(ai), a−i) − ui(π) ≤ ECE(π′, u) + 2∥π − π′∥
         | 
| 1530 | 
            +
            Similarly, we also have
         | 
| 1531 | 
            +
            ECE(π′, u) ≤ ECE(π, u) + 2∥π − π′∥
         | 
| 1532 | 
            +
            Based on Lemma A.5, ∀f, f ′ ∈ FCE, we have
         | 
| 1533 | 
            +
            ECE(f(u), u) − ECE(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
         | 
| 1534 | 
            +
            Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
         | 
| 1535 | 
            +
            Eu∼D[ECE(f CE(u), u)] − 1
         | 
| 1536 | 
            +
            m
         | 
| 1537 | 
            +
            �
         | 
| 1538 | 
            +
            u∈S
         | 
| 1539 | 
            +
            ECE(f CE(u), u) ≤ 2 · inf
         | 
| 1540 | 
            +
            r>0
         | 
| 1541 | 
            +
            ��
         | 
| 1542 | 
            +
            2 ln N∞(FCE, r)
         | 
| 1543 | 
            +
            m
         | 
| 1544 | 
            +
            + 2r
         | 
| 1545 | 
            +
            �
         | 
| 1546 | 
            +
            + 4
         | 
| 1547 | 
            +
            �
         | 
| 1548 | 
            +
            2 ln(4/δ)
         | 
| 1549 | 
            +
            m
         | 
| 1550 | 
            +
            A.7
         | 
| 1551 | 
            +
            Proof of Theorem 4.4
         | 
| 1552 | 
            +
            For function class F of NE, CE or CCE approximators, according to Lemma A.4, Lemma A.5 and
         | 
| 1553 | 
            +
            Lemma A.6, ∀f, g ∈ F we have
         | 
| 1554 | 
            +
            E(CE)(f(u), u) − E(CE)(g(u), u) ≤ L∥f(u) − g(u)∥ ≤ L∥f − g∥∞,
         | 
| 1555 | 
            +
            (7)
         | 
| 1556 | 
            +
            where L = 2n for NE approximators, and L = 2 for CE and CCE approximators.
         | 
| 1557 | 
            +
            For simplicity, we denote LS(f) =
         | 
| 1558 | 
            +
            1
         | 
| 1559 | 
            +
            m
         | 
| 1560 | 
            +
            �
         | 
| 1561 | 
            +
            u∈S E(CE)(f(u), u) and LD(f) = Eu∼D[E(CE)(f(u), u)]. let
         | 
| 1562 | 
            +
            Fr with |Fr| = N∞(F, r) be the function class that r-covers F for some r > 0. ∀ǫ ∈ (0, 1), by setting
         | 
| 1563 | 
            +
            r =
         | 
| 1564 | 
            +
            ǫ
         | 
| 1565 | 
            +
            3L we have
         | 
| 1566 | 
            +
            PS∼Dm
         | 
| 1567 | 
            +
            �
         | 
| 1568 | 
            +
            ∃f ∈ F,
         | 
| 1569 | 
            +
            ��LS(f) − LD(f)
         | 
| 1570 | 
            +
            �� > ǫ
         | 
| 1571 | 
            +
            �
         | 
| 1572 | 
            +
            ≤PS∼Dm
         | 
| 1573 | 
            +
            �
         | 
| 1574 | 
            +
            ∃f ∈ F,
         | 
| 1575 | 
            +
            ��LS(f) − LS(fr)
         | 
| 1576 | 
            +
            �� +
         | 
| 1577 | 
            +
            ��LS(fr) − LD(fr)
         | 
| 1578 | 
            +
            �� +
         | 
| 1579 | 
            +
            ��LD(fr) − LD(f)
         | 
| 1580 | 
            +
            �� > ǫ
         | 
| 1581 | 
            +
            �
         | 
| 1582 | 
            +
            (a)
         | 
| 1583 | 
            +
            ≤PS∼Dm
         | 
| 1584 | 
            +
            �
         | 
| 1585 | 
            +
            ∃f ∈ F, Lr +
         | 
| 1586 | 
            +
            ��LS(fr) − LD(fr)
         | 
| 1587 | 
            +
            �� + Lr > ǫ
         | 
| 1588 | 
            +
            �
         | 
| 1589 | 
            +
            ≤PS∼Dm
         | 
| 1590 | 
            +
            �
         | 
| 1591 | 
            +
            ∃fr ∈ Fr,
         | 
| 1592 | 
            +
            ��LS(fr) − LD(fr)
         | 
| 1593 | 
            +
            �� > ǫ − 2Lr
         | 
| 1594 | 
            +
            �
         | 
| 1595 | 
            +
            (b)
         | 
| 1596 | 
            +
            ≤N∞(F, r)PS∼Dm
         | 
| 1597 | 
            +
            ���LS(f) − LD(f)
         | 
| 1598 | 
            +
            �� > ǫ − 2Lr
         | 
| 1599 | 
            +
            �
         | 
| 1600 | 
            +
            (c)
         | 
| 1601 | 
            +
            ≤2N∞(F, r) exp(−2m(ǫ − 2Lr)2),
         | 
| 1602 | 
            +
            =2N∞(F, ǫ
         | 
| 1603 | 
            +
            3L) exp(−2
         | 
| 1604 | 
            +
            9mǫ2)
         | 
| 1605 | 
            +
            where (a) holds by Equation (7), (b) holds by union bound, and (c) holds by Hoeffding inequality. As
         | 
| 1606 | 
            +
            a result, when m ≥
         | 
| 1607 | 
            +
            9
         | 
| 1608 | 
            +
            2ǫ2
         | 
| 1609 | 
            +
            �
         | 
| 1610 | 
            +
            ln 2
         | 
| 1611 | 
            +
            δ + ln N∞(F,
         | 
| 1612 | 
            +
            ǫ
         | 
| 1613 | 
            +
            3L)
         | 
| 1614 | 
            +
            �
         | 
| 1615 | 
            +
            , we have PS∼Dm
         | 
| 1616 | 
            +
            �
         | 
| 1617 | 
            +
            ∃f ∈ F,
         | 
| 1618 | 
            +
            ���LS(f) − LD(f)
         | 
| 1619 | 
            +
            ��� > ǫ
         | 
| 1620 | 
            +
            �
         | 
| 1621 | 
            +
            < δ.
         | 
| 1622 | 
            +
            20
         | 
| 1623 | 
            +
             | 
| 1624 | 
            +
            A.8
         | 
| 1625 | 
            +
            Proof of Theorem 4.5
         | 
| 1626 | 
            +
            We first provide an auxiliary lemma.
         | 
| 1627 | 
            +
            Lemma A.7. For function class F and orbit averaging operator X, if ∀f, g ∈ F, ℓ∞(Xf, Xg) ≤
         | 
| 1628 | 
            +
            ℓ∞(f, g), then N∞(XF, r) ≤ N∞(F, r) for any r > 0.
         | 
| 1629 | 
            +
            Proof. ∀r > 0, Denote Fr as the smallest r-covering set that covers F with size N∞(F, r). ∀f ∈ F,
         | 
| 1630 | 
            +
            let fr ∈ Fr be the function that r-covers f. We have ℓ∞(Xfr, Xf) ≤ ℓ∞(fr, f) ≤ r. Therefore, XFr
         | 
| 1631 | 
            +
            is a r-covering set of XF, and we have N∞(XF, r) ≤ |XFr| ≤ |Fr| = N∞.
         | 
| 1632 | 
            +
            For player i ∈ [n] and ∀f NE, gNE ∈ FNE, assuming U is closed under any ρi ∈ Gi. For Oi,
         | 
| 1633 | 
            +
            l∞(Oif NE, OigNE) = max
         | 
| 1634 | 
            +
            u∈U ∥Oif NE(u) − OigNE(u)∥
         | 
| 1635 | 
            +
            = max
         | 
| 1636 | 
            +
            j∈[n] max
         | 
| 1637 | 
            +
            u∈U ∥(Oif NE)(u)j − (OigNE)(u)j∥
         | 
| 1638 | 
            +
            = max
         | 
| 1639 | 
            +
            �
         | 
| 1640 | 
            +
            max
         | 
| 1641 | 
            +
            u∈U ∥f NE(u)i − gNE(u)i∥, max
         | 
| 1642 | 
            +
            j̸=i max
         | 
| 1643 | 
            +
            u∈U ∥
         | 
| 1644 | 
            +
            1
         | 
| 1645 | 
            +
            |Ai|!
         | 
| 1646 | 
            +
            �
         | 
| 1647 | 
            +
            ρi∈Gi
         | 
| 1648 | 
            +
            (f NE(ρiu)j − gNE(ρiu)j)∥
         | 
| 1649 | 
            +
            �
         | 
| 1650 | 
            +
            ≤ max
         | 
| 1651 | 
            +
            �
         | 
| 1652 | 
            +
            max
         | 
| 1653 | 
            +
            u∈U ∥f NE(u)i − gNE(u)i∥, max
         | 
| 1654 | 
            +
            j̸=i
         | 
| 1655 | 
            +
            1
         | 
| 1656 | 
            +
            |Ai|!
         | 
| 1657 | 
            +
            �
         | 
| 1658 | 
            +
            ρi∈Gi
         | 
| 1659 | 
            +
            max
         | 
| 1660 | 
            +
            u∈U ∥f NE(ρiu)j − gNE(ρiu)j∥
         | 
| 1661 | 
            +
            �
         | 
| 1662 | 
            +
            = max
         | 
| 1663 | 
            +
            �
         | 
| 1664 | 
            +
            max
         | 
| 1665 | 
            +
            u∈U ∥f NE(u)i − gNE(u)i∥, max
         | 
| 1666 | 
            +
            j̸=i
         | 
| 1667 | 
            +
            1
         | 
| 1668 | 
            +
            |Ai|!
         | 
| 1669 | 
            +
            �
         | 
| 1670 | 
            +
            ρi∈Gi
         | 
| 1671 | 
            +
            max
         | 
| 1672 | 
            +
            u∈U ∥f NE(u)j − gNE(u)j∥
         | 
| 1673 | 
            +
            �
         | 
| 1674 | 
            +
            = max
         | 
| 1675 | 
            +
            �
         | 
| 1676 | 
            +
            max
         | 
| 1677 | 
            +
            u∈U ∥f NE(u)i − gNE(u)i∥, max
         | 
| 1678 | 
            +
            j̸=i max
         | 
| 1679 | 
            +
            u
         | 
| 1680 | 
            +
            ∥f NE(u)j − gNE(u)j∥
         | 
| 1681 | 
            +
            �
         | 
| 1682 | 
            +
            =l∞(f NE, gNE)
         | 
| 1683 | 
            +
            Since O = O1 ◦ · · · ◦ On, we have
         | 
| 1684 | 
            +
            ℓ∞(Of NE, OgNE) ≤ ℓ∞(f NE, gNE).
         | 
| 1685 | 
            +
            (8)
         | 
| 1686 | 
            +
            For Pi,
         | 
| 1687 | 
            +
            l∞(Pif NE, PigNE) = max
         | 
| 1688 | 
            +
            u∈U max
         | 
| 1689 | 
            +
            j∈[n] ∥(Pif NE)(u)j − (PigNE)(u)j∥
         | 
| 1690 | 
            +
            = max
         | 
| 1691 | 
            +
            �
         | 
| 1692 | 
            +
            max
         | 
| 1693 | 
            +
            j̸=i max
         | 
| 1694 | 
            +
            u
         | 
| 1695 | 
            +
            ∥f NE(u)j − gNE(u)j∥, max
         | 
| 1696 | 
            +
            u
         | 
| 1697 | 
            +
            ∥
         | 
| 1698 | 
            +
            1
         | 
| 1699 | 
            +
            |Ai|!
         | 
| 1700 | 
            +
            �
         | 
| 1701 | 
            +
            ρi∈Gi
         | 
| 1702 | 
            +
            ρ−1
         | 
| 1703 | 
            +
            i (f NE(ρiu)i − gNE(ρiu)i)∥
         | 
| 1704 | 
            +
            �
         | 
| 1705 | 
            +
            = max
         | 
| 1706 | 
            +
            �
         | 
| 1707 | 
            +
            max
         | 
| 1708 | 
            +
            j̸=i max
         | 
| 1709 | 
            +
            u
         | 
| 1710 | 
            +
            ∥f NE(u)j − gNE(u)j∥, max
         | 
| 1711 | 
            +
            u
         | 
| 1712 | 
            +
            ∥
         | 
| 1713 | 
            +
            1
         | 
| 1714 | 
            +
            |Ai|!
         | 
| 1715 | 
            +
            �
         | 
| 1716 | 
            +
            ρi∈Gi
         | 
| 1717 | 
            +
            (f NE(ρiu)i − gNE(ρiu)i)∥
         | 
| 1718 | 
            +
            �
         | 
| 1719 | 
            +
            ≤ max
         | 
| 1720 | 
            +
            �
         | 
| 1721 | 
            +
            max
         | 
| 1722 | 
            +
            j̸=i max
         | 
| 1723 | 
            +
            u
         | 
| 1724 | 
            +
            ∥f NE(u)j − gNE(u)j∥,
         | 
| 1725 | 
            +
            1
         | 
| 1726 | 
            +
            |Ai|!
         | 
| 1727 | 
            +
            �
         | 
| 1728 | 
            +
            ρi∈Gi
         | 
| 1729 | 
            +
            max
         | 
| 1730 | 
            +
            u
         | 
| 1731 | 
            +
            ∥f NE(ρiu)i − gNE(ρiu)i∥
         | 
| 1732 | 
            +
            �
         | 
| 1733 | 
            +
            = max
         | 
| 1734 | 
            +
            �
         | 
| 1735 | 
            +
            max
         | 
| 1736 | 
            +
            j̸=i max
         | 
| 1737 | 
            +
            u
         | 
| 1738 | 
            +
            ∥f NE(u)j − gNE(u)j∥,
         | 
| 1739 | 
            +
            1
         | 
| 1740 | 
            +
            |Ai|!
         | 
| 1741 | 
            +
            �
         | 
| 1742 | 
            +
            ρi∈Gi
         | 
| 1743 | 
            +
            max
         | 
| 1744 | 
            +
            u
         | 
| 1745 | 
            +
            ∥f NE(u)i − gNE(u)i∥
         | 
| 1746 | 
            +
            �
         | 
| 1747 | 
            +
            = max
         | 
| 1748 | 
            +
            �
         | 
| 1749 | 
            +
            max
         | 
| 1750 | 
            +
            j̸=i max
         | 
| 1751 | 
            +
            u
         | 
| 1752 | 
            +
            ∥f NE(u)j − gNE(u)j∥, max
         | 
| 1753 | 
            +
            u
         | 
| 1754 | 
            +
            ∥f NE(u)i − gNE(u)i∥
         | 
| 1755 | 
            +
            �
         | 
| 1756 | 
            +
            =l∞(f NE, gNE)
         | 
| 1757 | 
            +
            Since P = P1 ◦ · · · ◦ Pn, we have
         | 
| 1758 | 
            +
            ℓ∞(Pf NE, PgNE) ≤ ℓ∞(f NE, gNE).
         | 
| 1759 | 
            +
            (9)
         | 
| 1760 | 
            +
            21
         | 
| 1761 | 
            +
             | 
| 1762 | 
            +
            For CE or CCE approximator f (C)CE ∈ F(C)CE and Qi, we have
         | 
| 1763 | 
            +
            l∞(Qif (C)CE, Qig(C)CE) = max
         | 
| 1764 | 
            +
            u∈U ∥(Qif (C)CE)(u) − (Qig(C)CE)(u)∥
         | 
| 1765 | 
            +
            = max
         | 
| 1766 | 
            +
            u
         | 
| 1767 | 
            +
            ∥
         | 
| 1768 | 
            +
            1
         | 
| 1769 | 
            +
            |Ai|!
         | 
| 1770 | 
            +
            �
         | 
| 1771 | 
            +
            ρi∈Gi
         | 
| 1772 | 
            +
            ρ−1
         | 
| 1773 | 
            +
            i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
         | 
| 1774 | 
            +
            ≤ max
         | 
| 1775 | 
            +
            u
         | 
| 1776 | 
            +
            1
         | 
| 1777 | 
            +
            |Ai|!
         | 
| 1778 | 
            +
            �
         | 
| 1779 | 
            +
            ρi∈Gi
         | 
| 1780 | 
            +
            ∥ρ−1
         | 
| 1781 | 
            +
            i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
         | 
| 1782 | 
            +
            ≤
         | 
| 1783 | 
            +
            1
         | 
| 1784 | 
            +
            |Ai|!
         | 
| 1785 | 
            +
            �
         | 
| 1786 | 
            +
            ρi∈Gi
         | 
| 1787 | 
            +
            max
         | 
| 1788 | 
            +
            u
         | 
| 1789 | 
            +
            ∥ρ−1
         | 
| 1790 | 
            +
            i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
         | 
| 1791 | 
            +
            =
         | 
| 1792 | 
            +
            1
         | 
| 1793 | 
            +
            |Ai|!
         | 
| 1794 | 
            +
            �
         | 
| 1795 | 
            +
            ρi∈Gi
         | 
| 1796 | 
            +
            max
         | 
| 1797 | 
            +
            u
         | 
| 1798 | 
            +
            ∥f (C)CE(ρiu) − g(C)CE(ρiu)∥
         | 
| 1799 | 
            +
            =
         | 
| 1800 | 
            +
            1
         | 
| 1801 | 
            +
            |Ai|!
         | 
| 1802 | 
            +
            �
         | 
| 1803 | 
            +
            ρi∈Gi
         | 
| 1804 | 
            +
            max
         | 
| 1805 | 
            +
            u
         | 
| 1806 | 
            +
            ∥f (C)CE(u) − g(C)CE(u)∥
         | 
| 1807 | 
            +
            =l∞(f (C)CE, g(C)CE)
         | 
| 1808 | 
            +
            Since Q = Q1 ◦ · · · ◦ Qn, we have
         | 
| 1809 | 
            +
            ℓ∞(Qf (C)CE, Qg(C)CE) ≤ ℓ∞(f (C)CE, g(C)CE).
         | 
| 1810 | 
            +
            (10)
         | 
| 1811 | 
            +
            Combing Lemma A.7, Equation (8), Equation (9) and Equation (10), we finish the proof.
         | 
| 1812 | 
            +
            A.9
         | 
| 1813 | 
            +
            Proof of Theorem 4.8
         | 
| 1814 | 
            +
            We first introduce a useful lemma. It is about the property of Ei(σ, u)
         | 
| 1815 | 
            +
            Lemma A.8. Ei(σ, u) is
         | 
| 1816 | 
            +
            1. Linear on σi, i.e.
         | 
| 1817 | 
            +
            pEi((σ1
         | 
| 1818 | 
            +
            i , σ−i), u) + (1 − p)Ei((σ2
         | 
| 1819 | 
            +
            i , σ−i), u) = Ei((pσ1
         | 
| 1820 | 
            +
            i + (1 − p)σ2
         | 
| 1821 | 
            +
            i , σ−i), u), ∀p ∈ [0, 1]
         | 
| 1822 | 
            +
            2. Convex on σj, i.e.
         | 
| 1823 | 
            +
            pEi((σ1
         | 
| 1824 | 
            +
            j , σ−j), u) + (1 − p)Ei((σ2
         | 
| 1825 | 
            +
            j , σ−j), u) ≥ Ei((pσ1
         | 
| 1826 | 
            +
            j + (1 − p)σ2
         | 
| 1827 | 
            +
            j , σ−j), u), ∀p ∈ [0, 1], j ̸= i
         | 
| 1828 | 
            +
            Proof. We recall the definition Ei(σ, u) = maxai∈Ai ui(ai, σ−i) − ui(σ). Notice that ui(σ) is linear on
         | 
| 1829 | 
            +
            σk for all k ∈ [n], thus both ui(ai, σ−i) and ui(σ) are linear on σk for any k ∈ [n]. Moreover, the
         | 
| 1830 | 
            +
            maximum operator on a set of linear functions will induce a convex function.
         | 
| 1831 | 
            +
            Proof of Theorem 4.8. We prove the theorem in two steps.
         | 
| 1832 | 
            +
            Step 1
         | 
| 1833 | 
            +
            First, we show that
         | 
| 1834 | 
            +
            Eu∼D[Ei((Pif NE)(u), u)] = Eu∼D[Ei(f NE(u), u)],
         | 
| 1835 | 
            +
            ∀f NE ∈ FNE
         | 
| 1836 | 
            +
            22
         | 
| 1837 | 
            +
             | 
| 1838 | 
            +
            By definition,
         | 
| 1839 | 
            +
            Eu∼D[Ei(Pif NE(u), u)]
         | 
| 1840 | 
            +
            =Eu∼D[Ei((
         | 
| 1841 | 
            +
            1
         | 
| 1842 | 
            +
            |Ai|!
         | 
| 1843 | 
            +
            �
         | 
| 1844 | 
            +
            ρi∈Gi
         | 
| 1845 | 
            +
            ρ−1
         | 
| 1846 | 
            +
            i f(ρiu)i, f(u)−i), u)]
         | 
| 1847 | 
            +
            =
         | 
| 1848 | 
            +
            1
         | 
| 1849 | 
            +
            |Ai|!
         | 
| 1850 | 
            +
            �
         | 
| 1851 | 
            +
            ρi∈Gi
         | 
| 1852 | 
            +
            Eu∼D[Ei((ρ−1
         | 
| 1853 | 
            +
            i
         | 
| 1854 | 
            +
            f(ρiu)i, f(u)−i), u)]
         | 
| 1855 | 
            +
            , by linearity of Ei(σ, u) on σi
         | 
| 1856 | 
            +
            =
         | 
| 1857 | 
            +
            1
         | 
| 1858 | 
            +
            |Ai|!
         | 
| 1859 | 
            +
            �
         | 
| 1860 | 
            +
            ρi∈Gi
         | 
| 1861 | 
            +
            Ev∼D[Ei((ρ−1
         | 
| 1862 | 
            +
            i
         | 
| 1863 | 
            +
            f(v)i, f(ρ−1
         | 
| 1864 | 
            +
            i v)−i), ρ−1
         | 
| 1865 | 
            +
            i v)]
         | 
| 1866 | 
            +
            , let v = ρiu and use the invariance of D
         | 
| 1867 | 
            +
            =
         | 
| 1868 | 
            +
            1
         | 
| 1869 | 
            +
            |Ai|!
         | 
| 1870 | 
            +
            �
         | 
| 1871 | 
            +
            ρi∈Gi
         | 
| 1872 | 
            +
            Ev∼D[Ei((ρ−1
         | 
| 1873 | 
            +
            i
         | 
| 1874 | 
            +
            f(v)i, f(v)−i), ρ−1
         | 
| 1875 | 
            +
            i v)]
         | 
| 1876 | 
            +
            , OPI of f
         | 
| 1877 | 
            +
            =
         | 
| 1878 | 
            +
            1
         | 
| 1879 | 
            +
            |Ai|!
         | 
| 1880 | 
            +
            �
         | 
| 1881 | 
            +
            ρi∈Gi
         | 
| 1882 | 
            +
            Eu∼D[Ei((f(u)i, f(u)−i), u)]
         | 
| 1883 | 
            +
            , invariance of Ei(σ, u) under ρ−1
         | 
| 1884 | 
            +
            i
         | 
| 1885 | 
            +
            ∈ Gi
         | 
| 1886 | 
            +
            =Eu∼D[Ei(f NE(u), u)]
         | 
| 1887 | 
            +
            Step 2
         | 
| 1888 | 
            +
            Then we show that
         | 
| 1889 | 
            +
            Eu∼D[Ej((Pif NE)(u), u)] ≤ Eu∼D[Ej(f NE(u), u)],
         | 
| 1890 | 
            +
            ∀f NE ∈ FNE, j ̸= i
         | 
| 1891 | 
            +
            Eu∼D[Ej((Pif NE)(u), u)]
         | 
| 1892 | 
            +
            =Eu∼D[Ej((
         | 
| 1893 | 
            +
            1
         | 
| 1894 | 
            +
            |Ai|!
         | 
| 1895 | 
            +
            �
         | 
| 1896 | 
            +
            ρi∈Gi
         | 
| 1897 | 
            +
            ρ−1
         | 
| 1898 | 
            +
            i f(ρiu)i, f(u)−i), u)]
         | 
| 1899 | 
            +
            ≤
         | 
| 1900 | 
            +
            1
         | 
| 1901 | 
            +
            |Ai|!
         | 
| 1902 | 
            +
            �
         | 
| 1903 | 
            +
            ρi∈Gi
         | 
| 1904 | 
            +
            Eu∼D[Ej((ρ−1
         | 
| 1905 | 
            +
            i
         | 
| 1906 | 
            +
            f(ρiu)i, f(u)−i), u)]
         | 
| 1907 | 
            +
            , by convexity of Ej(σ, u) on σi
         | 
| 1908 | 
            +
            =
         | 
| 1909 | 
            +
            1
         | 
| 1910 | 
            +
            |Ai|!
         | 
| 1911 | 
            +
            �
         | 
| 1912 | 
            +
            ρi∈Gi
         | 
| 1913 | 
            +
            Ev∼D[Ej((ρ−1
         | 
| 1914 | 
            +
            i
         | 
| 1915 | 
            +
            f(v)i, f(ρ−1
         | 
| 1916 | 
            +
            i v)−i), ρ−1
         | 
| 1917 | 
            +
            i v)]
         | 
| 1918 | 
            +
            , let v = ρiu and use the invariance of D
         | 
| 1919 | 
            +
            =
         | 
| 1920 | 
            +
            1
         | 
| 1921 | 
            +
            |Ai|!
         | 
| 1922 | 
            +
            �
         | 
| 1923 | 
            +
            ρi∈Gi
         | 
| 1924 | 
            +
            Ev∼D[Ej((ρ−1
         | 
| 1925 | 
            +
            i
         | 
| 1926 | 
            +
            f(v)i, f(v)−i), ρ−1
         | 
| 1927 | 
            +
            i v)]
         | 
| 1928 | 
            +
            , OPI of f
         | 
| 1929 | 
            +
            =
         | 
| 1930 | 
            +
            1
         | 
| 1931 | 
            +
            |Ai|!
         | 
| 1932 | 
            +
            �
         | 
| 1933 | 
            +
            ρi∈Gi
         | 
| 1934 | 
            +
            Eu∼D[Ej((f(u)i, f(u)−i), u)]
         | 
| 1935 | 
            +
            , invariance of Ej(σ, u) under ρ−1
         | 
| 1936 | 
            +
            i
         | 
| 1937 | 
            +
            ∈ Gi
         | 
| 1938 | 
            +
            =Eu∼D[Ej(f NE(u), u)]
         | 
| 1939 | 
            +
            Since P = ◦iPi and E = maxi Ei, we have
         | 
| 1940 | 
            +
            Eu∼D[E((Pf NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)]
         | 
| 1941 | 
            +
            A.10
         | 
| 1942 | 
            +
            Proof of Theorem 4.6
         | 
| 1943 | 
            +
            Similar to the proof of Theorem 4.8, we first prove a lemma about the property of Ei(π, u) and
         | 
| 1944 | 
            +
            ECE
         | 
| 1945 | 
            +
            i
         | 
| 1946 | 
            +
            (π, u).
         | 
| 1947 | 
            +
            Lemma A.9. Ei(π, u) and ECE
         | 
| 1948 | 
            +
            i
         | 
| 1949 | 
            +
            (π, u) are convex on π, i.e.
         | 
| 1950 | 
            +
            pE(CE)
         | 
| 1951 | 
            +
            i
         | 
| 1952 | 
            +
            (π1, u) + (1 − p)E(CE)
         | 
| 1953 | 
            +
            i
         | 
| 1954 | 
            +
            (π2, u) ≥ E(CE)
         | 
| 1955 | 
            +
            i
         | 
| 1956 | 
            +
            (pπ1 + (1 − p)π2, u),
         | 
| 1957 | 
            +
            ∀p ∈ [0, 1]
         | 
| 1958 | 
            +
            23
         | 
| 1959 | 
            +
             | 
| 1960 | 
            +
            Proof. We recall the definition Ei(π, u) = maxai∈Ai ui(ai, π−i) − ui(π) for CCE approximator and
         | 
| 1961 | 
            +
            ECE
         | 
| 1962 | 
            +
            i
         | 
| 1963 | 
            +
            (π, u) = maxφi∈Ai→Ai
         | 
| 1964 | 
            +
            �
         | 
| 1965 | 
            +
            a π(a)ui(φi(ai), a−i) − ui(π) for CE approximator. ui(ai, π−i) is linear
         | 
| 1966 | 
            +
            on π.
         | 
| 1967 | 
            +
            Given φ, �
         | 
| 1968 | 
            +
            a π(a)ui(φi(ai), a−i) is also linear on π. Moreover, the maximum operator on a set of
         | 
| 1969 | 
            +
            linear functions will induce a convex function.
         | 
| 1970 | 
            +
            Proof of Theorem 4.6. For f ∈ F(C)CE and ∀i, j ∈ [n],
         | 
| 1971 | 
            +
            Eu∼D[E(CE)
         | 
| 1972 | 
            +
            i
         | 
| 1973 | 
            +
            (Qjf(u), u)] =Eu∼D[E(CE)
         | 
| 1974 | 
            +
            i
         | 
| 1975 | 
            +
            (
         | 
| 1976 | 
            +
            1
         | 
| 1977 | 
            +
            |Aj|!
         | 
| 1978 | 
            +
            �
         | 
| 1979 | 
            +
            ρj∈Gj
         | 
| 1980 | 
            +
            ρ−1
         | 
| 1981 | 
            +
            j f(ρju), u)]
         | 
| 1982 | 
            +
            , by definition
         | 
| 1983 | 
            +
            ≤
         | 
| 1984 | 
            +
            1
         | 
| 1985 | 
            +
            |Aj|!
         | 
| 1986 | 
            +
            �
         | 
| 1987 | 
            +
            ρj∈Gj
         | 
| 1988 | 
            +
            Eu∼D[E(CE)
         | 
| 1989 | 
            +
            i
         | 
| 1990 | 
            +
            (ρ−1
         | 
| 1991 | 
            +
            j f(ρju), u)]
         | 
| 1992 | 
            +
            , by convexity
         | 
| 1993 | 
            +
            =
         | 
| 1994 | 
            +
            1
         | 
| 1995 | 
            +
            |Aj|!
         | 
| 1996 | 
            +
            �
         | 
| 1997 | 
            +
            ρj∈Gj
         | 
| 1998 | 
            +
            Ev∼D[E(CE)
         | 
| 1999 | 
            +
            i
         | 
| 2000 | 
            +
            (ρ−1
         | 
| 2001 | 
            +
            j f(v), ρ−1
         | 
| 2002 | 
            +
            j v)]
         | 
| 2003 | 
            +
            , let v = ρju
         | 
| 2004 | 
            +
            =
         | 
| 2005 | 
            +
            1
         | 
| 2006 | 
            +
            |Aj|!
         | 
| 2007 | 
            +
            �
         | 
| 2008 | 
            +
            ρj∈Gj
         | 
| 2009 | 
            +
            Ev∼D[E(CE)
         | 
| 2010 | 
            +
            i
         | 
| 2011 | 
            +
            (f(v), v)]
         | 
| 2012 | 
            +
            , invariance of E(CE)
         | 
| 2013 | 
            +
            i
         | 
| 2014 | 
            +
            (π, u) under ρ−1
         | 
| 2015 | 
            +
            j
         | 
| 2016 | 
            +
            ∈ Gj
         | 
| 2017 | 
            +
            =Eu∼D[E(CE)
         | 
| 2018 | 
            +
            i
         | 
| 2019 | 
            +
            (f(u), u)]
         | 
| 2020 | 
            +
            Since Q = ◦iQi and E = maxi Ei, we have
         | 
| 2021 | 
            +
            Eu∼D[E(Qf(u), u)] ≤ Eu∼D[E(f(u), u)]
         | 
| 2022 | 
            +
            A.11
         | 
| 2023 | 
            +
            Proof of Theorem 4.9
         | 
| 2024 | 
            +
            We prove the theorem in two steps, similar to the proof of Theorem 4.8.
         | 
| 2025 | 
            +
            Step 1
         | 
| 2026 | 
            +
            First we show that for player i ∈ {1, 2}, let {j} = {1, 2}\{i},
         | 
| 2027 | 
            +
            Eu∼D[Ei((Oif NE)(u), u)] ≤ Eu∼D[Ei(f NE(u), u)]
         | 
| 2028 | 
            +
            This is because
         | 
| 2029 | 
            +
            Eu∼D[Ei((Oif NE)(u), u)] =Eu∼D[Ei((f NE(u)i,
         | 
| 2030 | 
            +
            1
         | 
| 2031 | 
            +
            |Ai|!
         | 
| 2032 | 
            +
            �
         | 
| 2033 | 
            +
            ρi∈Gi
         | 
| 2034 | 
            +
            f NE(ρiu)j), u)]
         | 
| 2035 | 
            +
            ≤
         | 
| 2036 | 
            +
            1
         | 
| 2037 | 
            +
            |Ai|!
         | 
| 2038 | 
            +
            �
         | 
| 2039 | 
            +
            ρi∈Gi
         | 
| 2040 | 
            +
            Eu∼D[Ei((f NE(u)i, f NE(ρiu)j), u)]
         | 
| 2041 | 
            +
            , by convexity of Ei on σj
         | 
| 2042 | 
            +
            =
         | 
| 2043 | 
            +
            1
         | 
| 2044 | 
            +
            |Ai|!
         | 
| 2045 | 
            +
            �
         | 
| 2046 | 
            +
            ρi∈Gi
         | 
| 2047 | 
            +
            Ev∼D[Ei((f NE(ρ−1
         | 
| 2048 | 
            +
            i v)i, f NE(v)j), ρ−1
         | 
| 2049 | 
            +
            i
         | 
| 2050 | 
            +
            v)]
         | 
| 2051 | 
            +
            , let v = ρiu
         | 
| 2052 | 
            +
            =
         | 
| 2053 | 
            +
            1
         | 
| 2054 | 
            +
            |Ai|!
         | 
| 2055 | 
            +
            �
         | 
| 2056 | 
            +
            ρi∈Gi
         | 
| 2057 | 
            +
            Ev∼D[Ei((ρ−1
         | 
| 2058 | 
            +
            i
         | 
| 2059 | 
            +
            f NE(v)i, f NE(v)j), ρ−1
         | 
| 2060 | 
            +
            i
         | 
| 2061 | 
            +
            v)]
         | 
| 2062 | 
            +
            , by PPE of f NE
         | 
| 2063 | 
            +
            =
         | 
| 2064 | 
            +
            1
         | 
| 2065 | 
            +
            |Ai|!
         | 
| 2066 | 
            +
            �
         | 
| 2067 | 
            +
            ρi∈Gi
         | 
| 2068 | 
            +
            Ev∼D[Ei((f NE(v)i, f NE(v)j), v)]
         | 
| 2069 | 
            +
            , invariance of Ei(σ, u) under ρ−1
         | 
| 2070 | 
            +
            i
         | 
| 2071 | 
            +
            ∈ G
         | 
| 2072 | 
            +
            =Eu∼D[Ei((f NE)(u), u)]
         | 
| 2073 | 
            +
            Step 2
         | 
| 2074 | 
            +
            Then we show that if j ̸= i and {i, j} = {1, 2}
         | 
| 2075 | 
            +
            Eu∼D[Ej((Oif NE)(u), u)] = Eu∼D[Ej(f NE(u), u)]
         | 
| 2076 | 
            +
            24
         | 
| 2077 | 
            +
             | 
| 2078 | 
            +
            This is because
         | 
| 2079 | 
            +
            Eu∼D[Ej((Oif NE)(u), u)] =Eu∼D[Ej((f NE(u)i,
         | 
| 2080 | 
            +
            1
         | 
| 2081 | 
            +
            |Ai|!
         | 
| 2082 | 
            +
            �
         | 
| 2083 | 
            +
            ρi∈Gi
         | 
| 2084 | 
            +
            f NE(ρiu)j), u)]
         | 
| 2085 | 
            +
            =
         | 
| 2086 | 
            +
            1
         | 
| 2087 | 
            +
            |Ai|!
         | 
| 2088 | 
            +
            �
         | 
| 2089 | 
            +
            ρi∈Gi
         | 
| 2090 | 
            +
            Eu∼D[Ej((f NE(u)i, f NE(ρiu)j), u)]
         | 
| 2091 | 
            +
            , by linearity of Ej on σj
         | 
| 2092 | 
            +
            =
         | 
| 2093 | 
            +
            1
         | 
| 2094 | 
            +
            |Ai|!
         | 
| 2095 | 
            +
            �
         | 
| 2096 | 
            +
            ρi∈Gi
         | 
| 2097 | 
            +
            Ev∼D[Ej((f NE(ρ−1
         | 
| 2098 | 
            +
            i v)i, f NE(v)j), ρ−1
         | 
| 2099 | 
            +
            i v)]
         | 
| 2100 | 
            +
            , let v = ρiu
         | 
| 2101 | 
            +
            =
         | 
| 2102 | 
            +
            1
         | 
| 2103 | 
            +
            |Ai|!
         | 
| 2104 | 
            +
            �
         | 
| 2105 | 
            +
            ρi∈Gi
         | 
| 2106 | 
            +
            Ev∼D[Ej((ρ−1
         | 
| 2107 | 
            +
            i f NE(v)i, f NE(v)j), ρ−1
         | 
| 2108 | 
            +
            i v)]
         | 
| 2109 | 
            +
            , by PPE of f NE
         | 
| 2110 | 
            +
            =
         | 
| 2111 | 
            +
            1
         | 
| 2112 | 
            +
            |Ai|!
         | 
| 2113 | 
            +
            �
         | 
| 2114 | 
            +
            ρi∈Gi
         | 
| 2115 | 
            +
            Ev∼D[Ej((f NE(v)i, f NE(v)j), v)]
         | 
| 2116 | 
            +
            , invariance of Ej(σ, u) under ρ−1
         | 
| 2117 | 
            +
            i
         | 
| 2118 | 
            +
            ∈ Gi
         | 
| 2119 | 
            +
            =Eu∼D[Ej(f NE(u), u)]
         | 
| 2120 | 
            +
            Since O = ◦iOi and E = maxi Ei, we have
         | 
| 2121 | 
            +
            Eu∼D[E(Of NE(u), u)] ≤ Eu∼D[E(f NE(u), u)]
         | 
| 2122 | 
            +
            A.12
         | 
| 2123 | 
            +
            Proof of Theorem 4.7
         | 
| 2124 | 
            +
            We only prove for the P-projected case; the proof for O-projected case is similar and therefore
         | 
| 2125 | 
            +
            omitted.
         | 
| 2126 | 
            +
            Recall
         | 
| 2127 | 
            +
            Ei(σ, u) = max
         | 
| 2128 | 
            +
            ai∈Ai ui(ai, σ−i) − ui(σ)
         | 
| 2129 | 
            +
            Denote u1(σ) + u2(σ) ≡ c, then
         | 
| 2130 | 
            +
            �
         | 
| 2131 | 
            +
            i
         | 
| 2132 | 
            +
            Ei(σ, u) =
         | 
| 2133 | 
            +
            max
         | 
| 2134 | 
            +
            a1∈A1,a2∈A2 u1(a1, σ2) + u2(a2, σ1) − c
         | 
| 2135 | 
            +
            Then we have
         | 
| 2136 | 
            +
            Eu∼D[
         | 
| 2137 | 
            +
            �
         | 
| 2138 | 
            +
            i
         | 
| 2139 | 
            +
            Ei((Pf NE)(u), u)] =Eu∼D[max
         | 
| 2140 | 
            +
            a1,a2 u1(a1, (Pf NE)(u)2) + u2(a2, (Pf NE)(u)1) − c]
         | 
| 2141 | 
            +
            =Eu∼D[max
         | 
| 2142 | 
            +
            a1 u1(a1, (Pf NE)(u)2)] + Eu∼D[max
         | 
| 2143 | 
            +
            a2 u2(a2, (Pf NE)(u)1)] − c
         | 
| 2144 | 
            +
            For the first term,
         | 
| 2145 | 
            +
            Eu∼D[max
         | 
| 2146 | 
            +
            a1 u1(a1, (Pf NE)(u)2)] =Eu∼D[max
         | 
| 2147 | 
            +
            a1 u1(a1,
         | 
| 2148 | 
            +
            1
         | 
| 2149 | 
            +
            |A2|!
         | 
| 2150 | 
            +
            �
         | 
| 2151 | 
            +
            ρ2∈G2
         | 
| 2152 | 
            +
            ρ��1
         | 
| 2153 | 
            +
            2 f NE(ρ2u)2)]
         | 
| 2154 | 
            +
            ≤
         | 
| 2155 | 
            +
            1
         | 
| 2156 | 
            +
            |A2|!
         | 
| 2157 | 
            +
            �
         | 
| 2158 | 
            +
            ρ2∈G2
         | 
| 2159 | 
            +
            Eu∼D[max
         | 
| 2160 | 
            +
            a1 u1(a1, ρ−1
         | 
| 2161 | 
            +
            2 f NE(ρ2u)2)]
         | 
| 2162 | 
            +
            =
         | 
| 2163 | 
            +
            1
         | 
| 2164 | 
            +
            |A2|!
         | 
| 2165 | 
            +
            �
         | 
| 2166 | 
            +
            ρ2∈G2
         | 
| 2167 | 
            +
            Ev∼D[max
         | 
| 2168 | 
            +
            a1 (ρ−1
         | 
| 2169 | 
            +
            2 v)1(a1, ρ−1
         | 
| 2170 | 
            +
            2 f NE(v)2)]
         | 
| 2171 | 
            +
            =
         | 
| 2172 | 
            +
            1
         | 
| 2173 | 
            +
            |A2|!
         | 
| 2174 | 
            +
            �
         | 
| 2175 | 
            +
            ρ2∈G2
         | 
| 2176 | 
            +
            Ev∼D[max
         | 
| 2177 | 
            +
            a1 v1(a1, f NE(v)2)]
         | 
| 2178 | 
            +
            =Eu∼D[max
         | 
| 2179 | 
            +
            a1 u1(a1, f NE(u)2)]
         | 
| 2180 | 
            +
            Similarly, for the second term,
         | 
| 2181 | 
            +
            Eu∼D[max
         | 
| 2182 | 
            +
            a2 u2(a2, (Pf NE)(u)1)] ≤ Eu∼D[max
         | 
| 2183 | 
            +
            a2 u2(a2, f NE(u)1)]
         | 
| 2184 | 
            +
            25
         | 
| 2185 | 
            +
             | 
| 2186 | 
            +
            Above all,
         | 
| 2187 | 
            +
            Eu∼D[
         | 
| 2188 | 
            +
            �
         | 
| 2189 | 
            +
            i
         | 
| 2190 | 
            +
            Ei((Pf NE)(u), u)] =Eu∼D[max
         | 
| 2191 | 
            +
            a1 u1(a1, (Pf NE)(u)2)] + Eu∼D[max
         | 
| 2192 | 
            +
            a2 u2(a2, (Pf NE)(u)1)] − c
         | 
| 2193 | 
            +
            ≤Eu∼D[max
         | 
| 2194 | 
            +
            a1 u1(a1, f NE(u)2)] + Eu∼D[max
         | 
| 2195 | 
            +
            a2 u2(a2, f NE(u)1)] − c
         | 
| 2196 | 
            +
            =Eu∼D[
         | 
| 2197 | 
            +
            �
         | 
| 2198 | 
            +
            i
         | 
| 2199 | 
            +
            Ei(f NE(u), u)]
         | 
| 2200 | 
            +
            A.13
         | 
| 2201 | 
            +
            Proof of Theorem 5.3
         | 
| 2202 | 
            +
            Let f be a PPE and OPI NE approximator. Denote f(u) = (σi)i∈[n]. For player k that a∗
         | 
| 2203 | 
            +
            k ∈ V (ρk),
         | 
| 2204 | 
            +
            we get
         | 
| 2205 | 
            +
            σk = f(u)k
         | 
| 2206 | 
            +
            (a)
         | 
| 2207 | 
            +
            = f(ρu)k
         | 
| 2208 | 
            +
            (b)
         | 
| 2209 | 
            +
            = f(ρku)k
         | 
| 2210 | 
            +
            (c)
         | 
| 2211 | 
            +
            = ρkf(u)k = ρkσk,
         | 
| 2212 | 
            +
            (11)
         | 
| 2213 | 
            +
            where (a) holds since u is permutable w.r.t. ρ, (b) holds by OPI of f, and (c) holds by PPE of f.
         | 
| 2214 | 
            +
            If a∗ can be found by f, we will have 1 = σk(a∗
         | 
| 2215 | 
            +
            k)
         | 
| 2216 | 
            +
            (d)
         | 
| 2217 | 
            +
            = ρkσk(a∗
         | 
| 2218 | 
            +
            k) = σk(ρ−1
         | 
| 2219 | 
            +
            k (a∗
         | 
| 2220 | 
            +
            k)), where (d) holds by
         | 
| 2221 | 
            +
            Equation (11). However, such result leads to a contradiction, because a∗
         | 
| 2222 | 
            +
            k ̸= ρ−1
         | 
| 2223 | 
            +
            k (ak) but σk(a∗
         | 
| 2224 | 
            +
            k) =
         | 
| 2225 | 
            +
            σ(ρ−1
         | 
| 2226 | 
            +
            k (a∗
         | 
| 2227 | 
            +
            k)) = 1.
         | 
| 2228 | 
            +
            Let f be a PE (C)CE approximator. Denote f(u) = π, we have
         | 
| 2229 | 
            +
            π = f(u)
         | 
| 2230 | 
            +
            (a)
         | 
| 2231 | 
            +
            = f(ρu)
         | 
| 2232 | 
            +
            (b)
         | 
| 2233 | 
            +
            = ρf(u) = ρπ
         | 
| 2234 | 
            +
            (12)
         | 
| 2235 | 
            +
            where (a) holds since u is permutable w.r.t. ρ, (b) holds by PE of f. If a∗ can be found by f, we
         | 
| 2236 | 
            +
            will have 1 = π(a∗)
         | 
| 2237 | 
            +
            (c)
         | 
| 2238 | 
            +
            = ρπ(a∗) = π(ρ−1a∗) = π(ρ−1
         | 
| 2239 | 
            +
            1 a∗
         | 
| 2240 | 
            +
            1, · · · , ρ−1
         | 
| 2241 | 
            +
            n a∗
         | 
| 2242 | 
            +
            n), where (c) holds by Equation (12).
         | 
| 2243 | 
            +
            However, from a∗
         | 
| 2244 | 
            +
            k ∈ V (ρk) we know ρ−1
         | 
| 2245 | 
            +
            k (a∗
         | 
| 2246 | 
            +
            k) ̸= a∗
         | 
| 2247 | 
            +
            k, then ρ−1a∗ ̸= a∗, but π(a∗) = π(ρ−1a∗) = 1.
         | 
| 2248 | 
            +
            A.14
         | 
| 2249 | 
            +
            Proof of Theorem 5.6
         | 
| 2250 | 
            +
            Proof. Assume f ∈ F(C)CE
         | 
| 2251 | 
            +
            general is an (C)CE approximator that always finds the strategy that maximizes
         | 
| 2252 | 
            +
            the social welfare. Afterward, we construct another f0 that satisfies PE and always finds the strategy
         | 
| 2253 | 
            +
            that maximizes social welfare. f0 is constructed by orbit averaging:
         | 
| 2254 | 
            +
            f0(u) = Qf(u),
         | 
| 2255 | 
            +
            thus f0 is PE.
         | 
| 2256 | 
            +
            Denote D as an arbitrary payoff distribution of u such that D is invariant under permutation and
         | 
| 2257 | 
            +
            the cardinality of its support is finite. We have
         | 
| 2258 | 
            +
            Eu∼DSW(Qif(u), u) =Eu∼DSW(
         | 
| 2259 | 
            +
            1
         | 
| 2260 | 
            +
            |Ai|!
         | 
| 2261 | 
            +
            �
         | 
| 2262 | 
            +
            ρi∈Gi
         | 
| 2263 | 
            +
            ρ−1
         | 
| 2264 | 
            +
            i
         | 
| 2265 | 
            +
            f(ρiu), u)
         | 
| 2266 | 
            +
            =Eu∼D
         | 
| 2267 | 
            +
            n
         | 
| 2268 | 
            +
            �
         | 
| 2269 | 
            +
            i=1
         | 
| 2270 | 
            +
            ui(
         | 
| 2271 | 
            +
            1
         | 
| 2272 | 
            +
            |Ai|!
         | 
| 2273 | 
            +
            �
         | 
| 2274 | 
            +
            ρi∈Gi
         | 
| 2275 | 
            +
            ρ−1
         | 
| 2276 | 
            +
            i f(ρiu))
         | 
| 2277 | 
            +
            =
         | 
| 2278 | 
            +
            1
         | 
| 2279 | 
            +
            |Ai|!
         | 
| 2280 | 
            +
            �
         | 
| 2281 | 
            +
            ρi∈Gi
         | 
| 2282 | 
            +
            Eu∼D
         | 
| 2283 | 
            +
            n
         | 
| 2284 | 
            +
            �
         | 
| 2285 | 
            +
            i=1
         | 
| 2286 | 
            +
            ui(ρ−1
         | 
| 2287 | 
            +
            i
         | 
| 2288 | 
            +
            f(ρiu))
         | 
| 2289 | 
            +
            =
         | 
| 2290 | 
            +
            1
         | 
| 2291 | 
            +
            |Ai|!
         | 
| 2292 | 
            +
            �
         | 
| 2293 | 
            +
            ρi∈Gi
         | 
| 2294 | 
            +
            Ev∼D
         | 
| 2295 | 
            +
            n
         | 
| 2296 | 
            +
            �
         | 
| 2297 | 
            +
            i=1
         | 
| 2298 | 
            +
            (ρ−1
         | 
| 2299 | 
            +
            i
         | 
| 2300 | 
            +
            v)i(ρ−1
         | 
| 2301 | 
            +
            i f(v))
         | 
| 2302 | 
            +
            , let v = ρiu
         | 
| 2303 | 
            +
            =
         | 
| 2304 | 
            +
            1
         | 
| 2305 | 
            +
            |Ai|!
         | 
| 2306 | 
            +
            �
         | 
| 2307 | 
            +
            ρi∈Gi
         | 
| 2308 | 
            +
            Ev∼D
         | 
| 2309 | 
            +
            n
         | 
| 2310 | 
            +
            �
         | 
| 2311 | 
            +
            i=1
         | 
| 2312 | 
            +
            vi(f(v))
         | 
| 2313 | 
            +
            =Eu∼D
         | 
| 2314 | 
            +
            n
         | 
| 2315 | 
            +
            �
         | 
| 2316 | 
            +
            i=1
         | 
| 2317 | 
            +
            ui(f(u))
         | 
| 2318 | 
            +
            =Eu∼DSW(f(u), u)
         | 
| 2319 | 
            +
            26
         | 
| 2320 | 
            +
             | 
| 2321 | 
            +
            Due to that Q = Q1 ◦ · · · ◦ Qn, we have
         | 
| 2322 | 
            +
            Eu∼DSW(f0(u), u) = Eu∼DSW(f(u), u)
         | 
| 2323 | 
            +
            Due to the arbitrariness of D, we know that f0 maximizes the social welfare w.r.t. any u.
         | 
| 2324 | 
            +
            From above, we immediately know
         | 
| 2325 | 
            +
            SWRN,M(F(C)CE
         | 
| 2326 | 
            +
            PE
         | 
| 2327 | 
            +
            , F(C)CE
         | 
| 2328 | 
            +
            general) = 1
         | 
| 2329 | 
            +
            A.15
         | 
| 2330 | 
            +
            Proof of Theorem 5.7
         | 
| 2331 | 
            +
            A.15.1
         | 
| 2332 | 
            +
            Proof of Equation (1) and Equation (3)
         | 
| 2333 | 
            +
            We first prove the theorem with respect to FNE
         | 
| 2334 | 
            +
            OPI and FNE
         | 
| 2335 | 
            +
            both
         | 
| 2336 | 
            +
            Step 1
         | 
| 2337 | 
            +
            On the one part, we prove
         | 
| 2338 | 
            +
            SWRN,M(FNE
         | 
| 2339 | 
            +
            OPI, FNE
         | 
| 2340 | 
            +
            general)
         | 
| 2341 | 
            +
            SWRN,M(FNE
         | 
| 2342 | 
            +
            both, FNE
         | 
| 2343 | 
            +
            general)
         | 
| 2344 | 
            +
            �
         | 
| 2345 | 
            +
            ≤
         | 
| 2346 | 
            +
            1
         | 
| 2347 | 
            +
            M N−1
         | 
| 2348 | 
            +
            We prove this by construction.
         | 
| 2349 | 
            +
            Consider a game with N player and Ai = [M] for i ∈ [N]. ∀a ∈ A, i ∈ [N], define the payoff ¯u as
         | 
| 2350 | 
            +
            follows:
         | 
| 2351 | 
            +
            ¯ui(a) =
         | 
| 2352 | 
            +
            �
         | 
| 2353 | 
            +
            1
         | 
| 2354 | 
            +
            , if a1 = a2 = · · · = aN
         | 
| 2355 | 
            +
            0
         | 
| 2356 | 
            +
            , otherwise
         | 
| 2357 | 
            +
            Define U = {u′|u′ = ◦iρi¯u, ρi ∈ Gi} and D as a uniform distribution on U. Easy to certify that D is a
         | 
| 2358 | 
            +
            permutation-invariant distribution.
         | 
| 2359 | 
            +
            Let ˜f ∈ ˜FNE
         | 
| 2360 | 
            +
            general be the NE oracle that ˜f(¯u)i = 1 and for any u′ = ◦iρi¯u ∈ U, ˜f(u′)i = ρi(1).
         | 
| 2361 | 
            +
            Intuitively, the oracle will choose the action that will provide all players with revenue 1, leading to a
         | 
| 2362 | 
            +
            social welfare of N. Since each player has got her maximum possible utility, we have
         | 
| 2363 | 
            +
            max
         | 
| 2364 | 
            +
            f∈F NE
         | 
| 2365 | 
            +
            general
         | 
| 2366 | 
            +
            Eu∼DSW(f(u), u) =
         | 
| 2367 | 
            +
            max
         | 
| 2368 | 
            +
            ˜f∈ �
         | 
| 2369 | 
            +
            F NE
         | 
| 2370 | 
            +
            general
         | 
| 2371 | 
            +
            Eu∼DSW( ˜f(u), u) = N.
         | 
| 2372 | 
            +
            (13)
         | 
| 2373 | 
            +
            For any j1, j2 ∈ [M] and j1 < j2, let ρ(j1,j2)
         | 
| 2374 | 
            +
            i
         | 
| 2375 | 
            +
            = (1, . . . , j2, . . . , j1, . . . , M) for all player i ∈ [N] be
         | 
| 2376 | 
            +
            the swap permutation that swaps actions j1 and j2 and keeps other actions still. Then ◦i̸=jρ(j1,j2)
         | 
| 2377 | 
            +
            i
         | 
| 2378 | 
            +
            ¯u =
         | 
| 2379 | 
            +
            ρ(j1,j2)
         | 
| 2380 | 
            +
            j
         | 
| 2381 | 
            +
            ¯u for player j. For f ∈ FNE
         | 
| 2382 | 
            +
            OPI, we have f(¯u)j = f(◦i̸=jρ(j1,j2)
         | 
| 2383 | 
            +
            i
         | 
| 2384 | 
            +
            ¯u)j = f(ρ(j1,j2)
         | 
| 2385 | 
            +
            j
         | 
| 2386 | 
            +
            ¯u)j for arbitrary swap
         | 
| 2387 | 
            +
            permutation ρ(j1,j2)
         | 
| 2388 | 
            +
            j
         | 
| 2389 | 
            +
            . Since any permutation can be achieved by composition of swap permutations,
         | 
| 2390 | 
            +
            we have ∀ρj ∈ Gj, f(¯u)j = f(ρj ¯u)j.
         | 
| 2391 | 
            +
            Based on that, and by OPI of f, ∀ρ = ◦i∈[N]ρi we have
         | 
| 2392 | 
            +
            f(¯u)j = f(ρ¯u)j, i.e. f is a constant function on U. Without loss of generality, we denote f(u) ≡ σ for
         | 
| 2393 | 
            +
            all u ∈ U. Then
         | 
| 2394 | 
            +
            Eu∼DSW(f(u), u) =
         | 
| 2395 | 
            +
            1
         | 
| 2396 | 
            +
            |U|
         | 
| 2397 | 
            +
            �
         | 
| 2398 | 
            +
            u′∈U
         | 
| 2399 | 
            +
            SW(σ, u′) =
         | 
| 2400 | 
            +
            1
         | 
| 2401 | 
            +
            (M!)N−1 SW(σ,
         | 
| 2402 | 
            +
            �
         | 
| 2403 | 
            +
            u′∈U
         | 
| 2404 | 
            +
            u′).
         | 
| 2405 | 
            +
            Additionally, we have (�
         | 
| 2406 | 
            +
            u′∈U u′)(a) = ((M − 1)!)N−1 for any a ∈ A. Based on that, we have
         | 
| 2407 | 
            +
            max
         | 
| 2408 | 
            +
            f∈F NE
         | 
| 2409 | 
            +
            OPI
         | 
| 2410 | 
            +
            Eu∼DSW(f(u), u) =
         | 
| 2411 | 
            +
            1
         | 
| 2412 | 
            +
            (M!)N−1 · N((M − 1)!)N−1 =
         | 
| 2413 | 
            +
            N
         | 
| 2414 | 
            +
            M N−1 .
         | 
| 2415 | 
            +
            (14)
         | 
| 2416 | 
            +
            Combining Equation (13) and Equation (14), we have
         | 
| 2417 | 
            +
            SWRN,M(FNE
         | 
| 2418 | 
            +
            OPI, FNE
         | 
| 2419 | 
            +
            general) ≤
         | 
| 2420 | 
            +
            1
         | 
| 2421 | 
            +
            M N−1 .
         | 
| 2422 | 
            +
            Due to FNE
         | 
| 2423 | 
            +
            both ⊆ FNE
         | 
| 2424 | 
            +
            OPI, we immediately know
         | 
| 2425 | 
            +
            SWRN,M(FNE
         | 
| 2426 | 
            +
            both, FNE
         | 
| 2427 | 
            +
            general) ≤
         | 
| 2428 | 
            +
            1
         | 
| 2429 | 
            +
            M N−1
         | 
| 2430 | 
            +
            27
         | 
| 2431 | 
            +
             | 
| 2432 | 
            +
            Step 2
         | 
| 2433 | 
            +
            On the other part, we prove
         | 
| 2434 | 
            +
            SWRN,M(FNE
         | 
| 2435 | 
            +
            OPI, FNE
         | 
| 2436 | 
            +
            general)
         | 
| 2437 | 
            +
            SWRN,M(FNE
         | 
| 2438 | 
            +
            both, FNE
         | 
| 2439 | 
            +
            general)
         | 
| 2440 | 
            +
            �
         | 
| 2441 | 
            +
            ≥ 1/M N−1
         | 
| 2442 | 
            +
            Define the maximum possible utility (MPU) for player i with respect to utility ui and action ai as
         | 
| 2443 | 
            +
            MPU(ui, ai) :=
         | 
| 2444 | 
            +
            max
         | 
| 2445 | 
            +
            a−i∈A−i ui(ai, a−i)
         | 
| 2446 | 
            +
            (15)
         | 
| 2447 | 
            +
            Define the set of maximum possible utility best response for player i w.r.t. ui as
         | 
| 2448 | 
            +
            Bi(ui) := {ai ∈ Ai : MPU(ui, ai) = max
         | 
| 2449 | 
            +
            a′
         | 
| 2450 | 
            +
            i∈Ai MPU(ui, a′
         | 
| 2451 | 
            +
            i)}
         | 
| 2452 | 
            +
            We first conduct some simplification to the target.
         | 
| 2453 | 
            +
            SWRN,M(FNE
         | 
| 2454 | 
            +
            both, FNE
         | 
| 2455 | 
            +
            general) = inf
         | 
| 2456 | 
            +
            D
         | 
| 2457 | 
            +
            maxf∈F NE
         | 
| 2458 | 
            +
            both Eu∼DSW(f(u), u)
         | 
| 2459 | 
            +
            maxf∈F NE
         | 
| 2460 | 
            +
            general Eu∼DSW(f(u), u) ≥ inf
         | 
| 2461 | 
            +
            D
         | 
| 2462 | 
            +
            maxf∈F NE
         | 
| 2463 | 
            +
            both Eu∼DSW(f(u), u)
         | 
| 2464 | 
            +
            Eu∼D maxσ SW(σ, u)
         | 
| 2465 | 
            +
            Then we constrain u to be a cooperation game. For a normal form game Γu, we define ˜u = (˜ui)i∈[n]
         | 
| 2466 | 
            +
            in which ˜ui = 1
         | 
| 2467 | 
            +
            n
         | 
| 2468 | 
            +
            �n
         | 
| 2469 | 
            +
            i=1 ui. Then we have SW(σ, u) = SW(σ, ˜u), which means that constraining u to be
         | 
| 2470 | 
            +
            a cooperation game will induce the same social welfare. Then
         | 
| 2471 | 
            +
            inf
         | 
| 2472 | 
            +
            D
         | 
| 2473 | 
            +
            maxf∈F NE
         | 
| 2474 | 
            +
            both Eu∼DSW(f(u), u)
         | 
| 2475 | 
            +
            Eu∼D maxσ SW(σ, u)
         | 
| 2476 | 
            +
            = inf
         | 
| 2477 | 
            +
            D
         | 
| 2478 | 
            +
            maxf∈F NE
         | 
| 2479 | 
            +
            both Eu∼DSW(f(u), ˜u)
         | 
| 2480 | 
            +
            Eu∼D maxσ SW(σ, ˜u)
         | 
| 2481 | 
            +
            Denote f0 be the approximator that always outputs uniform strategy on Bi(˜ui) for player i. It’s
         | 
| 2482 | 
            +
            obvious that f0 is both OPI and PPE because the operations from u to f0(u) are all permutation-
         | 
| 2483 | 
            +
            equivariant. Then,
         | 
| 2484 | 
            +
            inf
         | 
| 2485 | 
            +
            D
         | 
| 2486 | 
            +
            maxf∈F NE
         | 
| 2487 | 
            +
            both Eu∼DSW(f(u), ˜u)
         | 
| 2488 | 
            +
            Eu∼D maxσ SW(σ, ˜u)
         | 
| 2489 | 
            +
            ≥ inf
         | 
| 2490 | 
            +
            D
         | 
| 2491 | 
            +
            Eu∼DSW(f0(u), ˜u)
         | 
| 2492 | 
            +
            Eu∼D maxσ SW(σ, ˜u)
         | 
| 2493 | 
            +
            Ignore the infimum and the expectation operator, consider
         | 
| 2494 | 
            +
            SW(f0(u),˜u)
         | 
| 2495 | 
            +
            maxσ SW(σ,˜u) for arbitrary ˜u, denote b
         | 
| 2496 | 
            +
            be the maximum element appeared in ˜u, then the denominator equals Nb. But for the numerator,
         | 
| 2497 | 
            +
            for player i, no matter what action ai ∈ Bi(˜ui) she chooses, she always has probability at least
         | 
| 2498 | 
            +
            �
         | 
| 2499 | 
            +
            j̸=i
         | 
| 2500 | 
            +
            1
         | 
| 2501 | 
            +
            |Bj| ≥
         | 
| 2502 | 
            +
            1
         | 
| 2503 | 
            +
            MN−1 to achieve revenue b, therefore inducing SW(f0(u), ˜u) ≥
         | 
| 2504 | 
            +
            Nb
         | 
| 2505 | 
            +
            MN−1 .
         | 
| 2506 | 
            +
            Then,
         | 
| 2507 | 
            +
            SW(f0(u),˜u)
         | 
| 2508 | 
            +
            maxσ SW(σ,˜u) ≥
         | 
| 2509 | 
            +
            1
         | 
| 2510 | 
            +
            MN−1 , so as infD
         | 
| 2511 | 
            +
            Eu∼DSW(f0(u),˜u)
         | 
| 2512 | 
            +
            Eu∼D maxσ SW(σ,˜u), SWRN,M(FNE
         | 
| 2513 | 
            +
            both) and SWRN,M(FNE
         | 
| 2514 | 
            +
            OPI).
         | 
| 2515 | 
            +
            Above all,
         | 
| 2516 | 
            +
            SWRN,M(FNE
         | 
| 2517 | 
            +
            OPI, FNE
         | 
| 2518 | 
            +
            general)
         | 
| 2519 | 
            +
            SWRN,M(FNE
         | 
| 2520 | 
            +
            both, FNE
         | 
| 2521 | 
            +
            general)
         | 
| 2522 | 
            +
            �
         | 
| 2523 | 
            +
            =
         | 
| 2524 | 
            +
            1
         | 
| 2525 | 
            +
            M N−1
         | 
| 2526 | 
            +
            A.15.2
         | 
| 2527 | 
            +
            Proof of Equation (2)
         | 
| 2528 | 
            +
            We next prove the theorem with respect to FNE
         | 
| 2529 | 
            +
            PPEthat
         | 
| 2530 | 
            +
            SWRN,M(FNE
         | 
| 2531 | 
            +
            PPE, FNE
         | 
| 2532 | 
            +
            general) ≤ 1
         | 
| 2533 | 
            +
            M
         | 
| 2534 | 
            +
            Consider a bimatrix game and Ai = [M] for i ∈ [2]. ∀a ∈ A, i ∈ [2], define the payoff ¯u as follows:
         | 
| 2535 | 
            +
            ¯ui(a) =
         | 
| 2536 | 
            +
            �
         | 
| 2537 | 
            +
            1
         | 
| 2538 | 
            +
            , if a1 = a2
         | 
| 2539 | 
            +
            0
         | 
| 2540 | 
            +
            , otherwise
         | 
| 2541 | 
            +
            Define U := {u′|u′ = ρ1ρ2¯u, ρi ∈ Gi} and D as a uniform distribution on U. Easy to certify that
         | 
| 2542 | 
            +
            U = {u′|u′ = ρ1¯u, ρ1 ∈ G1} = {u′|u′ = ρ2¯u, ρ2 ∈ G2} and D is a permutation-invariant distribution.
         | 
| 2543 | 
            +
            28
         | 
| 2544 | 
            +
             | 
| 2545 | 
            +
            Let ˜f ∈ ˜FNE
         | 
| 2546 | 
            +
            general be the NE oracle that ˜f(¯u)i = 1 and for any u′ = ◦iρi¯u ∈ U, ˜f(u′)i = ρi(1).
         | 
| 2547 | 
            +
            Intuitively, the oracle will choose the action that will provide all players with revenue of 1, leading to
         | 
| 2548 | 
            +
            a social welfare of 2.
         | 
| 2549 | 
            +
            For a permutation ̺ on [M], let P̺ ∈ {0, 1}M×M be the corresponding permutation matrix. Denote
         | 
| 2550 | 
            +
            P as the set of all permutation matrice. As a result, ∀u ∈ U, ∀ρ1 ∈ G1, ρ1u = (Pρ1u1, Pρ1u2) =: Pρ1u
         | 
| 2551 | 
            +
            and ∀ρ2 ∈ G2, ρ2u = (u1P T
         | 
| 2552 | 
            +
            ρ2, u2P T
         | 
| 2553 | 
            +
            ρ2) =: uP T
         | 
| 2554 | 
            +
            ρ2. Specially, we have P̺¯uP T
         | 
| 2555 | 
            +
            ̺ = ¯u. For f ∈ FNE
         | 
| 2556 | 
            +
            PPE, Denote
         | 
| 2557 | 
            +
            f(¯u) = σ = (σ1, σ2). For permutation ̺ in [M] and payoff u′ = P̺¯u = ¯u(P T
         | 
| 2558 | 
            +
            ̺ )−1, by PPE of f, we have
         | 
| 2559 | 
            +
            f(u′)1 = f(P̺¯u)1 = P̺σ1 = ̺σ1, and f(u′)2 = f(¯u(P T
         | 
| 2560 | 
            +
            ̺ )−1)2 = (P̺)−1σ2 = ̺−1σ2. Then we have
         | 
| 2561 | 
            +
            SW(f(u′), u′) =
         | 
| 2562 | 
            +
            �
         | 
| 2563 | 
            +
            i
         | 
| 2564 | 
            +
            (P̺¯u)i(̺σ1, ̺−1σ2) =
         | 
| 2565 | 
            +
            �
         | 
| 2566 | 
            +
            i
         | 
| 2567 | 
            +
            ¯ui(σ1, ̺−1σ2) =
         | 
| 2568 | 
            +
            �
         | 
| 2569 | 
            +
            i
         | 
| 2570 | 
            +
            (¯uP T
         | 
| 2571 | 
            +
            ̺ )i(σ1, σ2) = SW(f(¯u), ¯uP T
         | 
| 2572 | 
            +
            ̺ )
         | 
| 2573 | 
            +
            Therefore
         | 
| 2574 | 
            +
            Eu∼DSW(f(u), u) =
         | 
| 2575 | 
            +
            1
         | 
| 2576 | 
            +
            |U|
         | 
| 2577 | 
            +
            �
         | 
| 2578 | 
            +
            u′∈U
         | 
| 2579 | 
            +
            SW(f(u′), u′)
         | 
| 2580 | 
            +
            =
         | 
| 2581 | 
            +
            1
         | 
| 2582 | 
            +
            |U|
         | 
| 2583 | 
            +
            �
         | 
| 2584 | 
            +
            P̺∈P
         | 
| 2585 | 
            +
            SW(f(¯u), ¯uP T
         | 
| 2586 | 
            +
            ̺ )
         | 
| 2587 | 
            +
            =
         | 
| 2588 | 
            +
            1
         | 
| 2589 | 
            +
            |U|
         | 
| 2590 | 
            +
            �
         | 
| 2591 | 
            +
            u=¯u(P T
         | 
| 2592 | 
            +
            ̺ )∈U
         | 
| 2593 | 
            +
            SW(f(¯u), u)
         | 
| 2594 | 
            +
            =
         | 
| 2595 | 
            +
            1
         | 
| 2596 | 
            +
            |U|SW(σ,
         | 
| 2597 | 
            +
            �
         | 
| 2598 | 
            +
            u′∈U
         | 
| 2599 | 
            +
            u′).
         | 
| 2600 | 
            +
            Since |U| =
         | 
| 2601 | 
            +
            1
         | 
| 2602 | 
            +
            M! and �
         | 
| 2603 | 
            +
            u′∈U u′ is a tensor with all elements equal to (M −1)!. Thus Eu∼DSW(f(u), u) =
         | 
| 2604 | 
            +
            2
         | 
| 2605 | 
            +
            M and
         | 
| 2606 | 
            +
            SWRN,M(FNE
         | 
| 2607 | 
            +
            PPE, FNE
         | 
| 2608 | 
            +
            general) ≤ 1
         | 
| 2609 | 
            +
            M
         | 
| 2610 | 
            +
            A.15.3
         | 
| 2611 | 
            +
            Proof of Equation (4)
         | 
| 2612 | 
            +
            Consider a 3 × 3 game as follows, where ǫ ∈ (0, 1
         | 
| 2613 | 
            +
            2):
         | 
| 2614 | 
            +
            u =
         | 
| 2615 | 
            +
            
         | 
| 2616 | 
            +
            
         | 
| 2617 | 
            +
            1, 1
         | 
| 2618 | 
            +
            0, 0
         | 
| 2619 | 
            +
            0, 1
         | 
| 2620 | 
            +
            2 + ε
         | 
| 2621 | 
            +
            0, 0
         | 
| 2622 | 
            +
            1, 1
         | 
| 2623 | 
            +
            0, 1
         | 
| 2624 | 
            +
            2 + ε
         | 
| 2625 | 
            +
            1
         | 
| 2626 | 
            +
            2 + ε, 0
         | 
| 2627 | 
            +
            1
         | 
| 2628 | 
            +
            2 + ε, 0
         | 
| 2629 | 
            +
            ε, ε
         | 
| 2630 | 
            +
            
         | 
| 2631 | 
            +
            
         | 
| 2632 | 
            +
            It is obvious that maxσ∗⊆NE(Γu) SW(σ∗, u) = 2, and the corresponding strategy has been bolded.
         | 
| 2633 | 
            +
            However, for NE oracles with both PPE and OPI, it can only output a unique NE with a pure strategy
         | 
| 2634 | 
            +
            that induces utility (ε, ε).
         | 
| 2635 | 
            +
            Let ρ1 = ρ2 = (2, 1, 3), we have ρ1ρ2u = u. From the analysis above we know if f NE ∈ �
         | 
| 2636 | 
            +
            FNE
         | 
| 2637 | 
            +
            both and
         | 
| 2638 | 
            +
            f NE(u) = (σ1, σ2), then σ1(1) = σ1(2), σ2(1) = σ2(2). We integrate the first two actions of player 1
         | 
| 2639 | 
            +
            and player 2 into a new action that will choose randomly between the first two actions, then we form
         | 
| 2640 | 
            +
            the utility matrix below:
         | 
| 2641 | 
            +
            u =
         | 
| 2642 | 
            +
            �
         | 
| 2643 | 
            +
            1
         | 
| 2644 | 
            +
            2, 1
         | 
| 2645 | 
            +
            2
         | 
| 2646 | 
            +
            0, 1
         | 
| 2647 | 
            +
            2 + ε
         | 
| 2648 | 
            +
            1
         | 
| 2649 | 
            +
            2 + ε, 0
         | 
| 2650 | 
            +
            ε, ε
         | 
| 2651 | 
            +
            �
         | 
| 2652 | 
            +
            There is a unique NE in this Prisoner’s Dilemma, which has been bolded. The game u is the
         | 
| 2653 | 
            +
            same with the game u under the assumption that σ1(1) = σ1(2) and σ2(1) = σ2(2) in u.
         | 
| 2654 | 
            +
            Then
         | 
| 2655 | 
            +
            maxf∈ �
         | 
| 2656 | 
            +
            F NE
         | 
| 2657 | 
            +
            both SW(f(u), u) = 2ε. Since ε can be arbitrarily small, we have SWR2,3( �
         | 
| 2658 | 
            +
            FNE
         | 
| 2659 | 
            +
            both, �FNE
         | 
| 2660 | 
            +
            general) = 0.
         | 
| 2661 | 
            +
            As a result, we have SWRN,M( �FNE
         | 
| 2662 | 
            +
            both, �FNE
         | 
| 2663 | 
            +
            general) = 0 for all N ≥ 2 and M ≥ 3.
         | 
| 2664 | 
            +
            29
         | 
| 2665 | 
            +
             | 
    	
        VdFJT4oBgHgl3EQfOSwV/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        VtE4T4oBgHgl3EQfMgzk/content/tmp_files/2301.04949v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,3642 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.04949v1  [math.OC]  12 Jan 2023
         | 
| 2 | 
            +
            A FORMAL POWER SERIES APPROACH TO MULTIPLICATIVE
         | 
| 3 | 
            +
            DYNAMIC FEEDBACK CONNECTION
         | 
| 4 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 5 | 
            +
            Abstract. The goal of the paper is multi-fold. The first of which is to derive an explicit
         | 
| 6 | 
            +
            formula to compute the generating series of a closed-loop system when a plant, given in a
         | 
| 7 | 
            +
            Chen–Fliess series description is in multiplicative output feedback connection with another
         | 
| 8 | 
            +
            system given in Chen–Fliess series description. Further, the objective extends in showing
         | 
| 9 | 
            +
            that the multiplicative dynamic output feedback connection has a natural interpretation as
         | 
| 10 | 
            +
            a transformation group acting on the plant. A computational framework for computing the
         | 
| 11 | 
            +
            generating series for multiplicative dynamic output feedback is devised utilizing the dual
         | 
| 12 | 
            +
            Hopf algebras corresponding to the shuffle group and the multiplicative feedback group.
         | 
| 13 | 
            +
            Contents
         | 
| 14 | 
            +
            1.
         | 
| 15 | 
            +
            Introduction
         | 
| 16 | 
            +
            2
         | 
| 17 | 
            +
            2.
         | 
| 18 | 
            +
            Preliminaries: Formal Power Series
         | 
| 19 | 
            +
            2
         | 
| 20 | 
            +
            2.1.
         | 
| 21 | 
            +
            Shuffle Product
         | 
| 22 | 
            +
            3
         | 
| 23 | 
            +
            3.
         | 
| 24 | 
            +
            Bialgebra and Hopf algebra: Preliminaries
         | 
| 25 | 
            +
            4
         | 
| 26 | 
            +
            3.1.
         | 
| 27 | 
            +
            Algebra
         | 
| 28 | 
            +
            4
         | 
| 29 | 
            +
            3.2.
         | 
| 30 | 
            +
            Coalgebra
         | 
| 31 | 
            +
            5
         | 
| 32 | 
            +
            3.3.
         | 
| 33 | 
            +
            Bialgebra
         | 
| 34 | 
            +
            6
         | 
| 35 | 
            +
            3.4.
         | 
| 36 | 
            +
            Hopf Algebra
         | 
| 37 | 
            +
            7
         | 
| 38 | 
            +
            4.
         | 
| 39 | 
            +
            Unshuffle Hopf algebra and its Coaction
         | 
| 40 | 
            +
            8
         | 
| 41 | 
            +
            4.1.
         | 
| 42 | 
            +
            Unshuffle Hopf Algebra
         | 
| 43 | 
            +
            8
         | 
| 44 | 
            +
            4.2.
         | 
| 45 | 
            +
            Gradation of Bialgebra H
         | 
| 46 | 
            +
            10
         | 
| 47 | 
            +
            4.3.
         | 
| 48 | 
            +
            Coaction of H
         | 
| 49 | 
            +
            11
         | 
| 50 | 
            +
            5.
         | 
| 51 | 
            +
            Chen–Fliess Series and its Interconnections
         | 
| 52 | 
            +
            13
         | 
| 53 | 
            +
            5.1.
         | 
| 54 | 
            +
            Chen–Fliess Series
         | 
| 55 | 
            +
            13
         | 
| 56 | 
            +
            5.2.
         | 
| 57 | 
            +
            Interconnections of Chen–Fliess Series: Parallel and Cascade Connections
         | 
| 58 | 
            +
            14
         | 
| 59 | 
            +
            5.3.
         | 
| 60 | 
            +
            Cascading of Chen–Fliess with Multiplicative Feedforward of Input
         | 
| 61 | 
            +
            15
         | 
| 62 | 
            +
            5.4.
         | 
| 63 | 
            +
            Multiplicative Dynamic Output Feedback Group
         | 
| 64 | 
            +
            16
         | 
| 65 | 
            +
            6.
         | 
| 66 | 
            +
            Chen–Fliess Series Under Multiplicative Dynamic Output Feedback
         | 
| 67 | 
            +
            18
         | 
| 68 | 
            +
            7.
         | 
| 69 | 
            +
            Invariance of Class and Relative Degree under multiplicative dynamic feedback
         | 
| 70 | 
            +
            connection
         | 
| 71 | 
            +
            20
         | 
| 72 | 
            +
            8.
         | 
| 73 | 
            +
            Computational Framework for Multiplicative Mixed Composition & Dynamic
         | 
| 74 | 
            +
            Feedback Product
         | 
| 75 | 
            +
            24
         | 
| 76 | 
            +
            8.1.
         | 
| 77 | 
            +
            Hopf Algebra Corresponding to the Multiplicative Dynamic Feedback Subgroup 24
         | 
| 78 | 
            +
            8.2.
         | 
| 79 | 
            +
            Coaction of Hopf algebra H on Algebra of Coordinate Map
         | 
| 80 | 
            +
            25
         | 
| 81 | 
            +
            8.3.
         | 
| 82 | 
            +
            Coaction of Hopf algbera H on the Hopf algebra H
         | 
| 83 | 
            +
            27
         | 
| 84 | 
            +
            8.4.
         | 
| 85 | 
            +
            Coproduct, Antipode Computations and Grading of Hopf algebra H
         | 
| 86 | 
            +
            29
         | 
| 87 | 
            +
            9.
         | 
| 88 | 
            +
            Conclusions and Future work
         | 
| 89 | 
            +
            35
         | 
| 90 | 
            +
            References
         | 
| 91 | 
            +
            35
         | 
| 92 | 
            +
             | 
| 93 | 
            +
            2
         | 
| 94 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 95 | 
            +
            1. Introduction
         | 
| 96 | 
            +
            The objective of the document is two fold and works with the Chen–Fliess functional
         | 
| 97 | 
            +
            series [Fliess(1981)]. There is no need that these input-output systems have a state space
         | 
| 98 | 
            +
            realization and thus, the results presented here are independent of any state space embed-
         | 
| 99 | 
            +
            ding when a realization is possible [Fliess(1983)]. Firstly, let Fc and Fd be two nonlinear
         | 
| 100 | 
            +
            input-output systems represented by Chen–Fliess series. It was shown in [Gray & Li(2005)]
         | 
| 101 | 
            +
            that the additive feedback interconnection of two such systems result in a Chen–Fliess se-
         | 
| 102 | 
            +
            ries description for the closed-loop system. The convergence of the closed-loop system was
         | 
| 103 | 
            +
            characterized in [Thitsa & Gray(2012)]. An efficient computation of the generating series for
         | 
| 104 | 
            +
            closed-loop system is facilitated through a combinatorial Hopf algebra [Gray, et al.(2014a),
         | 
| 105 | 
            +
            Foissy(2015), Duffaut Espinosa, et al.(2016)]. The feedback product formula and its com-
         | 
| 106 | 
            +
            putation were used to solve system inversion problems [Gray, et al.(2014b)] and trajectory
         | 
| 107 | 
            +
            generation problems [Duffaut Espinosa & Gray(2017)].
         | 
| 108 | 
            +
            However, when the nature of interconnection becomes multiplicative feedback, the similar
         | 
| 109 | 
            +
            set of questions persist in general. It is known that, in single-input single-output (SISO)
         | 
| 110 | 
            +
            setting, the closed-loop system in the affine feedback case (of which multiplicative feedback
         | 
| 111 | 
            +
            is a special case) has a Chen–Fliess series description and the computation of feedback for-
         | 
| 112 | 
            +
            mula is facilitated through a combinatorial Hopf algebra [Gray & Ebrahimi-Fard(2017)]. The
         | 
| 113 | 
            +
            present document, in one part, shows that even in multi-input multi-output (MIMO) setting
         | 
| 114 | 
            +
            the closed-loop system under multiplicative feedback has a Chen–Fliess series representation
         | 
| 115 | 
            +
            and provides an explicit expression of the closed-loop generating series which will be called
         | 
| 116 | 
            +
            as multiplicative dynamic feedback product . Furthermore, it will be shown that this feedback
         | 
| 117 | 
            +
            product has a natural interpretation as a transformation group acting on the plant. The
         | 
| 118 | 
            +
            algorithmic framework for the computation of the multiplicative dynamic feedback product
         | 
| 119 | 
            +
            formula for a general MIMO case is devised using the dual Hopf algebras corresponding to
         | 
| 120 | 
            +
            the shuffle product and to the multiplicative dynamic output feedback group. The charac-
         | 
| 121 | 
            +
            terization of convergence of the Chen–Fliess series for the closed-loop system is deferred for
         | 
| 122 | 
            +
            future work.
         | 
| 123 | 
            +
            The paper is organized as follows. The next section provides a summary of the concepts
         | 
| 124 | 
            +
            related to non-commutative formal power series, Hopf algebra, Chen–Fliess series and their
         | 
| 125 | 
            +
            interconnections. The Section 5.4 builds the pivotal multiplicative dynamic output feedback
         | 
| 126 | 
            +
            group. The Hopf algebra construction corresponding to the shuffle group is drafted in Sec-
         | 
| 127 | 
            +
            tion 4. Section 6 is where the multiplicative dynamic feedback connection is analyzed. The
         | 
| 128 | 
            +
            invariance of relative degree under multiplicative output feedback is asserted in Section 7.
         | 
| 129 | 
            +
            The framework for computing the feedback product is devised in Section 8 and is demon-
         | 
| 130 | 
            +
            strated using examples. The conclusions of the paper and directions for future work is given
         | 
| 131 | 
            +
            in the last section.
         | 
| 132 | 
            +
            2. Preliminaries: Formal Power Series
         | 
| 133 | 
            +
            A finite nonempty set of noncommuting symbols X = {x0, x1, . . . , xm} is called an alphabet.
         | 
| 134 | 
            +
            Each element of X is called a letter. Any finite sequence, η = xi1 · · · xik, of letters from X
         | 
| 135 | 
            +
            is called a word over X and its length is |η| = k. The set X∗ of all words includes the
         | 
| 136 | 
            +
            empty word, denoted ∅ ∈ X∗ and X+ := X∗\∅, and forms a monoid under catenation.
         | 
| 137 | 
            +
            Any mapping c : X∗ → Rℓ is called a formal power series. The value of c at η ∈ X∗ is
         | 
| 138 | 
            +
            denoted by (c, η) and called the coefficient of η in c. Normally, c is written as a formal sum
         | 
| 139 | 
            +
            c = �
         | 
| 140 | 
            +
            η∈X∗(c, η)η. A series c is proper when the coefficient (c, ∅) = 0 else it is a non-proper
         | 
| 141 | 
            +
            series. The support of c is the set supp(c) containing all words having nonzero coefficients.
         | 
| 142 | 
            +
            The order of c, denoted ord(c), is the length of the minimal length word in its support. The
         | 
| 143 | 
            +
             | 
| 144 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 145 | 
            +
            3
         | 
| 146 | 
            +
            collection of all formal power series over X is denoted by Rℓ⟨⟨X⟩⟩. The ith component of a
         | 
| 147 | 
            +
            vector v ∈ Rℓ is denoted by vi and consequently the ith component of a series c ∈ Rℓ⟨⟨X⟩⟩
         | 
| 148 | 
            +
            is denoted by ci viz. (ci, η) = (c, η)i.
         | 
| 149 | 
            +
            A series c′ ∈ Rℓ⟨⟨X⟩⟩ is called a subseries of c ∈ Rℓ⟨⟨X⟩⟩ if there exists another series
         | 
| 150 | 
            +
            c′′ ∈ Rℓ⟨⟨X⟩⟩ such that the intersection supp (c′) ∩ supp (c′′) is empty and the series c can
         | 
| 151 | 
            +
            be decomposed as c = c′ + c′′.
         | 
| 152 | 
            +
            Definition 2.1. Let c ∈ Rℓ⟨⟨X⟩⟩, then the natural part of the series c is the subseries
         | 
| 153 | 
            +
            denoted by cN such that c = cN + cF and supp (cF) ⊆ X∗ \ {xk
         | 
| 154 | 
            +
            0 : k ∈ N0}. The subseries cF
         | 
| 155 | 
            +
            is called as forced part of the series c.
         | 
| 156 | 
            +
            Definition 2.1 asserts that the forced part cF of a series c should not contain any word
         | 
| 157 | 
            +
            formed by the letter x0 alone, including the empty word ∅. For the remainder of the docu-
         | 
| 158 | 
            +
            ment, Rℓ is given the structure of a unital commutative ring under Hadamard or pointwise
         | 
| 159 | 
            +
            product viz. (xy)i = xiyi with ll = [1 1 · · ·1]t ∈ Rℓ being the multiplicative unit. Formal
         | 
| 160 | 
            +
            power series Rℓ⟨⟨X⟩⟩ form a Rℓ-module and the submodule of all proper series in Rℓ⟨⟨X⟩⟩
         | 
| 161 | 
            +
            is denoted by Rℓ
         | 
| 162 | 
            +
            p ⟨⟨X⟩⟩, while the subset of non-proper series is denoted by Rℓ
         | 
| 163 | 
            +
            np ⟨⟨X⟩⟩.
         | 
| 164 | 
            +
            Definition 2.2. A series c ∈ Rℓ⟨⟨X⟩⟩ is called purely improper if ci is non-proper ∀i =
         | 
| 165 | 
            +
            1, . . . , ℓ. The subset of all purely improper series in Rℓ⟨⟨X⟩⟩ is denoted by Rℓ
         | 
| 166 | 
            +
            pi ⟨⟨X⟩⟩.
         | 
| 167 | 
            +
            Observe that Rℓ
         | 
| 168 | 
            +
            pi ⟨⟨X⟩⟩ ⊊ Rℓ
         | 
| 169 | 
            +
            np ⟨⟨X⟩⟩ if ℓ > 1, otherwise Rpi ⟨⟨X⟩⟩ = Rnp ⟨⟨X⟩⟩.
         | 
| 170 | 
            +
            2.1. Shuffle Product. The shuffle product α
         | 
| 171 | 
            +
            β of two words is a bilinear product on the
         | 
| 172 | 
            +
            linear span of words, which can be uniquely specified iteratively
         | 
| 173 | 
            +
            (xiη)
         | 
| 174 | 
            +
            (xjξ) := xi(η
         | 
| 175 | 
            +
            (xjξ)) + xj((xiη)
         | 
| 176 | 
            +
            ξ),
         | 
| 177 | 
            +
            where η, ξ ∈ X∗ and xi, xj ∈ X. See for instance [Fliess(1981)]. The shuffle product of two
         | 
| 178 | 
            +
            series, (c, d) �→ c
         | 
| 179 | 
            +
            d is defined as
         | 
| 180 | 
            +
            (c
         | 
| 181 | 
            +
            d, η) =
         | 
| 182 | 
            +
            �
         | 
| 183 | 
            +
            ζ,ν∈X∗
         | 
| 184 | 
            +
            η∈supp(ζ
         | 
| 185 | 
            +
            ν)
         | 
| 186 | 
            +
            (c, ζ) (d, ν) .
         | 
| 187 | 
            +
            We define for any xi, xj ∈ X and any word η ∈ X∗
         | 
| 188 | 
            +
            x−1
         | 
| 189 | 
            +
            i (xjη) :=
         | 
| 190 | 
            +
            �η,
         | 
| 191 | 
            +
            i = j
         | 
| 192 | 
            +
            0,
         | 
| 193 | 
            +
            else
         | 
| 194 | 
            +
            The following proposition is vital in understanding the bialgebra and Hopf algebra devised
         | 
| 195 | 
            +
            in Sections 4.1 and 4.3.
         | 
| 196 | 
            +
            Proposition 2.1. If c, d ∈ Rℓ⟨⟨X⟩⟩, then ∀xi ∈ X
         | 
| 197 | 
            +
            x−1
         | 
| 198 | 
            +
            i
         | 
| 199 | 
            +
            (c
         | 
| 200 | 
            +
            d) =
         | 
| 201 | 
            +
            �
         | 
| 202 | 
            +
            x−1
         | 
| 203 | 
            +
            i
         | 
| 204 | 
            +
            (c)
         | 
| 205 | 
            +
            d
         | 
| 206 | 
            +
            �
         | 
| 207 | 
            +
            +
         | 
| 208 | 
            +
            �
         | 
| 209 | 
            +
            c
         | 
| 210 | 
            +
            x−1
         | 
| 211 | 
            +
            i
         | 
| 212 | 
            +
            (d)
         | 
| 213 | 
            +
            �
         | 
| 214 | 
            +
            .
         | 
| 215 | 
            +
            Note that Rℓ⟨⟨X⟩⟩ forms an associative and commutative Rℓ-algebra under the shuffle
         | 
| 216 | 
            +
            product. If d ∈ Rℓ
         | 
| 217 | 
            +
            pi ⟨⟨X⟩⟩, then shuffle inverse of d, denoted by d
         | 
| 218 | 
            +
            −1 is defined as
         | 
| 219 | 
            +
            d
         | 
| 220 | 
            +
            −1
         | 
| 221 | 
            +
            i
         | 
| 222 | 
            +
            = (di, ∅)−1
         | 
| 223 | 
            +
            ��
         | 
| 224 | 
            +
            k∈N0
         | 
| 225 | 
            +
            (d′
         | 
| 226 | 
            +
            i)
         | 
| 227 | 
            +
            k
         | 
| 228 | 
            +
            �
         | 
| 229 | 
            +
            ,
         | 
| 230 | 
            +
            where d′
         | 
| 231 | 
            +
            i = 1 − (di/ (di, ∅)). Hence, Rℓ
         | 
| 232 | 
            +
            pi ⟨⟨X⟩⟩ forms an Abelian group under the shuffle
         | 
| 233 | 
            +
            product with ll as the identity element.
         | 
| 234 | 
            +
             | 
| 235 | 
            +
            4
         | 
| 236 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 237 | 
            +
            Example 2.1. Let X = {x0, x1} and c ∈ R⟨⟨X⟩⟩ described as c = 1 − x1. Then the shuffle
         | 
| 238 | 
            +
            inverse is computed as:
         | 
| 239 | 
            +
            c
         | 
| 240 | 
            +
            −1 =
         | 
| 241 | 
            +
            �
         | 
| 242 | 
            +
            k∈N0
         | 
| 243 | 
            +
            (1 − (1 − x1))
         | 
| 244 | 
            +
            k
         | 
| 245 | 
            +
            =
         | 
| 246 | 
            +
            �
         | 
| 247 | 
            +
            k∈N0
         | 
| 248 | 
            +
            x
         | 
| 249 | 
            +
            k
         | 
| 250 | 
            +
            1
         | 
| 251 | 
            +
            =
         | 
| 252 | 
            +
            �
         | 
| 253 | 
            +
            k∈N0
         | 
| 254 | 
            +
            k!xk
         | 
| 255 | 
            +
            1.
         | 
| 256 | 
            +
            Therefore, c
         | 
| 257 | 
            +
            −1 = 1 + x1 + 2x2
         | 
| 258 | 
            +
            1 + 6x3
         | 
| 259 | 
            +
            1 + · · · + n!xn
         | 
| 260 | 
            +
            1 + · · · .
         | 
| 261 | 
            +
            Observe that (c
         | 
| 262 | 
            +
            d, ∅) = (c, ∅) (d, ∅). Hence, the set
         | 
| 263 | 
            +
            M
         | 
| 264 | 
            +
            = { ll + c : c ∈ Rn
         | 
| 265 | 
            +
            p ⟨⟨X⟩⟩},
         | 
| 266 | 
            +
            where c is a proper series in Rn⟨⟨X⟩⟩, forms a subgroup of the shuffle group. The group
         | 
| 267 | 
            +
            M
         | 
| 268 | 
            +
            is vital in the design of a computational framework of multiplicative dynamic feedback
         | 
| 269 | 
            +
            product as explained in Section 8.
         | 
| 270 | 
            +
            The set Rℓ⟨⟨X⟩⟩ is endowed with ultrametric structure where the metric κ is defined as
         | 
| 271 | 
            +
            κ(c, d) = σord(c−d),
         | 
| 272 | 
            +
            for c, d ∈ Rℓ⟨⟨X⟩⟩ and σ ∈]0, 1[. For brevity, κ(c, 0) is written as κ(c), and κ(c, d) = κ(c−d).
         | 
| 273 | 
            +
            The ultrametric space (Rℓ⟨⟨X⟩⟩, κ) is Cauchy complete [Berstel & Reutenauer(1988)]. The
         | 
| 274 | 
            +
            following definition of contraction maps between metric spaces will be useful.
         | 
| 275 | 
            +
            Definition 2.3. Given metric spaces (E, d) and (E′, d′), a map f : E −→ E′ is said to be a
         | 
| 276 | 
            +
            strong contraction map if ∀s, t ∈ E, it satisfies the condition d′(f(s), f(t)) ≤ αd(s, t) where
         | 
| 277 | 
            +
            α ∈ [0, 1[. If α = 1, then the map f is said to be a weak contraction map or a non-expansive
         | 
| 278 | 
            +
            map.
         | 
| 279 | 
            +
            3. Bialgebra and Hopf algebra: Preliminaries
         | 
| 280 | 
            +
            The goal is to provide the definitions of algebraic structures such as algebra, coalgebra,
         | 
| 281 | 
            +
            bialgebra and Hopf algebra [Abe(2004), Sweedler(1969)]. We let K be a commutative ring
         | 
| 282 | 
            +
            with identity 1K.
         | 
| 283 | 
            +
            3.1. Algebra. The definition of an algebra can be facilitated through the category of mod-
         | 
| 284 | 
            +
            ules. It allows to define the concept of a coalgebra (the dual notion) with ease.
         | 
| 285 | 
            +
            Definition 3.1. An algebra over K is a K-module A along with the morphisms of K-
         | 
| 286 | 
            +
            modules m : A ⊗ A −→ A , called the multiplication or product map, and η : K −→ A ,
         | 
| 287 | 
            +
            called the unit map, such that the following diagrams are commutative.
         | 
| 288 | 
            +
            (1)
         | 
| 289 | 
            +
            A ⊗ A ⊗ A
         | 
| 290 | 
            +
            m⊗idA
         | 
| 291 | 
            +
            �
         | 
| 292 | 
            +
            idA ⊗m
         | 
| 293 | 
            +
            �
         | 
| 294 | 
            +
            A ⊗ A
         | 
| 295 | 
            +
            m
         | 
| 296 | 
            +
            �
         | 
| 297 | 
            +
            A ⊗ A
         | 
| 298 | 
            +
            m
         | 
| 299 | 
            +
            � A
         | 
| 300 | 
            +
            K ⊗ A
         | 
| 301 | 
            +
            η⊗idA
         | 
| 302 | 
            +
            �
         | 
| 303 | 
            +
            ∼
         | 
| 304 | 
            +
            =
         | 
| 305 | 
            +
            �▲
         | 
| 306 | 
            +
            ▲
         | 
| 307 | 
            +
            ▲
         | 
| 308 | 
            +
            ▲
         | 
| 309 | 
            +
            ▲
         | 
| 310 | 
            +
            ▲
         | 
| 311 | 
            +
            ▲
         | 
| 312 | 
            +
            ▲
         | 
| 313 | 
            +
            ▲
         | 
| 314 | 
            +
            ▲
         | 
| 315 | 
            +
            ▲
         | 
| 316 | 
            +
            ▲
         | 
| 317 | 
            +
            ▲
         | 
| 318 | 
            +
            ▲
         | 
| 319 | 
            +
            ▲
         | 
| 320 | 
            +
            ▲
         | 
| 321 | 
            +
            ▲
         | 
| 322 | 
            +
            ▲
         | 
| 323 | 
            +
            ▲
         | 
| 324 | 
            +
            ▲
         | 
| 325 | 
            +
            A ⊗ A
         | 
| 326 | 
            +
            m
         | 
| 327 | 
            +
            �
         | 
| 328 | 
            +
            A
         | 
| 329 | 
            +
            A ⊗ K
         | 
| 330 | 
            +
            ∼
         | 
| 331 | 
            +
            =
         | 
| 332 | 
            +
            �r
         | 
| 333 | 
            +
            r
         | 
| 334 | 
            +
            r
         | 
| 335 | 
            +
            r
         | 
| 336 | 
            +
            r
         | 
| 337 | 
            +
            r
         | 
| 338 | 
            +
            r
         | 
| 339 | 
            +
            r
         | 
| 340 | 
            +
            r
         | 
| 341 | 
            +
            r
         | 
| 342 | 
            +
            r
         | 
| 343 | 
            +
            r
         | 
| 344 | 
            +
            r
         | 
| 345 | 
            +
            r
         | 
| 346 | 
            +
            r
         | 
| 347 | 
            +
            r
         | 
| 348 | 
            +
            r
         | 
| 349 | 
            +
            r
         | 
| 350 | 
            +
            r
         | 
| 351 | 
            +
            idA ⊗η
         | 
| 352 | 
            +
            � A ⊗ A
         | 
| 353 | 
            +
            m
         | 
| 354 | 
            +
            �
         | 
| 355 | 
            +
             | 
| 356 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 357 | 
            +
            5
         | 
| 358 | 
            +
            The tuple (A , m, η) is called a K-algebra.
         | 
| 359 | 
            +
            The commutative diagrams (1) mean that a K-algebra A must satisfy the following prop-
         | 
| 360 | 
            +
            erties:
         | 
| 361 | 
            +
            (1) The product map m must be associative.
         | 
| 362 | 
            +
            (2) The scalar multiplication through the η map must have a unit.
         | 
| 363 | 
            +
            The concept of a K-algebra morphism is defined next.
         | 
| 364 | 
            +
            Definition 3.2. Let (A , m, η), (A ′, m′, η′) be K-algebras. A map f : A −→ A ′ is called
         | 
| 365 | 
            +
            a K-algebra morphism provided the following diagrams commute.
         | 
| 366 | 
            +
            A ⊗ A
         | 
| 367 | 
            +
            m
         | 
| 368 | 
            +
            �
         | 
| 369 | 
            +
            f⊗f
         | 
| 370 | 
            +
            �
         | 
| 371 | 
            +
            A
         | 
| 372 | 
            +
            f
         | 
| 373 | 
            +
            �
         | 
| 374 | 
            +
            A ′ ⊗ A ′
         | 
| 375 | 
            +
            m′
         | 
| 376 | 
            +
            � A ′
         | 
| 377 | 
            +
            K
         | 
| 378 | 
            +
            η
         | 
| 379 | 
            +
            �
         | 
| 380 | 
            +
            η′
         | 
| 381 | 
            +
            �❋
         | 
| 382 | 
            +
            ❋
         | 
| 383 | 
            +
            ❋
         | 
| 384 | 
            +
            ❋
         | 
| 385 | 
            +
            ❋
         | 
| 386 | 
            +
            ❋
         | 
| 387 | 
            +
            ❋
         | 
| 388 | 
            +
            ❋
         | 
| 389 | 
            +
            ❋
         | 
| 390 | 
            +
            ❋
         | 
| 391 | 
            +
            ❋
         | 
| 392 | 
            +
            ❋
         | 
| 393 | 
            +
            ❋
         | 
| 394 | 
            +
            ❋
         | 
| 395 | 
            +
            ❋
         | 
| 396 | 
            +
            ❋
         | 
| 397 | 
            +
            A
         | 
| 398 | 
            +
            f
         | 
| 399 | 
            +
            �①①①①①①①①①①①①①①①①
         | 
| 400 | 
            +
            A ′
         | 
| 401 | 
            +
            Definition 3.3. Let P and Q be modules over K. The twisting morphism τ of K-modules
         | 
| 402 | 
            +
            is τ : P ⊗ Q −→ Q ⊗ P with
         | 
| 403 | 
            +
            τ(p ⊗ q) = q ⊗ p
         | 
| 404 | 
            +
            ∀ q ∈ Q, p ∈ P.
         | 
| 405 | 
            +
            A K-algebra A is commutative if and only if the following diagram commutes.
         | 
| 406 | 
            +
            A ⊗ A
         | 
| 407 | 
            +
            τ
         | 
| 408 | 
            +
            �
         | 
| 409 | 
            +
            m
         | 
| 410 | 
            +
            �■
         | 
| 411 | 
            +
            ■
         | 
| 412 | 
            +
            ■
         | 
| 413 | 
            +
            ■
         | 
| 414 | 
            +
            ■
         | 
| 415 | 
            +
            ■
         | 
| 416 | 
            +
            ■
         | 
| 417 | 
            +
            ■
         | 
| 418 | 
            +
            ■
         | 
| 419 | 
            +
            ■
         | 
| 420 | 
            +
            ■
         | 
| 421 | 
            +
            ■
         | 
| 422 | 
            +
            ■
         | 
| 423 | 
            +
            ■
         | 
| 424 | 
            +
            ■
         | 
| 425 | 
            +
            ■
         | 
| 426 | 
            +
            ■
         | 
| 427 | 
            +
            ■
         | 
| 428 | 
            +
            A ⊗ A
         | 
| 429 | 
            +
            m
         | 
| 430 | 
            +
            � A
         | 
| 431 | 
            +
            A K-algebra A is a graded algebra if the underlying K-module structure is graded
         | 
| 432 | 
            +
            viz. A = �
         | 
| 433 | 
            +
            n∈N0 An, where An is a K-module for all n ∈ N0 such that m (Am ⊗ An) ⊆
         | 
| 434 | 
            +
            Am+n, for all m, n ∈ N0. The graded K-algebra is connected if η : K −→ A0 is a K-algebra
         | 
| 435 | 
            +
            isomorphism.
         | 
| 436 | 
            +
            3.2. Coalgebra. The notion of a K-coalgebra is a categorical structure dual to that of a
         | 
| 437 | 
            +
            K-algebra.
         | 
| 438 | 
            +
            Definition 3.4. A K-coalgebra C is a K-module with the K-module morphisms ∆ : C −→
         | 
| 439 | 
            +
            C ⊗ C , called the comultiplication or coproduct map, and ǫ : C −→ K, called the counit
         | 
| 440 | 
            +
            map, such that the following diagrams commute.
         | 
| 441 | 
            +
            (2)
         | 
| 442 | 
            +
            C
         | 
| 443 | 
            +
            ∆
         | 
| 444 | 
            +
            �
         | 
| 445 | 
            +
            ∆
         | 
| 446 | 
            +
            �
         | 
| 447 | 
            +
            C ⊗ C
         | 
| 448 | 
            +
            ∆⊗idC
         | 
| 449 | 
            +
            �
         | 
| 450 | 
            +
            C ⊗ C
         | 
| 451 | 
            +
            idC ⊗∆
         | 
| 452 | 
            +
            � C ⊗ C ⊗ C
         | 
| 453 | 
            +
            C ⊗ C
         | 
| 454 | 
            +
            ǫ⊗idC
         | 
| 455 | 
            +
            � K ⊗ C
         | 
| 456 | 
            +
            ∼
         | 
| 457 | 
            +
            =
         | 
| 458 | 
            +
            �
         | 
| 459 | 
            +
            C
         | 
| 460 | 
            +
            ∆
         | 
| 461 | 
            +
            �❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑
         | 
| 462 | 
            +
            ∆
         | 
| 463 | 
            +
            �sssssssssssssssssss
         | 
| 464 | 
            +
            C ⊗ C
         | 
| 465 | 
            +
            idC ⊗ǫ
         | 
| 466 | 
            +
            � C ⊗ K
         | 
| 467 | 
            +
            ∼
         | 
| 468 | 
            +
            =
         | 
| 469 | 
            +
            �
         | 
| 470 | 
            +
             | 
| 471 | 
            +
            6
         | 
| 472 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 473 | 
            +
            The tuple (C , ∆, ǫ) is called a K-coalgebra.
         | 
| 474 | 
            +
            The commutative diagrams (2) imply that a K-coalgebra C must satisfy the following
         | 
| 475 | 
            +
            properties:
         | 
| 476 | 
            +
            (1) The coproduct map ∆ must be coassociative.
         | 
| 477 | 
            +
            (2) The counit map ǫ is the categorical dual to the unit map η for a K-algebra.
         | 
| 478 | 
            +
            The coalgebra C is called cocommutative if the following diagram commutes,
         | 
| 479 | 
            +
            C
         | 
| 480 | 
            +
            ∆
         | 
| 481 | 
            +
            �
         | 
| 482 | 
            +
            ∆
         | 
| 483 | 
            +
            �❑
         | 
| 484 | 
            +
            ❑
         | 
| 485 | 
            +
            ❑
         | 
| 486 | 
            +
            ❑
         | 
| 487 | 
            +
            ❑
         | 
| 488 | 
            +
            ❑
         | 
| 489 | 
            +
            ❑
         | 
| 490 | 
            +
            ❑
         | 
| 491 | 
            +
            ❑
         | 
| 492 | 
            +
            ❑
         | 
| 493 | 
            +
            ❑
         | 
| 494 | 
            +
            ❑
         | 
| 495 | 
            +
            ❑
         | 
| 496 | 
            +
            ❑
         | 
| 497 | 
            +
            ❑
         | 
| 498 | 
            +
            ❑
         | 
| 499 | 
            +
            ❑
         | 
| 500 | 
            +
            ❑
         | 
| 501 | 
            +
            ❑
         | 
| 502 | 
            +
            C ⊗ C
         | 
| 503 | 
            +
            τ
         | 
| 504 | 
            +
            � C ⊗ C
         | 
| 505 | 
            +
            where τ is the twisting morphism given in Definition 3.3. Sweedler’s notation is very useful
         | 
| 506 | 
            +
            in representing the coproduct map and is adopted in Sections 4 and 8.
         | 
| 507 | 
            +
            Definition 3.5. [Sweedler(1969)]. Given the K-coalgebra tuple (C , ∇, ǫ) and an element
         | 
| 508 | 
            +
            c ∈ C , then the Sweedler notation for the coproduct
         | 
| 509 | 
            +
            ∆(c) =
         | 
| 510 | 
            +
            �
         | 
| 511 | 
            +
            (c)
         | 
| 512 | 
            +
            c(1) ⊗ c(2),
         | 
| 513 | 
            +
            where c(1), c(2) ∈ C are the components of the tensors resulting from the coproduct of c.
         | 
| 514 | 
            +
            Next, the definition of a K-coalgebra morphism is given.
         | 
| 515 | 
            +
            Definition 3.6. Let (C , ∆, ǫ), (C ′, ∆′, ǫ′) be K-coalgebras. A map f : C −→ C ′ is called a
         | 
| 516 | 
            +
            K-coalgebra morphism provided the following diagrams commute.
         | 
| 517 | 
            +
            C
         | 
| 518 | 
            +
            ∆
         | 
| 519 | 
            +
            �
         | 
| 520 | 
            +
            f
         | 
| 521 | 
            +
            �
         | 
| 522 | 
            +
            C ⊗ C
         | 
| 523 | 
            +
            f⊗f
         | 
| 524 | 
            +
            �
         | 
| 525 | 
            +
            C ′
         | 
| 526 | 
            +
            ∆′
         | 
| 527 | 
            +
            � C ′ ⊗ C ′
         | 
| 528 | 
            +
            C
         | 
| 529 | 
            +
            ǫ
         | 
| 530 | 
            +
            �
         | 
| 531 | 
            +
            f
         | 
| 532 | 
            +
            �❊
         | 
| 533 | 
            +
            ❊
         | 
| 534 | 
            +
            ❊
         | 
| 535 | 
            +
            ❊
         | 
| 536 | 
            +
            ❊
         | 
| 537 | 
            +
            ❊
         | 
| 538 | 
            +
            ❊
         | 
| 539 | 
            +
            ❊
         | 
| 540 | 
            +
            ❊
         | 
| 541 | 
            +
            ❊
         | 
| 542 | 
            +
            ❊
         | 
| 543 | 
            +
            ❊
         | 
| 544 | 
            +
            ❊
         | 
| 545 | 
            +
            ❊
         | 
| 546 | 
            +
            ❊
         | 
| 547 | 
            +
            ❊
         | 
| 548 | 
            +
            K
         | 
| 549 | 
            +
            C ′
         | 
| 550 | 
            +
            ǫ′
         | 
| 551 | 
            +
            �②
         | 
| 552 | 
            +
            ②
         | 
| 553 | 
            +
            ②
         | 
| 554 | 
            +
            ②
         | 
| 555 | 
            +
            ②
         | 
| 556 | 
            +
            ②
         | 
| 557 | 
            +
            ②
         | 
| 558 | 
            +
            ②
         | 
| 559 | 
            +
            ②
         | 
| 560 | 
            +
            ②
         | 
| 561 | 
            +
            ②
         | 
| 562 | 
            +
            ②
         | 
| 563 | 
            +
            ��
         | 
| 564 | 
            +
            ②
         | 
| 565 | 
            +
            ②
         | 
| 566 | 
            +
            ②
         | 
| 567 | 
            +
            3.3. Bialgebra. The bialgebra structure over a commutative ring is fundamental for defining
         | 
| 568 | 
            +
            a Hopf algebra. A bialgebra is an amalgamation of the algebra and coalgebra structures such
         | 
| 569 | 
            +
            that both are compatible with each other.
         | 
| 570 | 
            +
            Definition 3.7. A bialgebra H over K is a tuple (H, m, η, ∆, ǫ) such that
         | 
| 571 | 
            +
            (1) H is a K-module.
         | 
| 572 | 
            +
            (2) (H, m, η) is a K-algebra, where m and η are the product and unit maps, respectively.
         | 
| 573 | 
            +
            (3) (H, ∆, ǫ) is a K-coalgebra, where ∆ and ǫ are the coproduct and counit maps, respec-
         | 
| 574 | 
            +
            tively.
         | 
| 575 | 
            +
            such that the following diagrams commute.
         | 
| 576 | 
            +
            (3)
         | 
| 577 | 
            +
            H ⊗ H
         | 
| 578 | 
            +
            m
         | 
| 579 | 
            +
            �
         | 
| 580 | 
            +
            ∆⊗∆
         | 
| 581 | 
            +
            �
         | 
| 582 | 
            +
            H
         | 
| 583 | 
            +
            ∆
         | 
| 584 | 
            +
            � H ⊗ H
         | 
| 585 | 
            +
            H ⊗ H ⊗ H ⊗ H
         | 
| 586 | 
            +
            idH⊗τ⊗idH
         | 
| 587 | 
            +
            � H ⊗ H ⊗ H ⊗ H
         | 
| 588 | 
            +
            m⊗m
         | 
| 589 | 
            +
            �
         | 
| 590 | 
            +
             | 
| 591 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 592 | 
            +
            7
         | 
| 593 | 
            +
            (4)
         | 
| 594 | 
            +
            H ⊗ H
         | 
| 595 | 
            +
            m
         | 
| 596 | 
            +
            �
         | 
| 597 | 
            +
            ǫ⊗ǫ
         | 
| 598 | 
            +
            �▼
         | 
| 599 | 
            +
            ▼
         | 
| 600 | 
            +
            ▼
         | 
| 601 | 
            +
            ▼
         | 
| 602 | 
            +
            ▼
         | 
| 603 | 
            +
            ▼
         | 
| 604 | 
            +
            ▼
         | 
| 605 | 
            +
            ▼
         | 
| 606 | 
            +
            ▼
         | 
| 607 | 
            +
            ▼
         | 
| 608 | 
            +
            ▼
         | 
| 609 | 
            +
            ▼
         | 
| 610 | 
            +
            ▼
         | 
| 611 | 
            +
            ▼
         | 
| 612 | 
            +
            ▼
         | 
| 613 | 
            +
            ▼
         | 
| 614 | 
            +
            ▼
         | 
| 615 | 
            +
            ▼
         | 
| 616 | 
            +
            ▼
         | 
| 617 | 
            +
            ▼
         | 
| 618 | 
            +
            ▼
         | 
| 619 | 
            +
            H
         | 
| 620 | 
            +
            ǫ
         | 
| 621 | 
            +
            �
         | 
| 622 | 
            +
            K ∼= K ⊗ K
         | 
| 623 | 
            +
            η⊗η
         | 
| 624 | 
            +
            �qqqqqqqqqqqqqqqqqqqqq
         | 
| 625 | 
            +
            η
         | 
| 626 | 
            +
            �
         | 
| 627 | 
            +
            H ⊗ H
         | 
| 628 | 
            +
            H
         | 
| 629 | 
            +
            ∆
         | 
| 630 | 
            +
            �
         | 
| 631 | 
            +
            (5)
         | 
| 632 | 
            +
            H
         | 
| 633 | 
            +
            ǫ
         | 
| 634 | 
            +
            �❊
         | 
| 635 | 
            +
            ❊
         | 
| 636 | 
            +
            ❊
         | 
| 637 | 
            +
            ❊
         | 
| 638 | 
            +
            ❊
         | 
| 639 | 
            +
            ❊
         | 
| 640 | 
            +
            ❊
         | 
| 641 | 
            +
            ❊
         | 
| 642 | 
            +
            ❊
         | 
| 643 | 
            +
            ❊
         | 
| 644 | 
            +
            ❊
         | 
| 645 | 
            +
            ❊
         | 
| 646 | 
            +
            ❊
         | 
| 647 | 
            +
            ❊
         | 
| 648 | 
            +
            ❊
         | 
| 649 | 
            +
            ❊
         | 
| 650 | 
            +
            K
         | 
| 651 | 
            +
            η
         | 
| 652 | 
            +
            �②
         | 
| 653 | 
            +
            ②
         | 
| 654 | 
            +
            ②
         | 
| 655 | 
            +
            ②
         | 
| 656 | 
            +
            ②
         | 
| 657 | 
            +
            ②
         | 
| 658 | 
            +
            ②
         | 
| 659 | 
            +
            ②
         | 
| 660 | 
            +
            ②
         | 
| 661 | 
            +
            ②
         | 
| 662 | 
            +
            ②
         | 
| 663 | 
            +
            ②
         | 
| 664 | 
            +
            ②
         | 
| 665 | 
            +
            ②
         | 
| 666 | 
            +
            ②
         | 
| 667 | 
            +
            ②
         | 
| 668 | 
            +
            idK
         | 
| 669 | 
            +
            � K
         | 
| 670 | 
            +
            The diagrams (3) and (4) state that the product map m and the unit map η are K-
         | 
| 671 | 
            +
            coalgebra morphisms, while the coproduct map ∆ and the counit map ǫ are K-algebra
         | 
| 672 | 
            +
            morphisms. Diagram (5) describes that the unit map η is a section of the counit map ǫ in
         | 
| 673 | 
            +
            the category of K-modules.
         | 
| 674 | 
            +
            3.4. Hopf Algebra. Hopf algebras are an important class of bialgebras. A Hopf algebra is
         | 
| 675 | 
            +
            a bialgebra equipped with a particular K-linear map called antipode.
         | 
| 676 | 
            +
            Definition 3.8. A Hopf algebra H over K is a tuple (H, m, η, ∆, ǫ, S) such that the following
         | 
| 677 | 
            +
            conditions are satisfied:
         | 
| 678 | 
            +
            (1) (H, m, η, ∆, ǫ) is a K-bialgebra.
         | 
| 679 | 
            +
            (2) S : H −→ H is a K-linear map such that the following diagram commutes.
         | 
| 680 | 
            +
            (6)
         | 
| 681 | 
            +
            H ⊗ H
         | 
| 682 | 
            +
            idH⊗S
         | 
| 683 | 
            +
            � H ⊗ H
         | 
| 684 | 
            +
            m
         | 
| 685 | 
            +
            �❍
         | 
| 686 | 
            +
            ❍
         | 
| 687 | 
            +
            ❍
         | 
| 688 | 
            +
            ❍
         | 
| 689 | 
            +
            ❍
         | 
| 690 | 
            +
            ❍
         | 
| 691 | 
            +
            ❍
         | 
| 692 | 
            +
            ❍
         | 
| 693 | 
            +
            ❍
         | 
| 694 | 
            +
            ❍
         | 
| 695 | 
            +
            ❍
         | 
| 696 | 
            +
            ❍
         | 
| 697 | 
            +
            ❍
         | 
| 698 | 
            +
            ❍
         | 
| 699 | 
            +
            ❍
         | 
| 700 | 
            +
            ❍
         | 
| 701 | 
            +
            ❍
         | 
| 702 | 
            +
            ❍
         | 
| 703 | 
            +
            H
         | 
| 704 | 
            +
            ǫ
         | 
| 705 | 
            +
            �
         | 
| 706 | 
            +
            ∆
         | 
| 707 | 
            +
            �✈
         | 
| 708 | 
            +
            ✈
         | 
| 709 | 
            +
            ✈
         | 
| 710 | 
            +
            ✈
         | 
| 711 | 
            +
            ✈
         | 
| 712 | 
            +
            ✈
         | 
| 713 | 
            +
            ✈
         | 
| 714 | 
            +
            ✈
         | 
| 715 | 
            +
            ✈
         | 
| 716 | 
            +
            ✈
         | 
| 717 | 
            +
            ✈
         | 
| 718 | 
            +
            ✈
         | 
| 719 | 
            +
            ✈
         | 
| 720 | 
            +
            ✈
         | 
| 721 | 
            +
            ✈
         | 
| 722 | 
            +
            ✈
         | 
| 723 | 
            +
            ✈
         | 
| 724 | 
            +
            ✈
         | 
| 725 | 
            +
            ∆
         | 
| 726 | 
            +
            �❍
         | 
| 727 | 
            +
            ❍
         | 
| 728 | 
            +
            ❍
         | 
| 729 | 
            +
            ❍
         | 
| 730 | 
            +
            ❍
         | 
| 731 | 
            +
            ❍
         | 
| 732 | 
            +
            ❍
         | 
| 733 | 
            +
            ❍
         | 
| 734 | 
            +
            ❍
         | 
| 735 | 
            +
            ❍
         | 
| 736 | 
            +
            ❍
         | 
| 737 | 
            +
            ❍
         | 
| 738 | 
            +
            ❍
         | 
| 739 | 
            +
            ❍
         | 
| 740 | 
            +
            ❍
         | 
| 741 | 
            +
            ❍
         | 
| 742 | 
            +
            ❍
         | 
| 743 | 
            +
            ❍
         | 
| 744 | 
            +
            K
         | 
| 745 | 
            +
            η
         | 
| 746 | 
            +
            � H
         | 
| 747 | 
            +
            H ⊗ H
         | 
| 748 | 
            +
            S⊗idH
         | 
| 749 | 
            +
            � H ⊗ H
         | 
| 750 | 
            +
            m
         | 
| 751 | 
            +
            �✈
         | 
| 752 | 
            +
            ✈
         | 
| 753 | 
            +
            ✈
         | 
| 754 | 
            +
            ✈
         | 
| 755 | 
            +
            ✈
         | 
| 756 | 
            +
            ✈
         | 
| 757 | 
            +
            ✈
         | 
| 758 | 
            +
            ✈
         | 
| 759 | 
            +
            ✈
         | 
| 760 | 
            +
            ✈
         | 
| 761 | 
            +
            ✈
         | 
| 762 | 
            +
            ✈
         | 
| 763 | 
            +
            ✈
         | 
| 764 | 
            +
            ✈
         | 
| 765 | 
            +
            ✈
         | 
| 766 | 
            +
            ✈
         | 
| 767 | 
            +
            ✈
         | 
| 768 | 
            +
            ✈
         | 
| 769 | 
            +
            An element a ∈ H is called group-like if ∆(a) = a ⊗ a and thus a̸∈ker(ǫ), where ker(.)
         | 
| 770 | 
            +
            represents the kernel of a K-module map. A graded Hopf algebra H = �
         | 
| 771 | 
            +
            n∈N0 Hn is connected
         | 
| 772 | 
            +
            if and only if H0 ∼= Kη(1K) as K-modules.
         | 
| 773 | 
            +
            Equivalently, a graded Hopf algebra H is
         | 
| 774 | 
            +
            connected if and only if H+ := �
         | 
| 775 | 
            +
            k≥1 Hk is isomorphic to ker(ǫ) as K-modules viz. η◦ǫ = idH0
         | 
| 776 | 
            +
            and zero otherwise. For simplicity denote m (a, b) := ab, for all a, b, ∈ H. Using Sweedler’s
         | 
| 777 | 
            +
             | 
| 778 | 
            +
            8
         | 
| 779 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 780 | 
            +
            notation, diagram (6) implies that for all c ∈ H,
         | 
| 781 | 
            +
            �
         | 
| 782 | 
            +
            (c)
         | 
| 783 | 
            +
            S
         | 
| 784 | 
            +
            �
         | 
| 785 | 
            +
            c(1)
         | 
| 786 | 
            +
            �
         | 
| 787 | 
            +
            c(2) =
         | 
| 788 | 
            +
            �
         | 
| 789 | 
            +
            (c)
         | 
| 790 | 
            +
            c(1)S
         | 
| 791 | 
            +
            �
         | 
| 792 | 
            +
            c(2)
         | 
| 793 | 
            +
            �
         | 
| 794 | 
            +
            = ǫ (c) 1H ,
         | 
| 795 | 
            +
            where 1H is the multiplicative unit of the Hopf algebra H. The computation of the antipode
         | 
| 796 | 
            +
            of an element c becomes easier when the algebra structure of H is graded and connected.
         | 
| 797 | 
            +
            Theorem 3.1. If the Hopf algebra H is graded and connected, then the antipode can be
         | 
| 798 | 
            +
            computed for any a ∈ H+ := �
         | 
| 799 | 
            +
            k≥1 Hk as
         | 
| 800 | 
            +
            S(a) = −a −
         | 
| 801 | 
            +
            �
         | 
| 802 | 
            +
            a′
         | 
| 803 | 
            +
            (1)S(a′
         | 
| 804 | 
            +
            (2)),
         | 
| 805 | 
            +
            where the summation is taken over all components of the reduced coproduct ∆′ defined as:
         | 
| 806 | 
            +
            ∆′ (a) := ∆ (a) − a ⊗ η (1K) − η (1K) ⊗ a.
         | 
| 807 | 
            +
            4. Unshuffle Hopf algebra and its Coaction
         | 
| 808 | 
            +
            The goal of this section is to explain and illustrate the computational framework to
         | 
| 809 | 
            +
            compute the shuffle product of two series and the shuffle inverse using the coordinate
         | 
| 810 | 
            +
            maps of the series. The framework is well-developed in the literature [Foissy(2015)] and
         | 
| 811 | 
            +
            was utilized in study of interconnections of Chen–Fliess series [Venkatesh & Gray(2022),
         | 
| 812 | 
            +
            Venkatesh & Gray(2021), Venkatesh & Gray (2020), Gray, et al.(2014b), Gray, et al.(2014a)].
         | 
| 813 | 
            +
            4.1. Unshuffle Hopf Algebra. We construct a dual Hopf algebra reflecting the group
         | 
| 814 | 
            +
            structure of M
         | 
| 815 | 
            +
            as defined in Section 2. The antipode constructed in the Hopf algebra
         | 
| 816 | 
            +
            provides a framework for computing the shuffle inverse of purely improper series c.
         | 
| 817 | 
            +
            Let the set Wb ⊂ Rm⟨⟨X⟩⟩∗ (dual module of Rm⟨⟨X⟩⟩) be defined as the collection of
         | 
| 818 | 
            +
            coordinate maps:
         | 
| 819 | 
            +
            Wb = {aη : aη(c) = (c, η), η ∈ X∗, c ∈ Rm⟨⟨X⟩⟩}.
         | 
| 820 | 
            +
            Define W to be the free Rm-module spanned by the set Wb. Let H
         | 
| 821 | 
            +
            denote the reduced
         | 
| 822 | 
            +
            symmetric algebra generated by the module W. The Rm-algebra H
         | 
| 823 | 
            +
            can equivalently be
         | 
| 824 | 
            +
            seen as the polynomial algebra of coordinate maps (corresponding to non-empty words) of
         | 
| 825 | 
            +
            Rm⟨⟨X⟩⟩. The unit map ξ : Rm −→ H
         | 
| 826 | 
            +
            is defined by ξ( ll) = a∅. Observe that a∅ : c �→ ll,
         | 
| 827 | 
            +
            for all c ∈ M
         | 
| 828 | 
            +
            . By construction, H
         | 
| 829 | 
            +
            is an Rm-associative, commutative and unital algebra
         | 
| 830 | 
            +
            with addition and scalar multiplication defined, respectively, as
         | 
| 831 | 
            +
            (aη + aζ)(c) = aη(c) + aζ(c)
         | 
| 832 | 
            +
            (kaη)(c) = k(aη(c)),
         | 
| 833 | 
            +
            where c ∈ Rm⟨⟨X⟩⟩ and k ∈ Rm, and product
         | 
| 834 | 
            +
            m(aη, aζ)(c) = aη(c).aζ(c),
         | 
| 835 | 
            +
            for c ∈ M
         | 
| 836 | 
            +
            . Then H
         | 
| 837 | 
            +
            is equipped with a coproduct ˆ∆
         | 
| 838 | 
            +
            : H
         | 
| 839 | 
            +
            −→ H
         | 
| 840 | 
            +
            � H
         | 
| 841 | 
            +
            such that
         | 
| 842 | 
            +
            ˆ∆
         | 
| 843 | 
            +
            aη(c, d) = (c
         | 
| 844 | 
            +
            d, η), for all c, d ∈ M
         | 
| 845 | 
            +
            and η ∈ X∗. The counit map ǫ : H
         | 
| 846 | 
            +
            −→ Rm is
         | 
| 847 | 
            +
            defined as
         | 
| 848 | 
            +
            ǫ(h) =
         | 
| 849 | 
            +
            � ll : h = a∅
         | 
| 850 | 
            +
            0 : otherwise.
         | 
| 851 | 
            +
            Since the shuffle product is associative and commutative, thus dually the coproduct ˆ∆
         | 
| 852 | 
            +
            is
         | 
| 853 | 
            +
            coassociative and cocommutative. Therefore, (H
         | 
| 854 | 
            +
            , m, ξ, ˆ∆
         | 
| 855 | 
            +
            , ǫ) forms a Rm-bialgebra. The
         | 
| 856 | 
            +
             | 
| 857 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 858 | 
            +
            9
         | 
| 859 | 
            +
            following lemma is vital in the framework for computing both shuffle product and dynamic
         | 
| 860 | 
            +
            feedback group product. Define a collection of linear endomorphisms {θi}m
         | 
| 861 | 
            +
            i=0 on W
         | 
| 862 | 
            +
            θi : W −→ W
         | 
| 863 | 
            +
            aη �−→ axiη,
         | 
| 864 | 
            +
            for all xi ∈ X, η ∈ X∗. Thus θi (aη) (c) = aη
         | 
| 865 | 
            +
            �
         | 
| 866 | 
            +
            x−1
         | 
| 867 | 
            +
            i
         | 
| 868 | 
            +
            (c)
         | 
| 869 | 
            +
            �
         | 
| 870 | 
            +
            .
         | 
| 871 | 
            +
            The coproduct ˆ∆
         | 
| 872 | 
            +
            can be recursively constructed as defined in the following proposition.
         | 
| 873 | 
            +
            Proposition 4.1. [Foissy(2015)] On the module W
         | 
| 874 | 
            +
            ˆ∆
         | 
| 875 | 
            +
            ◦ θk = (θk ⊗ id + id ⊗ θk) ◦ ˆ∆
         | 
| 876 | 
            +
            ,
         | 
| 877 | 
            +
            for all i = 1, 2, . . . , m and k = 0, 1, . . . , m with base case being ˆ∆
         | 
| 878 | 
            +
            a∅ = a∅ ⊗ a∅.
         | 
| 879 | 
            +
            Proposition 4.1 infers that the maps θi, for i = 1, 2, . . . , m, are coderivations on the
         | 
| 880 | 
            +
            underlying coalgebra of H
         | 
| 881 | 
            +
            .
         | 
| 882 | 
            +
            We note that the unshuffle coproduct ˆ∆
         | 
| 883 | 
            +
            was utilized in the design of an algorithmic
         | 
| 884 | 
            +
            framework for computation of Wiener-Fliess composition product and subsequently additive
         | 
| 885 | 
            +
            static feedback product [Venkatesh & Gray(2021), Venkatesh & Gray(2022), Venkatesh(2021)]
         | 
| 886 | 
            +
            and also in the computation of shuffle-rational series from its representation [Venkatesh & Gray (2020),
         | 
| 887 | 
            +
            Venkatesh(2021)]. Moreover, the unshuffle coproduct was also crucial in the computational
         | 
| 888 | 
            +
            framework for the multivariate additive output feedback [Gray, et al.(2014a), Gray, et al.(2014b)]
         | 
| 889 | 
            +
            and for SISO affine output feedback [Gray & Ebrahimi-Fard(2017)].
         | 
| 890 | 
            +
            Let {πi}m
         | 
| 891 | 
            +
            i=1 be the collection of co-ordinate projection maps on the module W defined as
         | 
| 892 | 
            +
            ai
         | 
| 893 | 
            +
            η(c) := πi(aη)(c) = (c, η)i = (ci, η),
         | 
| 894 | 
            +
            for all η ∈ X∗. Thus, define the following notation
         | 
| 895 | 
            +
            ˆ∆j ai
         | 
| 896 | 
            +
            η := (πi ⊗ πj) ◦ ˆ∆
         | 
| 897 | 
            +
            aη.
         | 
| 898 | 
            +
            Note that the projection maps {πi}m
         | 
| 899 | 
            +
            i=1 commute with the maps {θj}m
         | 
| 900 | 
            +
            j=0 viz. θi
         | 
| 901 | 
            +
            �
         | 
| 902 | 
            +
            aj
         | 
| 903 | 
            +
            η
         | 
| 904 | 
            +
            �
         | 
| 905 | 
            +
            = aj
         | 
| 906 | 
            +
            xiη.
         | 
| 907 | 
            +
            The significance of these notations are well-reflected in the computational framework in
         | 
| 908 | 
            +
            Section 8. The following example is to demonstrate the result of Proposition 4.1 for a few
         | 
| 909 | 
            +
            words.
         | 
| 910 | 
            +
            Example 4.1. A few examples of the computation of deshuffle coproduct ˆ∆
         | 
| 911 | 
            +
            on W (akin
         | 
| 912 | 
            +
            to Example 4.3) using Proposition 4.1 are given as follows(indices i = 1, 2, . . . , m and k, s =
         | 
| 913 | 
            +
            0, 1, . . . , m):
         | 
| 914 | 
            +
            ˆ∆j ai
         | 
| 915 | 
            +
            xk = ai
         | 
| 916 | 
            +
            xk ⊗ aj
         | 
| 917 | 
            +
            ∅ + ai
         | 
| 918 | 
            +
            ∅ ⊗ aj
         | 
| 919 | 
            +
            xk.
         | 
| 920 | 
            +
            ˆ∆j ai
         | 
| 921 | 
            +
            xkxk = ai
         | 
| 922 | 
            +
            xkxk ⊗ aj
         | 
| 923 | 
            +
            ∅ + 2ai
         | 
| 924 | 
            +
            xk ⊗ aj
         | 
| 925 | 
            +
            xk + ai
         | 
| 926 | 
            +
            ∅ ⊗ aj
         | 
| 927 | 
            +
            xkxk.
         | 
| 928 | 
            +
            ˆ∆j ai
         | 
| 929 | 
            +
            xkxs = ai
         | 
| 930 | 
            +
            xkxs ⊗ aj
         | 
| 931 | 
            +
            ∅ + ai
         | 
| 932 | 
            +
            xk ⊗ aj
         | 
| 933 | 
            +
            xs + ai
         | 
| 934 | 
            +
            xs ⊗ aj
         | 
| 935 | 
            +
            xk + ai
         | 
| 936 | 
            +
            ∅ ⊗ aj
         | 
| 937 | 
            +
            xkxs.
         | 
| 938 | 
            +
            The connected Rm-bialgebra H
         | 
| 939 | 
            +
            is endowed with an antipode map S
         | 
| 940 | 
            +
            given as:
         | 
| 941 | 
            +
            S
         | 
| 942 | 
            +
            : H
         | 
| 943 | 
            +
            −→ H
         | 
| 944 | 
            +
            aη �→ S
         | 
| 945 | 
            +
            aη
         | 
| 946 | 
            +
            such that S
         | 
| 947 | 
            +
            aη (c) = (c
         | 
| 948 | 
            +
            −1, η), for η ∈ X∗, c ∈ M
         | 
| 949 | 
            +
            .
         | 
| 950 | 
            +
             | 
| 951 | 
            +
            10
         | 
| 952 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 953 | 
            +
            4.2. Gradation of Bialgebra H
         | 
| 954 | 
            +
            . The Hopf algebra H
         | 
| 955 | 
            +
            can be equipped with a grading
         | 
| 956 | 
            +
            such that it is connected and all its homogeneous components are finite-dimensional.
         | 
| 957 | 
            +
            Definition 4.1. Given η ∈ X+, define the degree of aη as deg (aη) = |η|.
         | 
| 958 | 
            +
            (1) Define gradation on the Rm-module W viz.
         | 
| 959 | 
            +
            W =
         | 
| 960 | 
            +
            �
         | 
| 961 | 
            +
            k≥1
         | 
| 962 | 
            +
            Wk,
         | 
| 963 | 
            +
            where Wk is the free Rm-module spanned by the aη of deg (aη) = k.
         | 
| 964 | 
            +
            (2) The gradation on the module W induces a graded structure on the algebra H
         | 
| 965 | 
            +
            as
         | 
| 966 | 
            +
            H
         | 
| 967 | 
            +
            =
         | 
| 968 | 
            +
            �
         | 
| 969 | 
            +
            n∈N0
         | 
| 970 | 
            +
            ˆHn,
         | 
| 971 | 
            +
            with ˆH0 ∼= Rm in the category of Rm-modules.
         | 
| 972 | 
            +
            The following proposition asserts that the above gradation is connected and all its homo-
         | 
| 973 | 
            +
            geneous components are finite-dimensional.
         | 
| 974 | 
            +
            Proposition 4.2. Given the gradation for the Hopf algebra H
         | 
| 975 | 
            +
            ,
         | 
| 976 | 
            +
            (1) H
         | 
| 977 | 
            +
            is a graded and connected Hopf algebra viz.
         | 
| 978 | 
            +
            ˆ∆
         | 
| 979 | 
            +
            �
         | 
| 980 | 
            +
            ˆHn
         | 
| 981 | 
            +
            �
         | 
| 982 | 
            +
            ⊆
         | 
| 983 | 
            +
            �
         | 
| 984 | 
            +
            i+j=n
         | 
| 985 | 
            +
            i,j≥0
         | 
| 986 | 
            +
            ˆHi ⊗ ˆHj.
         | 
| 987 | 
            +
            (2) For all k: define wk = dim (Wk) and FW = �
         | 
| 988 | 
            +
            k≥1 wkZk is the geometric series given
         | 
| 989 | 
            +
            by
         | 
| 990 | 
            +
            FW =
         | 
| 991 | 
            +
            1
         | 
| 992 | 
            +
            1 − mZ ,
         | 
| 993 | 
            +
            where m = |X| and for all k ≥ 1:
         | 
| 994 | 
            +
            wk = dim (Wk) = mk.
         | 
| 995 | 
            +
            (3) Define F ˆ
         | 
| 996 | 
            +
            H = �
         | 
| 997 | 
            +
            n≥1 hnZn where hn = dim( ˆHn) then
         | 
| 998 | 
            +
            F ˆ
         | 
| 999 | 
            +
            H =
         | 
| 1000 | 
            +
            ∞
         | 
| 1001 | 
            +
            �
         | 
| 1002 | 
            +
            k=1
         | 
| 1003 | 
            +
            1
         | 
| 1004 | 
            +
            (1 − Zk)wk .
         | 
| 1005 | 
            +
            Proof:
         | 
| 1006 | 
            +
            (1) The Hopf algebra H
         | 
| 1007 | 
            +
            follows from the fact that if γ(̸= η, ζ) ∈ supp(η
         | 
| 1008 | 
            +
            ζ) then
         | 
| 1009 | 
            +
            deg (γ) = |γ| = |η| + |ζ| = deg (η) + deg (ζ) ,
         | 
| 1010 | 
            +
            for all η, ζ, γ ∈ X∗.
         | 
| 1011 | 
            +
            (2) Define the formal power series
         | 
| 1012 | 
            +
            F(Z0, Z1, . . . , Zm) =
         | 
| 1013 | 
            +
            �
         | 
| 1014 | 
            +
            k≥1
         | 
| 1015 | 
            +
            �
         | 
| 1016 | 
            +
            i0,i1,...,im≥0
         | 
| 1017 | 
            +
            i0+i1+···+im=k
         | 
| 1018 | 
            +
            #{η : |η|xj = ij ∀ j = 0, 1, 2, . . . , m}Zi0
         | 
| 1019 | 
            +
            0 Zi1
         | 
| 1020 | 
            +
            1 · · · Zim
         | 
| 1021 | 
            +
            m
         | 
| 1022 | 
            +
            =
         | 
| 1023 | 
            +
            (Z0 + Z1 + · · · + Zm)
         | 
| 1024 | 
            +
            1 − (Z0 + Z1 + · · · + Zm).
         | 
| 1025 | 
            +
             | 
| 1026 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 1027 | 
            +
            11
         | 
| 1028 | 
            +
            Since each letter contributes equally to the degree (viz. length), thus
         | 
| 1029 | 
            +
            FW = F(Z, Z, . . ., Z) =
         | 
| 1030 | 
            +
            mZ
         | 
| 1031 | 
            +
            1 − mZ .
         | 
| 1032 | 
            +
            (3) The proposition follows from the item 2 as ˆH is the symmetric algebra generated by
         | 
| 1033 | 
            +
            the Rm-module W.
         | 
| 1034 | 
            +
            Table 1. Dimensions of the homogeneous components of module W and H
         | 
| 1035 | 
            +
            (when m = 2)
         | 
| 1036 | 
            +
            k
         | 
| 1037 | 
            +
            0
         | 
| 1038 | 
            +
            1
         | 
| 1039 | 
            +
            2
         | 
| 1040 | 
            +
            3
         | 
| 1041 | 
            +
            4
         | 
| 1042 | 
            +
            5
         | 
| 1043 | 
            +
            6
         | 
| 1044 | 
            +
            7
         | 
| 1045 | 
            +
            8
         | 
| 1046 | 
            +
            9
         | 
| 1047 | 
            +
            10
         | 
| 1048 | 
            +
            dim (Wk)
         | 
| 1049 | 
            +
            1
         | 
| 1050 | 
            +
            2
         | 
| 1051 | 
            +
            4
         | 
| 1052 | 
            +
            8
         | 
| 1053 | 
            +
            16
         | 
| 1054 | 
            +
            32
         | 
| 1055 | 
            +
            64
         | 
| 1056 | 
            +
            128
         | 
| 1057 | 
            +
            256
         | 
| 1058 | 
            +
            512
         | 
| 1059 | 
            +
            1024
         | 
| 1060 | 
            +
            dim( ˆHk)
         | 
| 1061 | 
            +
            1
         | 
| 1062 | 
            +
            2
         | 
| 1063 | 
            +
            7
         | 
| 1064 | 
            +
            20
         | 
| 1065 | 
            +
            59
         | 
| 1066 | 
            +
            162
         | 
| 1067 | 
            +
            449
         | 
| 1068 | 
            +
            1200
         | 
| 1069 | 
            +
            3194
         | 
| 1070 | 
            +
            8348
         | 
| 1071 | 
            +
            21646
         | 
| 1072 | 
            +
            . . .
         | 
| 1073 | 
            +
            Example 4.2. The dimensions of the homogeneous components of the graded module W
         | 
| 1074 | 
            +
            (up to k = 10) and the graded algebra H
         | 
| 1075 | 
            +
            for m = 2 viz when X = {x0, x1} is tabulated in
         | 
| 1076 | 
            +
            Table 1.
         | 
| 1077 | 
            +
            The sequence {dim( ˆHk)}k∈N0 is the sequence A034899 in [OEIS(2022)] which corresponds
         | 
| 1078 | 
            +
            to the number of multisets of binary words of total length n.
         | 
| 1079 | 
            +
            4.3. Coaction of H
         | 
| 1080 | 
            +
            . The subsection explains the coaction of the Hopf algebra H
         | 
| 1081 | 
            +
            (4.1)
         | 
| 1082 | 
            +
            on the algebra of coordinate functions. It is utilized subsequently to develop an algorithm to
         | 
| 1083 | 
            +
            compute the multiplicative mixed composition product explained in Section 5.2 and dynamic
         | 
| 1084 | 
            +
            feedback product as defined in Theorem 6.2. Let W to be the Rm-module as described in
         | 
| 1085 | 
            +
            Section 4.1. Let S+ (W) denote the reduced symmetric algebra generated by the module W.
         | 
| 1086 | 
            +
            The non-unital Rm-algebra S+(W) are equivalently the polynomials without constant term
         | 
| 1087 | 
            +
            of coordinate maps of Rm⟨⟨X⟩⟩. By construction S+(W) has a non-unital Rm-associative,
         | 
| 1088 | 
            +
            commutative algebra structure with addition, scalar multiplication and product defined,
         | 
| 1089 | 
            +
            respectively, as
         | 
| 1090 | 
            +
            (aη + aζ)(c) = aη(c) + aζ(c)
         | 
| 1091 | 
            +
            (kaη)(c) = k(aη(c))
         | 
| 1092 | 
            +
            where c ∈ Rm⟨⟨X⟩⟩, and
         | 
| 1093 | 
            +
            m(aη, aζ)(c) = aη(c).aζ(c),
         | 
| 1094 | 
            +
            where c ∈ M
         | 
| 1095 | 
            +
            . The Rm-algebra S+(W) is isomorphic to the algebra structure of H
         | 
| 1096 | 
            +
            with
         | 
| 1097 | 
            +
            forgetting of the unit map ξ. The right coaction map ρ
         | 
| 1098 | 
            +
            : S+ (W) −→ S+ (W) ⊗ H
         | 
| 1099 | 
            +
            is
         | 
| 1100 | 
            +
            recursively defined on the module V as given by the following proposition.
         | 
| 1101 | 
            +
            Proposition 4.3. For all i = 0, 1, 2, . . . , m :
         | 
| 1102 | 
            +
            ρ
         | 
| 1103 | 
            +
            ◦ θi = (θi ⊗ id + id ⊗ θi) ◦ ρ
         | 
| 1104 | 
            +
            ,
         | 
| 1105 | 
            +
            with base case being ρ
         | 
| 1106 | 
            +
            a∅ = a∅ ⊗ a∅.
         | 
| 1107 | 
            +
            Proposition 4.3 might appear as repetition of Proposition 4.1. It is vital to note that
         | 
| 1108 | 
            +
            Proposition 4.1 is for defining the coproduct of Hopf algebra H
         | 
| 1109 | 
            +
            , where a∅ is the unit
         | 
| 1110 | 
            +
            element. Observe that,
         | 
| 1111 | 
            +
            ρ
         | 
| 1112 | 
            +
            ai
         | 
| 1113 | 
            +
            η(c, d) = ai
         | 
| 1114 | 
            +
            η(c
         | 
| 1115 | 
            +
            d),
         | 
| 1116 | 
            +
             | 
| 1117 | 
            +
            12
         | 
| 1118 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 1119 | 
            +
            where c ∈ R⟨⟨X⟩⟩ (not necessarily in M
         | 
| 1120 | 
            +
            ) and d ∈ M
         | 
| 1121 | 
            +
            .
         | 
| 1122 | 
            +
            The coaction ρ
         | 
| 1123 | 
            +
            thus is a
         | 
| 1124 | 
            +
            corepresentation of the Hopf algebra H
         | 
| 1125 | 
            +
            on the algebra S+ (W) or equivalently, ρ
         | 
| 1126 | 
            +
            makes
         | 
| 1127 | 
            +
            S+ (W), a H
         | 
| 1128 | 
            +
            -algebra. Let {πi}m
         | 
| 1129 | 
            +
            i=1 be the collection of co-ordinate projection maps on the
         | 
| 1130 | 
            +
            module W defined as
         | 
| 1131 | 
            +
            ai
         | 
| 1132 | 
            +
            η(c) := πi(aη)(c) = (c, η)i = (ci, η),
         | 
| 1133 | 
            +
            for all η ∈ X∗ and thus the following notation is well-defined,
         | 
| 1134 | 
            +
            ρj ai
         | 
| 1135 | 
            +
            η := (πi ⊗ πj) ◦ ρ
         | 
| 1136 | 
            +
            aη.
         | 
| 1137 | 
            +
            These notations are very much utilized in developing computational framework for the
         | 
| 1138 | 
            +
            multiplicative mixed composition product as discussed in Section 8.
         | 
| 1139 | 
            +
            Corollary 4.1. If n ∈ N0, then for all i = 0, 1, 2, . . ., m and j, k = 1, 2, . . . , m (defining
         | 
| 1140 | 
            +
            x0
         | 
| 1141 | 
            +
            j := ∅):
         | 
| 1142 | 
            +
            ρj ak
         | 
| 1143 | 
            +
            xin =
         | 
| 1144 | 
            +
            n
         | 
| 1145 | 
            +
            �
         | 
| 1146 | 
            +
            r=0
         | 
| 1147 | 
            +
            �n
         | 
| 1148 | 
            +
            r
         | 
| 1149 | 
            +
            �
         | 
| 1150 | 
            +
            ak
         | 
| 1151 | 
            +
            xir ⊗ aj
         | 
| 1152 | 
            +
            xin−r .
         | 
| 1153 | 
            +
            Proof: The statement is proved by induction on n ∈ N0. The base case (n = 0) follows from
         | 
| 1154 | 
            +
            Proposition 4.3. Assume the statement is true for n = p − 1, then
         | 
| 1155 | 
            +
            ρj ak
         | 
| 1156 | 
            +
            xip = ρj ◦ θiak
         | 
| 1157 | 
            +
            xip−1
         | 
| 1158 | 
            +
            = (θi ⊗ id + id ⊗ θi) ◦ ∆j ak
         | 
| 1159 | 
            +
            xip−1.
         | 
| 1160 | 
            +
            Using the induction hypothesis,
         | 
| 1161 | 
            +
            ρj ak
         | 
| 1162 | 
            +
            xip = (θi ⊗ id + id ⊗ θi)
         | 
| 1163 | 
            +
            �p−1
         | 
| 1164 | 
            +
            �
         | 
| 1165 | 
            +
            r=0
         | 
| 1166 | 
            +
            �p − 1
         | 
| 1167 | 
            +
            r
         | 
| 1168 | 
            +
            �
         | 
| 1169 | 
            +
            ak
         | 
| 1170 | 
            +
            xir ⊗ aj
         | 
| 1171 | 
            +
            xip−1−r
         | 
| 1172 | 
            +
            �
         | 
| 1173 | 
            +
            =
         | 
| 1174 | 
            +
            p
         | 
| 1175 | 
            +
            �
         | 
| 1176 | 
            +
            r=1
         | 
| 1177 | 
            +
            �p − 1
         | 
| 1178 | 
            +
            r − 1
         | 
| 1179 | 
            +
            �
         | 
| 1180 | 
            +
            ak
         | 
| 1181 | 
            +
            xir ⊗ aj
         | 
| 1182 | 
            +
            xip−r +
         | 
| 1183 | 
            +
            p−1
         | 
| 1184 | 
            +
            �
         | 
| 1185 | 
            +
            r=0
         | 
| 1186 | 
            +
            �p − 1
         | 
| 1187 | 
            +
            r
         | 
| 1188 | 
            +
            �
         | 
| 1189 | 
            +
            ak
         | 
| 1190 | 
            +
            xir ⊗ aj
         | 
| 1191 | 
            +
            xip−r.
         | 
| 1192 | 
            +
            =
         | 
| 1193 | 
            +
            p
         | 
| 1194 | 
            +
            �
         | 
| 1195 | 
            +
            r=0
         | 
| 1196 | 
            +
            �n
         | 
| 1197 | 
            +
            r
         | 
| 1198 | 
            +
            �
         | 
| 1199 | 
            +
            ak
         | 
| 1200 | 
            +
            xir ⊗ aj
         | 
| 1201 | 
            +
            xip−r.
         | 
| 1202 | 
            +
            Since the S+ (W) and H
         | 
| 1203 | 
            +
            are isomorphic as Rm-modules, the following lemma states the
         | 
| 1204 | 
            +
            coaction of H
         | 
| 1205 | 
            +
            on S+ (W) and the unshuffle coproduct coincide when the evaluation of
         | 
| 1206 | 
            +
            coordinate maps are restricted to the group M
         | 
| 1207 | 
            +
            .
         | 
| 1208 | 
            +
            Lemma 4.1. Given c, d ∈ M
         | 
| 1209 | 
            +
            , η ∈ X∗ and i = 1, 2, . . . , m,
         | 
| 1210 | 
            +
            ˆ∆
         | 
| 1211 | 
            +
            aη (c, d) = (c
         | 
| 1212 | 
            +
            d, η) = ρ
         | 
| 1213 | 
            +
            aη (c, d) ,
         | 
| 1214 | 
            +
            where c, d ∈ M
         | 
| 1215 | 
            +
            and ˆ∆i
         | 
| 1216 | 
            +
            is the coproduct from the bialgebra H
         | 
| 1217 | 
            +
            constructed in Section 4.3.
         | 
| 1218 | 
            +
            Example 4.3. A few examples of the computation of the coaction map ρ
         | 
| 1219 | 
            +
            on W using
         | 
| 1220 | 
            +
            Proposition 4.3 are given as follows(indices i, j = 1, 2, . . . , m and k, s = 0, 1, . . . , m):
         | 
| 1221 | 
            +
            ∆j ai
         | 
| 1222 | 
            +
            ∅ = ai
         | 
| 1223 | 
            +
            ∅ ⊗ aj
         | 
| 1224 | 
            +
            ∅.
         | 
| 1225 | 
            +
            ∆j ai
         | 
| 1226 | 
            +
            xk = ai
         | 
| 1227 | 
            +
            xi ⊗ aj
         | 
| 1228 | 
            +
            ∅ + ai
         | 
| 1229 | 
            +
            ∅ ⊗ aj
         | 
| 1230 | 
            +
            xi.
         | 
| 1231 | 
            +
            ∆j ai
         | 
| 1232 | 
            +
            xkxk = ai
         | 
| 1233 | 
            +
            xkxk ⊗ aj
         | 
| 1234 | 
            +
            ∅ + 2ai
         | 
| 1235 | 
            +
            xk ⊗ aj
         | 
| 1236 | 
            +
            xk + ai
         | 
| 1237 | 
            +
            ∅ ⊗ aj
         | 
| 1238 | 
            +
            xkxk.
         | 
| 1239 | 
            +
             | 
| 1240 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 1241 | 
            +
            13
         | 
| 1242 | 
            +
            ∆j ai
         | 
| 1243 | 
            +
            xkxs = ai
         | 
| 1244 | 
            +
            xkxs ⊗ aj
         | 
| 1245 | 
            +
            ∅ + ai
         | 
| 1246 | 
            +
            xk ⊗ aj
         | 
| 1247 | 
            +
            xs + ai
         | 
| 1248 | 
            +
            xs ⊗ aj
         | 
| 1249 | 
            +
            xk + ai
         | 
| 1250 | 
            +
            ∅ ⊗ aj
         | 
| 1251 | 
            +
            xkxs.
         | 
| 1252 | 
            +
            The following example illustrates the application of the deshuffle coproduct ∆
         | 
| 1253 | 
            +
            in the
         | 
| 1254 | 
            +
            computation of the shuffle product of two series.
         | 
| 1255 | 
            +
            Example 4.4. Let X = {x0, x1} and c, d ∈ R2⟨⟨X⟩⟩ described as
         | 
| 1256 | 
            +
            c =
         | 
| 1257 | 
            +
            �
         | 
| 1258 | 
            +
            1 + x1 + x2
         | 
| 1259 | 
            +
            1 + x3
         | 
| 1260 | 
            +
            1 + · · ·
         | 
| 1261 | 
            +
            x0 + x0x1 + x100
         | 
| 1262 | 
            +
            1
         | 
| 1263 | 
            +
            �
         | 
| 1264 | 
            +
            &
         | 
| 1265 | 
            +
            d =
         | 
| 1266 | 
            +
            �
         | 
| 1267 | 
            +
            1 + x2
         | 
| 1268 | 
            +
            0 + exp (x1)
         | 
| 1269 | 
            +
            1 + x2
         | 
| 1270 | 
            +
            0x1
         | 
| 1271 | 
            +
            �
         | 
| 1272 | 
            +
            ,
         | 
| 1273 | 
            +
            where exp(.) is the standard exponential function expressed in its Taylor series. Note that
         | 
| 1274 | 
            +
            c ̸∈ M
         | 
| 1275 | 
            +
            but d ∈ M
         | 
| 1276 | 
            +
            . The coefficient of x0x2
         | 
| 1277 | 
            +
            1 in series c2
         | 
| 1278 | 
            +
            d1 can be computed as:
         | 
| 1279 | 
            +
            �
         | 
| 1280 | 
            +
            c2
         | 
| 1281 | 
            +
            d1, x0x2
         | 
| 1282 | 
            +
            1
         | 
| 1283 | 
            +
            �
         | 
| 1284 | 
            +
            = ∆1 a2
         | 
| 1285 | 
            +
            x0x2
         | 
| 1286 | 
            +
            1 (c, d) = (π2 ⊗ π1) ◦ ∆
         | 
| 1287 | 
            +
            ax0x2
         | 
| 1288 | 
            +
            1 (c, d)
         | 
| 1289 | 
            +
            = ∆1 ◦ θ0ax2
         | 
| 1290 | 
            +
            1 (c, d) .
         | 
| 1291 | 
            +
            Using Proposition 4.3,
         | 
| 1292 | 
            +
            �
         | 
| 1293 | 
            +
            c2
         | 
| 1294 | 
            +
            d1, x0x2
         | 
| 1295 | 
            +
            1
         | 
| 1296 | 
            +
            �
         | 
| 1297 | 
            +
            = (θ0 ⊗ id + id ⊗ θ0) ◦ ∆1 a2
         | 
| 1298 | 
            +
            x2
         | 
| 1299 | 
            +
            1 (c, d) .
         | 
| 1300 | 
            +
            Using Corollary 4.1,
         | 
| 1301 | 
            +
            �
         | 
| 1302 | 
            +
            c2
         | 
| 1303 | 
            +
            d1, x0x2
         | 
| 1304 | 
            +
            1
         | 
| 1305 | 
            +
            �
         | 
| 1306 | 
            +
            = (θ0 ⊗ id + id ⊗ θ0) ◦
         | 
| 1307 | 
            +
            �
         | 
| 1308 | 
            +
            a2
         | 
| 1309 | 
            +
            x12 ⊗ a1
         | 
| 1310 | 
            +
            ∅ + 2a2
         | 
| 1311 | 
            +
            x1 ⊗ a1
         | 
| 1312 | 
            +
            x1 + a2
         | 
| 1313 | 
            +
            ∅ ⊗ a1
         | 
| 1314 | 
            +
            x12
         | 
| 1315 | 
            +
            �
         | 
| 1316 | 
            +
            (c, d)
         | 
| 1317 | 
            +
            =
         | 
| 1318 | 
            +
            �
         | 
| 1319 | 
            +
            a2
         | 
| 1320 | 
            +
            x0x12 ⊗ a1
         | 
| 1321 | 
            +
            ∅ + 2a2
         | 
| 1322 | 
            +
            x0x1 ⊗ a1
         | 
| 1323 | 
            +
            x1 + a2
         | 
| 1324 | 
            +
            x0 ⊗ a1
         | 
| 1325 | 
            +
            x12 + a2
         | 
| 1326 | 
            +
            x12 ⊗ a1
         | 
| 1327 | 
            +
            x0+
         | 
| 1328 | 
            +
            2a2
         | 
| 1329 | 
            +
            x1 ⊗ a1
         | 
| 1330 | 
            +
            x0x1 + a2
         | 
| 1331 | 
            +
            ∅ ⊗ a1
         | 
| 1332 | 
            +
            x0x12
         | 
| 1333 | 
            +
            �
         | 
| 1334 | 
            +
            (c, d)
         | 
| 1335 | 
            +
            = (0)(1) + 2(1)(1) + (1)(0.5) + (0)(0) + 2(0)(0) + (0)(0) = 2.5.
         | 
| 1336 | 
            +
            Therefore (c2
         | 
| 1337 | 
            +
            d1, x0x2
         | 
| 1338 | 
            +
            1) = 2.5.
         | 
| 1339 | 
            +
            5. Chen–Fliess Series and its Interconnections
         | 
| 1340 | 
            +
            The objective of the section is to describe Chen–Fliess series and the necessary non-
         | 
| 1341 | 
            +
            recursive interconnections of Chen–Fliess series to understand the results about the multi-
         | 
| 1342 | 
            +
            plicative dynamic feedback product in Section 6.
         | 
| 1343 | 
            +
            5.1. Chen–Fliess Series. Let p ≥ 1 and t0 < t1 be given. For a Lebesgue measurable
         | 
| 1344 | 
            +
            function u : [t0, t1] → Rm, define ∥u∥p = max{∥ui∥p :
         | 
| 1345 | 
            +
            1 ≤ i ≤ m}, where ∥ui∥p is the
         | 
| 1346 | 
            +
            usual Lp-norm for a measurable real-valued function, ui, defined on [t0, t1]. Let Lm
         | 
| 1347 | 
            +
            p [t0, t1]
         | 
| 1348 | 
            +
            denote the set of all measurable functions defined on [t0, t1] having a finite ∥ · ∥p norm
         | 
| 1349 | 
            +
            and Bm
         | 
| 1350 | 
            +
            p (R)[t0, t1] := {u ∈ Lm
         | 
| 1351 | 
            +
            p [t0, t1] : ∥u∥p ≤ R}.
         | 
| 1352 | 
            +
            Given any series c ∈ Rℓ⟨⟨X⟩⟩, the
         | 
| 1353 | 
            +
            corresponding Chen–Fliess series is
         | 
| 1354 | 
            +
            (7)
         | 
| 1355 | 
            +
            Fc[u](t) =
         | 
| 1356 | 
            +
            �
         | 
| 1357 | 
            +
            η∈X∗
         | 
| 1358 | 
            +
            (c, η) Fη[u](t, t0),
         | 
| 1359 | 
            +
            where E∅[u] = 1 and
         | 
| 1360 | 
            +
            Fxi¯η[u](t, t0) =
         | 
| 1361 | 
            +
            � t
         | 
| 1362 | 
            +
            t0
         | 
| 1363 | 
            +
            ui(τ)F¯η[u](τ, t0) dτ
         | 
| 1364 | 
            +
            with xi ∈ X, ¯η ∈ X∗, and u0 = 1 [Fliess(1981)]. If there exist constants K, M > 0 such that
         | 
| 1365 | 
            +
            |(ci, η)| ≤ KM|η||η|!, ∀η ∈ X∗, ∀i = 1, . . . , ℓ ,
         | 
| 1366 | 
            +
            (8)
         | 
| 1367 | 
            +
             | 
| 1368 | 
            +
            14
         | 
| 1369 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 1370 | 
            +
            then Fc constitutes a well-defined mapping from Bm
         | 
| 1371 | 
            +
            p (R)[t0, t0 + T] into Bℓ
         | 
| 1372 | 
            +
            q(S)[t0, t0 + T]
         | 
| 1373 | 
            +
            for sufficiently small R, T > 0, where the numbers p, q ∈ [1, ∞] are conjugate exponents,
         | 
| 1374 | 
            +
            i.e., 1/p + 1/q = 1 [Gray & Wang(2002)].
         | 
| 1375 | 
            +
            This map is referred to as a Fliess operator.
         | 
| 1376 | 
            +
            A series c ∈ Rℓ⟨⟨X⟩⟩ obeying the growth condition in (8) is called a locally convergent
         | 
| 1377 | 
            +
            generating series. The set of all locally convergent generating series is denoted by Rℓ
         | 
| 1378 | 
            +
            LC⟨⟨X⟩⟩.
         | 
| 1379 | 
            +
            The supremum of the set of all max{R, T} for which a Fliess operator Fc is a well-defined
         | 
| 1380 | 
            +
            mapping from Bm
         | 
| 1381 | 
            +
            p (R)[t0, t0 + T] into Bℓ
         | 
| 1382 | 
            +
            q(S)[t0, t0 + T] is called the radius of convergence
         | 
| 1383 | 
            +
            of the Fliess operator Fc and is denoted by ρ (Fc). A Fliess operator Fc is called locally
         | 
| 1384 | 
            +
            convergent if ρ (Fc) > 0. If there exist constants K, M > 0 and γ ∈ [0, 1[ such that
         | 
| 1385 | 
            +
            |(ci, η)| ≤ KM|η| (|η|!)γ , ∀η ∈ X∗, ∀i = 1, . . . , ℓ ,
         | 
| 1386 | 
            +
            (9)
         | 
| 1387 | 
            +
            then Fc constitutes a well defined mapping from Bm
         | 
| 1388 | 
            +
            p (R)[t0, t0 + T] into Bℓ
         | 
| 1389 | 
            +
            q(S)[t0, t0 + T]
         | 
| 1390 | 
            +
            for all R, T > 0 [Winter-Arboleda(2019), Winter-Arboleda, et al.(2015)]. The infimum of all
         | 
| 1391 | 
            +
            the γ ∈ [0, 1[ such that (9) is satisfied for a series c ∈ Rℓ⟨⟨X⟩⟩ is called the Gevrey order of
         | 
| 1392 | 
            +
            the series c.
         | 
| 1393 | 
            +
            A series c ∈ Rℓ⟨⟨X⟩⟩ obeying the growth condition in (9) is called a globally convergent
         | 
| 1394 | 
            +
            series. The set of all globally convergent series in Rℓ⟨⟨X⟩⟩ is denoted as Rℓ
         | 
| 1395 | 
            +
            GC⟨⟨X⟩⟩. A Fliess
         | 
| 1396 | 
            +
            operator Fc is globally convergent if and only if there exists no real number M > 0 such
         | 
| 1397 | 
            +
            that ρ (Fc) < M. Observe that a noncommutative polynomial R⟨X⟩ is a globally convergent
         | 
| 1398 | 
            +
            series with Gevrey degree 0. As described above, a series c ∈ Rℓ
         | 
| 1399 | 
            +
            GC⟨⟨X⟩⟩ is only a sufficient
         | 
| 1400 | 
            +
            condition for the corresponding Fliess operator Fc to be globally convergent.
         | 
| 1401 | 
            +
            Necessary
         | 
| 1402 | 
            +
            conditions are well-detailed in the literature [Winter-Arboleda(2019), Venkatesh(2021)]. In
         | 
| 1403 | 
            +
            the absence of any convergence criterion, (7) only defines an operator in a formal sense.
         | 
| 1404 | 
            +
            5.2. Interconnections of Chen–Fliess Series: Parallel and Cascade Connections.
         | 
| 1405 | 
            +
            Given Chen–Fliess series Fc and Fd, where c, d ∈ Rℓ⟨⟨X⟩⟩, the parallel and product connec-
         | 
| 1406 | 
            +
            tions satisfy Fc + Fd = Fc+d and FcFd = Fc
         | 
| 1407 | 
            +
            d, respectively [Ree(1958), Fliess(1981)]. The
         | 
| 1408 | 
            +
            parallel and product connections preserve local convergence and hence the interconnected
         | 
| 1409 | 
            +
            systems has a Fliess operator representation [Thitsa & Gray(2012), Venkatesh(2021)]. When
         | 
| 1410 | 
            +
            Chen–Fliess series Fc and Fd with c ∈ Rk⟨⟨X′⟩⟩ and d ∈ Rℓ⟨⟨X⟩⟩ are interconnected in a
         | 
| 1411 | 
            +
            cascade fashion, where |X′| = ℓ + 1, the composite system Fc ◦ Fd has a Chen–Fliess series
         | 
| 1412 | 
            +
            representation Fc◦d, where the composition product of c and d is given by
         | 
| 1413 | 
            +
            (10)
         | 
| 1414 | 
            +
            c ◦ d =
         | 
| 1415 | 
            +
            �
         | 
| 1416 | 
            +
            η∈X′∗
         | 
| 1417 | 
            +
            (c, η) ψd(η)(1)
         | 
| 1418 | 
            +
            [Ferfera(1979), Ferfera(1980)]. Here 1 denotes the monomial 1∅, and ψd is the continuous
         | 
| 1419 | 
            +
            (in the ultrametric sense) algebra homomorphism from R⟨⟨X′⟩⟩ to the set of vector space
         | 
| 1420 | 
            +
            endomorphisms on R⟨⟨X⟩⟩, End (R⟨⟨X⟩⟩), uniquely specified by
         | 
| 1421 | 
            +
            ψd(x′
         | 
| 1422 | 
            +
            iη) = ψd(x′
         | 
| 1423 | 
            +
            i) ◦ ψd(η)
         | 
| 1424 | 
            +
            with ψd(x′
         | 
| 1425 | 
            +
            i)(e) = x0(di
         | 
| 1426 | 
            +
            e), i = 0, 1, . . . , m for any e ∈ R⟨⟨X⟩⟩, and where di is the i-th
         | 
| 1427 | 
            +
            component series of d (d0 := 1). By definition, ψd(∅) is the identity map on R⟨⟨X⟩⟩. The
         | 
| 1428 | 
            +
            cascade interconnection preserves local convergence and thus the composite has a Fliess
         | 
| 1429 | 
            +
            operator representation [Thitsa & Gray(2012)]. The linearity of the composition product in
         | 
| 1430 | 
            +
            the left argument is evident form the definition. However, the following theorem states that
         | 
| 1431 | 
            +
            the composition product distributes over the shuffle product from the right.
         | 
| 1432 | 
            +
            Theorem 5.1. [Gray & Li(2005)] Let c, d ∈ Rk⟨⟨X′⟩⟩ and e ∈ Rℓ⟨⟨X⟩⟩, such that |X′| =
         | 
| 1433 | 
            +
            ℓ + 1, then (c
         | 
| 1434 | 
            +
            d) ◦ e = (c ◦ e)
         | 
| 1435 | 
            +
            (d ◦ e).
         | 
| 1436 | 
            +
             | 
| 1437 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 1438 | 
            +
            15
         | 
| 1439 | 
            +
            Given a series e ∈ Rℓ⟨⟨X⟩⟩, define a map Υe : Rk⟨⟨X′⟩⟩ −→ Rk⟨⟨X⟩⟩ defined as c �→
         | 
| 1440 | 
            +
            c ◦ e. Theorem 5.1 infers that Υe is an R-algebra homomorphism from the shuffle algebra of
         | 
| 1441 | 
            +
            Rk⟨⟨X′⟩⟩ to the shuffle algebra of Rℓ⟨⟨X⟩⟩. The composition product preserves the purely
         | 
| 1442 | 
            +
            improper property of the left argument which is stated in the following theorem.
         | 
| 1443 | 
            +
            Theorem 5.2. If c ∈ Rk⟨⟨X′⟩⟩ and d ∈ Rℓ⟨⟨X⟩⟩ such that |X′| = ℓ + 1, then (c ◦ d, ∅) =
         | 
| 1444 | 
            +
            (c, ∅). Hence, if c ∈ Rk
         | 
| 1445 | 
            +
            pi ⟨⟨X′⟩⟩ then c ◦ d ∈ Rk
         | 
| 1446 | 
            +
            pi ⟨⟨X⟩⟩ and vice-versa. Similarly if c is a
         | 
| 1447 | 
            +
            proper series then c ◦ d is also a proper series and vice-versa.
         | 
| 1448 | 
            +
            Proof: The proof follows immediately from (10).
         | 
| 1449 | 
            +
            The composition product is a strong contraction map with respect to its right argument
         | 
| 1450 | 
            +
            in the ultrametric topology and is stated in the following theorem.
         | 
| 1451 | 
            +
            Theorem 5.3. [Gray & Li(2005)] Let c ∈ Rk⟨⟨X′⟩⟩ and d, e ∈ Rℓ⟨⟨X⟩⟩, such that |X′| =
         | 
| 1452 | 
            +
            ℓ + 1, then κ (c ◦ d, c ◦ e) ≤ σκ (d, e) where σ ∈ [0, 1[.
         | 
| 1453 | 
            +
            5.3. Cascading of Chen–Fliess with Multiplicative Feedforward of Input. The cas-
         | 
| 1454 | 
            +
            cade interconnection of a Chen–Fliess series Fc and Fd along with the multiplicative feed-
         | 
| 1455 | 
            +
            forward of the input, as shown in Figure 1, arises primarily in the analysis of multiplicative
         | 
| 1456 | 
            +
            feedback interconnection discussed in Section 6. A semblance of such an interconnection
         | 
| 1457 | 
            +
            has appeared in Definition 3.1 of [Gray & Ebrahimi-Fard(2017)], without being explicit and
         | 
| 1458 | 
            +
            limited to the SISO case. With respect to Figure 1, the map u �→ y viz. y = Fc[u.Fd[u]] has
         | 
| 1459 | 
            +
            Chen–Fliess series representation denoted by Fc↶d, where c ↶ d denotes the multiplicative
         | 
| 1460 | 
            +
            mixed composition product of c ∈ Rp⟨⟨X⟩⟩ and d ∈ Rm⟨⟨X⟩⟩ defined as
         | 
| 1461 | 
            +
            c ↶ d =
         | 
| 1462 | 
            +
            �
         | 
| 1463 | 
            +
            η∈X∗
         | 
| 1464 | 
            +
            (c, η) η ↶ d :=
         | 
| 1465 | 
            +
            �
         | 
| 1466 | 
            +
            η∈X∗
         | 
| 1467 | 
            +
            (c, η) ¯φd (η) (1) .
         | 
| 1468 | 
            +
            (11)
         | 
| 1469 | 
            +
            Here, ¯φd : R⟨⟨X⟩⟩ −→ End (R⟨⟨X⟩⟩) is an R-algebra homomorphism such that
         | 
| 1470 | 
            +
            ¯φd(x0)(e) = x0e
         | 
| 1471 | 
            +
            and
         | 
| 1472 | 
            +
            ¯φd(xi)(e) = xi(di
         | 
| 1473 | 
            +
            e).
         | 
| 1474 | 
            +
            Recall that R⟨⟨X⟩⟩ is an R-algebra under Cauchy product and End (R⟨⟨X⟩⟩). The multi-
         | 
| 1475 | 
            +
            plicative mixed composition defined in (11) asserts that, for all η ∈ X∗ and d ∈ Rm⟨⟨X⟩⟩,
         | 
| 1476 | 
            +
            ∅ ↶ d = ∅
         | 
| 1477 | 
            +
            x0η ↶ d = x0 (η ↶ d)
         | 
| 1478 | 
            +
            xiη ↶ d = xi (di
         | 
| 1479 | 
            +
            (η ↶ d))
         | 
| 1480 | 
            +
            ∀ i = 1, 2, . . . , m.
         | 
| 1481 | 
            +
            For later reference, we summarise the properties of (11) in the following
         | 
| 1482 | 
            +
            Theorem 5.4. The multiplicative mixed composition product (11) is linear in its left argu-
         | 
| 1483 | 
            +
            ment and (c ↶ d, ∅) = (c, ∅), for all c ∈ Rp⟨⟨X⟩⟩ and d ∈ Rm⟨⟨X⟩⟩.
         | 
| 1484 | 
            +
            The following results are already known in the single-input single-output (SISO) setting.
         | 
| 1485 | 
            +
            However, their multi-input multi-output (MIMO) extensions are straightforward and to avoid
         | 
| 1486 | 
            +
            reiteration of the proofs, only the statements are provided in this document. The foremost
         | 
| 1487 | 
            +
            of the theorems asserts that the multiplicative mixed composition product distributes over
         | 
| 1488 | 
            +
            shuffle product from the right.
         | 
| 1489 | 
            +
            Theorem 5.5. [Gray & Ebrahimi-Fard(2017)] Let c, d ∈ Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then
         | 
| 1490 | 
            +
            (c
         | 
| 1491 | 
            +
            d) ↶ e = (c ↶ e)
         | 
| 1492 | 
            +
            (d ↶ e).
         | 
| 1493 | 
            +
             | 
| 1494 | 
            +
            16
         | 
| 1495 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 1496 | 
            +
            Fd
         | 
| 1497 | 
            +
            Fc
         | 
| 1498 | 
            +
            u
         | 
| 1499 | 
            +
            y
         | 
| 1500 | 
            +
            Figure 1. Cascade connection of Chen–Fliess Fd with Fc along with multi-
         | 
| 1501 | 
            +
            plicative feedforward of input
         | 
| 1502 | 
            +
            The inference of Theorem 5.5 is that for any e ∈ Rm⟨⟨X⟩⟩, the map Γe : Rp⟨⟨X⟩⟩ −→
         | 
| 1503 | 
            +
            Rp⟨⟨X⟩⟩ given by d �→ d ↶ e is an R-algebra endomorphism on the shuffle algebra Rp⟨⟨X⟩⟩.
         | 
| 1504 | 
            +
            The next lemma is essential in proving that multiplicative mixed composition product is a
         | 
| 1505 | 
            +
            strong contraction map in its right argument in the ultrametric topology.
         | 
| 1506 | 
            +
            Lemma 5.1. [Gray & Ebrahimi-Fard(2017)] Let η ∈ X∗ and d, e ∈ Rm⟨⟨X⟩⟩, then
         | 
| 1507 | 
            +
            κ (η ↶ d, η ↶ e) ≤ σ|η|κ (d, e) where σ ∈ [0, 1[.
         | 
| 1508 | 
            +
            The following theorem states the strong contraction property of the multiplicative mixed
         | 
| 1509 | 
            +
            composition product which is an essential result in Section 6.
         | 
| 1510 | 
            +
            Theorem 5.6. [Gray & Ebrahimi-Fard(2017)] Let d, e ∈ Rm⟨⟨X⟩⟩ and c ∈ Rp⟨⟨X⟩⟩, then
         | 
| 1511 | 
            +
            κ (c ↶ d, c ↶ e) ≤ σord(c′)κ (d, e), where c′ = c − (c, ∅), the proper part of c.
         | 
| 1512 | 
            +
            Since ord (c′) ≥ 1 and σ ∈]0, 1[, then from Theorem 5.6, the map ¯Γc : e �→ c ↶ e is a strong
         | 
| 1513 | 
            +
            contraction map in the ultrametric topology. The following lemma is essential in proving
         | 
| 1514 | 
            +
            the mixed associativity of the composition and multiplicative mixed composition product.
         | 
| 1515 | 
            +
            The result, along with Theorem 5.7 can be inferred in the SISO setting from Lemma 3.6 in
         | 
| 1516 | 
            +
            [Gray & Ebrahimi-Fard(2017)], and its extension to the MIMO case is straightforward.
         | 
| 1517 | 
            +
            Lemma 5.2. [Gray & Ebrahimi-Fard(2017)] Let X′ = {x′
         | 
| 1518 | 
            +
            0, . . . , x′
         | 
| 1519 | 
            +
            p} and η ∈ X′∗. Let d ∈
         | 
| 1520 | 
            +
            Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then η ◦ (d ↶ e) = (η ◦ d) ↶ e.
         | 
| 1521 | 
            +
            The following theorem states that the composition product and multiplicative mixed com-
         | 
| 1522 | 
            +
            position product are associative in combination.
         | 
| 1523 | 
            +
            Theorem 5.7. [Gray & Ebrahimi-Fard(2017)] Let X′ = {x′
         | 
| 1524 | 
            +
            0, . . . , x′
         | 
| 1525 | 
            +
            p} and c ∈ Rq⟨⟨X′⟩⟩. Let
         | 
| 1526 | 
            +
            d ∈ Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then c ◦ (d ↶ e) = (c ◦ d) ↶ e.
         | 
| 1527 | 
            +
            5.4. Multiplicative Dynamic Output Feedback Group. The dynamic multiplicative
         | 
| 1528 | 
            +
            feedback group plays a vital role in computation of the multiplicative dynamic feedback
         | 
| 1529 | 
            +
            formula, as well as in assessing the feedback as a group action in Section 6. Indeed, consider
         | 
| 1530 | 
            +
            the cascade interconnection of two Chen–Fliess series Fc and Fd along with their multiplica-
         | 
| 1531 | 
            +
            tive feedforward of inputs displayed in Figure 2, where c, d ∈ Rm⟨⟨X⟩⟩. The input-output
         | 
| 1532 | 
            +
            relation of the composite system, u �→ y is u.Fd[u]Fc[u.Fd[u]] and can be represented by
         | 
| 1533 | 
            +
            Chen–Fliess series as follows. Consider
         | 
| 1534 | 
            +
            u.Fc⋆d[u] := u.Fd[u]Fc[u.Fd[u]],
         | 
| 1535 | 
            +
            where the multiplicative composition product of c and d is defined as
         | 
| 1536 | 
            +
            c ⋆ d = d
         | 
| 1537 | 
            +
            (c ↶ d) .
         | 
| 1538 | 
            +
            (12)
         | 
| 1539 | 
            +
            The following theorems appeared in [Gray & Ebrahimi-Fard(2017)] in the SISO setting.
         | 
| 1540 | 
            +
            We underline that the latter restriction is not essential, that is, the statements along with
         | 
| 1541 | 
            +
            the proofs naturally extend to the MIMO setting.
         | 
| 1542 | 
            +
             | 
| 1543 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 1544 | 
            +
            17
         | 
| 1545 | 
            +
            Figure 2. Cascade connection of Chen–Fliess Fd with Fc along with multi-
         | 
| 1546 | 
            +
            plicative feedforward of their inputs.
         | 
| 1547 | 
            +
            Theorem 5.8. [Gray & Ebrahimi-Fard(2017)] Let c, d, e ∈ Rm⟨⟨X⟩⟩, then, (c ⋆ d) ⋆ e =
         | 
| 1548 | 
            +
            c ⋆ (d ⋆ e).
         | 
| 1549 | 
            +
            Observe that (12) and Theorem 5.8 infer that Rm⟨⟨X⟩⟩ forms a non-commutative monoid
         | 
| 1550 | 
            +
            under multiplicative composition product, with the identity element ll. The following theo-
         | 
| 1551 | 
            +
            rem states that the multiplicative mixed composition product is a right action on Rq⟨⟨X⟩⟩
         | 
| 1552 | 
            +
            by the monoid (Rm⟨⟨X⟩⟩, ⋆, ll).
         | 
| 1553 | 
            +
            Theorem 5.9. [Gray & Ebrahimi-Fard(2017)] Let c ∈ Rq⟨⟨X⟩⟩ and d, e ∈ Rm⟨⟨X⟩⟩, then
         | 
| 1554 | 
            +
            (c ↶ d) ↶ e = c ↶ (d ⋆ e).
         | 
| 1555 | 
            +
            The prominent question is to find the invertible elements of the monoid (Rm⟨⟨X⟩⟩, ⋆) and
         | 
| 1556 | 
            +
            the motivation to find the unit elements of the monoid shall be evident in Section 6. Let
         | 
| 1557 | 
            +
            d, e ∈ Rm
         | 
| 1558 | 
            +
            pi ⟨⟨X⟩⟩ and suppose
         | 
| 1559 | 
            +
            d ⋆ e = ll.
         | 
| 1560 | 
            +
            Observe that d ∈ Rm
         | 
| 1561 | 
            +
            pi ⟨⟨X⟩⟩ implies (d ↶ e) ∈ Rm
         | 
| 1562 | 
            +
            pi ⟨⟨X⟩⟩ and using Theorem 5.5,
         | 
| 1563 | 
            +
            e = (d ↶ e)
         | 
| 1564 | 
            +
            −1 = d
         | 
| 1565 | 
            +
            −1 ↶ e.
         | 
| 1566 | 
            +
            Hence, for e to be right inverse of d, the purely improper series e has to satisfy the fixed
         | 
| 1567 | 
            +
            point equation
         | 
| 1568 | 
            +
            e = d
         | 
| 1569 | 
            +
            −1 ↶ e
         | 
| 1570 | 
            +
            (13)
         | 
| 1571 | 
            +
            Observe from Theorem 5.6 that the map e �→ d
         | 
| 1572 | 
            +
            −1 ↶ e is a strong contraction in the
         | 
| 1573 | 
            +
            ultrametric space inferring that (13) has a unique fixed point. Suppose e is the left inverse
         | 
| 1574 | 
            +
            of d viz. e ⋆ d, then a similar procedure shows that e has to satisfy the equation
         | 
| 1575 | 
            +
            d = e
         | 
| 1576 | 
            +
            −1 ↶ d
         | 
| 1577 | 
            +
            (14)
         | 
| 1578 | 
            +
            Note that if e is a solution of (13), then e satisfies (14) and also the converse holds true.
         | 
| 1579 | 
            +
            Hence, e is the unique inverse of d and is given the notation d⋆−1 for d ∈ Rm
         | 
| 1580 | 
            +
            pi ⟨⟨X⟩⟩. Thus,
         | 
| 1581 | 
            +
            Rm
         | 
| 1582 | 
            +
            pi ⟨⟨X⟩⟩ forms a group under multiplicative composition product, ⋆, and is termed as the
         | 
| 1583 | 
            +
            multiplicative dynamic output feedback group and is formally stated in the following theorem.
         | 
| 1584 | 
            +
            Theorem 5.10.
         | 
| 1585 | 
            +
            �
         | 
| 1586 | 
            +
            Rm
         | 
| 1587 | 
            +
            pi ⟨⟨X⟩⟩, ⋆
         | 
| 1588 | 
            +
            �
         | 
| 1589 | 
            +
            forms a group with the identity element ll.
         | 
| 1590 | 
            +
            It is worth noting that [Gray & Ebrahimi-Fard(2017)] proved Theorem 5.10 for one-
         | 
| 1591 | 
            +
            dimensional case viz. m = 1. In light of Theorem 5.10, Theorem 5.5 and (12) one obtains
         | 
| 1592 | 
            +
            the following relations for c ∈ Rm
         | 
| 1593 | 
            +
            pi ⟨⟨X⟩⟩:
         | 
| 1594 | 
            +
            c⋆−1 = c
         | 
| 1595 | 
            +
            −1 ↶ c⋆−1
         | 
| 1596 | 
            +
            (15)
         | 
| 1597 | 
            +
            �
         | 
| 1598 | 
            +
            c⋆−1�
         | 
| 1599 | 
            +
            −1 = c ↶ c⋆−1.
         | 
| 1600 | 
            +
            The following lemma is essential in defining a subgroup of the multiplicative dynamic out-
         | 
| 1601 | 
            +
            put feedback group upon which the computational framework for the multiplicative feedback
         | 
| 1602 | 
            +
            products is discussed in Section 8.
         | 
| 1603 | 
            +
             | 
| 1604 | 
            +
            F
         | 
| 1605 | 
            +
            F
         | 
| 1606 | 
            +
            n18
         | 
| 1607 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 1608 | 
            +
            Lemma 5.3. Let c, d ∈ Rm
         | 
| 1609 | 
            +
            pi ⟨⟨X⟩⟩, then (c ⋆ d, ∅) = (c, ∅) (d, ∅).
         | 
| 1610 | 
            +
            Proof: Observe from (12) that,
         | 
| 1611 | 
            +
            (c ⋆ d, ∅) = (d
         | 
| 1612 | 
            +
            (c ↶ d) , ∅)
         | 
| 1613 | 
            +
            = (c ↶ d, ∅) (d, ∅)
         | 
| 1614 | 
            +
            Since (c ↶ d, ∅) = (c, ∅),
         | 
| 1615 | 
            +
            (c ⋆ d, ∅) = (c, ∅) (d, ∅) .
         | 
| 1616 | 
            +
            Lemma 5.3 thus proves that the set of all series which are of the form ll + c, where c is
         | 
| 1617 | 
            +
            a proper series, forms a subgroup of the multiplicative dynamic feedback group, which is
         | 
| 1618 | 
            +
            stated in the following theorem.
         | 
| 1619 | 
            +
            Theorem 5.11. Let M = { ll + c : c ∈ Rm
         | 
| 1620 | 
            +
            p ⟨⟨X⟩⟩}, then (M, ⋆, ll) forms a subgroup of the
         | 
| 1621 | 
            +
            multiplicative dynamic feedback group.
         | 
| 1622 | 
            +
            The algorithmic framework for the computation of multiplicative feedback products is
         | 
| 1623 | 
            +
            fundamentally based on the subgroup M as asserted in Theorem 5.11. The group M is
         | 
| 1624 | 
            +
            isomorphic to the character group of the Hopf algebra H which is used for computation of
         | 
| 1625 | 
            +
            feedback and the framework is explained in detail in Section 8.
         | 
| 1626 | 
            +
            6. Chen–Fliess Series Under Multiplicative Dynamic Output Feedback
         | 
| 1627 | 
            +
            Let Fc be a Chen–Fliess series with a generating series c ∈ Rq⟨⟨X⟩⟩. Assume it is intercon-
         | 
| 1628 | 
            +
            nected with a Chen–Fliess series Fd with a purely improper generating series d ∈ Rm
         | 
| 1629 | 
            +
            pi ⟨⟨X′⟩⟩,
         | 
| 1630 | 
            +
            as shown in Figure 3. Note that, |X| = m + 1 and |X′| = q + 1. The primary goal of this
         | 
| 1631 | 
            +
            section is to show that the closed-loop system has a Chen–Fliess series representation, say
         | 
| 1632 | 
            +
            y = Fe[v], where e ∈ Rq⟨⟨X⟩⟩. If this is the case, then necessarily
         | 
| 1633 | 
            +
            y = Fe[v] = Fc[u] = Fc[vFd[y]]
         | 
| 1634 | 
            +
            = Fc[vFd[Fe[v]]] = Fc[vFd◦e[v]]
         | 
| 1635 | 
            +
            = Fc↶(d◦e)[v]
         | 
| 1636 | 
            +
            for any admissible input v. Therefore, the series e has to satisfy the fixed point equation
         | 
| 1637 | 
            +
            e = c ↶ (d ◦ e) .
         | 
| 1638 | 
            +
            (16)
         | 
| 1639 | 
            +
            Observe that, in light of Theorem 5.3 and Theorem 5.6 the map e �→ c ↶ (d ◦ e) is a
         | 
| 1640 | 
            +
            strong contraction map in the ultrametric space and thus (16) has a unique fixed point. The
         | 
| 1641 | 
            +
            following thoerem establishes the first main result of this section, which follows immediately.
         | 
| 1642 | 
            +
            Theorem 6.1. The series c ↶ (d
         | 
| 1643 | 
            +
            −1 ◦ c)⋆−1 ∈ Rq⟨⟨X⟩⟩ is the unique fixed point of the map
         | 
| 1644 | 
            +
            e �→ c ↶ (d ◦ e).
         | 
| 1645 | 
            +
            Proof: If e := c ↶ (d
         | 
| 1646 | 
            +
            −1 ◦ c)⋆−1, then
         | 
| 1647 | 
            +
            c ↶ (d ◦ e) = c ↶
         | 
| 1648 | 
            +
            �
         | 
| 1649 | 
            +
            d ◦
         | 
| 1650 | 
            +
            �
         | 
| 1651 | 
            +
            c ↶
         | 
| 1652 | 
            +
            �
         | 
| 1653 | 
            +
            d
         | 
| 1654 | 
            +
            −1 ◦ c
         | 
| 1655 | 
            +
            �⋆−1��
         | 
| 1656 | 
            +
            Using Theorem 5.7 and then Theorem 5.5,
         | 
| 1657 | 
            +
            c ↶ (d ◦ e) = c ↶
         | 
| 1658 | 
            +
            �
         | 
| 1659 | 
            +
            (d ◦ c) ↶
         | 
| 1660 | 
            +
            �
         | 
| 1661 | 
            +
            d
         | 
| 1662 | 
            +
            −1 ◦ c
         | 
| 1663 | 
            +
            �⋆−1�
         | 
| 1664 | 
            +
             | 
| 1665 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 1666 | 
            +
            19
         | 
| 1667 | 
            +
            Fc
         | 
| 1668 | 
            +
            v
         | 
| 1669 | 
            +
            Fd
         | 
| 1670 | 
            +
            y
         | 
| 1671 | 
            +
            u
         | 
| 1672 | 
            +
            Figure 3. Chen–Fliess series Fc in multiplicative output feedback with Chen-
         | 
| 1673 | 
            +
            Flies series Fd
         | 
| 1674 | 
            +
            = c ↶
         | 
| 1675 | 
            +
            �
         | 
| 1676 | 
            +
            (d ◦ c)
         | 
| 1677 | 
            +
            −1 ↶
         | 
| 1678 | 
            +
            �
         | 
| 1679 | 
            +
            d
         | 
| 1680 | 
            +
            −1 ◦ c
         | 
| 1681 | 
            +
            �⋆−1�
         | 
| 1682 | 
            +
            −1
         | 
| 1683 | 
            +
            .
         | 
| 1684 | 
            +
            Using Theorem 5.1,
         | 
| 1685 | 
            +
            c ↶ (d ◦ e) = c ↶
         | 
| 1686 | 
            +
            ��
         | 
| 1687 | 
            +
            d
         | 
| 1688 | 
            +
            −1 ◦ c
         | 
| 1689 | 
            +
            �
         | 
| 1690 | 
            +
            ↶
         | 
| 1691 | 
            +
            �
         | 
| 1692 | 
            +
            d
         | 
| 1693 | 
            +
            −1 ◦ c
         | 
| 1694 | 
            +
            �⋆−1�
         | 
| 1695 | 
            +
            −1
         | 
| 1696 | 
            +
            .
         | 
| 1697 | 
            +
            Using the relations (15),
         | 
| 1698 | 
            +
            c ↶ (d ◦ e) = c ↶
         | 
| 1699 | 
            +
            ���
         | 
| 1700 | 
            +
            d
         | 
| 1701 | 
            +
            −1 ◦ c
         | 
| 1702 | 
            +
            �⋆−1�
         | 
| 1703 | 
            +
            −1�
         | 
| 1704 | 
            +
            −1
         | 
| 1705 | 
            +
            = c ↶
         | 
| 1706 | 
            +
            �
         | 
| 1707 | 
            +
            d
         | 
| 1708 | 
            +
            −1 ◦ c
         | 
| 1709 | 
            +
            �⋆−1 = e.
         | 
| 1710 | 
            +
            Theorem 6.2. Given a series c ∈ Rq⟨⟨X⟩⟩ and a purely improper series d ∈ Rm
         | 
| 1711 | 
            +
            pi ⟨⟨X′⟩⟩ (such
         | 
| 1712 | 
            +
            that |X| = m + 1 and |X′| = q + 1), then the generating series for the closed-loop system in
         | 
| 1713 | 
            +
            Figure 3 is given by the multiplicative dynamic feedback product cˇ@d := c ↶ (d
         | 
| 1714 | 
            +
            −1 ◦ c)⋆−1.
         | 
| 1715 | 
            +
            The notion that feedback can described mathematically as a transformation group acting
         | 
| 1716 | 
            +
            on the plant is well established in control theory [Brockett(1978)]. The following theorem
         | 
| 1717 | 
            +
            describes the situation in the present context.
         | 
| 1718 | 
            +
            Theorem 6.3. The multiplicative dynamic feedback product is a right group action by the
         | 
| 1719 | 
            +
            multiplicative group
         | 
| 1720 | 
            +
            �
         | 
| 1721 | 
            +
            Rm
         | 
| 1722 | 
            +
            pi ⟨⟨X′⟩⟩,
         | 
| 1723 | 
            +
            , ll
         | 
| 1724 | 
            +
            �
         | 
| 1725 | 
            +
            on the set Rq⟨⟨X⟩⟩, where |X| = m + 1 and |X′| =
         | 
| 1726 | 
            +
            q + 1.
         | 
| 1727 | 
            +
            Proof: Let c ∈ Rq⟨⟨X⟩⟩. Observe that from Theorem 6.2,
         | 
| 1728 | 
            +
            cˇ@ ll = c ↶
         | 
| 1729 | 
            +
            �
         | 
| 1730 | 
            +
            ll
         | 
| 1731 | 
            +
            −1 ◦ c
         | 
| 1732 | 
            +
            �⋆−1
         | 
| 1733 | 
            +
            = c ↶ ll = c.
         | 
| 1734 | 
            +
            Let d1, d2 ∈ Rm
         | 
| 1735 | 
            +
            pi ⟨⟨X′⟩⟩. It needs to be proven that
         | 
| 1736 | 
            +
            �
         | 
| 1737 | 
            +
            cˇ@d1
         | 
| 1738 | 
            +
            � ˇ@d2 = cˇ@ (d1
         | 
| 1739 | 
            +
            d2). From Theo-
         | 
| 1740 | 
            +
            rem 6.2, observe that
         | 
| 1741 | 
            +
            �
         | 
| 1742 | 
            +
            cˇ@d1
         | 
| 1743 | 
            +
            � ˇ@d2 =
         | 
| 1744 | 
            +
            �
         | 
| 1745 | 
            +
            cˇ@d1
         | 
| 1746 | 
            +
            �
         | 
| 1747 | 
            +
            ↶
         | 
| 1748 | 
            +
            �
         | 
| 1749 | 
            +
            d
         | 
| 1750 | 
            +
            −1
         | 
| 1751 | 
            +
            2
         | 
| 1752 | 
            +
            ◦
         | 
| 1753 | 
            +
            �
         | 
| 1754 | 
            +
            cˇ@d1
         | 
| 1755 | 
            +
            ��⋆−1
         | 
| 1756 | 
            +
            =
         | 
| 1757 | 
            +
            �
         | 
| 1758 | 
            +
            c ↶
         | 
| 1759 | 
            +
            �
         | 
| 1760 | 
            +
            d
         | 
| 1761 | 
            +
            −1
         | 
| 1762 | 
            +
            1
         | 
| 1763 | 
            +
            ◦ c
         | 
| 1764 | 
            +
            �⋆−1�
         | 
| 1765 | 
            +
            ↶
         | 
| 1766 | 
            +
            �
         | 
| 1767 | 
            +
            d
         | 
| 1768 | 
            +
            −1
         | 
| 1769 | 
            +
            2
         | 
| 1770 | 
            +
            ◦
         | 
| 1771 | 
            +
            �
         | 
| 1772 | 
            +
            c ↶
         | 
| 1773 | 
            +
            �
         | 
| 1774 | 
            +
            d
         | 
| 1775 | 
            +
            −1
         | 
| 1776 | 
            +
            1
         | 
| 1777 | 
            +
            ◦ c
         | 
| 1778 | 
            +
            �⋆−1��⋆−1
         | 
| 1779 | 
            +
            .
         | 
| 1780 | 
            +
            Applying Theorem 5.7,
         | 
| 1781 | 
            +
            �
         | 
| 1782 | 
            +
            cˇ@d1
         | 
| 1783 | 
            +
            � ˇ@d2 =
         | 
| 1784 | 
            +
            �
         | 
| 1785 | 
            +
            c ↶
         | 
| 1786 | 
            +
            �
         | 
| 1787 | 
            +
            d
         | 
| 1788 | 
            +
            −1
         | 
| 1789 | 
            +
            1
         | 
| 1790 | 
            +
            ◦ c
         | 
| 1791 | 
            +
            �⋆−1�
         | 
| 1792 | 
            +
            ↶
         | 
| 1793 | 
            +
            ��
         | 
| 1794 | 
            +
            d
         | 
| 1795 | 
            +
            −1
         | 
| 1796 | 
            +
            2
         | 
| 1797 | 
            +
            ◦ c
         | 
| 1798 | 
            +
            �
         | 
| 1799 | 
            +
            ↶
         | 
| 1800 | 
            +
            �
         | 
| 1801 | 
            +
            d
         | 
| 1802 | 
            +
            −1
         | 
| 1803 | 
            +
            1
         | 
| 1804 | 
            +
            ◦ c
         | 
| 1805 | 
            +
            �⋆−1�⋆−1
         | 
| 1806 | 
            +
            .
         | 
| 1807 | 
            +
             | 
| 1808 | 
            +
            20
         | 
| 1809 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 1810 | 
            +
            Applying Theorem 5.9 and fact that the group inverse is anti-homomorphism with respect
         | 
| 1811 | 
            +
            to the group product,
         | 
| 1812 | 
            +
            �
         | 
| 1813 | 
            +
            cˇ@d1
         | 
| 1814 | 
            +
            � ˇ@d2 = c ↶
         | 
| 1815 | 
            +
            � �
         | 
| 1816 | 
            +
            d
         | 
| 1817 | 
            +
            −1
         | 
| 1818 | 
            +
            1
         | 
| 1819 | 
            +
            ◦ c
         | 
| 1820 | 
            +
            �⋆−1 ⋆
         | 
| 1821 | 
            +
            ��
         | 
| 1822 | 
            +
            d
         | 
| 1823 | 
            +
            −1
         | 
| 1824 | 
            +
            2
         | 
| 1825 | 
            +
            ◦ c
         | 
| 1826 | 
            +
            �
         | 
| 1827 | 
            +
            ↶
         | 
| 1828 | 
            +
            �
         | 
| 1829 | 
            +
            d
         | 
| 1830 | 
            +
            −1
         | 
| 1831 | 
            +
            1
         | 
| 1832 | 
            +
            ◦ c
         | 
| 1833 | 
            +
            �⋆−1�⋆−1 �
         | 
| 1834 | 
            +
            = c ↶
         | 
| 1835 | 
            +
            � ��
         | 
| 1836 | 
            +
            d
         | 
| 1837 | 
            +
            −1
         | 
| 1838 | 
            +
            2
         | 
| 1839 | 
            +
            ◦ c
         | 
| 1840 | 
            +
            �
         | 
| 1841 | 
            +
            ↶
         | 
| 1842 | 
            +
            �
         | 
| 1843 | 
            +
            d
         | 
| 1844 | 
            +
            −1
         | 
| 1845 | 
            +
            1
         | 
| 1846 | 
            +
            ◦ c
         | 
| 1847 | 
            +
            �⋆−1�
         | 
| 1848 | 
            +
            ⋆
         | 
| 1849 | 
            +
            �
         | 
| 1850 | 
            +
            d
         | 
| 1851 | 
            +
            −1
         | 
| 1852 | 
            +
            1
         | 
| 1853 | 
            +
            ◦ c
         | 
| 1854 | 
            +
            � �⋆−1
         | 
| 1855 | 
            +
            .
         | 
| 1856 | 
            +
            Applying (12),
         | 
| 1857 | 
            +
            �
         | 
| 1858 | 
            +
            cˇ@d1
         | 
| 1859 | 
            +
            � ˇ@d2 = c ↶
         | 
| 1860 | 
            +
            �
         | 
| 1861 | 
            +
            �
         | 
| 1862 | 
            +
            d
         | 
| 1863 | 
            +
            −1
         | 
| 1864 | 
            +
            1
         | 
| 1865 | 
            +
            ◦ c
         | 
| 1866 | 
            +
            �
         | 
| 1867 | 
            +
            �� �
         | 
| 1868 | 
            +
            d
         | 
| 1869 | 
            +
            −1
         | 
| 1870 | 
            +
            2
         | 
| 1871 | 
            +
            ◦ c
         | 
| 1872 | 
            +
            �
         | 
| 1873 | 
            +
            ↶
         | 
| 1874 | 
            +
            �
         | 
| 1875 | 
            +
            d
         | 
| 1876 | 
            +
            −1
         | 
| 1877 | 
            +
            1
         | 
| 1878 | 
            +
            ◦ c
         | 
| 1879 | 
            +
            �⋆−1 �
         | 
| 1880 | 
            +
            ↶
         | 
| 1881 | 
            +
            �
         | 
| 1882 | 
            +
            d
         | 
| 1883 | 
            +
            −1
         | 
| 1884 | 
            +
            1
         | 
| 1885 | 
            +
            ◦ c
         | 
| 1886 | 
            +
            �
         | 
| 1887 | 
            +
            ��⋆−1
         | 
| 1888 | 
            +
            .
         | 
| 1889 | 
            +
            Using Theorem 5.9,
         | 
| 1890 | 
            +
            �
         | 
| 1891 | 
            +
            cˇ@d1
         | 
| 1892 | 
            +
            � ˇ@d2 = c ↶
         | 
| 1893 | 
            +
            �
         | 
| 1894 | 
            +
            �
         | 
| 1895 | 
            +
            d
         | 
| 1896 | 
            +
            −1
         | 
| 1897 | 
            +
            1
         | 
| 1898 | 
            +
            ◦ c
         | 
| 1899 | 
            +
            �
         | 
| 1900 | 
            +
            �
         | 
| 1901 | 
            +
            �
         | 
| 1902 | 
            +
            d
         | 
| 1903 | 
            +
            −1
         | 
| 1904 | 
            +
            2
         | 
| 1905 | 
            +
            ◦ c
         | 
| 1906 | 
            +
            �
         | 
| 1907 | 
            +
            ↶
         | 
| 1908 | 
            +
            ��
         | 
| 1909 | 
            +
            d
         | 
| 1910 | 
            +
            −1
         | 
| 1911 | 
            +
            1
         | 
| 1912 | 
            +
            ◦ c
         | 
| 1913 | 
            +
            �⋆−1 ⋆
         | 
| 1914 | 
            +
            �
         | 
| 1915 | 
            +
            d
         | 
| 1916 | 
            +
            −1
         | 
| 1917 | 
            +
            1
         | 
| 1918 | 
            +
            ◦ c
         | 
| 1919 | 
            +
            �� ��⋆−1
         | 
| 1920 | 
            +
            = c ↶
         | 
| 1921 | 
            +
            ��
         | 
| 1922 | 
            +
            d
         | 
| 1923 | 
            +
            −1
         | 
| 1924 | 
            +
            1
         | 
| 1925 | 
            +
            ◦ c
         | 
| 1926 | 
            +
            �
         | 
| 1927 | 
            +
            ��
         | 
| 1928 | 
            +
            d
         | 
| 1929 | 
            +
            −1
         | 
| 1930 | 
            +
            2
         | 
| 1931 | 
            +
            ◦ c
         | 
| 1932 | 
            +
            �
         | 
| 1933 | 
            +
            ↶ ll
         | 
| 1934 | 
            +
            ��⋆−1
         | 
| 1935 | 
            +
            = c ↶
         | 
| 1936 | 
            +
            ��
         | 
| 1937 | 
            +
            d
         | 
| 1938 | 
            +
            −1
         | 
| 1939 | 
            +
            1
         | 
| 1940 | 
            +
            ◦ c
         | 
| 1941 | 
            +
            �
         | 
| 1942 | 
            +
            �
         | 
| 1943 | 
            +
            d
         | 
| 1944 | 
            +
            −1
         | 
| 1945 | 
            +
            2
         | 
| 1946 | 
            +
            ◦ c
         | 
| 1947 | 
            +
            ��⋆−1 .
         | 
| 1948 | 
            +
            In light of Theorem 5.1,
         | 
| 1949 | 
            +
            �
         | 
| 1950 | 
            +
            cˇ@d1
         | 
| 1951 | 
            +
            � ˇ@d2 = c ↶
         | 
| 1952 | 
            +
            ��
         | 
| 1953 | 
            +
            d
         | 
| 1954 | 
            +
            −1
         | 
| 1955 | 
            +
            1
         | 
| 1956 | 
            +
            d
         | 
| 1957 | 
            +
            −1
         | 
| 1958 | 
            +
            2
         | 
| 1959 | 
            +
            �
         | 
| 1960 | 
            +
            ◦ c
         | 
| 1961 | 
            +
            �⋆−1
         | 
| 1962 | 
            +
            = c ↶
         | 
| 1963 | 
            +
            �
         | 
| 1964 | 
            +
            (d1
         | 
| 1965 | 
            +
            d2)
         | 
| 1966 | 
            +
            −1 ◦ c
         | 
| 1967 | 
            +
            �⋆−1 .
         | 
| 1968 | 
            +
            Therefore,
         | 
| 1969 | 
            +
            �
         | 
| 1970 | 
            +
            cˇ@d1
         | 
| 1971 | 
            +
            � ˇ@d2 = cˇ@ (d1
         | 
| 1972 | 
            +
            d2) .
         | 
| 1973 | 
            +
            It is worth noting that for the additive dynamic feedback product the transformation group
         | 
| 1974 | 
            +
            is the additive group (Rm⟨⟨X′⟩⟩, +, 0) while here (Rm
         | 
| 1975 | 
            +
            pi ⟨⟨X′⟩⟩,
         | 
| 1976 | 
            +
            , ll) plays the role.
         | 
| 1977 | 
            +
            7. Invariance of Class and Relative Degree under multiplicative dynamic
         | 
| 1978 | 
            +
            feedback connection
         | 
| 1979 | 
            +
            The notion of relative degree of a plant is very essential and prime in the studies of
         | 
| 1980 | 
            +
            feedback linearization [Isidori(1995)], flatness and system inversion etc. The existence and
         | 
| 1981 | 
            +
            quantification of relative degree of a interconnection of systems is vital in systems theory.
         | 
| 1982 | 
            +
            The notion of class and relative degree of a SISO Chen–Fliess series is equivalently char-
         | 
| 1983 | 
            +
            acterized by the notion of relative degree of its generating series and the definition was
         | 
| 1984 | 
            +
            furnished in [Gray, et al.(2014b), Gray & Venkatesh(2019)] and the existence and quantifi-
         | 
| 1985 | 
            +
            cation of relative degree of interconnected system of Chen–Fliess series was described in
         | 
| 1986 | 
            +
            [Gray & Venkatesh(2019), Venkatesh(2021)]. In addition, this definition of relative degree is
         | 
| 1987 | 
            +
            consistent with the classical definition whenever y = Fc[u] has an input-affine analytic state
         | 
| 1988 | 
            +
            space realization [Gray, et al.(2014b), Gray & Ebrahimi-Fard(2017)]. Let X = {x0, x1} and
         | 
| 1989 | 
            +
            the following definition explains the concept of a class, a weaker notion than the relative
         | 
| 1990 | 
            +
            degree of a series in R⟨⟨X⟩⟩.
         | 
| 1991 | 
            +
            Definition 7.1.
         | 
| 1992 | 
            +
            [Gray & Venkatesh(2019)] A series c ∈ R⟨⟨X⟩⟩ is said to be of r-class,
         | 
| 1993 | 
            +
            denoted by C (c) = r, if supp(cF) ⊆ xr−1
         | 
| 1994 | 
            +
            0
         | 
| 1995 | 
            +
            X+ and supp(cF) ⊈ xr
         | 
| 1996 | 
            +
            0X+.
         | 
| 1997 | 
            +
            By definition, let
         | 
| 1998 | 
            +
            C (c) = ∞ if cF = 0.
         | 
| 1999 | 
            +
            The notion of class is universal and is versed in the following theorem.
         | 
| 2000 | 
            +
             | 
| 2001 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 2002 | 
            +
            21
         | 
| 2003 | 
            +
            Lemma 7.1. [Gray & Venkatesh(2019)] Every series c ∈ R⟨⟨X⟩⟩ has a class.
         | 
| 2004 | 
            +
            Definition 7.1 of class is illustrated in the following example.
         | 
| 2005 | 
            +
            Example 7.1. Let c = 1 + x0x2
         | 
| 2006 | 
            +
            1 + x2
         | 
| 2007 | 
            +
            0x1, so that cF = x0x2
         | 
| 2008 | 
            +
            1 + x2
         | 
| 2009 | 
            +
            0x1. Observe that supp(cF) ⊆
         | 
| 2010 | 
            +
            x0X+ but supp(cF) ⊈ x2
         | 
| 2011 | 
            +
            0X+. Thus, C (c) = 2.
         | 
| 2012 | 
            +
            The following lemma is essential in the proof of quantification of class for the multiplicative
         | 
| 2013 | 
            +
            mixed composition product.
         | 
| 2014 | 
            +
            Lemma 7.2. Let c, c′, d ∈ Rm⟨⟨X⟩⟩ such that supp (c′) ̸⊆ x0X∗. Then the following state-
         | 
| 2015 | 
            +
            ments are true:
         | 
| 2016 | 
            +
            (1) xk
         | 
| 2017 | 
            +
            0 ↶ d = xk
         | 
| 2018 | 
            +
            0 ∀k ∈ N0.
         | 
| 2019 | 
            +
            (2) cN ↶ d = cN where cN is the natural part of the series c.
         | 
| 2020 | 
            +
            (3) supp (c′ ↶ d) ̸⊆ x0X∗.
         | 
| 2021 | 
            +
            Proof:
         | 
| 2022 | 
            +
            (1) The proof is by induction on k ∈ N0. The base case being k = 0 is true viz ∅ ↶ d = ∅
         | 
| 2023 | 
            +
            from (11). Assume the proposition is true for k = n − 1, then using (11)
         | 
| 2024 | 
            +
            xn
         | 
| 2025 | 
            +
            0 ↶ d = x0
         | 
| 2026 | 
            +
            �
         | 
| 2027 | 
            +
            xn−1
         | 
| 2028 | 
            +
            0
         | 
| 2029 | 
            +
            ↶ d
         | 
| 2030 | 
            +
            �
         | 
| 2031 | 
            +
            = x0
         | 
| 2032 | 
            +
            �
         | 
| 2033 | 
            +
            xn−1
         | 
| 2034 | 
            +
            0
         | 
| 2035 | 
            +
            �
         | 
| 2036 | 
            +
            = xn
         | 
| 2037 | 
            +
            0.
         | 
| 2038 | 
            +
            Hence proved by induction on N0.
         | 
| 2039 | 
            +
            (2) Observe that from Definition 2.1, supp (cN) ⊆ {xk
         | 
| 2040 | 
            +
            0 : k ∈ N0}. Thus, using the previ-
         | 
| 2041 | 
            +
            ous statement (1) and Theorem 5.4 it follows that cN ↶ d = cN.
         | 
| 2042 | 
            +
            (3) Since supp (c′) ̸⊆ x0X∗, there exists a word xiη ∈ supp (c′) where xi ̸= x0 and η ∈ X∗.
         | 
| 2043 | 
            +
            Using (11),
         | 
| 2044 | 
            +
            xiη ↶ d = xi (di
         | 
| 2045 | 
            +
            (η ↶ d)) .
         | 
| 2046 | 
            +
            Thus, supp (xiη ↶ d) ⊆ xiX∗, where xi ̸= x0. Therefore, supp (c′ ↶ d) ̸⊆ x0X∗.
         | 
| 2047 | 
            +
            The following theorem quantifies that class is invariant under the multiplicative mixed
         | 
| 2048 | 
            +
            composition product
         | 
| 2049 | 
            +
            Theorem 7.1. Let c, d ∈ R⟨⟨X⟩⟩, then C (c ↶ d) = C (c).
         | 
| 2050 | 
            +
            Proof: Suppose the series c ∈ R⟨⟨X⟩⟩ is of r-class, then the series c can be written as:
         | 
| 2051 | 
            +
            c = cN + xr−1
         | 
| 2052 | 
            +
            0
         | 
| 2053 | 
            +
            c′,
         | 
| 2054 | 
            +
            where c′ is a proper series such that supp (c′) ̸⊆ x0X∗. Hence by Theorem 5.4,
         | 
| 2055 | 
            +
            c ↶ d = (cN ↶ d) +
         | 
| 2056 | 
            +
            �
         | 
| 2057 | 
            +
            xr−1
         | 
| 2058 | 
            +
            0
         | 
| 2059 | 
            +
            c′ ↶ d
         | 
| 2060 | 
            +
            �
         | 
| 2061 | 
            +
            .
         | 
| 2062 | 
            +
            Using (11),
         | 
| 2063 | 
            +
            c ↶ d = (cN ↶ d) + xr−1
         | 
| 2064 | 
            +
            0
         | 
| 2065 | 
            +
            (c′ ↶ d) .
         | 
| 2066 | 
            +
            Since supp (c′) ̸⊆ x0X∗, then by applying Lemma 7.2,
         | 
| 2067 | 
            +
            c ↶ d = cN + xr−1
         | 
| 2068 | 
            +
            0
         | 
| 2069 | 
            +
            (c′ ↶ d) ,
         | 
| 2070 | 
            +
             | 
| 2071 | 
            +
            22
         | 
| 2072 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 2073 | 
            +
            with supp (c′ ↶ d) ̸⊆ x0X∗. Given that c′ ∈ Rp ⟨⟨X⟩⟩, whence supp (c ↶ d)F ⊆ xr−1
         | 
| 2074 | 
            +
            0
         | 
| 2075 | 
            +
            X+ and
         | 
| 2076 | 
            +
            supp (c ↶ d)F ̸⊆ xr
         | 
| 2077 | 
            +
            0X+. Therefore, C (c ↶ d) = r = C (c).
         | 
| 2078 | 
            +
            Example 7.2. Consider the series c in Example 7.1, given by c = 1 + x2
         | 
| 2079 | 
            +
            0x1 + x0x2
         | 
| 2080 | 
            +
            1 and
         | 
| 2081 | 
            +
            d = 1 + x1 ∈ R⟨⟨X⟩⟩. Using (11), the multiplicative mixed composition product of c and d
         | 
| 2082 | 
            +
            is computed as:
         | 
| 2083 | 
            +
            c ↶ d = 1 + x0x2
         | 
| 2084 | 
            +
            1 + 3x0x3
         | 
| 2085 | 
            +
            1 + 3x0x4
         | 
| 2086 | 
            +
            1 + x2
         | 
| 2087 | 
            +
            0x1 + x2
         | 
| 2088 | 
            +
            0x2
         | 
| 2089 | 
            +
            1.
         | 
| 2090 | 
            +
            Observe that C (c ↶ d) = 2 = C (c), as in Example 7.1.
         | 
| 2091 | 
            +
            The following theorem asserts that class of a series is preserved under the multiplicative
         | 
| 2092 | 
            +
            dynamic feedback product which is one of the prime goal of this subsection.
         | 
| 2093 | 
            +
            Theorem 7.2. If c ∈ R⟨⟨X⟩⟩ with C (c) = r, and d ∈ Rpi ⟨⟨X⟩⟩, then C
         | 
| 2094 | 
            +
            �
         | 
| 2095 | 
            +
            cˇ@d
         | 
| 2096 | 
            +
            �
         | 
| 2097 | 
            +
            = r = C (c).
         | 
| 2098 | 
            +
            Proof: From Theorem 6.2,
         | 
| 2099 | 
            +
            cˇ@d = c ↶
         | 
| 2100 | 
            +
            �
         | 
| 2101 | 
            +
            d
         | 
| 2102 | 
            +
            −1 ◦ c
         | 
| 2103 | 
            +
            �⋆−1 .
         | 
| 2104 | 
            +
            Since C (c) = r, whence applying Theorem 7.1,
         | 
| 2105 | 
            +
            C
         | 
| 2106 | 
            +
            �
         | 
| 2107 | 
            +
            cˇ@d
         | 
| 2108 | 
            +
            �
         | 
| 2109 | 
            +
            = C
         | 
| 2110 | 
            +
            �
         | 
| 2111 | 
            +
            c ↶
         | 
| 2112 | 
            +
            �
         | 
| 2113 | 
            +
            d
         | 
| 2114 | 
            +
            −1 ◦ c
         | 
| 2115 | 
            +
            �⋆−1�
         | 
| 2116 | 
            +
            = r = C (c) .
         | 
| 2117 | 
            +
            The preservation of class under the multiplicative dynamic feedback connections as as-
         | 
| 2118 | 
            +
            serted in Theorem 7.2 is further illustrated in the following example.
         | 
| 2119 | 
            +
            Example 7.3. Let c, d ∈ R⟨⟨X⟩⟩ c = x1 and d = 1 + �
         | 
| 2120 | 
            +
            k∈N k!xk
         | 
| 2121 | 
            +
            1. Note that the class of
         | 
| 2122 | 
            +
            series C (c) = 1. Using Theorem 6.2 the multiplicative feedback product is computed as:
         | 
| 2123 | 
            +
            cˇ@d = x1 + x1x0x1 + 3x1x0x1x0x1 + 4x1x2
         | 
| 2124 | 
            +
            0x2
         | 
| 2125 | 
            +
            1 + · · · .
         | 
| 2126 | 
            +
            Infer from Definition 7.1 that C
         | 
| 2127 | 
            +
            �
         | 
| 2128 | 
            +
            cˇ@d
         | 
| 2129 | 
            +
            �
         | 
| 2130 | 
            +
            = C (c) = 1.
         | 
| 2131 | 
            +
            Finally, the main definition of the section details the concept of relative degree in the
         | 
| 2132 | 
            +
            context of Chen–Fliess series which is characterized on its generating series.
         | 
| 2133 | 
            +
            Definition 7.2.
         | 
| 2134 | 
            +
            [Gray & Venkatesh(2019)] A series c ∈ R⟨⟨X⟩⟩ has relative degree r if
         | 
| 2135 | 
            +
            C (c) = r and the word xr−1
         | 
| 2136 | 
            +
            0
         | 
| 2137 | 
            +
            x1 ∈ supp(cF). Otherwise, c does not have relative degree.
         | 
| 2138 | 
            +
            The following theorem asserts the quantification of relative degree under multiplicative
         | 
| 2139 | 
            +
            mixed composition product.
         | 
| 2140 | 
            +
            Theorem 7.3. If c ∈ R⟨⟨X⟩⟩ with relative degree rc and d ∈ R⟨⟨X⟩⟩ be non-proper, then
         | 
| 2141 | 
            +
            c ↶ d has relative degree rc.
         | 
| 2142 | 
            +
            Proof: From Theorem 7.1, C (c ↶ d) = rc. It remains to prove that xrc−1
         | 
| 2143 | 
            +
            0
         | 
| 2144 | 
            +
            x1 ∈ supp (c ↶ d).
         | 
| 2145 | 
            +
            Given that c ∈ R⟨⟨X⟩⟩ has relative degree rc, then c can be decomposed as:
         | 
| 2146 | 
            +
            c = cN + λxrc−1
         | 
| 2147 | 
            +
            0
         | 
| 2148 | 
            +
            x1 + xrc−1
         | 
| 2149 | 
            +
            0
         | 
| 2150 | 
            +
            c′,
         | 
| 2151 | 
            +
            where λ ̸= 0 and c′ is a proper series such that x1 ̸∈ supp (c′). Then,
         | 
| 2152 | 
            +
            c ↶ d =
         | 
| 2153 | 
            +
            �
         | 
| 2154 | 
            +
            cN + λxrc−1
         | 
| 2155 | 
            +
            0
         | 
| 2156 | 
            +
            x1 + xrc−1
         | 
| 2157 | 
            +
            0
         | 
| 2158 | 
            +
            c′�
         | 
| 2159 | 
            +
            ↶ d.
         | 
| 2160 | 
            +
            Applying Theorem 5.4,
         | 
| 2161 | 
            +
            c ↶ d = (cN ↶ d) + λ
         | 
| 2162 | 
            +
            �
         | 
| 2163 | 
            +
            xrc−1
         | 
| 2164 | 
            +
            0
         | 
| 2165 | 
            +
            x1 ↶ d
         | 
| 2166 | 
            +
            �
         | 
| 2167 | 
            +
            +
         | 
| 2168 | 
            +
            �
         | 
| 2169 | 
            +
            xrc−1
         | 
| 2170 | 
            +
            0
         | 
| 2171 | 
            +
            c′ ↶ d
         | 
| 2172 | 
            +
            �
         | 
| 2173 | 
            +
            .
         | 
| 2174 | 
            +
             | 
| 2175 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 2176 | 
            +
            23
         | 
| 2177 | 
            +
            Using (11) and Lemma 7.2,
         | 
| 2178 | 
            +
            c ↶ d = cN + λxrc−1
         | 
| 2179 | 
            +
            0
         | 
| 2180 | 
            +
            x1d + xrc−1
         | 
| 2181 | 
            +
            0
         | 
| 2182 | 
            +
            (c′ ↶ d) .
         | 
| 2183 | 
            +
            Since d ∈ Rpi ⟨⟨X⟩⟩ −→ d = α + d′, where α ̸= 0 and d′ is a proper series. Hence,
         | 
| 2184 | 
            +
            c ↶ d = cN + λαxrc−1
         | 
| 2185 | 
            +
            0
         | 
| 2186 | 
            +
            x1 + xrc−1
         | 
| 2187 | 
            +
            0
         | 
| 2188 | 
            +
            x1d′ + xrc−1
         | 
| 2189 | 
            +
            0
         | 
| 2190 | 
            +
            (c′ ↶ d) .
         | 
| 2191 | 
            +
            Observe from (11), x1 ̸∈ supp (c′) =⇒ x1 ̸∈ supp (c′ ↶ d) and also that αλ ̸= 0.
         | 
| 2192 | 
            +
            Therefore xrc−1
         | 
| 2193 | 
            +
            0
         | 
| 2194 | 
            +
            x1 ∈ supp (c ↶ d), whence the relative degree of c ↶ d is rc, when d is a
         | 
| 2195 | 
            +
            non-proper series.
         | 
| 2196 | 
            +
            The following example illustrates the statement from Theorem 7.3.
         | 
| 2197 | 
            +
            Example 7.4. Let c = 1 + x2
         | 
| 2198 | 
            +
            0 + x0x1 + x2
         | 
| 2199 | 
            +
            0x1 and d = 1 + x1. Observe that by Definition 7.2,
         | 
| 2200 | 
            +
            the relative degree of c is rc = 2 and also that d is non-proper. The multiplicative mixed
         | 
| 2201 | 
            +
            composition product of c and d to computed as:
         | 
| 2202 | 
            +
            c ↶ d = 1 + x2
         | 
| 2203 | 
            +
            0 + x0x1 + x0x2
         | 
| 2204 | 
            +
            1 + x2
         | 
| 2205 | 
            +
            0x1 + x2
         | 
| 2206 | 
            +
            0x2
         | 
| 2207 | 
            +
            1.
         | 
| 2208 | 
            +
            Using Definition 7.2, note that the relative degree of c ↶ d is 2 = rc.
         | 
| 2209 | 
            +
            The following theorem is the prime objective of this section stating that the relative degree
         | 
| 2210 | 
            +
            of a series remains invariant under multiplicative dynamic feedback product.
         | 
| 2211 | 
            +
            Theorem 7.4. If c ∈ R⟨⟨X⟩⟩ with relative degree rc and d ∈ Rpi ⟨⟨X⟩⟩, then the relative
         | 
| 2212 | 
            +
            degree of
         | 
| 2213 | 
            +
            �
         | 
| 2214 | 
            +
            cˇ@d
         | 
| 2215 | 
            +
            �
         | 
| 2216 | 
            +
            is rc.
         | 
| 2217 | 
            +
            Proof: Since c ∈ R⟨⟨X⟩⟩ and d ∈ Rpi ⟨⟨X⟩⟩, then by Theorem 6.2,
         | 
| 2218 | 
            +
            cˇ@d = c ↶
         | 
| 2219 | 
            +
            �
         | 
| 2220 | 
            +
            d
         | 
| 2221 | 
            +
            −1 ◦ c
         | 
| 2222 | 
            +
            �⋆−1 .
         | 
| 2223 | 
            +
            Observe that d ∈ Rpi ⟨⟨X⟩⟩ ⇔ d
         | 
| 2224 | 
            +
            −1 ∈ Rpi ⟨⟨X⟩⟩.
         | 
| 2225 | 
            +
            Then by Theorem 5.2 (d
         | 
| 2226 | 
            +
            −1 ◦ c) ∈
         | 
| 2227 | 
            +
            Rpi ⟨⟨X⟩⟩. As per Theorem 5.10, the group inverse
         | 
| 2228 | 
            +
            �
         | 
| 2229 | 
            +
            d
         | 
| 2230 | 
            +
            −1 ◦ c
         | 
| 2231 | 
            +
            �⋆−1 ∈ Rpi ⟨⟨X⟩⟩.
         | 
| 2232 | 
            +
            Hence by Theorem 7.3,
         | 
| 2233 | 
            +
            cˇ@d = c ↶
         | 
| 2234 | 
            +
            �
         | 
| 2235 | 
            +
            d
         | 
| 2236 | 
            +
            −1 ◦ c
         | 
| 2237 | 
            +
            �⋆−1 .
         | 
| 2238 | 
            +
            has relative degree rc.
         | 
| 2239 | 
            +
            The invariance of the relative degree of a Chen–Fliess series under multiplicative dynamic
         | 
| 2240 | 
            +
            feedback connections as stated in Theorem 7.4 is illustrated through the following example.
         | 
| 2241 | 
            +
            Example 7.5. Consider the Example 7.3 again where c = x1 and d = 1 + �
         | 
| 2242 | 
            +
            k∈N k!xk
         | 
| 2243 | 
            +
            1.
         | 
| 2244 | 
            +
            Observe that by Definition 7.2, the relative degree of c is rc = 1. The multiplicative feedback
         | 
| 2245 | 
            +
            product is computed as:
         | 
| 2246 | 
            +
            cˇ@d = x1 + x1x0x1 + 3x1x0x1x0x1 + 4x1x2
         | 
| 2247 | 
            +
            0x2
         | 
| 2248 | 
            +
            1 + · · ·
         | 
| 2249 | 
            +
            Infer that the relative degree of cˇ@d = 1 = rc as stated in Theorem 7.4.
         | 
| 2250 | 
            +
             | 
| 2251 | 
            +
            24
         | 
| 2252 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 2253 | 
            +
            8. Computational Framework for Multiplicative Mixed Composition &
         | 
| 2254 | 
            +
            Dynamic Feedback Product
         | 
| 2255 | 
            +
            The goal of this section is to describe the computational framework for multiplicative
         | 
| 2256 | 
            +
            dynamic feedback product as explained in Section 6.
         | 
| 2257 | 
            +
            The section further illustrates the
         | 
| 2258 | 
            +
            framework with examples but prior to that it is imperative to understand the dual bialgebra
         | 
| 2259 | 
            +
            and Hopf algebra constructions corresponding to the multiplicative dynamic output feedback
         | 
| 2260 | 
            +
            group.
         | 
| 2261 | 
            +
            8.1. Hopf Algebra Corresponding to the Multiplicative Dynamic Feedback Sub-
         | 
| 2262 | 
            +
            group. The goal of the subsection is to construct a dual Hopf algebra reflecting the group
         | 
| 2263 | 
            +
            structure of the multiplicative dynamic feedback subgroup M as asserted in Theorem 5.11.
         | 
| 2264 | 
            +
            The group inverse is computed the antipode of the constructed Hopf algebra and thus pro-
         | 
| 2265 | 
            +
            vides a computational framework to compute the multiplicative dynamic feedback group
         | 
| 2266 | 
            +
            inverse. As a recall, the group M is defined as
         | 
| 2267 | 
            +
            M = { ll + d : d ∈ Rm
         | 
| 2268 | 
            +
            p ⟨⟨X⟩⟩},
         | 
| 2269 | 
            +
            where ll = [1 · · ·1 1]T ∈ Rm. In light of Theorem 5.11, (M, ⋆) forms a subgroup of the
         | 
| 2270 | 
            +
            multiplicative dynamic feedback group. The algebra structure is same as the algebra of H
         | 
| 2271 | 
            +
            in Section 4.1. Let the set Wb ⊂ Rm⟨⟨X⟩⟩∗ (dual module of Rm⟨⟨X⟩⟩) be defined as the
         | 
| 2272 | 
            +
            collection of coordinate maps defined as:
         | 
| 2273 | 
            +
            Wb = {aη : aη(c) = (c, η) : η ∈ X∗},
         | 
| 2274 | 
            +
            where c ∈ Rm⟨⟨X⟩⟩.
         | 
| 2275 | 
            +
            Define W to be the free Rm-module spanned by the set Wb.
         | 
| 2276 | 
            +
            Let
         | 
| 2277 | 
            +
            H denote the reduced symmetric algebra generated by the module W. The unit map ξ :
         | 
| 2278 | 
            +
            Rm −→ W is defined by ξ( ll) = a∅. Note that a∅ (c) = ll ∀c ∈ M. By construction H is
         | 
| 2279 | 
            +
            an Rm-associative, commutative and unital algebra with addition, scalar multiplication and
         | 
| 2280 | 
            +
            product defined, respectively, as
         | 
| 2281 | 
            +
            (aη + aζ)(c) = aη(c) + aζ(c)
         | 
| 2282 | 
            +
            (kaη)(c) = k(ai
         | 
| 2283 | 
            +
            η(c))
         | 
| 2284 | 
            +
            m(aη, aζ)(c) = aη(c)aζ(c),
         | 
| 2285 | 
            +
            where c ∈ Rm⟨⟨X⟩⟩. Then H is given a coproduct ∆H : H −→ H � H such that for all
         | 
| 2286 | 
            +
            c, d ∈ M: ∆Hai
         | 
| 2287 | 
            +
            η(c, d) = ai
         | 
| 2288 | 
            +
            η(c ⋆ d) = ((c ⋆ d)i , η) ∀η ∈ X+. The counit map ǫ : H −→ R is
         | 
| 2289 | 
            +
            defined as
         | 
| 2290 | 
            +
            ǫ(h) =
         | 
| 2291 | 
            +
            � ll : h = a∅
         | 
| 2292 | 
            +
            0 : otherwise.
         | 
| 2293 | 
            +
            Since ◦ is associative (from Theorem 5.8), thus by the dual the coproduct ∆H is coasso-
         | 
| 2294 | 
            +
            ciative. Therefore, (H, m, ξ, ∆H, ǫ) forms a Rm-bialgebra. Owing to the group structure of
         | 
| 2295 | 
            +
            (M, ◦), the bialgebra H is equipped with antipode S defined as:
         | 
| 2296 | 
            +
            Saη (c) = aη
         | 
| 2297 | 
            +
            �
         | 
| 2298 | 
            +
            c⋆−1�
         | 
| 2299 | 
            +
            =
         | 
| 2300 | 
            +
            �
         | 
| 2301 | 
            +
            c⋆−1, η
         | 
| 2302 | 
            +
            �
         | 
| 2303 | 
            +
            ,
         | 
| 2304 | 
            +
            for all i = 1, 2, . . . , m and η ∈ X+. Hence H is a Rm-Hopf algebra. The computation of
         | 
| 2305 | 
            +
            coproduct ∆H is well-understood through the right coaction of Hopf algebra H on the Hopf
         | 
| 2306 | 
            +
            algebra H
         | 
| 2307 | 
            +
            . Prior to that, it is imperative to understand the right coaction of Hopf algebra
         | 
| 2308 | 
            +
            H on the non-unital algebra of coordinate functions.
         | 
| 2309 | 
            +
             | 
| 2310 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 2311 | 
            +
            25
         | 
| 2312 | 
            +
            8.2. Coaction of Hopf algebra H on Algebra of Coordinate Map. The subsection
         | 
| 2313 | 
            +
            explains the coaction of the Hopf algebra H defined in Section 8.1 on the algebra of coordinate
         | 
| 2314 | 
            +
            functions. The results in this subsection are utilized subsequently to explain the coaction of
         | 
| 2315 | 
            +
            H on the bialgebra H
         | 
| 2316 | 
            +
            , particularly in proofs in Section 8.3. The right coaction of the Hopf
         | 
| 2317 | 
            +
            algebra H is on Rm-algebra of coordinate maps S+ (W) constructed in Section 4.3.
         | 
| 2318 | 
            +
            The right coaction map ˜∆ : S+ (W) −→ S+ (W) � H is defined such that for all c ∈
         | 
| 2319 | 
            +
            Rm⟨⟨X⟩⟩, d ∈ M and η ∈ X∗,
         | 
| 2320 | 
            +
            ˜∆aη (c, d) = (c ↶ d, η) .
         | 
| 2321 | 
            +
            (17)
         | 
| 2322 | 
            +
            The map ˜∆ being a right coaction map is a reflection of Theorem 5.9. It remains to
         | 
| 2323 | 
            +
            show how the coaction map ˜∆ is computed on S+(W), for which it is sufficient to define its
         | 
| 2324 | 
            +
            computation on the module W. Observe that for all aη ∈ W,
         | 
| 2325 | 
            +
            ˜∆aη =
         | 
| 2326 | 
            +
            �
         | 
| 2327 | 
            +
            ˜∆ ◦ π1 ˜∆ ◦ π2 · · · ˜∆ ◦ πm�t
         | 
| 2328 | 
            +
            aη.
         | 
| 2329 | 
            +
            On the dual side, the above statement infers that for all c ∈ Rm⟨⟨X⟩⟩, d ∈ M and η ∈ X∗,
         | 
| 2330 | 
            +
            (c ↶ d, η) = [((c ↶ d)1 , η) · · · ((c ↶ d)m , η)]t .
         | 
| 2331 | 
            +
            Hence, the notation ˜∆ai
         | 
| 2332 | 
            +
            η := ˜∆ ◦ πiaη for all η ∈ X∗ and i = 1, 2, . . . , m. The following
         | 
| 2333 | 
            +
            proposition provides a recursive definition to compute ˜∆ on the module V viz to compute
         | 
| 2334 | 
            +
            the ˜∆
         | 
| 2335 | 
            +
            �
         | 
| 2336 | 
            +
            aj
         | 
| 2337 | 
            +
            η
         | 
| 2338 | 
            +
            �
         | 
| 2339 | 
            +
            ∀η ∈ X∗ and j = 1, 2, . . . , m.
         | 
| 2340 | 
            +
            Proposition 8.1. For all i = 1, . . . , m:
         | 
| 2341 | 
            +
            (1) ˜∆ai
         | 
| 2342 | 
            +
            ∅ = ai
         | 
| 2343 | 
            +
            ∅ ⊗ ai
         | 
| 2344 | 
            +
            ∅.
         | 
| 2345 | 
            +
            (2) ˜∆ ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆.
         | 
| 2346 | 
            +
            (3) ˜∆ ◦ θi = (θi ⊗ m) ◦
         | 
| 2347 | 
            +
            �
         | 
| 2348 | 
            +
            ˜∆ ⊗ id
         | 
| 2349 | 
            +
            �
         | 
| 2350 | 
            +
            ◦ ρi ,
         | 
| 2351 | 
            +
            where ρ
         | 
| 2352 | 
            +
            is the coaction map of Hopf algebra H
         | 
| 2353 | 
            +
            on S+ (W) as defined in Section 4.3.
         | 
| 2354 | 
            +
            Proof: Observe that ∀c ∈ Rm⟨⟨X⟩⟩ and d ∈ M,
         | 
| 2355 | 
            +
            c = (c, ∅) +
         | 
| 2356 | 
            +
            m
         | 
| 2357 | 
            +
            �
         | 
| 2358 | 
            +
            j=0
         | 
| 2359 | 
            +
            xj
         | 
| 2360 | 
            +
            �
         | 
| 2361 | 
            +
            x−1
         | 
| 2362 | 
            +
            j
         | 
| 2363 | 
            +
            (c)
         | 
| 2364 | 
            +
            �
         | 
| 2365 | 
            +
            .
         | 
| 2366 | 
            +
            Hence by Theorem 5.4,
         | 
| 2367 | 
            +
            c ↶ d = (c, ∅) + x0
         | 
| 2368 | 
            +
            �
         | 
| 2369 | 
            +
            x−1
         | 
| 2370 | 
            +
            0 (c) ↶ d
         | 
| 2371 | 
            +
            �
         | 
| 2372 | 
            +
            +
         | 
| 2373 | 
            +
            m
         | 
| 2374 | 
            +
            �
         | 
| 2375 | 
            +
            j=1
         | 
| 2376 | 
            +
            xj
         | 
| 2377 | 
            +
            �
         | 
| 2378 | 
            +
            dj
         | 
| 2379 | 
            +
            �
         | 
| 2380 | 
            +
            x−1
         | 
| 2381 | 
            +
            j
         | 
| 2382 | 
            +
            (c) ↶ d
         | 
| 2383 | 
            +
            ��
         | 
| 2384 | 
            +
            .
         | 
| 2385 | 
            +
            (18)
         | 
| 2386 | 
            +
            The proof for each of the statement as follows:
         | 
| 2387 | 
            +
            (1) Let c, d ∈ Rm⟨⟨X⟩⟩. From (17) and (18),
         | 
| 2388 | 
            +
            ˜∆ai
         | 
| 2389 | 
            +
            ∅ (c, d) = ((c ↶ d)i , ∅)
         | 
| 2390 | 
            +
            = (ci ↶ d, ∅) = (ci, ∅) .1 = ai
         | 
| 2391 | 
            +
            ∅ ⊗ ai
         | 
| 2392 | 
            +
            ∅ (c, d) .
         | 
| 2393 | 
            +
            Therefore, ˜∆ai
         | 
| 2394 | 
            +
            ∅ = ai
         | 
| 2395 | 
            +
            ∅ ⊗ ai
         | 
| 2396 | 
            +
            ∅.
         | 
| 2397 | 
            +
             | 
| 2398 | 
            +
            26
         | 
| 2399 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 2400 | 
            +
            (2) Let c, d ∈ Rm⟨⟨X⟩⟩, η ∈ X∗ and ∀ j = 1, 2, . . . , m. Then,
         | 
| 2401 | 
            +
            �
         | 
| 2402 | 
            +
            ˜∆ ◦ θ0
         | 
| 2403 | 
            +
            �
         | 
| 2404 | 
            +
            aj
         | 
| 2405 | 
            +
            η (c, d) =
         | 
| 2406 | 
            +
            �
         | 
| 2407 | 
            +
            (c ↶ d)j , x0η
         | 
| 2408 | 
            +
            �
         | 
| 2409 | 
            +
            =
         | 
| 2410 | 
            +
            �
         | 
| 2411 | 
            +
            x−1
         | 
| 2412 | 
            +
            0 (c ↶ d)j , η
         | 
| 2413 | 
            +
            �
         | 
| 2414 | 
            +
            From (18),
         | 
| 2415 | 
            +
            �
         | 
| 2416 | 
            +
            ˜∆ ◦ θ0
         | 
| 2417 | 
            +
            �
         | 
| 2418 | 
            +
            aj
         | 
| 2419 | 
            +
            η (c, d) =
         | 
| 2420 | 
            +
            �
         | 
| 2421 | 
            +
            x−1
         | 
| 2422 | 
            +
            0 (cj) ↶ d, η
         | 
| 2423 | 
            +
            �
         | 
| 2424 | 
            +
            = ˜∆aj
         | 
| 2425 | 
            +
            η
         | 
| 2426 | 
            +
            �
         | 
| 2427 | 
            +
            x−1
         | 
| 2428 | 
            +
            0 (c) , d
         | 
| 2429 | 
            +
            �
         | 
| 2430 | 
            +
            = (θ0 ⊗ id) ◦ ˜∆aη (c, d) .
         | 
| 2431 | 
            +
            Therefore, ˜∆ ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆.
         | 
| 2432 | 
            +
            (3) Let c, d ∈ Rm⟨⟨X⟩⟩ and η ∈ X∗. Then ∀ i, j = 1, 2, . . . , m,
         | 
| 2433 | 
            +
            �
         | 
| 2434 | 
            +
            ˜∆ ◦ θi
         | 
| 2435 | 
            +
            �
         | 
| 2436 | 
            +
            aj
         | 
| 2437 | 
            +
            η (c, d) =
         | 
| 2438 | 
            +
            �
         | 
| 2439 | 
            +
            (c ↶ d)j , xiη
         | 
| 2440 | 
            +
            �
         | 
| 2441 | 
            +
            =
         | 
| 2442 | 
            +
            �
         | 
| 2443 | 
            +
            x−1
         | 
| 2444 | 
            +
            i
         | 
| 2445 | 
            +
            (c ↶ d)j , η
         | 
| 2446 | 
            +
            �
         | 
| 2447 | 
            +
            From (18),
         | 
| 2448 | 
            +
            �
         | 
| 2449 | 
            +
            ˜∆ ◦ θi
         | 
| 2450 | 
            +
            �
         | 
| 2451 | 
            +
            aj
         | 
| 2452 | 
            +
            η (c, d) =
         | 
| 2453 | 
            +
            �
         | 
| 2454 | 
            +
            di
         | 
| 2455 | 
            +
            x−1
         | 
| 2456 | 
            +
            i
         | 
| 2457 | 
            +
            (cj) ↶ d, η
         | 
| 2458 | 
            +
            �
         | 
| 2459 | 
            +
            = ρi aj
         | 
| 2460 | 
            +
            η
         | 
| 2461 | 
            +
            �
         | 
| 2462 | 
            +
            x−1
         | 
| 2463 | 
            +
            i
         | 
| 2464 | 
            +
            (c) ↶ d, d
         | 
| 2465 | 
            +
            �
         | 
| 2466 | 
            +
            = ρi aj
         | 
| 2467 | 
            +
            η
         | 
| 2468 | 
            +
            �
         | 
| 2469 | 
            +
            x−1
         | 
| 2470 | 
            +
            i
         | 
| 2471 | 
            +
            (c) ↶ d
         | 
| 2472 | 
            +
            �
         | 
| 2473 | 
            +
            = ρi aj
         | 
| 2474 | 
            +
            η
         | 
| 2475 | 
            +
            �
         | 
| 2476 | 
            +
            x−1
         | 
| 2477 | 
            +
            i
         | 
| 2478 | 
            +
            (c) ↶ d, d
         | 
| 2479 | 
            +
            �
         | 
| 2480 | 
            +
            =
         | 
| 2481 | 
            +
            �
         | 
| 2482 | 
            +
            ˜∆ ⊗ id
         | 
| 2483 | 
            +
            �
         | 
| 2484 | 
            +
            ◦ ρi aj
         | 
| 2485 | 
            +
            η
         | 
| 2486 | 
            +
            �
         | 
| 2487 | 
            +
            x−1
         | 
| 2488 | 
            +
            i
         | 
| 2489 | 
            +
            (c) , d, d
         | 
| 2490 | 
            +
            �
         | 
| 2491 | 
            +
            = (θi ⊗ m) ◦
         | 
| 2492 | 
            +
            �
         | 
| 2493 | 
            +
            ˜∆ ⊗ id
         | 
| 2494 | 
            +
            �
         | 
| 2495 | 
            +
            ◦ ρi aj
         | 
| 2496 | 
            +
            η (c, d) .
         | 
| 2497 | 
            +
            Therefore, ˜∆ ◦ θi = (θi ⊗ m) ◦
         | 
| 2498 | 
            +
            �
         | 
| 2499 | 
            +
            ˜∆ ⊗ id
         | 
| 2500 | 
            +
            �
         | 
| 2501 | 
            +
            ◦ ρi
         | 
| 2502 | 
            +
            ∀i = 1, 2, . . . , m.
         | 
| 2503 | 
            +
            Example 8.1. A few examples of the computation of ˜∆ on V using Proposition 8.1 are
         | 
| 2504 | 
            +
            given as follows(indices i, j, k = 1, 2, . . . , m.):
         | 
| 2505 | 
            +
            ˜∆ai
         | 
| 2506 | 
            +
            ∅ = ai
         | 
| 2507 | 
            +
            ∅ ⊗ ai
         | 
| 2508 | 
            +
            ∅.
         | 
| 2509 | 
            +
            ˜∆ai
         | 
| 2510 | 
            +
            x0 = ai
         | 
| 2511 | 
            +
            x0 ⊗ ai
         | 
| 2512 | 
            +
            ∅.
         | 
| 2513 | 
            +
            ˜∆aj
         | 
| 2514 | 
            +
            xi = aj
         | 
| 2515 | 
            +
            xi ⊗ ai
         | 
| 2516 | 
            +
            ∅.
         | 
| 2517 | 
            +
            ˜∆ai
         | 
| 2518 | 
            +
            x2
         | 
| 2519 | 
            +
            0 = ai
         | 
| 2520 | 
            +
            x2
         | 
| 2521 | 
            +
            0 ⊗ ai
         | 
| 2522 | 
            +
            ∅.
         | 
| 2523 | 
            +
            ˜∆aj
         | 
| 2524 | 
            +
            x0xi = aj
         | 
| 2525 | 
            +
            x0xi ⊗ ai
         | 
| 2526 | 
            +
            ∅.
         | 
| 2527 | 
            +
            ˜∆aj
         | 
| 2528 | 
            +
            xix0 =
         | 
| 2529 | 
            +
            �
         | 
| 2530 | 
            +
            aj
         | 
| 2531 | 
            +
            xix0 ⊗ ai
         | 
| 2532 | 
            +
            ∅
         | 
| 2533 | 
            +
            �
         | 
| 2534 | 
            +
            +
         | 
| 2535 | 
            +
            �
         | 
| 2536 | 
            +
            aj
         | 
| 2537 | 
            +
            xi ⊗ ai
         | 
| 2538 | 
            +
            x0
         | 
| 2539 | 
            +
            �
         | 
| 2540 | 
            +
            .
         | 
| 2541 | 
            +
             | 
| 2542 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 2543 | 
            +
            27
         | 
| 2544 | 
            +
            ˜∆ak
         | 
| 2545 | 
            +
            xixj =
         | 
| 2546 | 
            +
            �
         | 
| 2547 | 
            +
            ak
         | 
| 2548 | 
            +
            xixj ⊗ aj
         | 
| 2549 | 
            +
            ∅ai
         | 
| 2550 | 
            +
            ∅
         | 
| 2551 | 
            +
            �
         | 
| 2552 | 
            +
            +
         | 
| 2553 | 
            +
            �
         | 
| 2554 | 
            +
            ak
         | 
| 2555 | 
            +
            xi ⊗ ai
         | 
| 2556 | 
            +
            xj
         | 
| 2557 | 
            +
            �
         | 
| 2558 | 
            +
            .
         | 
| 2559 | 
            +
            The coaction map ˜∆ thus provides a framework to compute the multiplicative mixed com-
         | 
| 2560 | 
            +
            position product and multiplicative dynamic feedback group product whenever c ∈ Rm⟨⟨X⟩⟩
         | 
| 2561 | 
            +
            and d ∈ M ⊊ Rm⟨⟨X⟩⟩. For computing the multiplicative mixed composition product for
         | 
| 2562 | 
            +
            c ∈ Rp⟨⟨X⟩⟩ and d ∈ M ⊊ Rm⟨⟨X⟩⟩ where p = m,
         | 
| 2563 | 
            +
            (1) If p < m, then define ˇc ∈ Rm⟨⟨X⟩⟩ such that ˇci = ci ∀ i = 1, 2, . . . , p and ˇci = 0 ∀ i =
         | 
| 2564 | 
            +
            p + 1, p + 2, . . . , m. Then for all η ∈ X∗,
         | 
| 2565 | 
            +
            ((c ↶ d)i , η) = ˜∆ai
         | 
| 2566 | 
            +
            η (ˇc, d)
         | 
| 2567 | 
            +
            ∀i = 1, 2, . . . , p.
         | 
| 2568 | 
            +
            Note that (ˇc ↶ d)j = 0 ∀j = p + 1, p + 2, . . . , m.
         | 
| 2569 | 
            +
            (2) If p > m, then this can be reduced to Case 1 by performing computations component
         | 
| 2570 | 
            +
            wise viz computing ci ↶ d for all i = 1, 2, . . . , p.
         | 
| 2571 | 
            +
            Thus the computational framework to compute the multiplicative mixed composition prod-
         | 
| 2572 | 
            +
            uct of c ∈ Rp⟨⟨X⟩⟩ and d ∈ M, denoted by c ↶ d for arbitrary p and m is well-defined via
         | 
| 2573 | 
            +
            the coaction map ˜∆. The computations of the coproduct ∆H and antipode S (defined in
         | 
| 2574 | 
            +
            Section 8.1) are well-understood once the right coaction of Hopf algebra H on Hopf algebra
         | 
| 2575 | 
            +
            H
         | 
| 2576 | 
            +
            .
         | 
| 2577 | 
            +
            8.3. Coaction of Hopf algbera H on the Hopf algebra H
         | 
| 2578 | 
            +
            . The objective of the
         | 
| 2579 | 
            +
            subsection is to define the right coaction map of Hopf algebra H on the unshuffle Hopf algebra
         | 
| 2580 | 
            +
            H
         | 
| 2581 | 
            +
            defined in Section 4.1. The right coaction is pivotal in computation of the coproduct
         | 
| 2582 | 
            +
            and antipode of Hopf algebra H which in turn are essential to compute the multiplicative
         | 
| 2583 | 
            +
            dynamic feedback product.
         | 
| 2584 | 
            +
            The right coaction map of H on H
         | 
| 2585 | 
            +
            is defined to be ˜∆H : H
         | 
| 2586 | 
            +
            −→ H
         | 
| 2587 | 
            +
            � H such that
         | 
| 2588 | 
            +
            for all c, d ∈ M (the underlying sets of M and M
         | 
| 2589 | 
            +
            are identical) and η ∈ X∗,
         | 
| 2590 | 
            +
            ˜∆Haη (c, d) = (c ↶ d, η) .
         | 
| 2591 | 
            +
            (19)
         | 
| 2592 | 
            +
            Observe that the algebra of coordinate functions S+(W) and H
         | 
| 2593 | 
            +
            are isomorphic as Rm-
         | 
| 2594 | 
            +
            modules. Thus it is vital to understand the relationship between the operator ˜∆ operating
         | 
| 2595 | 
            +
            on the module S+(W) and operator ˜∆H operating on H
         | 
| 2596 | 
            +
            , which is stated in the following
         | 
| 2597 | 
            +
            lemma.
         | 
| 2598 | 
            +
            Lemma 8.1. If c, d ∈ M, then for all η ∈ X∗
         | 
| 2599 | 
            +
            ˜∆Haη (c, d) = ˜∆aη (c, d) .
         | 
| 2600 | 
            +
            Proof: If c, d ∈ M and η ∈ X+,
         | 
| 2601 | 
            +
            ˜∆Haη (c, d) = (c ↶ d, η) = ˜∆aη (c, d) .
         | 
| 2602 | 
            +
            Despite the statement of Lemma 8.1, it is vital to understand the difference between the
         | 
| 2603 | 
            +
            coaction maps ˜∆ and ˜∆H.
         | 
| 2604 | 
            +
            The coaction map ˜∆H is compatible with the Hopf algebra
         | 
| 2605 | 
            +
            structure of H
         | 
| 2606 | 
            +
            viz.
         | 
| 2607 | 
            +
            m1,3,24 ◦
         | 
| 2608 | 
            +
            �
         | 
| 2609 | 
            +
            ˜∆H ⊗ ˜∆H
         | 
| 2610 | 
            +
            �
         | 
| 2611 | 
            +
            ◦ ∆
         | 
| 2612 | 
            +
            = (∆
         | 
| 2613 | 
            +
            ⊗ id) ◦ ˜∆H,
         | 
| 2614 | 
            +
            ˜∆H ◦ S = (S
         | 
| 2615 | 
            +
            ⊗ id) ◦ ˜∆H,
         | 
| 2616 | 
            +
            where m1,3,24 = (m ⊗ m) ◦ (id ⊗ τ ⊗ id).
         | 
| 2617 | 
            +
             | 
| 2618 | 
            +
            28
         | 
| 2619 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 2620 | 
            +
            Thus the coaction map ˜∆H makes H
         | 
| 2621 | 
            +
            a comodule-Hopf algebra over H. Equivalently,
         | 
| 2622 | 
            +
            the coaction map ˜∆H is a corepresentation of Hopf algebra H over unshuffle Hopf algebra
         | 
| 2623 | 
            +
            H
         | 
| 2624 | 
            +
            . Similar to Section 8.2, for all aη ∈ W,
         | 
| 2625 | 
            +
            ˜∆Haη =
         | 
| 2626 | 
            +
            �
         | 
| 2627 | 
            +
            ˜∆H ◦ π1 ˜∆H ◦ π2 · · · ˜∆H ◦ πm�
         | 
| 2628 | 
            +
            aη.
         | 
| 2629 | 
            +
            The map to compute the ˜∆H
         | 
| 2630 | 
            +
            �
         | 
| 2631 | 
            +
            aj
         | 
| 2632 | 
            +
            η
         | 
| 2633 | 
            +
            �
         | 
| 2634 | 
            +
            ∀η ∈ X∗ and j = 1, 2, . . . , m is g module W is stated
         | 
| 2635 | 
            +
            in the following proposition.
         | 
| 2636 | 
            +
            Proposition 8.2. For all i, j = 1, 2 . . . , m and η ∈ X∗:
         | 
| 2637 | 
            +
            (1) ˜∆Hai
         | 
| 2638 | 
            +
            ∅ = ai
         | 
| 2639 | 
            +
            ∅ ⊗ ai
         | 
| 2640 | 
            +
            ∅.
         | 
| 2641 | 
            +
            (2) ˜∆H ◦ θ0aj
         | 
| 2642 | 
            +
            η = (θ0 ⊗ id) ◦ ˜∆Haj
         | 
| 2643 | 
            +
            η.
         | 
| 2644 | 
            +
            (3)
         | 
| 2645 | 
            +
            �
         | 
| 2646 | 
            +
            ˜∆H ◦ θi
         | 
| 2647 | 
            +
            �
         | 
| 2648 | 
            +
            aj
         | 
| 2649 | 
            +
            η = (θi ⊗ m) ◦
         | 
| 2650 | 
            +
            �
         | 
| 2651 | 
            +
            ˜∆H ⊗ id
         | 
| 2652 | 
            +
            �
         | 
| 2653 | 
            +
            ◦ ∆i aj
         | 
| 2654 | 
            +
            η,
         | 
| 2655 | 
            +
            where ∆
         | 
| 2656 | 
            +
            is the unshuffle coproduct defined in Section 4.1.
         | 
| 2657 | 
            +
            Proof: Observe that ∀c ∈ M,
         | 
| 2658 | 
            +
            c = ll +
         | 
| 2659 | 
            +
            m
         | 
| 2660 | 
            +
            �
         | 
| 2661 | 
            +
            j=0
         | 
| 2662 | 
            +
            xj
         | 
| 2663 | 
            +
            �
         | 
| 2664 | 
            +
            x−1
         | 
| 2665 | 
            +
            j
         | 
| 2666 | 
            +
            (c)
         | 
| 2667 | 
            +
            �
         | 
| 2668 | 
            +
            .
         | 
| 2669 | 
            +
            Hence by Theorem 5.4,
         | 
| 2670 | 
            +
            c ↶ d = ll + x0
         | 
| 2671 | 
            +
            �
         | 
| 2672 | 
            +
            x−1
         | 
| 2673 | 
            +
            0 (c) ↶ d
         | 
| 2674 | 
            +
            �
         | 
| 2675 | 
            +
            +
         | 
| 2676 | 
            +
            m
         | 
| 2677 | 
            +
            �
         | 
| 2678 | 
            +
            j=1
         | 
| 2679 | 
            +
            xj
         | 
| 2680 | 
            +
            �
         | 
| 2681 | 
            +
            dj
         | 
| 2682 | 
            +
            �
         | 
| 2683 | 
            +
            x−1
         | 
| 2684 | 
            +
            j
         | 
| 2685 | 
            +
            (c) ↶ d
         | 
| 2686 | 
            +
            ��
         | 
| 2687 | 
            +
            .
         | 
| 2688 | 
            +
            (20)
         | 
| 2689 | 
            +
            The proof for each of the statement as follows:
         | 
| 2690 | 
            +
            (1) Let c, d ∈ M. From (19) and (20),
         | 
| 2691 | 
            +
            ˜∆Hai
         | 
| 2692 | 
            +
            ∅ (c, d) = ((c ↶ d)i , ∅)
         | 
| 2693 | 
            +
            = (ci ↶ d, ∅) = 1 = (ci, ∅)(di, ∅)
         | 
| 2694 | 
            +
            = ai
         | 
| 2695 | 
            +
            ∅ ⊗ ai
         | 
| 2696 | 
            +
            ∅(c, d).
         | 
| 2697 | 
            +
            Therefore, ˜∆Hai
         | 
| 2698 | 
            +
            ∅ = ai
         | 
| 2699 | 
            +
            ∅ ⊗ ai
         | 
| 2700 | 
            +
            ∅.
         | 
| 2701 | 
            +
            (2) Let c, d ∈ M, η ∈ X∗ and ∀ j = 1, 2, . . . , m. Then,
         | 
| 2702 | 
            +
            �
         | 
| 2703 | 
            +
            ˜∆H ◦ θ0
         | 
| 2704 | 
            +
            �
         | 
| 2705 | 
            +
            aj
         | 
| 2706 | 
            +
            η (c, d) =
         | 
| 2707 | 
            +
            �
         | 
| 2708 | 
            +
            (c ↶ d)j , x0η
         | 
| 2709 | 
            +
            �
         | 
| 2710 | 
            +
            =
         | 
| 2711 | 
            +
            �
         | 
| 2712 | 
            +
            x−1
         | 
| 2713 | 
            +
            0 (c ↶ d)j , η
         | 
| 2714 | 
            +
            �
         | 
| 2715 | 
            +
            Observe that x−1
         | 
| 2716 | 
            +
            0 (c) may not belong to M and from (20),
         | 
| 2717 | 
            +
            �
         | 
| 2718 | 
            +
            ˜∆H ◦ θ0
         | 
| 2719 | 
            +
            �
         | 
| 2720 | 
            +
            aj
         | 
| 2721 | 
            +
            η (c, d) =
         | 
| 2722 | 
            +
            �
         | 
| 2723 | 
            +
            x−1
         | 
| 2724 | 
            +
            0 (cj) ↶ d, η
         | 
| 2725 | 
            +
            �
         | 
| 2726 | 
            +
            = ˜∆aj
         | 
| 2727 | 
            +
            η
         | 
| 2728 | 
            +
            �
         | 
| 2729 | 
            +
            x−1
         | 
| 2730 | 
            +
            0 (c) , d
         | 
| 2731 | 
            +
            �
         | 
| 2732 | 
            +
            = (θ0 ⊗ id) ◦ ˜∆aη (c, d) .
         | 
| 2733 | 
            +
             | 
| 2734 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 2735 | 
            +
            29
         | 
| 2736 | 
            +
            Since η ∈ X+ and c, d ∈ M, then by Lemma 8.1
         | 
| 2737 | 
            +
            �
         | 
| 2738 | 
            +
            ˜∆H ◦ θ0
         | 
| 2739 | 
            +
            �
         | 
| 2740 | 
            +
            aj
         | 
| 2741 | 
            +
            η (c, d) = (θ0 ⊗ id) ◦ ˜∆Haη (c, d) .
         | 
| 2742 | 
            +
            Therefore, ˜∆H ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆H.
         | 
| 2743 | 
            +
            (3) Let c, d ∈ M and η ∈ X∗. Then ∀ i, j = 1, 2, . . . , m,
         | 
| 2744 | 
            +
            �
         | 
| 2745 | 
            +
            ˜∆H ◦ θi
         | 
| 2746 | 
            +
            �
         | 
| 2747 | 
            +
            aj
         | 
| 2748 | 
            +
            η (c, d) =
         | 
| 2749 | 
            +
            �
         | 
| 2750 | 
            +
            (c ↶ d)j , xiη
         | 
| 2751 | 
            +
            �
         | 
| 2752 | 
            +
            =
         | 
| 2753 | 
            +
            �
         | 
| 2754 | 
            +
            x−1
         | 
| 2755 | 
            +
            i
         | 
| 2756 | 
            +
            (c ↶ d)j , η
         | 
| 2757 | 
            +
            �
         | 
| 2758 | 
            +
            From (20),
         | 
| 2759 | 
            +
            �
         | 
| 2760 | 
            +
            ˜∆H ◦ θi
         | 
| 2761 | 
            +
            �
         | 
| 2762 | 
            +
            aj
         | 
| 2763 | 
            +
            η (c, d) =
         | 
| 2764 | 
            +
            �
         | 
| 2765 | 
            +
            di
         | 
| 2766 | 
            +
            x−1
         | 
| 2767 | 
            +
            i
         | 
| 2768 | 
            +
            (cj) ↶ d, η
         | 
| 2769 | 
            +
            �
         | 
| 2770 | 
            +
            .
         | 
| 2771 | 
            +
            Since x−1
         | 
| 2772 | 
            +
            i
         | 
| 2773 | 
            +
            (c) may not belong to group M (also M
         | 
| 2774 | 
            +
            ),
         | 
| 2775 | 
            +
            = ρi aj
         | 
| 2776 | 
            +
            η
         | 
| 2777 | 
            +
            �
         | 
| 2778 | 
            +
            x−1
         | 
| 2779 | 
            +
            i
         | 
| 2780 | 
            +
            (c) ↶ d, d
         | 
| 2781 | 
            +
            �
         | 
| 2782 | 
            +
            = ρi aj
         | 
| 2783 | 
            +
            η
         | 
| 2784 | 
            +
            �
         | 
| 2785 | 
            +
            x−1
         | 
| 2786 | 
            +
            i
         | 
| 2787 | 
            +
            (c) ↶ d
         | 
| 2788 | 
            +
            �
         | 
| 2789 | 
            +
            = ρi aj
         | 
| 2790 | 
            +
            η
         | 
| 2791 | 
            +
            �
         | 
| 2792 | 
            +
            x−1
         | 
| 2793 | 
            +
            i
         | 
| 2794 | 
            +
            (c) ↶ d, d
         | 
| 2795 | 
            +
            �
         | 
| 2796 | 
            +
            =
         | 
| 2797 | 
            +
            �
         | 
| 2798 | 
            +
            ˜∆ ⊗ id
         | 
| 2799 | 
            +
            �
         | 
| 2800 | 
            +
            ◦ ρi aj
         | 
| 2801 | 
            +
            η
         | 
| 2802 | 
            +
            �
         | 
| 2803 | 
            +
            x−1
         | 
| 2804 | 
            +
            i
         | 
| 2805 | 
            +
            (c) , d, d
         | 
| 2806 | 
            +
            �
         | 
| 2807 | 
            +
            = (θi ⊗ m) ◦
         | 
| 2808 | 
            +
            �
         | 
| 2809 | 
            +
            ˜∆ ⊗ id
         | 
| 2810 | 
            +
            �
         | 
| 2811 | 
            +
            ◦ ρi aj
         | 
| 2812 | 
            +
            η (c, d) .
         | 
| 2813 | 
            +
            Since η ∈ X+ and c, d ∈ M, then by Lemma 8.1 and Lemma 4.1,
         | 
| 2814 | 
            +
            �
         | 
| 2815 | 
            +
            ˜∆H ◦ θi
         | 
| 2816 | 
            +
            �
         | 
| 2817 | 
            +
            aj
         | 
| 2818 | 
            +
            η (c, d) = (θi ⊗ m) ◦
         | 
| 2819 | 
            +
            �
         | 
| 2820 | 
            +
            ˜∆H ⊗ id
         | 
| 2821 | 
            +
            �
         | 
| 2822 | 
            +
            ◦ ∆i aj
         | 
| 2823 | 
            +
            η.
         | 
| 2824 | 
            +
            Therefore,
         | 
| 2825 | 
            +
            �
         | 
| 2826 | 
            +
            ˜∆H ◦ θi
         | 
| 2827 | 
            +
            �
         | 
| 2828 | 
            +
            = (θi ⊗ m) ◦
         | 
| 2829 | 
            +
            �
         | 
| 2830 | 
            +
            ˜∆H ⊗ id
         | 
| 2831 | 
            +
            �
         | 
| 2832 | 
            +
            ◦ ∆i
         | 
| 2833 | 
            +
            for all i = 1, 2, . . . , m.
         | 
| 2834 | 
            +
            8.4. Coproduct, Antipode Computations and Grading of Hopf algebra H. The
         | 
| 2835 | 
            +
            objective of this subsection is to define and illustrate the computation of coproduct ∆H of
         | 
| 2836 | 
            +
            the bialgebra H. Further, a graded and connected structure is endowed with the bialgebra
         | 
| 2837 | 
            +
            owing to which the antipode computation is possible owing to Theorem 3.1. The following
         | 
| 2838 | 
            +
            proposition asserts the essential reason behind the definition of ˜∆H.
         | 
| 2839 | 
            +
            Proposition 8.3. For all η ∈ X∗ and i = 1, 2, . . . , m,
         | 
| 2840 | 
            +
            ∆Hai
         | 
| 2841 | 
            +
            η = (id ⊗ m) ◦
         | 
| 2842 | 
            +
            �
         | 
| 2843 | 
            +
            ˜∆H ⊗ id
         | 
| 2844 | 
            +
            �
         | 
| 2845 | 
            +
            ◦ ˆ∆i ai
         | 
| 2846 | 
            +
            η.
         | 
| 2847 | 
            +
            Proof: Proof: Observe that for all c, d ∈ M and η ∈ X∗,
         | 
| 2848 | 
            +
            ∆ai
         | 
| 2849 | 
            +
            η (c, d) = ((c ⋆ d)i , η)
         | 
| 2850 | 
            +
            ∀ i = 1, 2, . . . , m.
         | 
| 2851 | 
            +
            Using (12),
         | 
| 2852 | 
            +
            ∆Hai
         | 
| 2853 | 
            +
            η (c, d) = (di
         | 
| 2854 | 
            +
            ci ↶ d, η)
         | 
| 2855 | 
            +
             | 
| 2856 | 
            +
            30
         | 
| 2857 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 2858 | 
            +
            = ˆ∆i ai
         | 
| 2859 | 
            +
            η(c ↶ d, d)
         | 
| 2860 | 
            +
            =
         | 
| 2861 | 
            +
            �
         | 
| 2862 | 
            +
            ˜∆H ⊗ id
         | 
| 2863 | 
            +
            �
         | 
| 2864 | 
            +
            ◦ ˆ∆i ai
         | 
| 2865 | 
            +
            η (c, d, d)
         | 
| 2866 | 
            +
            = (id ⊗ m) ◦
         | 
| 2867 | 
            +
            �
         | 
| 2868 | 
            +
            ˜∆H ⊗ id
         | 
| 2869 | 
            +
            �
         | 
| 2870 | 
            +
            ◦ ˆ∆i ai
         | 
| 2871 | 
            +
            η (c, d) .
         | 
| 2872 | 
            +
            Proposition 8.3 asserts that the computation of coproduct ∆H on the module W (sub-
         | 
| 2873 | 
            +
            sequently on the algebra H) can be carried out post the computation of the operator ˜∆H
         | 
| 2874 | 
            +
            on W. The computation of the coproduct ∆H for the some coordinate maps are given as
         | 
| 2875 | 
            +
            follows:
         | 
| 2876 | 
            +
            ∆Hai
         | 
| 2877 | 
            +
            ∅ = ai
         | 
| 2878 | 
            +
            ∅ ⊗ ai
         | 
| 2879 | 
            +
            ∅.
         | 
| 2880 | 
            +
            ∆Hai
         | 
| 2881 | 
            +
            x0 =
         | 
| 2882 | 
            +
            �
         | 
| 2883 | 
            +
            ai
         | 
| 2884 | 
            +
            x0 ⊗ ai
         | 
| 2885 | 
            +
            ∅
         | 
| 2886 | 
            +
            �
         | 
| 2887 | 
            +
            +
         | 
| 2888 | 
            +
            �
         | 
| 2889 | 
            +
            ai
         | 
| 2890 | 
            +
            ∅ ⊗ ai
         | 
| 2891 | 
            +
            x0
         | 
| 2892 | 
            +
            �
         | 
| 2893 | 
            +
            .
         | 
| 2894 | 
            +
            ∆Haj
         | 
| 2895 | 
            +
            xi =
         | 
| 2896 | 
            +
            �
         | 
| 2897 | 
            +
            aj
         | 
| 2898 | 
            +
            xi ⊗ ai
         | 
| 2899 | 
            +
            ∅aj
         | 
| 2900 | 
            +
            ∅
         | 
| 2901 | 
            +
            �
         | 
| 2902 | 
            +
            +
         | 
| 2903 | 
            +
            �
         | 
| 2904 | 
            +
            aj
         | 
| 2905 | 
            +
            ∅ ⊗ aj
         | 
| 2906 | 
            +
            xi
         | 
| 2907 | 
            +
            �
         | 
| 2908 | 
            +
            .
         | 
| 2909 | 
            +
            ∆Hai
         | 
| 2910 | 
            +
            x2
         | 
| 2911 | 
            +
            0 =
         | 
| 2912 | 
            +
            �
         | 
| 2913 | 
            +
            ai
         | 
| 2914 | 
            +
            x2
         | 
| 2915 | 
            +
            0 ⊗ ai
         | 
| 2916 | 
            +
            ∅
         | 
| 2917 | 
            +
            �
         | 
| 2918 | 
            +
            + 2
         | 
| 2919 | 
            +
            �
         | 
| 2920 | 
            +
            ai
         | 
| 2921 | 
            +
            x0 ⊗ ai
         | 
| 2922 | 
            +
            x0
         | 
| 2923 | 
            +
            �
         | 
| 2924 | 
            +
            +
         | 
| 2925 | 
            +
            �
         | 
| 2926 | 
            +
            ai
         | 
| 2927 | 
            +
            ∅ ⊗ ai
         | 
| 2928 | 
            +
            x2
         | 
| 2929 | 
            +
            0
         | 
| 2930 | 
            +
            �
         | 
| 2931 | 
            +
            .
         | 
| 2932 | 
            +
            ∆Haj
         | 
| 2933 | 
            +
            x0xi =
         | 
| 2934 | 
            +
            �
         | 
| 2935 | 
            +
            aj
         | 
| 2936 | 
            +
            x0xi ⊗ aj
         | 
| 2937 | 
            +
            ∅
         | 
| 2938 | 
            +
            �
         | 
| 2939 | 
            +
            +
         | 
| 2940 | 
            +
            �
         | 
| 2941 | 
            +
            aj
         | 
| 2942 | 
            +
            x0 ⊗ aj
         | 
| 2943 | 
            +
            xi
         | 
| 2944 | 
            +
            �
         | 
| 2945 | 
            +
            +
         | 
| 2946 | 
            +
            �
         | 
| 2947 | 
            +
            aj
         | 
| 2948 | 
            +
            xi ⊗ ai
         | 
| 2949 | 
            +
            ∅aj
         | 
| 2950 | 
            +
            x0
         | 
| 2951 | 
            +
            �
         | 
| 2952 | 
            +
            +
         | 
| 2953 | 
            +
            �
         | 
| 2954 | 
            +
            aj
         | 
| 2955 | 
            +
            ∅ ⊗ aj
         | 
| 2956 | 
            +
            x0xi
         | 
| 2957 | 
            +
            �
         | 
| 2958 | 
            +
            .
         | 
| 2959 | 
            +
            ∆Haj
         | 
| 2960 | 
            +
            xix0 =
         | 
| 2961 | 
            +
            �
         | 
| 2962 | 
            +
            aj
         | 
| 2963 | 
            +
            xix0 ⊗ ai
         | 
| 2964 | 
            +
            ∅aj
         | 
| 2965 | 
            +
            ∅
         | 
| 2966 | 
            +
            �
         | 
| 2967 | 
            +
            +
         | 
| 2968 | 
            +
            �
         | 
| 2969 | 
            +
            aj
         | 
| 2970 | 
            +
            xi ⊗ ai
         | 
| 2971 | 
            +
            x0aj
         | 
| 2972 | 
            +
            ∅
         | 
| 2973 | 
            +
            �
         | 
| 2974 | 
            +
            +
         | 
| 2975 | 
            +
            �
         | 
| 2976 | 
            +
            aj
         | 
| 2977 | 
            +
            xi ⊗ ai
         | 
| 2978 | 
            +
            ∅aj
         | 
| 2979 | 
            +
            x0
         | 
| 2980 | 
            +
            �
         | 
| 2981 | 
            +
            +
         | 
| 2982 | 
            +
            �
         | 
| 2983 | 
            +
            aj
         | 
| 2984 | 
            +
            x0 ⊗ aj
         | 
| 2985 | 
            +
            xi
         | 
| 2986 | 
            +
            �
         | 
| 2987 | 
            +
            +
         | 
| 2988 | 
            +
            �
         | 
| 2989 | 
            +
            aj
         | 
| 2990 | 
            +
            ∅ ⊗ aj
         | 
| 2991 | 
            +
            xix0
         | 
| 2992 | 
            +
            �
         | 
| 2993 | 
            +
            .
         | 
| 2994 | 
            +
            ∆Hak
         | 
| 2995 | 
            +
            xixj =
         | 
| 2996 | 
            +
            �
         | 
| 2997 | 
            +
            ak
         | 
| 2998 | 
            +
            xixj ⊗ aj
         | 
| 2999 | 
            +
            ∅ai
         | 
| 3000 | 
            +
            ∅ak
         | 
| 3001 | 
            +
            ∅
         | 
| 3002 | 
            +
            �
         | 
| 3003 | 
            +
            +
         | 
| 3004 | 
            +
            �
         | 
| 3005 | 
            +
            ak
         | 
| 3006 | 
            +
            xi ⊗ ai
         | 
| 3007 | 
            +
            xjak
         | 
| 3008 | 
            +
            ∅
         | 
| 3009 | 
            +
            �
         | 
| 3010 | 
            +
            +
         | 
| 3011 | 
            +
            �
         | 
| 3012 | 
            +
            ak
         | 
| 3013 | 
            +
            xi ⊗ ai
         | 
| 3014 | 
            +
            ∅ak
         | 
| 3015 | 
            +
            xj
         | 
| 3016 | 
            +
            �
         | 
| 3017 | 
            +
            +
         | 
| 3018 | 
            +
            �
         | 
| 3019 | 
            +
            ak
         | 
| 3020 | 
            +
            xj ⊗ aj
         | 
| 3021 | 
            +
            ∅ak
         | 
| 3022 | 
            +
            xi
         | 
| 3023 | 
            +
            �
         | 
| 3024 | 
            +
            +
         | 
| 3025 | 
            +
            �
         | 
| 3026 | 
            +
            ak
         | 
| 3027 | 
            +
            ∅ ⊗ ak
         | 
| 3028 | 
            +
            xixj
         | 
| 3029 | 
            +
            �
         | 
| 3030 | 
            +
            .
         | 
| 3031 | 
            +
            If m = 2 (two input-two output MIMO case) viz. X = {x0, x1, x2}, then from above
         | 
| 3032 | 
            +
            computations
         | 
| 3033 | 
            +
            ∆Hax1x2 =
         | 
| 3034 | 
            +
            
         | 
| 3035 | 
            +
            
         | 
| 3036 | 
            +
            �
         | 
| 3037 | 
            +
            a1
         | 
| 3038 | 
            +
            x1x2 ⊗
         | 
| 3039 | 
            +
            �
         | 
| 3040 | 
            +
            a1
         | 
| 3041 | 
            +
            ∅
         | 
| 3042 | 
            +
            �2 a2
         | 
| 3043 | 
            +
            ∅
         | 
| 3044 | 
            +
            �
         | 
| 3045 | 
            +
            +
         | 
| 3046 | 
            +
            �
         | 
| 3047 | 
            +
            a1
         | 
| 3048 | 
            +
            x1 ⊗ a1
         | 
| 3049 | 
            +
            x2a1
         | 
| 3050 | 
            +
            ∅
         | 
| 3051 | 
            +
            �
         | 
| 3052 | 
            +
            +
         | 
| 3053 | 
            +
            �
         | 
| 3054 | 
            +
            a1
         | 
| 3055 | 
            +
            x1 ⊗ a1
         | 
| 3056 | 
            +
            ∅a1
         | 
| 3057 | 
            +
            x2
         | 
| 3058 | 
            +
            �
         | 
| 3059 | 
            +
            +
         | 
| 3060 | 
            +
            �
         | 
| 3061 | 
            +
            a1
         | 
| 3062 | 
            +
            x2 ⊗ a2
         | 
| 3063 | 
            +
            ∅a1
         | 
| 3064 | 
            +
            x1
         | 
| 3065 | 
            +
            �
         | 
| 3066 | 
            +
            +
         | 
| 3067 | 
            +
            �
         | 
| 3068 | 
            +
            a1
         | 
| 3069 | 
            +
            ∅ ⊗ a1
         | 
| 3070 | 
            +
            x1x2
         | 
| 3071 | 
            +
            �
         | 
| 3072 | 
            +
            �
         | 
| 3073 | 
            +
            a2
         | 
| 3074 | 
            +
            x1x2 ⊗ a1
         | 
| 3075 | 
            +
            ∅
         | 
| 3076 | 
            +
            �
         | 
| 3077 | 
            +
            a2
         | 
| 3078 | 
            +
            ∅
         | 
| 3079 | 
            +
            �2�
         | 
| 3080 | 
            +
            +
         | 
| 3081 | 
            +
            �
         | 
| 3082 | 
            +
            a2
         | 
| 3083 | 
            +
            x1 ⊗ a1
         | 
| 3084 | 
            +
            x2a2
         | 
| 3085 | 
            +
            ∅
         | 
| 3086 | 
            +
            �
         | 
| 3087 | 
            +
            +
         | 
| 3088 | 
            +
            �
         | 
| 3089 | 
            +
            a2
         | 
| 3090 | 
            +
            x1 ⊗ a1
         | 
| 3091 | 
            +
            ∅a2
         | 
| 3092 | 
            +
            x2
         | 
| 3093 | 
            +
            �
         | 
| 3094 | 
            +
            +
         | 
| 3095 | 
            +
            �
         | 
| 3096 | 
            +
            a2
         | 
| 3097 | 
            +
            x2 ⊗ a2
         | 
| 3098 | 
            +
            ∅a2
         | 
| 3099 | 
            +
            x1
         | 
| 3100 | 
            +
            �
         | 
| 3101 | 
            +
            +
         | 
| 3102 | 
            +
            �
         | 
| 3103 | 
            +
            a2
         | 
| 3104 | 
            +
            ∅ ⊗ a2
         | 
| 3105 | 
            +
            x1x2
         | 
| 3106 | 
            +
            �
         | 
| 3107 | 
            +
            
         | 
| 3108 | 
            +
            
         | 
| 3109 | 
            +
            which can be rewritten as
         | 
| 3110 | 
            +
            ∆Hax1x2 =
         | 
| 3111 | 
            +
            �
         | 
| 3112 | 
            +
            ax1x2 ⊗ (a1
         | 
| 3113 | 
            +
            ∅a2
         | 
| 3114 | 
            +
            ∅ ll)a∅
         | 
| 3115 | 
            +
            �
         | 
| 3116 | 
            +
            +
         | 
| 3117 | 
            +
            �
         | 
| 3118 | 
            +
            ax1 ⊗ (a1
         | 
| 3119 | 
            +
            x2 ll)a∅
         | 
| 3120 | 
            +
            �
         | 
| 3121 | 
            +
            +
         | 
| 3122 | 
            +
            �
         | 
| 3123 | 
            +
            ax1 ⊗ (a1
         | 
| 3124 | 
            +
            ∅ ll)ax2
         | 
| 3125 | 
            +
            �
         | 
| 3126 | 
            +
            +
         | 
| 3127 | 
            +
            �
         | 
| 3128 | 
            +
            ax2 ⊗ (a2
         | 
| 3129 | 
            +
            ∅ ll)ax1
         | 
| 3130 | 
            +
            �
         | 
| 3131 | 
            +
            + (a∅ ⊗ ax1x2) ,
         | 
| 3132 | 
            +
            where ll = [1 1]t. It is vital to observe that the term
         | 
| 3133 | 
            +
            �
         | 
| 3134 | 
            +
            ax1x2 ⊗ (a1
         | 
| 3135 | 
            +
            ∅a2
         | 
| 3136 | 
            +
            ∅ ll)a∅
         | 
| 3137 | 
            +
            �
         | 
| 3138 | 
            +
            is a primitive
         | 
| 3139 | 
            +
            term of the coproduct as a1
         | 
| 3140 | 
            +
            ∅a2
         | 
| 3141 | 
            +
            ∅ ll ∼= ll since a∅ is the unit of H.
         | 
| 3142 | 
            +
            The following corollary is resultant of the Proposition 8.2 to the words of the form xn
         | 
| 3143 | 
            +
            0 for
         | 
| 3144 | 
            +
            all n ≥ 0.
         | 
| 3145 | 
            +
            Corollary 8.1. If n ∈ N0, then for all i = 1, 2, . . . , m (defining x0
         | 
| 3146 | 
            +
            0 := ∅):
         | 
| 3147 | 
            +
            ˜∆Hai
         | 
| 3148 | 
            +
            xn
         | 
| 3149 | 
            +
            0 = ai
         | 
| 3150 | 
            +
            xn
         | 
| 3151 | 
            +
            0 ⊗ ai
         | 
| 3152 | 
            +
            ∅.
         | 
| 3153 | 
            +
            ∆Hai
         | 
| 3154 | 
            +
            xn
         | 
| 3155 | 
            +
            0 =
         | 
| 3156 | 
            +
            n
         | 
| 3157 | 
            +
            �
         | 
| 3158 | 
            +
            k=0
         | 
| 3159 | 
            +
            �n
         | 
| 3160 | 
            +
            k
         | 
| 3161 | 
            +
            �
         | 
| 3162 | 
            +
            ai
         | 
| 3163 | 
            +
            xk
         | 
| 3164 | 
            +
            0 ⊗ ai
         | 
| 3165 | 
            +
            ∅ai
         | 
| 3166 | 
            +
            xn−k
         | 
| 3167 | 
            +
            0
         | 
| 3168 | 
            +
            .
         | 
| 3169 | 
            +
            Proof: The proof is by induction on n ∈ N0. The base case (n = 0) :
         | 
| 3170 | 
            +
            ˜∆Hai
         | 
| 3171 | 
            +
            ∅ = ai
         | 
| 3172 | 
            +
            ∅ ⊗ ai
         | 
| 3173 | 
            +
            ∅,
         | 
| 3174 | 
            +
             | 
| 3175 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 3176 | 
            +
            31
         | 
| 3177 | 
            +
            is proved in Proposition 8.1. Assume the statement is true for n = k, then
         | 
| 3178 | 
            +
            ˜∆ai
         | 
| 3179 | 
            +
            xk+1
         | 
| 3180 | 
            +
            0
         | 
| 3181 | 
            +
            =
         | 
| 3182 | 
            +
            �
         | 
| 3183 | 
            +
            ˜∆ ◦ θ0
         | 
| 3184 | 
            +
            �
         | 
| 3185 | 
            +
            ai
         | 
| 3186 | 
            +
            xk
         | 
| 3187 | 
            +
            0.
         | 
| 3188 | 
            +
            Using Proposition 8.1,
         | 
| 3189 | 
            +
            ˜∆ai
         | 
| 3190 | 
            +
            xk+1
         | 
| 3191 | 
            +
            0
         | 
| 3192 | 
            +
            = (θ0 ⊗ id) ◦ ˜∆ai
         | 
| 3193 | 
            +
            xk
         | 
| 3194 | 
            +
            0
         | 
| 3195 | 
            +
            = (θ0 ⊗ id) {ai
         | 
| 3196 | 
            +
            xk
         | 
| 3197 | 
            +
            0 ⊗ ai
         | 
| 3198 | 
            +
            ∅}
         | 
| 3199 | 
            +
            = ai
         | 
| 3200 | 
            +
            xk+1
         | 
| 3201 | 
            +
            0
         | 
| 3202 | 
            +
            ⊗ ai
         | 
| 3203 | 
            +
            ∅.
         | 
| 3204 | 
            +
            Hence proved by induction on n ∈ N0 that: ˜∆ai
         | 
| 3205 | 
            +
            xn
         | 
| 3206 | 
            +
            0 = ai
         | 
| 3207 | 
            +
            xn
         | 
| 3208 | 
            +
            0 ⊗1. Observe that from Proposition ??
         | 
| 3209 | 
            +
            ∆ai
         | 
| 3210 | 
            +
            xn
         | 
| 3211 | 
            +
            0 = (id ⊗ m) ◦
         | 
| 3212 | 
            +
            �
         | 
| 3213 | 
            +
            ˜∆ ⊗ id
         | 
| 3214 | 
            +
            �
         | 
| 3215 | 
            +
            ◦ ∆i ai
         | 
| 3216 | 
            +
            xn
         | 
| 3217 | 
            +
            0 .
         | 
| 3218 | 
            +
            Using Corollary 4.1,
         | 
| 3219 | 
            +
            ∆ai
         | 
| 3220 | 
            +
            xn
         | 
| 3221 | 
            +
            0 = (id ⊗ m) ◦
         | 
| 3222 | 
            +
            �
         | 
| 3223 | 
            +
            ˜∆ ⊗ id
         | 
| 3224 | 
            +
            � � n
         | 
| 3225 | 
            +
            �
         | 
| 3226 | 
            +
            k=0
         | 
| 3227 | 
            +
            �n
         | 
| 3228 | 
            +
            k
         | 
| 3229 | 
            +
            �
         | 
| 3230 | 
            +
            ai
         | 
| 3231 | 
            +
            xk
         | 
| 3232 | 
            +
            0 ⊗ ai
         | 
| 3233 | 
            +
            xn−k
         | 
| 3234 | 
            +
            0
         | 
| 3235 | 
            +
            �
         | 
| 3236 | 
            +
            = (id ⊗ m)
         | 
| 3237 | 
            +
            � n
         | 
| 3238 | 
            +
            �
         | 
| 3239 | 
            +
            k=0
         | 
| 3240 | 
            +
            �n
         | 
| 3241 | 
            +
            k
         | 
| 3242 | 
            +
            �
         | 
| 3243 | 
            +
            ˜∆ai
         | 
| 3244 | 
            +
            xk
         | 
| 3245 | 
            +
            0 ⊗ ai
         | 
| 3246 | 
            +
            xn−k
         | 
| 3247 | 
            +
            0
         | 
| 3248 | 
            +
            �
         | 
| 3249 | 
            +
            = (id ⊗ m)
         | 
| 3250 | 
            +
            � n
         | 
| 3251 | 
            +
            �
         | 
| 3252 | 
            +
            k=0
         | 
| 3253 | 
            +
            �n
         | 
| 3254 | 
            +
            k
         | 
| 3255 | 
            +
            �
         | 
| 3256 | 
            +
            ai
         | 
| 3257 | 
            +
            xk
         | 
| 3258 | 
            +
            0 ⊗ ai
         | 
| 3259 | 
            +
            ∅ ⊗ ai
         | 
| 3260 | 
            +
            xn−k
         | 
| 3261 | 
            +
            0
         | 
| 3262 | 
            +
            �
         | 
| 3263 | 
            +
            =
         | 
| 3264 | 
            +
            n
         | 
| 3265 | 
            +
            �
         | 
| 3266 | 
            +
            k=0
         | 
| 3267 | 
            +
            �n
         | 
| 3268 | 
            +
            k
         | 
| 3269 | 
            +
            �
         | 
| 3270 | 
            +
            ai
         | 
| 3271 | 
            +
            xk
         | 
| 3272 | 
            +
            0 ⊗ ai
         | 
| 3273 | 
            +
            ∅ai
         | 
| 3274 | 
            +
            xn−k
         | 
| 3275 | 
            +
            0
         | 
| 3276 | 
            +
            .
         | 
| 3277 | 
            +
            Proposition 8.3 asserted that the calculation of coproduct ∆H is carried out post the
         | 
| 3278 | 
            +
            computation of ˜∆H. However the converse is also true viz. the computation of ˜∆H can be
         | 
| 3279 | 
            +
            carried out if the evaluation fo the coproduct ∆H is known a priori which is well-asserted in
         | 
| 3280 | 
            +
            the following proposition.
         | 
| 3281 | 
            +
            Proposition 8.4. For all η ∈ X+ and for all i = 1, 2, . . . , m,
         | 
| 3282 | 
            +
            ˜∆Hai
         | 
| 3283 | 
            +
            η (c, d) = (id ⊗ m) ◦ (∆H ⊗ S
         | 
| 3284 | 
            +
            ) ◦ ˆ∆i ai
         | 
| 3285 | 
            +
            η.
         | 
| 3286 | 
            +
            Proof: Given c, d ∈ M, by Theorem (12)
         | 
| 3287 | 
            +
            (c ⋆ d) = (d
         | 
| 3288 | 
            +
            (c ↶ d)) .
         | 
| 3289 | 
            +
            Observe that d ∈ M implies that d is shuffle invertible. Thus for any η ∈ X+,
         | 
| 3290 | 
            +
            ((c ↶ d)i , η) =
         | 
| 3291 | 
            +
            �
         | 
| 3292 | 
            +
            d
         | 
| 3293 | 
            +
            −1
         | 
| 3294 | 
            +
            i
         | 
| 3295 | 
            +
            (c ⋆ d)i , η
         | 
| 3296 | 
            +
            �
         | 
| 3297 | 
            +
            ,
         | 
| 3298 | 
            +
            for all i = 1, 2, . . . , m. Hence,
         | 
| 3299 | 
            +
            ((c ↶ d)i , η) = ˜∆Hai
         | 
| 3300 | 
            +
            η (c, d)
         | 
| 3301 | 
            +
            = ˆ∆i ai
         | 
| 3302 | 
            +
            η
         | 
| 3303 | 
            +
            �
         | 
| 3304 | 
            +
            c ⋆ d, d
         | 
| 3305 | 
            +
            −1�
         | 
| 3306 | 
            +
            .
         | 
| 3307 | 
            +
            = (∆H ⊗ S
         | 
| 3308 | 
            +
            ) ◦ ˆ∆i ai
         | 
| 3309 | 
            +
            η (c, d, d) .
         | 
| 3310 | 
            +
            = (id ⊗ m) ◦ (∆H ⊗ S
         | 
| 3311 | 
            +
            ) ◦ ˆ∆i ai
         | 
| 3312 | 
            +
            η (c, d) .
         | 
| 3313 | 
            +
             | 
| 3314 | 
            +
            32
         | 
| 3315 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 3316 | 
            +
            The key point of the Proposition 8.4 is the shuffle-invertibility of a series c ∈ M
         | 
| 3317 | 
            +
            The goal of this subsection is to provide a graded structure on the R-module W and
         | 
| 3318 | 
            +
            consequently on the underlying R-module structure of the Hopf algebra H such that H is
         | 
| 3319 | 
            +
            connected and the homogeneous components of H are finite-dimensional.
         | 
| 3320 | 
            +
            Definition 8.1. Given a word η ∈ X+, denote the degree of the word as deg (η) and define
         | 
| 3321 | 
            +
            deg (η) = |η| and for all k ≥ 1:
         | 
| 3322 | 
            +
            Xk := {aη : deg (η) = k}.
         | 
| 3323 | 
            +
            (1) Define gradation on the R-module W viz.
         | 
| 3324 | 
            +
            W =
         | 
| 3325 | 
            +
            �
         | 
| 3326 | 
            +
            k≥1
         | 
| 3327 | 
            +
            Wk,
         | 
| 3328 | 
            +
            where Wk is the free R-module spanned by Xk.
         | 
| 3329 | 
            +
            (2) The gradation on the module W induces a graded structure on the algebra H as
         | 
| 3330 | 
            +
            H =
         | 
| 3331 | 
            +
            �
         | 
| 3332 | 
            +
            n∈N0
         | 
| 3333 | 
            +
            Hn,
         | 
| 3334 | 
            +
            with H0 ∼= R in the category of R-modules.
         | 
| 3335 | 
            +
            The following lemma aids in proving that the gradation in Definition 8.1 makes the Hopf
         | 
| 3336 | 
            +
            algebra H is well-defined.
         | 
| 3337 | 
            +
            Lemma 8.2. If η ∈ X∗ such that deg (η) = n then
         | 
| 3338 | 
            +
            ˜∆H (aη) ∈
         | 
| 3339 | 
            +
            �
         | 
| 3340 | 
            +
            i+j=n
         | 
| 3341 | 
            +
            Wi ⊗ Hj,
         | 
| 3342 | 
            +
            for all k = 1, 2, . . . , m.
         | 
| 3343 | 
            +
            Proof: The following observations will help in proving the lemma.
         | 
| 3344 | 
            +
            (1) The map {θi}m
         | 
| 3345 | 
            +
            i=0 is a homogeneous operator of degree 1 on the module W. If deg (η) =
         | 
| 3346 | 
            +
            |η| = n for some η ∈ X∗, then |xiη| = n + 1 for all i = 0, 1, . . . , m. Hence,
         | 
| 3347 | 
            +
            θi : Wn −→ Wn+1
         | 
| 3348 | 
            +
            for all i = 0, 1, . . . , m and n ≥ 1.
         | 
| 3349 | 
            +
            (2) Observe that if η, ζ, γ ∈ X∗ such that |γ| = n and γ ∈ supp (η
         | 
| 3350 | 
            +
            ζ) then |γ| = n =
         | 
| 3351 | 
            +
            |ζ|+|η|. Thus, the reduced coproduct ˆ∆
         | 
| 3352 | 
            +
            : W −→ W ⊗W is homogeneous operator
         | 
| 3353 | 
            +
            of degree 0 viz.
         | 
| 3354 | 
            +
            ˆ∆
         | 
| 3355 | 
            +
            : Wn −→ (W ⊗ W)n .
         | 
| 3356 | 
            +
            Let us prove the statement ot the lemma by induction on degree (equivalently length) n
         | 
| 3357 | 
            +
            of the word η ∈ X∗. The base case is n = 0 ⇔ η = ∅. From Proposition 8.2,
         | 
| 3358 | 
            +
            ˜∆Ha∅ = a∅ ⊗ a∅
         | 
| 3359 | 
            +
            ∈ W0 ⊗ H0,
         | 
| 3360 | 
            +
            Thus the statement holds true for the base case. Assume that the statement of theorem
         | 
| 3361 | 
            +
            holds true for all η ∈ X∗ such that deg (η) ≤ k. Let η′ such that deg (η′) = k + 1. Then two
         | 
| 3362 | 
            +
            cases can occur.
         | 
| 3363 | 
            +
            (1) Let η′ = x0η where |η| = k. Then
         | 
| 3364 | 
            +
            ˜∆Haη′ = ˜∆H ◦ θ0aj
         | 
| 3365 | 
            +
            η.
         | 
| 3366 | 
            +
             | 
| 3367 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 3368 | 
            +
            33
         | 
| 3369 | 
            +
            By Proposition 8.2,
         | 
| 3370 | 
            +
            ˜∆Haη′ = (θ0 ⊗ id) ◦ ˜∆Haη.
         | 
| 3371 | 
            +
            Since aη ∈ Wk, then by the induction hypothesis ˜∆H (aη) ⊆ �
         | 
| 3372 | 
            +
            i+j=k Wi ⊗ Hj. Then,
         | 
| 3373 | 
            +
            (θ0 ⊗ id)
         | 
| 3374 | 
            +
            � �
         | 
| 3375 | 
            +
            i+j=k
         | 
| 3376 | 
            +
            Wi ⊗ Hj
         | 
| 3377 | 
            +
            �
         | 
| 3378 | 
            +
            ⊆
         | 
| 3379 | 
            +
            �
         | 
| 3380 | 
            +
            i+j=k
         | 
| 3381 | 
            +
            Wi+1 ⊗ Hj
         | 
| 3382 | 
            +
            ⊆
         | 
| 3383 | 
            +
            �
         | 
| 3384 | 
            +
            i+j=k+1
         | 
| 3385 | 
            +
            Wi ⊗ Hj.
         | 
| 3386 | 
            +
            Thus, ˜∆Haη′ ∈ �
         | 
| 3387 | 
            +
            i+j=k+1 Wi ⊗ Hj where |η′| = k + 1.
         | 
| 3388 | 
            +
            (2) Let η′ = xiη where |η| = k and xi ̸= x0. Then from Proposition 8.2,
         | 
| 3389 | 
            +
            �
         | 
| 3390 | 
            +
            ˜∆H ◦ πj
         | 
| 3391 | 
            +
            �
         | 
| 3392 | 
            +
            aη′ = (θi ⊗ m) ◦
         | 
| 3393 | 
            +
            �
         | 
| 3394 | 
            +
            ˜∆H ⊗ id
         | 
| 3395 | 
            +
            �
         | 
| 3396 | 
            +
            ◦ (πj ⊗ πi) ◦ ˜∆
         | 
| 3397 | 
            +
            aη.
         | 
| 3398 | 
            +
            = (θi ⊗ m) ◦
         | 
| 3399 | 
            +
            �
         | 
| 3400 | 
            +
            ( ˜∆H ◦ πj) ⊗ πi
         | 
| 3401 | 
            +
            �
         | 
| 3402 | 
            +
            ◦ ˜∆
         | 
| 3403 | 
            +
            aη
         | 
| 3404 | 
            +
            Thus,
         | 
| 3405 | 
            +
            ˜∆Haη′ = (θi ⊗ m) ◦
         | 
| 3406 | 
            +
            �
         | 
| 3407 | 
            +
            ˜∆H ⊗ ll.πi
         | 
| 3408 | 
            +
            �
         | 
| 3409 | 
            +
            ˜∆
         | 
| 3410 | 
            +
            aη,
         | 
| 3411 | 
            +
            where ll.πi = [πi πi · · · πi]t. Since deg(η) = k,
         | 
| 3412 | 
            +
            ˜∆
         | 
| 3413 | 
            +
            aη ⊆ (W ⊗ W)k.
         | 
| 3414 | 
            +
            Note that ll.πi(aη)(c) = [ai
         | 
| 3415 | 
            +
            η ai
         | 
| 3416 | 
            +
            η · · · ai
         | 
| 3417 | 
            +
            η](c) = aη[ci ci · · · ci]. Thus ll.πiaη ∈ W and then
         | 
| 3418 | 
            +
            applying the induction hypothesis ˜∆HWn ⊆ (W ⊗ H)n for n ≤ k,
         | 
| 3419 | 
            +
            �
         | 
| 3420 | 
            +
            ˜∆H ⊗ ll.πi
         | 
| 3421 | 
            +
            �
         | 
| 3422 | 
            +
            (W ⊗ W)k ⊆ (W ⊗ H ⊗ W)k .
         | 
| 3423 | 
            +
            Finally,
         | 
| 3424 | 
            +
            (θi ⊗ m) (W ⊗ H ⊗ W)k ⊆ (W ⊗ H)k+1,
         | 
| 3425 | 
            +
            as θi is homogeneous operator of degree 1. Thus, ˜∆Haη′ ∈ �
         | 
| 3426 | 
            +
            i+j=k+1 Wi ⊗ Hj where
         | 
| 3427 | 
            +
            |η′| = k + 1.
         | 
| 3428 | 
            +
            Hence proved by induction that for all n ≥ 0: ˜∆H (aη) ∈ �
         | 
| 3429 | 
            +
            i+j=n Wi ⊗ Hj where |η| = n.
         | 
| 3430 | 
            +
            The following proposition asserts that the grading on H in Definition 8.1 is compatible
         | 
| 3431 | 
            +
            with bialgebraic structure of H.
         | 
| 3432 | 
            +
            Proposition 8.5. With the grading on the Hopf algebra H as in Definition 8.1,
         | 
| 3433 | 
            +
            ∆H (Hn) ⊆
         | 
| 3434 | 
            +
            �
         | 
| 3435 | 
            +
            i+j=n
         | 
| 3436 | 
            +
            Hi ⊗ Hj
         | 
| 3437 | 
            +
            for all n ≥ 0.
         | 
| 3438 | 
            +
            Proof: Observe that the statement is true for n = 0. Prior to the proving the statement for
         | 
| 3439 | 
            +
            n ≥ 1, the following statement needs to be proved:
         | 
| 3440 | 
            +
            ∆H (Wn) ⊆
         | 
| 3441 | 
            +
            �
         | 
| 3442 | 
            +
            i+j=n
         | 
| 3443 | 
            +
            Wi ⊗ Hj
         | 
| 3444 | 
            +
            ∀ n ≥ 0.
         | 
| 3445 | 
            +
             | 
| 3446 | 
            +
            34
         | 
| 3447 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 3448 | 
            +
            Observe that from Proposition 8.2,
         | 
| 3449 | 
            +
            ∆H ◦ πi = (id ⊗ m) ◦
         | 
| 3450 | 
            +
            �
         | 
| 3451 | 
            +
            ˜∆H ⊗ id
         | 
| 3452 | 
            +
            �
         | 
| 3453 | 
            +
            ◦ (πi ⊗ πi) ◦ ˜∆
         | 
| 3454 | 
            +
            .
         | 
| 3455 | 
            +
            Thus (by grouping them along the coordinate i),
         | 
| 3456 | 
            +
            ∆H = (id ⊗ m) ◦
         | 
| 3457 | 
            +
            �
         | 
| 3458 | 
            +
            ˜∆ ◦ id
         | 
| 3459 | 
            +
            �
         | 
| 3460 | 
            +
            ◦ ˜∆
         | 
| 3461 | 
            +
            .
         | 
| 3462 | 
            +
            Hence,
         | 
| 3463 | 
            +
            ∆H(Wn) = (id ⊗ m) ◦
         | 
| 3464 | 
            +
            �
         | 
| 3465 | 
            +
            ˜∆ ◦ id
         | 
| 3466 | 
            +
            �
         | 
| 3467 | 
            +
            ◦ ˜∆
         | 
| 3468 | 
            +
            (Wn)
         | 
| 3469 | 
            +
            ⊆ (id ⊗ m) ◦
         | 
| 3470 | 
            +
            �
         | 
| 3471 | 
            +
            ˜∆ ◦ id
         | 
| 3472 | 
            +
            �
         | 
| 3473 | 
            +
            (W ⊗ W)n.
         | 
| 3474 | 
            +
            Using Proposition 8.2,
         | 
| 3475 | 
            +
            ∆H(Wn) ⊆ (id ⊗ m) (W ⊗ H ⊗ W)n
         | 
| 3476 | 
            +
            ⊆ (W ⊗ H)n.
         | 
| 3477 | 
            +
            Therefore, the intermediate statement holds true viz.
         | 
| 3478 | 
            +
            ∆H (Wn) ⊆
         | 
| 3479 | 
            +
            �
         | 
| 3480 | 
            +
            i+j=n
         | 
| 3481 | 
            +
            Wi ⊗ Hj
         | 
| 3482 | 
            +
            ∀ n ≥ 0.
         | 
| 3483 | 
            +
            The statement of the theorem then holds true as ∆ is an Rn-algebra morphism from H to
         | 
| 3484 | 
            +
            H ⊗ H.
         | 
| 3485 | 
            +
            Thus Proposition 8.5 asserts that the grading defined on the Hopf algebra H in Defini-
         | 
| 3486 | 
            +
            tion 8.1 is well-defined and connected. The homogeneous components are finite-dimensional
         | 
| 3487 | 
            +
            and dimensions respect the Proposition 4.2 since the bialgebras H and H
         | 
| 3488 | 
            +
            are isomorphic
         | 
| 3489 | 
            +
            with respect to the underlying graded algebraic structures.
         | 
| 3490 | 
            +
            The following example is rework of the Example 4.10 in [Gray & Ebrahimi-Fard(2017)]
         | 
| 3491 | 
            +
            acting as a check for the computation of feedback group inverse in one-dimensional case.
         | 
| 3492 | 
            +
            Example 8.2. Let c = 1−x1 ∈ R⟨⟨X⟩⟩. The series c◦−1 = 1+· · ·+· · · . Using the recursive
         | 
| 3493 | 
            +
            computation formula for antipode as in Theorem 3.1
         | 
| 3494 | 
            +
            ax1(c◦−1) = Sax1 (c) = −ax1(c) = 1.
         | 
| 3495 | 
            +
            Observe that
         | 
| 3496 | 
            +
            ∆′
         | 
| 3497 | 
            +
            Hax2
         | 
| 3498 | 
            +
            1 = 3ax1 ⊗ ax1.
         | 
| 3499 | 
            +
            Thus,
         | 
| 3500 | 
            +
            ax2
         | 
| 3501 | 
            +
            1
         | 
| 3502 | 
            +
            �
         | 
| 3503 | 
            +
            c◦−1�
         | 
| 3504 | 
            +
            = Sax2
         | 
| 3505 | 
            +
            1 (c)
         | 
| 3506 | 
            +
            = −ax2
         | 
| 3507 | 
            +
            1 − 3ax1.Sax1 = −ax2
         | 
| 3508 | 
            +
            1 + 3a2
         | 
| 3509 | 
            +
            x1.
         | 
| 3510 | 
            +
            Therefore, ax2
         | 
| 3511 | 
            +
            1 (c◦−1) = 0 + 3(1)2 = 3. In similar fashion the reduced coproduct of a3
         | 
| 3512 | 
            +
            x1 is
         | 
| 3513 | 
            +
            ∆′
         | 
| 3514 | 
            +
            Hax3
         | 
| 3515 | 
            +
            1 = 4ax1 ⊗ ax2
         | 
| 3516 | 
            +
            1 + 6ax2
         | 
| 3517 | 
            +
            1 ⊗ ax1 + 3ax1 ⊗ a2
         | 
| 3518 | 
            +
            x1.
         | 
| 3519 | 
            +
            Thus,
         | 
| 3520 | 
            +
            ax3
         | 
| 3521 | 
            +
            1
         | 
| 3522 | 
            +
            �
         | 
| 3523 | 
            +
            c◦−1�
         | 
| 3524 | 
            +
            =
         | 
| 3525 | 
            +
            �
         | 
| 3526 | 
            +
            −ax3
         | 
| 3527 | 
            +
            1 − 4ax1.Sax2
         | 
| 3528 | 
            +
            1 − 6ax2
         | 
| 3529 | 
            +
            1.Sax1 − 3ax1. (Sax1)2�
         | 
| 3530 | 
            +
            (c)
         | 
| 3531 | 
            +
            = 0 − 4(−1)(3) − 6(0)(−1) − 3(−1)(1)2 = 15.
         | 
| 3532 | 
            +
            Therefore c◦−1 = 1 + x1 + 3x2
         | 
| 3533 | 
            +
            1 + 15x3
         | 
| 3534 | 
            +
            1 + 105x4
         | 
| 3535 | 
            +
            1 + · · · .
         | 
| 3536 | 
            +
            The result matches exactly with that of Example 4.10 in [Gray & Ebrahimi-Fard(2017)].
         | 
| 3537 | 
            +
             | 
| 3538 | 
            +
            FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
         | 
| 3539 | 
            +
            35
         | 
| 3540 | 
            +
            9. Conclusions and Future work
         | 
| 3541 | 
            +
            It was shown that the closed-loop system of a plant in Chen–Fliess series description
         | 
| 3542 | 
            +
            in multiplicative output feedback with another system, given by Chen–Fliess series, has a
         | 
| 3543 | 
            +
            Chen–Fliess series representation. An explicit expression of the closed-loop generating series
         | 
| 3544 | 
            +
            was derived and the multiplicative dynamic feedback connection has a natural interpretation
         | 
| 3545 | 
            +
            as a transformation group acting on the plant. A computational framework has been devised
         | 
| 3546 | 
            +
            utilizing the dual Hopf algebras corresponding to the shuffle group and multiplicative output
         | 
| 3547 | 
            +
            dynamic feedback group. Future work will be to address the solemn problem regarding the
         | 
| 3548 | 
            +
            local convergence of the both multiplicative dynamic and static output feedback connections
         | 
| 3549 | 
            +
            and to identify both the multiplicative dynamic and static feedback invariants.
         | 
| 3550 | 
            +
            References
         | 
| 3551 | 
            +
            [Abe(2004)] Abe, E., Hopf Algebras, Cambridge University Press, Cambridge, UK, 2004.
         | 
| 3552 | 
            +
            Abramowitz, M. and Stegun, I. A, Handbook of Mathematical Functions with Formulas, Graphs, and
         | 
| 3553 | 
            +
            Mathematical Tables, Dover Publications, New York, 1970.
         | 
| 3554 | 
            +
            [Berstel & Reutenauer(1988)] Berstel, J. and Reutenauer, C., Rational Series and Their Languages,
         | 
| 3555 | 
            +
            Springer-Verlag, Berlin, 1988.
         | 
| 3556 | 
            +
            [Brockett(1978)] Brockett, R. W., Feedback Invariants for Nonlinear Systems, IFAC Proceedings Volumes,
         | 
| 3557 | 
            +
            11 (1978) 1115–1120.
         | 
| 3558 | 
            +
            [Duffaut Espinosa, et al.(2016)] Duffaut Espinosa, L. A., Ebrahimi-Fard, K. and Gray, W. S., A Combina-
         | 
| 3559 | 
            +
            torial Hopf Algebra for Nonlinear Output Feedback Control Systems, Journal of Algebra, 453 (2016)
         | 
| 3560 | 
            +
            609–643.
         | 
| 3561 | 
            +
            [Duffaut Espinosa & Gray(2017)] Duffaut Espinosa, L. A. and Gray, W. S., Integration of Output Tracking
         | 
| 3562 | 
            +
            and Trajectory Generation via Analytic Left Inversion, Proc. 21st Int. Conf. on System Theory, Control
         | 
| 3563 | 
            +
            and Computing, Sinaia, Romania, 2017, pp. 802–807.
         | 
| 3564 | 
            +
            [Ferfera(1979)] Ferfera, A., Combinatoire du Mono¨ıde Libre Appliqu´ee `a la Composition et aux Variations de
         | 
| 3565 | 
            +
            Certaines Fonctionnelles Issues de la Th´eorie des Syst`emes, Ph.D. Dissertation, University of Bordeaux
         | 
| 3566 | 
            +
            I, 1979.
         | 
| 3567 | 
            +
            [Ferfera(1980)] Ferfera, A., Combinatoire du Mono¨ıde Libre et Composition de Certains Syst`emes Non
         | 
| 3568 | 
            +
            Lin´eaires, Ast´erisque, 75-76 (1980) 87–93.
         | 
| 3569 | 
            +
            [Fliess(1981)] Fliess, M., Fonctionnelles Causales Non Lin´eaires et Ind´etermin´ees Non Commutatives, Bul-
         | 
| 3570 | 
            +
            letin de la Soci´et´e Math´ematique de France, 109 (1981) 3–40.
         | 
| 3571 | 
            +
            [Fliess(1983)] Fliess, M., R´ealisation Locale des Syst`emes Non Lin´eaires, Alg`ebres de Lie Filtr´ees Transitives
         | 
| 3572 | 
            +
            et S´eries G´en´eratrices Non Commutatives, Inventiones Mathematicae, 71 (1983) 521–537.
         | 
| 3573 | 
            +
            [Foissy(2015)] Foissy, L., The Hopf Algebra of Fliess Operators and Its Dual Pre-Lie Algebra, Communica-
         | 
| 3574 | 
            +
            tions in Algebra, 43 (2015) 4528–4552.
         | 
| 3575 | 
            +
            [Gray, et al.(2014a)] Gray, W. S., Duffaut Espinosa, L. A., and Ebrahimi-Fard, K., Fa`a di Bruno Hopf
         | 
| 3576 | 
            +
            Algebra of the Output Feedback Group for Multivariable Fliess Operators, Systems & Control Letters,
         | 
| 3577 | 
            +
            74 (2014) 64–73.
         | 
| 3578 | 
            +
            [Gray, et al.(2014b)] Gray, W. S., Duffaut Espinosa, L. A., and Thitsa, M., Left Inversion of Analytic Non-
         | 
| 3579 | 
            +
            linear SISO Systems via Formal Power Series Methods, Automatica, 50 (2014) 2381–2388.
         | 
| 3580 | 
            +
            [Gray & Ebrahimi-Fard(2017)] Gray, W. S. and Ebrahimi-Fard, K., SISO Output Affine Feedback Trans-
         | 
| 3581 | 
            +
            formation Group and Its Fa`a di Bruno Hopf Algebra, SIAM Journal on Control and Optimization, 55
         | 
| 3582 | 
            +
            (2017) 885–912.
         | 
| 3583 | 
            +
            [Gray & Li(2005)] Gray, W. S. and Li, Y., Generating Series for Interconnected Analytic Nonlinear Systems,
         | 
| 3584 | 
            +
            SIAM Journal on Control and Optimization, 44 (2005) 646–672.
         | 
| 3585 | 
            +
            [Gray & Venkatesh(2019)] Gray, W. S. and Venkatesh, G. S., Relative Degree of Interconnected SISO Non-
         | 
| 3586 | 
            +
            linear Control Systems, Systems & Control Letters, 124 (2019) 99–105.
         | 
| 3587 | 
            +
            [Gray & Wang(2002)] Gray, W. S. and Wang, Y., Fliess Operators on Lp spaces: Convergence and Conti-
         | 
| 3588 | 
            +
            nuity, Systems & Control Letters, 46 (2002) 67–74.
         | 
| 3589 | 
            +
            [Isidori(1995)] Isidori, A., Nonlinear Control Systems, 3rd Ed., Springer-Verlag, London, 1995.
         | 
| 3590 | 
            +
            [OEIS(2022)] OEIS Foundation Inc., The On-Line Encyclopedia of Integer Sequences, published electroni-
         | 
| 3591 | 
            +
            cally at http://oeis.org, 2022.
         | 
| 3592 | 
            +
             | 
| 3593 | 
            +
            36
         | 
| 3594 | 
            +
            VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
         | 
| 3595 | 
            +
            [Ree(1958)] Ree, R., Lie Elements and an Algebra Associated with Shuffles, Annals of Mathematics (2), 68
         | 
| 3596 | 
            +
            (1958) 210–220.
         | 
| 3597 | 
            +
            [Sweedler(1969)] Sweedler, M. E., Hopf Algebras, Benjamin Inc., New York, 1969.
         | 
| 3598 | 
            +
            [Thitsa & Gray(2012)] Thitsa, M. and Gray, W. S., On the Radius of Convergence of Interconnected Analytic
         | 
| 3599 | 
            +
            Nonlinear Input-Output Systems, SIAM Journal on Control and Optimization, 50 (2012) 2786–2813.
         | 
| 3600 | 
            +
            [Venkatesh(2021)] Venkatesh, G. S., Wiener-Fliess Composition of Formal Power Series: Additive Static
         | 
| 3601 | 
            +
            Feedback and Shuffle Rational Series, Ph.D. Dissertation, Old Dominion University, 2021.
         | 
| 3602 | 
            +
            [Venkatesh & Gray(2022)] Venkatesh
         | 
| 3603 | 
            +
            G.
         | 
| 3604 | 
            +
            S.,
         | 
| 3605 | 
            +
            Gray,
         | 
| 3606 | 
            +
            W.
         | 
| 3607 | 
            +
            S.,
         | 
| 3608 | 
            +
            Formal
         | 
| 3609 | 
            +
            Power
         | 
| 3610 | 
            +
            Series
         | 
| 3611 | 
            +
            Approach
         | 
| 3612 | 
            +
            to
         | 
| 3613 | 
            +
            Nonlinear
         | 
| 3614 | 
            +
            Systems
         | 
| 3615 | 
            +
            with
         | 
| 3616 | 
            +
            Additive
         | 
| 3617 | 
            +
            Static
         | 
| 3618 | 
            +
            Feedback,
         | 
| 3619 | 
            +
            International
         | 
| 3620 | 
            +
            Journal
         | 
| 3621 | 
            +
            of
         | 
| 3622 | 
            +
            Control,
         | 
| 3623 | 
            +
            https://doi.org/10.1080/00207179.2022.2059013 (appeared online).
         | 
| 3624 | 
            +
            [Venkatesh & Gray(2021)] Venkatesh G. S., Gray, W. S., Formal Power Series Approach to Nonlinear Sys-
         | 
| 3625 | 
            +
            tems with Static Output Feedback, Proc. 24th Int. Symp. on Mathematical Theory of Networks and
         | 
| 3626 | 
            +
            Systems, Cambridge, UK, 2021, pp. 192–198.
         | 
| 3627 | 
            +
            [Venkatesh & Gray (2020)] Venkatesh G. S. and Gray, W. S., Shuffle-Rational Series: Recognizability and
         | 
| 3628 | 
            +
            Realizations, Proc. 24th Int. Conf. on System Theory, Control and Computing, Sinaia, Romania, 2020,
         | 
| 3629 | 
            +
            pp. 404–411.
         | 
| 3630 | 
            +
            [Winter-Arboleda(2019)] Winter-Arboleda, I. M., On Analytic Nonlinear Input-output Systems: Expanded
         | 
| 3631 | 
            +
            Global Convergence and System Interconnections, Ph.D. Dissertation, Old Dominion University, 2019.
         | 
| 3632 | 
            +
            [Winter-Arboleda, et al.(2015)] Winter-Arboleda, I. M., Gray, W. S. and Duffaut Espinosa, L. A., Frac-
         | 
| 3633 | 
            +
            tional Fliess Operators: Two Approaches, Proc. 49th Conference on Information Sciences and Systems,
         | 
| 3634 | 
            +
            Baltimore, MD, 2015, pp. 1–6
         | 
| 3635 | 
            +
            Department of Mathematical Sciences, Norwegian University of Science and Technology
         | 
| 3636 | 
            +
            (NTNU), 7491 Trondheim, Norway
         | 
| 3637 | 
            +
            Email address: [email protected]
         | 
| 3638 | 
            +
            Department of Mathematical Sciences, Norwegian University of Science and Technology
         | 
| 3639 | 
            +
            (NTNU), 7491 Trondheim, Norway
         | 
| 3640 | 
            +
            Email address: [email protected]
         | 
| 3641 | 
            +
            URL: https://folk.ntnu.no/kurusche/
         | 
| 3642 | 
            +
             | 
    	
        VtE4T4oBgHgl3EQfMgzk/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        X9AyT4oBgHgl3EQfWfd0/content/tmp_files/2301.00164v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,2493 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.00164v1  [eess.SP]  31 Dec 2022
         | 
| 2 | 
            +
            1
         | 
| 3 | 
            +
            Design of a Multi-User Wireless Powered
         | 
| 4 | 
            +
            Communication System Employing Either
         | 
| 5 | 
            +
            Active IRS or AF Relay
         | 
| 6 | 
            +
            Omid Rezaei, Maryam Masjedi, Ali Kanaani, Mohammad Mahdi Naghsh∗,
         | 
| 7 | 
            +
            Saeed Gazor, and Mohammad Mahdi Nayebi
         | 
| 8 | 
            +
            Abstract
         | 
| 9 | 
            +
            In this paper, we optimize a Wireless Powered Communication (WPC) system including multiple
         | 
| 10 | 
            +
            pair of users, where transmitters employ single-antenna to transmit their information and power to their
         | 
| 11 | 
            +
            receivers with the help of one multiple-antennas Amplify-and-Forward (AF) relay or an active Intelligent
         | 
| 12 | 
            +
            Reflecting Surface (IRS). We propose a joint Time Switching (TS) scheme in which transmitters,
         | 
| 13 | 
            +
            receivers, and the relay/IRS are either in their energy or information transmission/reception modes.
         | 
| 14 | 
            +
            The transmitted multi-carrier unmodulated and modulated waveforms are used for Energy Harvesting
         | 
| 15 | 
            +
            (EH) and Information Decoding (ID) modes, respectively. In order to design an optimal fair system, we
         | 
| 16 | 
            +
            maximize the minimum rate of all pairs for both relay and IRS systems through a unified framework.
         | 
| 17 | 
            +
            This framework allows us to simultaneously design energy waveforms, find optimal relay/IRS amplifi-
         | 
| 18 | 
            +
            cation/reflection matrices, allocate powers for information waveforms, and allocate time durations for
         | 
| 19 | 
            +
            various phases. In addition, we take into account the non-linearity of the EH circuits in our problem. This
         | 
| 20 | 
            +
            problem turns out to be non-convex. Thus, we propose an iterative algorithm by using the Minorization-
         | 
| 21 | 
            +
            Maximization (MM) technique, which quickly converges to the optimal solution. Numerical examples
         | 
| 22 | 
            +
            show that the proposed method improves the performance of the multi-pair WPC relay/IRS system
         | 
| 23 | 
            +
            under various setups.
         | 
| 24 | 
            +
            O. Rezaei and M. M. Nayebi are with the Department of Electrical Engineering, Sharif University of Technology, Tehran,
         | 
| 25 | 
            +
            11155-4363, Iran. M. Masjedi, A. Kanaani, and M. M. Naghsh are with the Department of Electrical and Computer Engineering,
         | 
| 26 | 
            +
            Isfahan University of Technology, Isfahan, 84156-83111, Iran. S. Gazor is with the Department of Electrical and Computer
         | 
| 27 | 
            +
            Engineering, Queen’s University, Kingston, Ontario, K7L 3N6, Canada.
         | 
| 28 | 
            +
            ∗Please address all the correspondence to M. M. Naghsh, Phone: (+98) 31-33912450; Fax: (+98) 31-33912451; Email:
         | 
| 29 | 
            +
            mm [email protected]
         | 
| 30 | 
            +
            January 3, 2023
         | 
| 31 | 
            +
            DRAFT
         | 
| 32 | 
            +
             | 
| 33 | 
            +
            2
         | 
| 34 | 
            +
            Index Terms
         | 
| 35 | 
            +
            Fair Throughput Maximization, Intelligent Reflecting Surface (IRS), Minorization-Maximization
         | 
| 36 | 
            +
            (MM), Relay Networks, Wireless Powered Communication (WPC).
         | 
| 37 | 
            +
            I. INTRODUCTION
         | 
| 38 | 
            +
            Wireless Power Transfer (WPT) technology is introduced to extend the lifetime of devices
         | 
| 39 | 
            +
            in wireless networks in which the energy is emitted from the dedicated power sources to the
         | 
| 40 | 
            +
            devices [1]. Interestingly, WPT enables Simultaneous Wireless Information and Power Transfer
         | 
| 41 | 
            +
            (SWIPT) [2], where devices not only receive and decode information, but also harvest the
         | 
| 42 | 
            +
            energy from Radio Frequency (RF) signals. The Time Switching (TS) and Power Splitting
         | 
| 43 | 
            +
            (PS) schemes are two well-known implementing protocols of SWIPT [3]. Recently, SWIPT
         | 
| 44 | 
            +
            models are designed to employ relays to further enhance the coverage and spectral efficiency
         | 
| 45 | 
            +
            of wireless networks [4]–[6]. In [4], a Multiple-Input Multiple-Output (MIMO) two-way relay
         | 
| 46 | 
            +
            system is introduced in which two transceivers exchange their information through a relay. The
         | 
| 47 | 
            +
            authors in [5] designed the relay and source precoders by minimizing the bit error rate at the
         | 
| 48 | 
            +
            destination for a full-duplex MIMO relay system and SWIPT-enabled users. A similar system
         | 
| 49 | 
            +
            with a half-duplex two-way relay is designed in [6] by minimizing the mean square error at the
         | 
| 50 | 
            +
            destination.
         | 
| 51 | 
            +
            Another impactful technology that is currently emerging is to use of the Intelligent Reflecting
         | 
| 52 | 
            +
            Surface (IRS) in wireless communication systems. This promising solution not only is capable
         | 
| 53 | 
            +
            of improving energy delivery but also can enhance the spectral efficiency of future wireless
         | 
| 54 | 
            +
            communication networks. [7]. An IRS is an array of large number of Reflecting Elements (REs)
         | 
| 55 | 
            +
            designed to have controllable electromagnetic properties. Each RE introduces a phase shift on
         | 
| 56 | 
            +
            the impinging signal, allowing beamforming/manipulation of the reflection waveforms. Precisely,
         | 
| 57 | 
            +
            the IRS matrix allows controlling the reflected signal (amplify, attenuated, steer in the desired
         | 
| 58 | 
            +
            direction, and so on) toward optimal desired directions by purposefully designing the phase
         | 
| 59 | 
            +
            shift matrix. The IRS is exploited recently in SWIPT systems in [8]–[11]. The weighted sum
         | 
| 60 | 
            +
            harvested power maximization problem was studied in [8] for an IRS-aided SWIPT model in
         | 
| 61 | 
            +
            which a multiple-antennas access point serves multiple single-antenna users. In [9], the model
         | 
| 62 | 
            +
            in [8] is extended for a more practical multi-objective optimization problem by taking into
         | 
| 63 | 
            +
            account the trade-off between sum rate and sum harvested power maximization. In [10], the
         | 
| 64 | 
            +
            total transmission power is minimized for a Multiple-Input Single-Output (MISO) SWIPT system
         | 
| 65 | 
            +
            January 3, 2023
         | 
| 66 | 
            +
            DRAFT
         | 
| 67 | 
            +
             | 
| 68 | 
            +
            3
         | 
| 69 | 
            +
            employing multiple IRSs. In [11], the MISO SWIPT in [8]–[10] is extended to the MIMO case,
         | 
| 70 | 
            +
            and the weighted sum rate is maximized in an IRS-assisted system.
         | 
| 71 | 
            +
            The design of the energy waveform remarkably affects the performance of WPT-based systems.
         | 
| 72 | 
            +
            Indeed, an efficient waveform leads to significant improvement in the efficacy of power delivery.
         | 
| 73 | 
            +
            Experiments reveal that signals with high Peak to Average Power Ratio (PAPR) such as multi-
         | 
| 74 | 
            +
            sine signals provide more DC power at Energy Harvesting (EH) circuits than constant envelope
         | 
| 75 | 
            +
            signals with the same average RF power [12]. Based on this interesting observation, a multi-sine
         | 
| 76 | 
            +
            waveform design for WPT has been examined in several works [13]–[21]. Waveform design
         | 
| 77 | 
            +
            with a non-linear EH model was considered in [13] and [14] for MISO and Single-Input Single-
         | 
| 78 | 
            +
            Output (SISO) systems, respectively. The authors of [15] proposed a low-complexity method for
         | 
| 79 | 
            +
            a waveform design in a SISO WPT system. In [16], the transmit waveform was designed based
         | 
| 80 | 
            +
            on limited Channel State Information (CSI) feedback WPT system. Then, the authors in [17]
         | 
| 81 | 
            +
            studied waveform design for an IRS-aided SWIPT MISO system. The aforementioned methods
         | 
| 82 | 
            +
            for design of single-user systems were extended to the multi-user case in [18]. Also, a waveform
         | 
| 83 | 
            +
            design was performed in [19] for wireless powered backscatter communication networks, and this
         | 
| 84 | 
            +
            work was extended to multi-user backscatter systems in [20]. The authors of [21] investigated
         | 
| 85 | 
            +
            the waveform and transceiver design problem in a MISO SWIPT system and determined the
         | 
| 86 | 
            +
            multi-sine waveforms for Information Decoding (ID) and EH phases.
         | 
| 87 | 
            +
            In this paper, we optimize a multi-user wireless powered relay/IRS system using a multi-sine
         | 
| 88 | 
            +
            waveform with the following main contributions:
         | 
| 89 | 
            +
            • Relay model: To the best of our knowledge, a multi-sine waveform design for multiple
         | 
| 90 | 
            +
            user pairs in a wireless powered relay system has not been addressed in the literature. In
         | 
| 91 | 
            +
            this paper, we consider a multi-carrier Wireless Powered Communication (WPC) system
         | 
| 92 | 
            +
            for multi-user relay channels. Precisely, in our proposed model, an amplify-and-forward
         | 
| 93 | 
            +
            (AF) relay provides energy/information transmission from K transmitters to their receivers
         | 
| 94 | 
            +
            by adopting the TS scheme in all nodes1. Herein, the aim is to design the multi-carrier
         | 
| 95 | 
            +
            unmodulated energy waveforms and the allocated power for information waveforms at the
         | 
| 96 | 
            +
            transmitters, the amplification matrices in a relay, and the time durations for the EH and ID
         | 
| 97 | 
            +
            modes in order to maximize the minimum rate of the user pairs. In addition, we consider
         | 
| 98 | 
            +
            1Note that the system in [22], where a TS scheme is only applied for a receiver, is considered as a special case of the proposed
         | 
| 99 | 
            +
            joint TS scheme.
         | 
| 100 | 
            +
            January 3, 2023
         | 
| 101 | 
            +
            DRAFT
         | 
| 102 | 
            +
             | 
| 103 | 
            +
            4
         | 
| 104 | 
            +
            the effect of the non-linearity of EH circuits in the design problem.
         | 
| 105 | 
            +
            • IRS model: In the case of IRS-assisted communication, multi-pair WPC has not been
         | 
| 106 | 
            +
            considered in the literature, and therefore, herein, we consider this type of IRS-assisted
         | 
| 107 | 
            +
            systems. Precisely, in this case, an active IRS2 replaced with the AF relay in the proposed
         | 
| 108 | 
            +
            system model mentioned in the above paragraph. Also, some comparisons are made between
         | 
| 109 | 
            +
            relay and IRS models in terms of architecture and performance (see Remark 1-2).
         | 
| 110 | 
            +
            • Unified consideration of relay and IRS: Both proposed AF relay and active IRS-aided
         | 
| 111 | 
            +
            systems are modeled under a unified formulation, and we handle the resulting optimization
         | 
| 112 | 
            +
            problems under a unified mathematical umbrella. We show that the problem is non-convex
         | 
| 113 | 
            +
            and consequently, is hard to solve. To deal with this problem, we devise a method based on
         | 
| 114 | 
            +
            the Minorization-Maximization (MM) technique. Interestingly, the proposed algorithm can
         | 
| 115 | 
            +
            deal with relay and IRS systems by switching between Kronecker and Hadamard products
         | 
| 116 | 
            +
            for parameters used in the algorithm (see Lemma 2).
         | 
| 117 | 
            +
            • Sub-optimal methods: Some sub-optimal methods with lower signaling overhead and com-
         | 
| 118 | 
            +
            putational complexity are proposed and then, their performance are compared.
         | 
| 119 | 
            +
            • Numerical result: Simulation results are reported to illustrate the effectiveness of the pro-
         | 
| 120 | 
            +
            posed method; particularly, the impact of the relay/IRS matrix and energy waveform design.
         | 
| 121 | 
            +
            Also, numerical examples show that the minimum rate of users increases linearly/super-
         | 
| 122 | 
            +
            linearly with the number of antennas/REs in relay/IRS systems.
         | 
| 123 | 
            +
            The rest of this paper is organized as follows: The signal and system models are explained
         | 
| 124 | 
            +
            in Section II. In Section III, the minimum rate maximization problem is formulated, and a
         | 
| 125 | 
            +
            unified optimization framework is proposed for both relay and IRS models. Section IV presents
         | 
| 126 | 
            +
            numerical examples to illustrate the effectiveness of the proposed method. Finally, conclusions
         | 
| 127 | 
            +
            are drawn in Section V.
         | 
| 128 | 
            +
            Notation: Bold lowercase (uppercase) letters are used for vectors (matrices). The notations
         | 
| 129 | 
            +
            arg(·), E[·], ℜ{·}, ∥·∥2, (·)T, (·)H, (·)∗, tr{·}, λmax(·), vec(·), Diag(·), ∇xf(·) and ∇2
         | 
| 130 | 
            +
            xf(·) indicate
         | 
| 131 | 
            +
            the phase of a complex number, statistical expectation, real-part, l2-norm of a vector, transpose,
         | 
| 132 | 
            +
            Hermitian, complex conjugate, trace of a matrix, the principal eigenvalue of a matrix, stacking
         | 
| 133 | 
            +
            of the column of a matrix, a diagonal matrix formed by the entries, the gradient of a function
         | 
| 134 | 
            +
            with respect to (w.r.t.) x and the Hessian of a function w.r.t. x, respectively. The symbols ⊗ and
         | 
| 135 | 
            +
            2Note that in an active IRS, REs can amplify the reflected signals using their reflection-type amplifiers [23].
         | 
| 136 | 
            +
            January 3, 2023
         | 
| 137 | 
            +
            DRAFT
         | 
| 138 | 
            +
             | 
| 139 | 
            +
            5
         | 
| 140 | 
            +
            T1 ...
         | 
| 141 | 
            +
            τ
         | 
| 142 | 
            +
            T − τ
         | 
| 143 | 
            +
            Information
         | 
| 144 | 
            +
            Transmitter
         | 
| 145 | 
            +
            Energy
         | 
| 146 | 
            +
            Transmitter
         | 
| 147 | 
            +
            Tk ...
         | 
| 148 | 
            +
            TK
         | 
| 149 | 
            +
            AF Relay or Active IRS
         | 
| 150 | 
            +
            R1
         | 
| 151 | 
            +
            ...
         | 
| 152 | 
            +
            Rk
         | 
| 153 | 
            +
            ...
         | 
| 154 | 
            +
            τ
         | 
| 155 | 
            +
            T − τ
         | 
| 156 | 
            +
            Information
         | 
| 157 | 
            +
            Decoder
         | 
| 158 | 
            +
            Energy
         | 
| 159 | 
            +
            Harvester
         | 
| 160 | 
            +
            RK
         | 
| 161 | 
            +
            Blockage
         | 
| 162 | 
            +
            Fig. 1. Multi-user wireless powered relay/IRS system based on TS scheme with blocked direct path.
         | 
| 163 | 
            +
            ⊙ stand for the Kronecker and Hadamard products of two matrices. We denote CN (ω, Σ) as
         | 
| 164 | 
            +
            a circularly symmetric complex Gaussian (CSCG) distribution with mean ω and covariance Σ.
         | 
| 165 | 
            +
            The set R+ represents non-negative real numbers and CN×N and DN×N are the set of N × N
         | 
| 166 | 
            +
            complex and complex diagonal matrices, respectively. The set of N × N positive (semi-)definite
         | 
| 167 | 
            +
            and identity matrices are denoted by SN
         | 
| 168 | 
            +
            ++ ⊂ CN×N (SN
         | 
| 169 | 
            +
            + ⊂ CN×N) and IN, respectively. The
         | 
| 170 | 
            +
            notation A ≻ B (A ⪰ B) means that A − B is positive (semi-)definite.
         | 
| 171 | 
            +
            II. SYSTEM MODEL
         | 
| 172 | 
            +
            We consider a multi-carrier wireless powered relay/IRS system with K user pairs {(Tk, Rk)}K
         | 
| 173 | 
            +
            k=1
         | 
| 174 | 
            +
            as shown in Fig. 1, where the direct links between the transmitters and receivers are likely blocked
         | 
| 175 | 
            +
            (see [24] and [25], [26] for similar models of multiple user pairs with blocked direct path for
         | 
| 176 | 
            +
            relay and IRS systems, respectively). The single-antenna transmitter Tk communicates with its
         | 
| 177 | 
            +
            receiver Rk through either an AF relay with MR antennas or an active IRS with MIRS REs.
         | 
| 178 | 
            +
            We assume that Rk harvests a part of its required power, whereas Tk and the relay/IRS have
         | 
| 179 | 
            +
            no energy concern [4], [5]. In each time duration T, the relay/IRS helps Rk not only harvest
         | 
| 180 | 
            +
            energy from the signal of all {Tk}K
         | 
| 181 | 
            +
            k=1, but also decode the information from its corresponding
         | 
| 182 | 
            +
            transmitter Tk by using a joint TS scheme. Precisely, Tk, relay/IRS, and Rk switch simultaneously
         | 
| 183 | 
            +
            at time t = τ from their energy delivery modes to their communication modes. We assume that all
         | 
| 184 | 
            +
            nodes are perfectly synchronized as shown in Fig. 2 for this switching [22]. We consider a multi-
         | 
| 185 | 
            +
            carrier system with a total bandwidth of Bt equally divided into N orthogonal subbands. We
         | 
| 186 | 
            +
            also model all channels to have a frequency-selective block fading, i.e., the channel coefficients
         | 
| 187 | 
            +
            January 3, 2023
         | 
| 188 | 
            +
            DRAFT
         | 
| 189 | 
            +
             | 
| 190 | 
            +
            6
         | 
| 191 | 
            +
            Relay:
         | 
| 192 | 
            +
            IRS:
         | 
| 193 | 
            +
            {Tk}K
         | 
| 194 | 
            +
            k=1 → IRS → {Rk}K
         | 
| 195 | 
            +
            k=1
         | 
| 196 | 
            +
            {Tk}K
         | 
| 197 | 
            +
            k=1 → relay relay → {Rk}K
         | 
| 198 | 
            +
            k=1
         | 
| 199 | 
            +
            {Tk}K
         | 
| 200 | 
            +
            k=1 → IRS → {Rk}K
         | 
| 201 | 
            +
            k=1
         | 
| 202 | 
            +
            {Tk}K
         | 
| 203 | 
            +
            k=1 → relay
         | 
| 204 | 
            +
            relay → {Rk}K
         | 
| 205 | 
            +
            k=1
         | 
| 206 | 
            +
            τ
         | 
| 207 | 
            +
            2
         | 
| 208 | 
            +
            τ (energy waveform)
         | 
| 209 | 
            +
            τ
         | 
| 210 | 
            +
            2
         | 
| 211 | 
            +
            T −τ
         | 
| 212 | 
            +
            2
         | 
| 213 | 
            +
            T − τ (information waveform)
         | 
| 214 | 
            +
            T −τ
         | 
| 215 | 
            +
            2
         | 
| 216 | 
            +
            Fig. 2. The transmission, amplification/reflection, and reception timeline for the proposed relay/IRS model.
         | 
| 217 | 
            +
            remain constant for at least T seconds. Let the complex random matrices HR
         | 
| 218 | 
            +
            n ∈ CMR×K and
         | 
| 219 | 
            +
            GR
         | 
| 220 | 
            +
            n ∈ CK×MR denote the channels from transmitters to the relay and the channels from the
         | 
| 221 | 
            +
            relay to the receivers for nth subband, respectively. The elements of HR
         | 
| 222 | 
            +
            n and GR
         | 
| 223 | 
            +
            n are zero mean
         | 
| 224 | 
            +
            CSCG random variables in the case of Rayleigh fading. Similarly, we denote the channels from
         | 
| 225 | 
            +
            transmitters to the IRS and the channels from the IRS to the receivers by HIRS
         | 
| 226 | 
            +
            n
         | 
| 227 | 
            +
            ∈ CMIRS×K
         | 
| 228 | 
            +
            and GIRS
         | 
| 229 | 
            +
            n
         | 
| 230 | 
            +
            ∈ CK×MIRS, respectively. In the sequel, Hn and Gn refer to either HR
         | 
| 231 | 
            +
            n and GR
         | 
| 232 | 
            +
            n or
         | 
| 233 | 
            +
            HIRS
         | 
| 234 | 
            +
            n
         | 
| 235 | 
            +
            and GIRS
         | 
| 236 | 
            +
            n , depending on the case under discussion. In addition, we assume that we can
         | 
| 237 | 
            +
            control the relay and IRS by collecting and using the CSI of all links [25]–[27]. For example,
         | 
| 238 | 
            +
            a relay itself can act as a controller. The CSI may be estimated in various ways, e.g., by using
         | 
| 239 | 
            +
            orthogonal pilot sequences ( see [28], [29] for more details). The CSI estimation is out of the
         | 
| 240 | 
            +
            scope of this paper. Also, we propose two low-complexity implementation methods mentioned
         | 
| 241 | 
            +
            in Remark 3 to reduce the signaling overhead in the controller node.
         | 
| 242 | 
            +
            Each Tk transmits a multi-sine energy waveform xE,k(t) and a multi-carrier modulated infor-
         | 
| 243 | 
            +
            mation waveform xI,k(t) to the relay/IRS during the first-hop transmission at the EH and ID
         | 
| 244 | 
            +
            time slots, respectively, as follows
         | 
| 245 | 
            +
            xE,k(t) =
         | 
| 246 | 
            +
            N
         | 
| 247 | 
            +
            �
         | 
| 248 | 
            +
            n=1
         | 
| 249 | 
            +
            aE,k,ncos(2πfnt + φE,k,n), = ℜ
         | 
| 250 | 
            +
            � N
         | 
| 251 | 
            +
            �
         | 
| 252 | 
            +
            n=1
         | 
| 253 | 
            +
            sE,k,nej2πfnt
         | 
| 254 | 
            +
            �
         | 
| 255 | 
            +
            ,
         | 
| 256 | 
            +
            (1)
         | 
| 257 | 
            +
            xI,k(t) =
         | 
| 258 | 
            +
            N
         | 
| 259 | 
            +
            �
         | 
| 260 | 
            +
            n=1
         | 
| 261 | 
            +
            aI,k,n(τ)cos(2πfnt + φI,k,n) = ℜ
         | 
| 262 | 
            +
            � N
         | 
| 263 | 
            +
            �
         | 
| 264 | 
            +
            n=1
         | 
| 265 | 
            +
            sI,k,nej2πfnt
         | 
| 266 | 
            +
            �
         | 
| 267 | 
            +
            ,
         | 
| 268 | 
            +
            (2)
         | 
| 269 | 
            +
            where sE,k,n = aE,k,nejφE,k,n and sI,k,n = aI,k,nejφI,k,n are the baseband complex signal represen-
         | 
| 270 | 
            +
            tations for the energy and information waveforms, respectively. We assume that the baseband
         | 
| 271 | 
            +
            information signals are i.i.d. CSCG random variable variables, i.e., sI,k,n ∼ CN (0, pI,k,n). The
         | 
| 272 | 
            +
            transmitted energy by Tk is constrained by
         | 
| 273 | 
            +
            τ
         | 
| 274 | 
            +
            2ρ|sE,k,n|2 + T − τ
         | 
| 275 | 
            +
            2ρ
         | 
| 276 | 
            +
            pI,k,n ≤ Tprf
         | 
| 277 | 
            +
            k,n, ∀k, n,
         | 
| 278 | 
            +
            (3)
         | 
| 279 | 
            +
            January 3, 2023
         | 
| 280 | 
            +
            DRAFT
         | 
| 281 | 
            +
             | 
| 282 | 
            +
            7
         | 
| 283 | 
            +
            where prf
         | 
| 284 | 
            +
            k,n is the maximum power budget at Tk for the nth subband and ρ addresses both ρR = 2
         | 
| 285 | 
            +
            for relay and ρIRS = 1 for IRS system according to the proposed timeline in Fig. 2 (see also
         | 
| 286 | 
            +
            Remark 1). By defining sE,n = [sE,1,n, · · · , sE,K,n]T and sI,n = [sI,1,n, · · · , sI,K,n]T, the received
         | 
| 287 | 
            +
            signal at the relay/IRS is expressed as
         | 
| 288 | 
            +
            r(t) =
         | 
| 289 | 
            +
            
         | 
| 290 | 
            +
            
         | 
| 291 | 
            +
            
         | 
| 292 | 
            +
            
         | 
| 293 | 
            +
            
         | 
| 294 | 
            +
            
         | 
| 295 | 
            +
            
         | 
| 296 | 
            +
            N�
         | 
| 297 | 
            +
            n=1
         | 
| 298 | 
            +
            {HnsE,n + zn}, t ∈ TEH, for EH,
         | 
| 299 | 
            +
            N�
         | 
| 300 | 
            +
            n=1
         | 
| 301 | 
            +
            {HnsI,n + zn}, t ∈ TID, for ID,
         | 
| 302 | 
            +
            (4)
         | 
| 303 | 
            +
            where
         | 
| 304 | 
            +
            TEH =
         | 
| 305 | 
            +
            
         | 
| 306 | 
            +
            
         | 
| 307 | 
            +
            
         | 
| 308 | 
            +
            
         | 
| 309 | 
            +
            
         | 
| 310 | 
            +
            0 ≤ t ≤ τ
         | 
| 311 | 
            +
            2, for relay,
         | 
| 312 | 
            +
            0 ≤ t ≤ τ, for IRS,
         | 
| 313 | 
            +
            TID =
         | 
| 314 | 
            +
            
         | 
| 315 | 
            +
            
         | 
| 316 | 
            +
            
         | 
| 317 | 
            +
            
         | 
| 318 | 
            +
            
         | 
| 319 | 
            +
            τ ≤ t ≤ τ + T−τ
         | 
| 320 | 
            +
            2 , for relay,
         | 
| 321 | 
            +
            τ ≤ t ≤ T, for IRS,
         | 
| 322 | 
            +
            (5)
         | 
| 323 | 
            +
            and r denotes either rR or rIRS. Furthermore, the AWGN zn denotes either zR
         | 
| 324 | 
            +
            n ∼ CN (0, σ2
         | 
| 325 | 
            +
            R,nIMR)
         | 
| 326 | 
            +
            or zIRS
         | 
| 327 | 
            +
            n
         | 
| 328 | 
            +
            ∼ CN (0, σ2
         | 
| 329 | 
            +
            IRS,nIMIRS) for relaying or reflecting modes. In contrast to the passive IRS,
         | 
| 330 | 
            +
            an active IRS adds non-negligible noise (which is introduced by the active elements [23], [30]);
         | 
| 331 | 
            +
            however, the added noise of an active IRS has considerably less impact compared to the relay
         | 
| 332 | 
            +
            noise (which is introduced by RF chains), i.e., σ2
         | 
| 333 | 
            +
            IRS,n ≤ σ2
         | 
| 334 | 
            +
            R,n [31].
         | 
| 335 | 
            +
            In the second-hop transmission, the relay/IRS amplifies the energy and information signals of
         | 
| 336 | 
            +
            Tk by amplification/reflection matrices and then forwards them to Rk. For AF relay system, the
         | 
| 337 | 
            +
            amplification matrices is introduced as UR
         | 
| 338 | 
            +
            E,n and UR
         | 
| 339 | 
            +
            I,n ∈ CMR×MR, ∀n for energy and information
         | 
| 340 | 
            +
            phases, respectively. In the case of IRS-aided system, the reflection matrices is defined as UIRS
         | 
| 341 | 
            +
            E
         | 
| 342 | 
            +
            =
         | 
| 343 | 
            +
            Diag(θE) and UIRS
         | 
| 344 | 
            +
            I
         | 
| 345 | 
            +
            = Diag(θI) for energy and information time slots, respectively, where θE =
         | 
| 346 | 
            +
            [ηE,1ejθE,1, ηE,2ejθE,2, · · · , ηE,MIRSejθE,MIRS]T and θI = [ηI,1ejθI,1, ηI,2ejθI,2, · · · , ηI,MIRSejθI,MIRS]T
         | 
| 347 | 
            +
            with ηE,m, ηI,m ≥ 1 and θE,m, θI,m ∈ [0, 2π] respectively denote the reflection amplitude and
         | 
| 348 | 
            +
            the phase shift at the mth RE3.
         | 
| 349 | 
            +
            Remark 1. An active IRS amplifies the signal without any significant delay. However, in an
         | 
| 350 | 
            +
            AF relay, the signal reception, amplification, and transmission at the RF chain cause a long
         | 
| 351 | 
            +
            delay. Therefore, in practice, the AF relay requires twice time compared to the active IRS for
         | 
| 352 | 
            +
            transmission one information symbol [23].
         | 
| 353 | 
            +
            3Note that passive and passive lossless IRS require ηE,m, ηI,m ∈ [0, 1] and ηE,m = ηI,m = 1, respectively.
         | 
| 354 | 
            +
            January 3, 2023
         | 
| 355 | 
            +
            DRAFT
         | 
| 356 | 
            +
             | 
| 357 | 
            +
            8
         | 
| 358 | 
            +
            We define UE,n and UI,n to address both UR
         | 
| 359 | 
            +
            E,n, UIRS
         | 
| 360 | 
            +
            E
         | 
| 361 | 
            +
            and UR
         | 
| 362 | 
            +
            I,n, UIRS
         | 
| 363 | 
            +
            I
         | 
| 364 | 
            +
            , respectively. The
         | 
| 365 | 
            +
            forwarded signal by the relay/IRS is given by
         | 
| 366 | 
            +
            �r(t)=
         | 
| 367 | 
            +
            
         | 
| 368 | 
            +
            
         | 
| 369 | 
            +
            
         | 
| 370 | 
            +
            
         | 
| 371 | 
            +
            
         | 
| 372 | 
            +
            �N
         | 
| 373 | 
            +
            n=1 UE,n (HnsE,n + zn) , t ∈ �TEH, for EH,
         | 
| 374 | 
            +
            �N
         | 
| 375 | 
            +
            n=1 UI,n (HnsI,n + zn) , t ∈ �TID, for ID,
         | 
| 376 | 
            +
            where
         | 
| 377 | 
            +
            �TEH =
         | 
| 378 | 
            +
            
         | 
| 379 | 
            +
            
         | 
| 380 | 
            +
            
         | 
| 381 | 
            +
            
         | 
| 382 | 
            +
            
         | 
| 383 | 
            +
            τ
         | 
| 384 | 
            +
            2 ≤ t ≤ τ, for relay,
         | 
| 385 | 
            +
            0 ≤ t ≤ τ, for IRS,
         | 
| 386 | 
            +
            �TID =
         | 
| 387 | 
            +
            
         | 
| 388 | 
            +
            
         | 
| 389 | 
            +
            
         | 
| 390 | 
            +
            
         | 
| 391 | 
            +
            
         | 
| 392 | 
            +
            τ + T−τ
         | 
| 393 | 
            +
            2
         | 
| 394 | 
            +
            ≤ t ≤ T, for relay,
         | 
| 395 | 
            +
            τ ≤ t ≤ T, for IRS,
         | 
| 396 | 
            +
            (6)
         | 
| 397 | 
            +
            and �r denotes either �rR or �rIRS for relay or IRS system, with a slight abuse of notation.
         | 
| 398 | 
            +
            Then, the power of �r(t) from the relay/IRS is written as
         | 
| 399 | 
            +
            E
         | 
| 400 | 
            +
            �
         | 
| 401 | 
            +
            ∥�r(t)∥2
         | 
| 402 | 
            +
            2
         | 
| 403 | 
            +
            �
         | 
| 404 | 
            +
            =
         | 
| 405 | 
            +
            
         | 
| 406 | 
            +
            
         | 
| 407 | 
            +
            
         | 
| 408 | 
            +
            
         | 
| 409 | 
            +
            
         | 
| 410 | 
            +
            
         | 
| 411 | 
            +
            
         | 
| 412 | 
            +
            1
         | 
| 413 | 
            +
            2
         | 
| 414 | 
            +
            N�
         | 
| 415 | 
            +
            n=1
         | 
| 416 | 
            +
            �
         | 
| 417 | 
            +
            sH
         | 
| 418 | 
            +
            E,nVE,nsE,n + σ2
         | 
| 419 | 
            +
            ntr
         | 
| 420 | 
            +
            �
         | 
| 421 | 
            +
            UE,nUH
         | 
| 422 | 
            +
            E,n
         | 
| 423 | 
            +
            ��
         | 
| 424 | 
            +
            , for EH,
         | 
| 425 | 
            +
            1
         | 
| 426 | 
            +
            2
         | 
| 427 | 
            +
            N�
         | 
| 428 | 
            +
            n=1
         | 
| 429 | 
            +
            �
         | 
| 430 | 
            +
            tr {QI,nVI,n} + σ2
         | 
| 431 | 
            +
            ntr
         | 
| 432 | 
            +
            �
         | 
| 433 | 
            +
            UI,nUH
         | 
| 434 | 
            +
            I,n
         | 
| 435 | 
            +
            ��
         | 
| 436 | 
            +
            , for ID,
         | 
| 437 | 
            +
            (7)
         | 
| 438 | 
            +
            where σ2
         | 
| 439 | 
            +
            n addresses both σ2
         | 
| 440 | 
            +
            R,n and σ2
         | 
| 441 | 
            +
            IRS,n, QI,n = Diag(pI,1,n, pI,2,n, · · · , pI,K,n) and
         | 
| 442 | 
            +
            VE,n = HH
         | 
| 443 | 
            +
            n UH
         | 
| 444 | 
            +
            E,nUE,nHn, ∀n,
         | 
| 445 | 
            +
            VI,n = HH
         | 
| 446 | 
            +
            n UH
         | 
| 447 | 
            +
            I,nUI,nHn, ∀n.
         | 
| 448 | 
            +
            (8)
         | 
| 449 | 
            +
            Using (7), the total consumed energy is bounded at the relay/IRS in t ∈ [0, T] as
         | 
| 450 | 
            +
            τ
         | 
| 451 | 
            +
            2ρ
         | 
| 452 | 
            +
            �
         | 
| 453 | 
            +
            sH
         | 
| 454 | 
            +
            E,nVE,nsE,n + σ2
         | 
| 455 | 
            +
            ntr{UE,nUH
         | 
| 456 | 
            +
            E,n}
         | 
| 457 | 
            +
            �
         | 
| 458 | 
            +
            + T − τ
         | 
| 459 | 
            +
            2ρ
         | 
| 460 | 
            +
            �
         | 
| 461 | 
            +
            tr{QI,nVI,n} + σ2
         | 
| 462 | 
            +
            ntr{UI,nUH
         | 
| 463 | 
            +
            I,n}
         | 
| 464 | 
            +
            �
         | 
| 465 | 
            +
            ≤ Tprf
         | 
| 466 | 
            +
            n , ∀n, (9)
         | 
| 467 | 
            +
            where prf
         | 
| 468 | 
            +
            n denotes either the maximum power budget at the relay prf
         | 
| 469 | 
            +
            R,n or IRS prf
         | 
| 470 | 
            +
            IRS. We can write
         | 
| 471 | 
            +
            received signal at Rk as
         | 
| 472 | 
            +
            yk(t) =
         | 
| 473 | 
            +
            
         | 
| 474 | 
            +
            
         | 
| 475 | 
            +
            
         | 
| 476 | 
            +
            
         | 
| 477 | 
            +
            
         | 
| 478 | 
            +
            
         | 
| 479 | 
            +
            
         | 
| 480 | 
            +
            N�
         | 
| 481 | 
            +
            n=1
         | 
| 482 | 
            +
            �
         | 
| 483 | 
            +
            gT
         | 
| 484 | 
            +
            k,nUE,n (HnsE,n + zn) + zk,n
         | 
| 485 | 
            +
            �
         | 
| 486 | 
            +
            , t ∈ �TEH, ∀k, for EH,
         | 
| 487 | 
            +
            N�
         | 
| 488 | 
            +
            n=1
         | 
| 489 | 
            +
            �
         | 
| 490 | 
            +
            gT
         | 
| 491 | 
            +
            k,nUI,n (HnsI,n + zn) + zk,n + �zk,n
         | 
| 492 | 
            +
            �
         | 
| 493 | 
            +
            , t ∈ �TID, ∀k, for ID,
         | 
| 494 | 
            +
            where gk,n is the kth column vector of GT
         | 
| 495 | 
            +
            n, and zk,n as well as �zk,n are the AWGN from
         | 
| 496 | 
            +
            the antenna and baseband processing noises at Rk, respectively, with zk,n ∼ CN(0, σ2
         | 
| 497 | 
            +
            k,n) and
         | 
| 498 | 
            +
            �zk,n ∼ CN (0, δ2
         | 
| 499 | 
            +
            k,n). The information signals at Rk corresponding to the nth subband can be
         | 
| 500 | 
            +
            expanded as
         | 
| 501 | 
            +
            yk,n(t) =gT
         | 
| 502 | 
            +
            k,nUI,nhk,nsI,k,n + gT
         | 
| 503 | 
            +
            k,nUI,n
         | 
| 504 | 
            +
            K
         | 
| 505 | 
            +
            �
         | 
| 506 | 
            +
            j=1,j̸=k
         | 
| 507 | 
            +
            hj,nsI,j,n + gT
         | 
| 508 | 
            +
            k,nUI,nzn + zk,n + �zk,n, ∀k, n,
         | 
| 509 | 
            +
            (10)
         | 
| 510 | 
            +
            January 3, 2023
         | 
| 511 | 
            +
            DRAFT
         | 
| 512 | 
            +
             | 
| 513 | 
            +
            9
         | 
| 514 | 
            +
            where hk,n and gk,n are the kth column vector of Hn and GT
         | 
| 515 | 
            +
            n, respectively. By defining pI,n =
         | 
| 516 | 
            +
            [pI,1,n, pI,2,n, · · · , pI,K,n]T, the SINR at the ID part for the nth subband is given by
         | 
| 517 | 
            +
            γk,n(pI,n, UI,n) =
         | 
| 518 | 
            +
            pI,k,nψk,k,n
         | 
| 519 | 
            +
            �K
         | 
| 520 | 
            +
            j=1,j̸=k pI,j,nψk,j,n + σ2n �ψk,n + δ2
         | 
| 521 | 
            +
            k,n + σ2
         | 
| 522 | 
            +
            k,n
         | 
| 523 | 
            +
            , ∀k, n,
         | 
| 524 | 
            +
            (11)
         | 
| 525 | 
            +
            where ψk,j,n = gT
         | 
| 526 | 
            +
            k,nUI,nhj,nhH
         | 
| 527 | 
            +
            j,nUH
         | 
| 528 | 
            +
            I,ng∗
         | 
| 529 | 
            +
            k,n and �ψk,n = gT
         | 
| 530 | 
            +
            k,nUI,nUH
         | 
| 531 | 
            +
            I,ng∗
         | 
| 532 | 
            +
            k,n. From Remark 1, we obtain
         | 
| 533 | 
            +
            the achievable rate at the kth pair as follows
         | 
| 534 | 
            +
            Rk
         | 
| 535 | 
            +
            �
         | 
| 536 | 
            +
            {pI,n}N
         | 
| 537 | 
            +
            n=1, {UI,n}N
         | 
| 538 | 
            +
            n=1, τ
         | 
| 539 | 
            +
            �
         | 
| 540 | 
            +
            = T − τ
         | 
| 541 | 
            +
            ρT
         | 
| 542 | 
            +
            N
         | 
| 543 | 
            +
            �
         | 
| 544 | 
            +
            n=1
         | 
| 545 | 
            +
            log2
         | 
| 546 | 
            +
            �
         | 
| 547 | 
            +
            1 + γk,n(pI,n, UI,n)
         | 
| 548 | 
            +
            �
         | 
| 549 | 
            +
            .
         | 
| 550 | 
            +
            (12)
         | 
| 551 | 
            +
            For the EH stream, we assume the noise power is negligible compared to the received signal
         | 
| 552 | 
            +
            power. We take into account the rectifier non-linearity by employing the results from [32] where
         | 
| 553 | 
            +
            the harvested energy at Rk is approximated by
         | 
| 554 | 
            +
            Ek
         | 
| 555 | 
            +
            �
         | 
| 556 | 
            +
            {sE,n}N
         | 
| 557 | 
            +
            n=1, {UE,n}N
         | 
| 558 | 
            +
            n=1, τ
         | 
| 559 | 
            +
            �
         | 
| 560 | 
            +
            = τ
         | 
| 561 | 
            +
            ρexp
         | 
| 562 | 
            +
            �
         | 
| 563 | 
            +
            �alog2pE,k
         | 
| 564 | 
            +
            �
         | 
| 565 | 
            +
            p
         | 
| 566 | 
            +
            �b
         | 
| 567 | 
            +
            E,kexp�c, ∀k,
         | 
| 568 | 
            +
            (13)
         | 
| 569 | 
            +
            where �a, �b, and �c are the curve fitting constants and pE,k is the average input power to Rk’s
         | 
| 570 | 
            +
            harvester as
         | 
| 571 | 
            +
            pE,k
         | 
| 572 | 
            +
            �
         | 
| 573 | 
            +
            {sE,n}N
         | 
| 574 | 
            +
            n=1, {UE,n}N
         | 
| 575 | 
            +
            n=1
         | 
| 576 | 
            +
            �
         | 
| 577 | 
            +
            = 1
         | 
| 578 | 
            +
            2
         | 
| 579 | 
            +
            N
         | 
| 580 | 
            +
            �
         | 
| 581 | 
            +
            n=1
         | 
| 582 | 
            +
            sH
         | 
| 583 | 
            +
            E,nΞk,nsE,n, ∀k,
         | 
| 584 | 
            +
            (14)
         | 
| 585 | 
            +
            with
         | 
| 586 | 
            +
            Ξk,n = HH
         | 
| 587 | 
            +
            n UH
         | 
| 588 | 
            +
            E,ng∗
         | 
| 589 | 
            +
            k,ngT
         | 
| 590 | 
            +
            k,nUE,nHn, ∀k, n.
         | 
| 591 | 
            +
            (15)
         | 
| 592 | 
            +
            Remark 2. Note that the reflection matrix cannot be designed separately for each subband in the
         | 
| 593 | 
            +
            IRS system, while, thanks to the RF chain circuits in a relay, the amplification matrix design is
         | 
| 594 | 
            +
            considered for each subband. We note that an active IRS is considerably less expensive than an
         | 
| 595 | 
            +
            AF relay. This is because an AF relay requires massive integrated circuits (including analog-to-
         | 
| 596 | 
            +
            digital/digital-to-analog converter, self-interference cancellation circuits, etc). The delay caused
         | 
| 597 | 
            +
            by RF chain processing of an AF relay contributes to latency, leads to lower transmission time,
         | 
| 598 | 
            +
            and requires more power for energy and information signals (see (3) and (9)). Therefore, a
         | 
| 599 | 
            +
            relay-IRS trade-off exists in the system performance (see (12) and (13)).
         | 
| 600 | 
            +
            Remark 3. An approach with lower implementation complexity is considered in which only one
         | 
| 601 | 
            +
            amplification/reflection matrix needs to be designed for both energy and information time slots,
         | 
| 602 | 
            +
            called the t-static approach. Also, one can consider another approach with only one amplification
         | 
| 603 | 
            +
            matrix design in both time slots and all subbands, referred to as t-f-static in the relay system.
         | 
| 604 | 
            +
            These design methodologies lead to a lower signaling overhead and system performance.
         | 
| 605 | 
            +
            January 3, 2023
         | 
| 606 | 
            +
            DRAFT
         | 
| 607 | 
            +
             | 
| 608 | 
            +
            10
         | 
| 609 | 
            +
            III. THE PROPOSED MINIMUM RATE MAXIMIZATION METHOD
         | 
| 610 | 
            +
            In this section, the aim is to maximize the minimum rate of the multi-user relay/IRS WPC
         | 
| 611 | 
            +
            system w.r.t. multi-sine energy waveforms sE,n, allocated power pI,n, amplification/reflection
         | 
| 612 | 
            +
            matrices UE,n, UI,n, and the time allocation parameter τ. The unified minimum rate maximization
         | 
| 613 | 
            +
            problem for both relay and IRS systems is cast as
         | 
| 614 | 
            +
            max
         | 
| 615 | 
            +
            τ,{sE,n,pI,n,UE,n,UI,n}N
         | 
| 616 | 
            +
            n=1
         | 
| 617 | 
            +
            min
         | 
| 618 | 
            +
            1≤k≤K
         | 
| 619 | 
            +
            Rk
         | 
| 620 | 
            +
            (16)
         | 
| 621 | 
            +
            s.t.
         | 
| 622 | 
            +
            �
         | 
| 623 | 
            +
            τ, {sE,n, pI,n, UE,n, UI,n}N
         | 
| 624 | 
            +
            n=1
         | 
| 625 | 
            +
            �
         | 
| 626 | 
            +
            ∈ Ω,
         | 
| 627 | 
            +
            where Ω = Ω0 ∩ Ωind with
         | 
| 628 | 
            +
            Ω0 =
         | 
| 629 | 
            +
            �
         | 
| 630 | 
            +
            C1 : 0 ≤ τ ≤ T, C2 : (3), pI,k,n ≥ 0, ∀k, n, C3 : (9), C4 : Ek ≥ Emin,k, ∀k
         | 
| 631 | 
            +
            �
         | 
| 632 | 
            +
            ,
         | 
| 633 | 
            +
            (17)
         | 
| 634 | 
            +
            Ωind =
         | 
| 635 | 
            +
            
         | 
| 636 | 
            +
            
         | 
| 637 | 
            +
            
         | 
| 638 | 
            +
            
         | 
| 639 | 
            +
            
         | 
| 640 | 
            +
            CR : UE,n, UI,n ∈ CMR×MR, ∀n, for relay,
         | 
| 641 | 
            +
            CIRS : UE,n, UI,n ∈ DMIRS×MIRS, ∀n, |θE,m| ≥ 1, |θI,m| ≥ 1, ∀m, for IRS,
         | 
| 642 | 
            +
            (18)
         | 
| 643 | 
            +
            and Emin,k in C4 is the minimum required harvested energy for the kth user.
         | 
| 644 | 
            +
            The problem in (16) is non-convex due to the coupled design variables in the objective function
         | 
| 645 | 
            +
            and the constraints C2 − C4 and CIRS. To deal with this non-convex problem, we first solve
         | 
| 646 | 
            +
            the problem w.r.t. {UE,n, UI,n} for fixed {sE,n, pI,n, τ}, then optimize {sE,n, pI,n} for given
         | 
| 647 | 
            +
            {UE,n, UI,n, τ}, and finally, solve the problem w.r.t. τ via a closed-form solution. The procedure
         | 
| 648 | 
            +
            is repeated until convergence.
         | 
| 649 | 
            +
            A. Maximization over {UE,n, UI,n}
         | 
| 650 | 
            +
            Here, we first consider the relay problem, and then the IRS problem is investigated.
         | 
| 651 | 
            +
            1) Relay System: The problem in (16) for fixed {sE,n, pI,n} reduces to the following opti-
         | 
| 652 | 
            +
            mization
         | 
| 653 | 
            +
            max
         | 
| 654 | 
            +
            {UE,UI}N
         | 
| 655 | 
            +
            n=1
         | 
| 656 | 
            +
            min
         | 
| 657 | 
            +
            1≤k≤K
         | 
| 658 | 
            +
            N
         | 
| 659 | 
            +
            �
         | 
| 660 | 
            +
            n=1
         | 
| 661 | 
            +
            log2 (1 + γk,n(UI,n))
         | 
| 662 | 
            +
            (19)
         | 
| 663 | 
            +
            s.t.
         | 
| 664 | 
            +
            C3, C4,
         | 
| 665 | 
            +
            January 3, 2023
         | 
| 666 | 
            +
            DRAFT
         | 
| 667 | 
            +
             | 
| 668 | 
            +
            11
         | 
| 669 | 
            +
            which is still a non-convex problem. To start solving the problem, first we need to reformulate
         | 
| 670 | 
            +
            the obtained expressions for the relay power constraint (7), SINR (11), and the input power of
         | 
| 671 | 
            +
            harvesters (14) from Section II. We can rewrite (7) as (see Appendix A for the derivation)
         | 
| 672 | 
            +
            E
         | 
| 673 | 
            +
            �
         | 
| 674 | 
            +
            ∥�r(t)∥2
         | 
| 675 | 
            +
            2
         | 
| 676 | 
            +
            �
         | 
| 677 | 
            +
            =
         | 
| 678 | 
            +
            
         | 
| 679 | 
            +
            
         | 
| 680 | 
            +
            
         | 
| 681 | 
            +
            
         | 
| 682 | 
            +
            
         | 
| 683 | 
            +
            
         | 
| 684 | 
            +
            
         | 
| 685 | 
            +
            1
         | 
| 686 | 
            +
            2
         | 
| 687 | 
            +
            N�
         | 
| 688 | 
            +
            n=1
         | 
| 689 | 
            +
            uH
         | 
| 690 | 
            +
            E,n �AR
         | 
| 691 | 
            +
            E,nuE,n, 0 ≤ t ≤ τ, for EH,
         | 
| 692 | 
            +
            1
         | 
| 693 | 
            +
            2
         | 
| 694 | 
            +
            N�
         | 
| 695 | 
            +
            n=1
         | 
| 696 | 
            +
            uH
         | 
| 697 | 
            +
            I,n �AR
         | 
| 698 | 
            +
            I,nuI,n, τ ≤ t ≤ T, for ID,
         | 
| 699 | 
            +
            (20)
         | 
| 700 | 
            +
            where uE,n = vec(UE,n), uI,n = vec(UI,n), and
         | 
| 701 | 
            +
            �AR
         | 
| 702 | 
            +
            E,n =
         | 
| 703 | 
            +
            �
         | 
| 704 | 
            +
            HnsE,nsH
         | 
| 705 | 
            +
            E,nHH
         | 
| 706 | 
            +
            n
         | 
| 707 | 
            +
            �T ⊗ IMR + σ2
         | 
| 708 | 
            +
            nIM2
         | 
| 709 | 
            +
            R,
         | 
| 710 | 
            +
            �AR
         | 
| 711 | 
            +
            I,n =
         | 
| 712 | 
            +
            �
         | 
| 713 | 
            +
            HnQI,nHH
         | 
| 714 | 
            +
            n
         | 
| 715 | 
            +
            �T ⊗ IMR + σ2
         | 
| 716 | 
            +
            nIM2
         | 
| 717 | 
            +
            R.
         | 
| 718 | 
            +
            (21)
         | 
| 719 | 
            +
            Therefore, we rewrite the relay power constraint in (9) by using (20) as
         | 
| 720 | 
            +
            τ
         | 
| 721 | 
            +
            2ρuH
         | 
| 722 | 
            +
            E,n �AR
         | 
| 723 | 
            +
            E,nuE,n + T − τ
         | 
| 724 | 
            +
            2ρ
         | 
| 725 | 
            +
            uH
         | 
| 726 | 
            +
            I,n �AR
         | 
| 727 | 
            +
            I,nuI,n ≤ Tprf
         | 
| 728 | 
            +
            R,n, ∀n.
         | 
| 729 | 
            +
            (22)
         | 
| 730 | 
            +
            Next, we rewrite the SINR and the input power at Rk’s harvester in (11) and (14) as
         | 
| 731 | 
            +
            γk,n(uI,n) =
         | 
| 732 | 
            +
            uH
         | 
| 733 | 
            +
            I,nAR
         | 
| 734 | 
            +
            k,nuI,n
         | 
| 735 | 
            +
            uH
         | 
| 736 | 
            +
            I,n �AR
         | 
| 737 | 
            +
            k,nuI,n + δ2
         | 
| 738 | 
            +
            k,n + σ2
         | 
| 739 | 
            +
            k,n
         | 
| 740 | 
            +
            , ∀k, n,
         | 
| 741 | 
            +
            (23)
         | 
| 742 | 
            +
            pE,k
         | 
| 743 | 
            +
            �
         | 
| 744 | 
            +
            {uE,n}N
         | 
| 745 | 
            +
            n=1
         | 
| 746 | 
            +
            �
         | 
| 747 | 
            +
            = 1
         | 
| 748 | 
            +
            2
         | 
| 749 | 
            +
            N
         | 
| 750 | 
            +
            �
         | 
| 751 | 
            +
            n=1
         | 
| 752 | 
            +
            uH
         | 
| 753 | 
            +
            E,n ¯AR
         | 
| 754 | 
            +
            k,nuE,n, ∀k,
         | 
| 755 | 
            +
            (24)
         | 
| 756 | 
            +
            where
         | 
| 757 | 
            +
            AR
         | 
| 758 | 
            +
            k,n = pI,k,n
         | 
| 759 | 
            +
            �
         | 
| 760 | 
            +
            hk,nhH
         | 
| 761 | 
            +
            k,n
         | 
| 762 | 
            +
            �T ⊗ g∗
         | 
| 763 | 
            +
            k,ngT
         | 
| 764 | 
            +
            k,n,
         | 
| 765 | 
            +
            (25)
         | 
| 766 | 
            +
            �AR
         | 
| 767 | 
            +
            k,n=
         | 
| 768 | 
            +
            K
         | 
| 769 | 
            +
            �
         | 
| 770 | 
            +
            j=1,j̸=k
         | 
| 771 | 
            +
            pI,j,n
         | 
| 772 | 
            +
            �
         | 
| 773 | 
            +
            hj,nhH
         | 
| 774 | 
            +
            j,n
         | 
| 775 | 
            +
            �T ⊗ g∗
         | 
| 776 | 
            +
            k,ngT
         | 
| 777 | 
            +
            k,n + σ2
         | 
| 778 | 
            +
            nIMR ⊗ g∗
         | 
| 779 | 
            +
            k,ngT
         | 
| 780 | 
            +
            k,n,
         | 
| 781 | 
            +
            (26)
         | 
| 782 | 
            +
            ¯AR
         | 
| 783 | 
            +
            k,n =
         | 
| 784 | 
            +
            �
         | 
| 785 | 
            +
            HnsE,nsH
         | 
| 786 | 
            +
            E,nHH
         | 
| 787 | 
            +
            n
         | 
| 788 | 
            +
            �T ⊗ g∗
         | 
| 789 | 
            +
            k,ngT
         | 
| 790 | 
            +
            k,n.
         | 
| 791 | 
            +
            (27)
         | 
| 792 | 
            +
            By using (22), (23), and (24) with an auxiliary variable αa the optimization problem in (19) can
         | 
| 793 | 
            +
            be equivalently rewritten as
         | 
| 794 | 
            +
            max
         | 
| 795 | 
            +
            αa,{uE,uI}N
         | 
| 796 | 
            +
            n=1
         | 
| 797 | 
            +
            αa
         | 
| 798 | 
            +
            (28)
         | 
| 799 | 
            +
            s.t.
         | 
| 800 | 
            +
            C3 : (22), C4 : Ek
         | 
| 801 | 
            +
            �
         | 
| 802 | 
            +
            {uE,n}N
         | 
| 803 | 
            +
            n=1
         | 
| 804 | 
            +
            �
         | 
| 805 | 
            +
            ≥ Emin,k, ∀k,
         | 
| 806 | 
            +
            C5 :
         | 
| 807 | 
            +
            N
         | 
| 808 | 
            +
            �
         | 
| 809 | 
            +
            n=1
         | 
| 810 | 
            +
            log2
         | 
| 811 | 
            +
            �
         | 
| 812 | 
            +
            1 +
         | 
| 813 | 
            +
            uH
         | 
| 814 | 
            +
            I,nAR
         | 
| 815 | 
            +
            k,nuI,n
         | 
| 816 | 
            +
            uH
         | 
| 817 | 
            +
            I,n �AR
         | 
| 818 | 
            +
            k,nuI,n + ζk,n,a
         | 
| 819 | 
            +
            �
         | 
| 820 | 
            +
            ≥ αa, ∀k,
         | 
| 821 | 
            +
            where ζk,n,a = σ2
         | 
| 822 | 
            +
            k,n + δ2
         | 
| 823 | 
            +
            k,n. The constraint C5 can be equivalently rewritten as
         | 
| 824 | 
            +
            C5 :
         | 
| 825 | 
            +
            N
         | 
| 826 | 
            +
            �
         | 
| 827 | 
            +
            n=1
         | 
| 828 | 
            +
            �
         | 
| 829 | 
            +
            log2
         | 
| 830 | 
            +
            �
         | 
| 831 | 
            +
            uH
         | 
| 832 | 
            +
            I,nBk,nuI,n + ζk,n,a
         | 
| 833 | 
            +
            �
         | 
| 834 | 
            +
            − log2
         | 
| 835 | 
            +
            �
         | 
| 836 | 
            +
            uH
         | 
| 837 | 
            +
            I,n �AR
         | 
| 838 | 
            +
            k,nuI,n + ζk,n,a
         | 
| 839 | 
            +
            � �
         | 
| 840 | 
            +
            ≥ αa,
         | 
| 841 | 
            +
            (29)
         | 
| 842 | 
            +
            January 3, 2023
         | 
| 843 | 
            +
            DRAFT
         | 
| 844 | 
            +
             | 
| 845 | 
            +
            12
         | 
| 846 | 
            +
            where Bk,n = �AR
         | 
| 847 | 
            +
            k,n + AR
         | 
| 848 | 
            +
            k,n. It is observed that this constraint is non-convex. Therefore, we
         | 
| 849 | 
            +
            employ the MM technique to tackle its non-convexity. Precisely, we minorize the denominator
         | 
| 850 | 
            +
            term − log2
         | 
| 851 | 
            +
            �
         | 
| 852 | 
            +
            uH
         | 
| 853 | 
            +
            I,n �AR
         | 
| 854 | 
            +
            k,nuI,n +ζk,n,b
         | 
| 855 | 
            +
            �
         | 
| 856 | 
            +
            by the using the following inequality
         | 
| 857 | 
            +
            log2(x) ≤ log2(x0) + log2 e
         | 
| 858 | 
            +
            x0
         | 
| 859 | 
            +
            (x − x0).
         | 
| 860 | 
            +
            (30)
         | 
| 861 | 
            +
            By setting x = uH
         | 
| 862 | 
            +
            I,n �AR
         | 
| 863 | 
            +
            k,nuI,n + ζk,n,a and x0 =
         | 
| 864 | 
            +
            �
         | 
| 865 | 
            +
            u0
         | 
| 866 | 
            +
            I,n
         | 
| 867 | 
            +
            �H �AR
         | 
| 868 | 
            +
            k,nu0
         | 
| 869 | 
            +
            I,n + ζk,n,a in (30) we obtain
         | 
| 870 | 
            +
            − log2
         | 
| 871 | 
            +
            �
         | 
| 872 | 
            +
            uH
         | 
| 873 | 
            +
            I,n �AR
         | 
| 874 | 
            +
            k,nuI,n + ζk,n,a
         | 
| 875 | 
            +
            �
         | 
| 876 | 
            +
            ≥ − log2
         | 
| 877 | 
            +
            ��
         | 
| 878 | 
            +
            u0
         | 
| 879 | 
            +
            I,n
         | 
| 880 | 
            +
            �H �AR
         | 
| 881 | 
            +
            k,nu0
         | 
| 882 | 
            +
            I,n + ζk,n,a
         | 
| 883 | 
            +
            �
         | 
| 884 | 
            +
            (31)
         | 
| 885 | 
            +
            −
         | 
| 886 | 
            +
            log2 e
         | 
| 887 | 
            +
            �
         | 
| 888 | 
            +
            uH
         | 
| 889 | 
            +
            I,n �AR
         | 
| 890 | 
            +
            k,nuI,n −
         | 
| 891 | 
            +
            �
         | 
| 892 | 
            +
            u0
         | 
| 893 | 
            +
            I,n
         | 
| 894 | 
            +
            �H �AR
         | 
| 895 | 
            +
            k,nu0
         | 
| 896 | 
            +
            I,n
         | 
| 897 | 
            +
            �
         | 
| 898 | 
            +
            �
         | 
| 899 | 
            +
            u0
         | 
| 900 | 
            +
            I,n
         | 
| 901 | 
            +
            �H �AR
         | 
| 902 | 
            +
            k,nu0
         | 
| 903 | 
            +
            I,n + ζk,n,a
         | 
| 904 | 
            +
            .
         | 
| 905 | 
            +
            Applying the above minorizer, the constraint C5 in (29) is rewritten at the ith iteration of the
         | 
| 906 | 
            +
            MM technique as
         | 
| 907 | 
            +
            N
         | 
| 908 | 
            +
            �
         | 
| 909 | 
            +
            n=1
         | 
| 910 | 
            +
            �
         | 
| 911 | 
            +
            log2
         | 
| 912 | 
            +
            �
         | 
| 913 | 
            +
            uH
         | 
| 914 | 
            +
            I,nBk,nuI,n + ζk,n,a
         | 
| 915 | 
            +
            �
         | 
| 916 | 
            +
            − log2
         | 
| 917 | 
            +
            ��
         | 
| 918 | 
            +
            u(i−1)
         | 
| 919 | 
            +
            I,n
         | 
| 920 | 
            +
            �H �AR
         | 
| 921 | 
            +
            k,nu(i−1)
         | 
| 922 | 
            +
            I,n
         | 
| 923 | 
            +
            + ζk,n,a
         | 
| 924 | 
            +
            �
         | 
| 925 | 
            +
            (32)
         | 
| 926 | 
            +
            −
         | 
| 927 | 
            +
            log2 e
         | 
| 928 | 
            +
            �
         | 
| 929 | 
            +
            u(i−1)
         | 
| 930 | 
            +
            I,n
         | 
| 931 | 
            +
            �H �AR
         | 
| 932 | 
            +
            k,nu(i−1)
         | 
| 933 | 
            +
            I,n
         | 
| 934 | 
            +
            + ζk,n,a
         | 
| 935 | 
            +
            �
         | 
| 936 | 
            +
            uH
         | 
| 937 | 
            +
            I,n �AR
         | 
| 938 | 
            +
            k,nuI,n −
         | 
| 939 | 
            +
            �
         | 
| 940 | 
            +
            u(i−1)
         | 
| 941 | 
            +
            I,n
         | 
| 942 | 
            +
            �H �AR
         | 
| 943 | 
            +
            k,nu(i−1)
         | 
| 944 | 
            +
            I,n
         | 
| 945 | 
            +
            � �
         | 
| 946 | 
            +
            ≥ αa.
         | 
| 947 | 
            +
            The following lemma lays the ground for dealing with the first non-concave logarithmic term
         | 
| 948 | 
            +
            in (32) in light of the MM technique.
         | 
| 949 | 
            +
            Lemma 1. Let s(x) = − log2
         | 
| 950 | 
            +
            �
         | 
| 951 | 
            +
            xHTx + ν
         | 
| 952 | 
            +
            �
         | 
| 953 | 
            +
            and xHQx ≤ P for any positive-definite matrices
         | 
| 954 | 
            +
            T, Q ∈ SN
         | 
| 955 | 
            +
            ++ and P ∈ R+. Then, s(x) is bounded for all x and x0 as follows
         | 
| 956 | 
            +
            s(x) ≤ s(x0) + ℜ
         | 
| 957 | 
            +
            �
         | 
| 958 | 
            +
            bH(x − x0)
         | 
| 959 | 
            +
            �
         | 
| 960 | 
            +
            + (x − x0)HD(x − x0),
         | 
| 961 | 
            +
            where b =
         | 
| 962 | 
            +
            −2 log2 e
         | 
| 963 | 
            +
            xH
         | 
| 964 | 
            +
            0 Tx0+νTx0, D =
         | 
| 965 | 
            +
            4P
         | 
| 966 | 
            +
            wH
         | 
| 967 | 
            +
            1 Qw1IM2
         | 
| 968 | 
            +
            R, and w1 is the principal eigenvector of T and ǫ > 0.
         | 
| 969 | 
            +
            Proof. See Appendix B.
         | 
| 970 | 
            +
            Using Lemma 1 and noting that the term τ
         | 
| 971 | 
            +
            2uH
         | 
| 972 | 
            +
            E,n �AR
         | 
| 973 | 
            +
            E,nuE,n in (22) is positive, we obtain the
         | 
| 974 | 
            +
            following minorizer for the term log2(uH
         | 
| 975 | 
            +
            I,nBk,nuI,n + ζk,n,a) in (32) at any given u0
         | 
| 976 | 
            +
            I,n
         | 
| 977 | 
            +
            log2(uH
         | 
| 978 | 
            +
            I,nBk,nuI,n + ζk,n,a) ≥ log2
         | 
| 979 | 
            +
            ��
         | 
| 980 | 
            +
            u0
         | 
| 981 | 
            +
            I,n
         | 
| 982 | 
            +
            �H Bk,nu0
         | 
| 983 | 
            +
            I,n + ζk,n,a
         | 
| 984 | 
            +
            �
         | 
| 985 | 
            +
            − ℜ
         | 
| 986 | 
            +
            �
         | 
| 987 | 
            +
            bH
         | 
| 988 | 
            +
            k,n(uI,n − u0
         | 
| 989 | 
            +
            I,n)
         | 
| 990 | 
            +
            �
         | 
| 991 | 
            +
            (33)
         | 
| 992 | 
            +
            −
         | 
| 993 | 
            +
            �
         | 
| 994 | 
            +
            uI,n − u0
         | 
| 995 | 
            +
            I,n
         | 
| 996 | 
            +
            �H Dk,n(uI,n − u0
         | 
| 997 | 
            +
            I,n),
         | 
| 998 | 
            +
            where
         | 
| 999 | 
            +
            bk,n =
         | 
| 1000 | 
            +
            −2 log2 e
         | 
| 1001 | 
            +
            �
         | 
| 1002 | 
            +
            u0
         | 
| 1003 | 
            +
            I,n
         | 
| 1004 | 
            +
            �H Bk,nu0
         | 
| 1005 | 
            +
            I,n + ζk,n,a
         | 
| 1006 | 
            +
            Bk,nu0
         | 
| 1007 | 
            +
            I,n,
         | 
| 1008 | 
            +
            Dk,n =
         | 
| 1009 | 
            +
            16T
         | 
| 1010 | 
            +
            T−τ prf
         | 
| 1011 | 
            +
            R,n
         | 
| 1012 | 
            +
            �wH
         | 
| 1013 | 
            +
            k,n �AR
         | 
| 1014 | 
            +
            I,n �wk,n
         | 
| 1015 | 
            +
            IM2
         | 
| 1016 | 
            +
            R,
         | 
| 1017 | 
            +
            January 3, 2023
         | 
| 1018 | 
            +
            DRAFT
         | 
| 1019 | 
            +
             | 
| 1020 | 
            +
            13
         | 
| 1021 | 
            +
            and �wk,n denotes the principal eigenvector of Bk,n. Applying (33), the constraint in (32) is
         | 
| 1022 | 
            +
            restated as
         | 
| 1023 | 
            +
            −
         | 
| 1024 | 
            +
            N
         | 
| 1025 | 
            +
            �
         | 
| 1026 | 
            +
            n=1
         | 
| 1027 | 
            +
            �
         | 
| 1028 | 
            +
            log2 e uH
         | 
| 1029 | 
            +
            I,n �AR
         | 
| 1030 | 
            +
            k,nuI,n
         | 
| 1031 | 
            +
            �
         | 
| 1032 | 
            +
            u(i−1)
         | 
| 1033 | 
            +
            I,n
         | 
| 1034 | 
            +
            �H �AR
         | 
| 1035 | 
            +
            k,nu(i−1)
         | 
| 1036 | 
            +
            I,n
         | 
| 1037 | 
            +
            + ζk,n,a
         | 
| 1038 | 
            +
            + uH
         | 
| 1039 | 
            +
            I,nDk,nuI,n + ℜ
         | 
| 1040 | 
            +
            ��
         | 
| 1041 | 
            +
            bk,n − 2Dk,nu(i−1)
         | 
| 1042 | 
            +
            I,n
         | 
| 1043 | 
            +
            �H
         | 
| 1044 | 
            +
            uI,n
         | 
| 1045 | 
            +
            �
         | 
| 1046 | 
            +
            + d(i)
         | 
| 1047 | 
            +
            k,n
         | 
| 1048 | 
            +
            �
         | 
| 1049 | 
            +
            ≥ αa, ∀k,
         | 
| 1050 | 
            +
            (34)
         | 
| 1051 | 
            +
            where
         | 
| 1052 | 
            +
            d(i)
         | 
| 1053 | 
            +
            k,n = log2
         | 
| 1054 | 
            +
            �
         | 
| 1055 | 
            +
            u(i−1)
         | 
| 1056 | 
            +
            I,n
         | 
| 1057 | 
            +
            �H �AR
         | 
| 1058 | 
            +
            k,nu(i−1)
         | 
| 1059 | 
            +
            I,n
         | 
| 1060 | 
            +
            + ζk,n,a
         | 
| 1061 | 
            +
            �
         | 
| 1062 | 
            +
            u(i−1)
         | 
| 1063 | 
            +
            I,n
         | 
| 1064 | 
            +
            �H
         | 
| 1065 | 
            +
            Bk,nu(i−1)
         | 
| 1066 | 
            +
            I,n
         | 
| 1067 | 
            +
            + ζk,n,a
         | 
| 1068 | 
            +
            − ℜ
         | 
| 1069 | 
            +
            �
         | 
| 1070 | 
            +
            bH
         | 
| 1071 | 
            +
            k,nu(i−1)
         | 
| 1072 | 
            +
            I,n
         | 
| 1073 | 
            +
            �
         | 
| 1074 | 
            +
            +
         | 
| 1075 | 
            +
            �
         | 
| 1076 | 
            +
            u(i−1)
         | 
| 1077 | 
            +
            I,n
         | 
| 1078 | 
            +
            �H
         | 
| 1079 | 
            +
            Dk,nu(i−1)
         | 
| 1080 | 
            +
            I,n
         | 
| 1081 | 
            +
            (35)
         | 
| 1082 | 
            +
            −
         | 
| 1083 | 
            +
            log2 e
         | 
| 1084 | 
            +
            �
         | 
| 1085 | 
            +
            u(i−1)
         | 
| 1086 | 
            +
            I,n
         | 
| 1087 | 
            +
            �H �AR
         | 
| 1088 | 
            +
            k,nu(i−1)
         | 
| 1089 | 
            +
            I,n
         | 
| 1090 | 
            +
            �
         | 
| 1091 | 
            +
            u(i−1)
         | 
| 1092 | 
            +
            I,n
         | 
| 1093 | 
            +
            �H �AR
         | 
| 1094 | 
            +
            k,nu(i−1)
         | 
| 1095 | 
            +
            I,n
         | 
| 1096 | 
            +
            + ζk,n,a
         | 
| 1097 | 
            +
            .
         | 
| 1098 | 
            +
            Then, we can simplify constraint in (34) as
         | 
| 1099 | 
            +
            −
         | 
| 1100 | 
            +
            N
         | 
| 1101 | 
            +
            �
         | 
| 1102 | 
            +
            n=1
         | 
| 1103 | 
            +
            �
         | 
| 1104 | 
            +
            uH
         | 
| 1105 | 
            +
            I,nF(i)
         | 
| 1106 | 
            +
            k,nuI,n + ℜ
         | 
| 1107 | 
            +
            �
         | 
| 1108 | 
            +
            (f(i)
         | 
| 1109 | 
            +
            k,n)HuI,n
         | 
| 1110 | 
            +
            �
         | 
| 1111 | 
            +
            + d(i)
         | 
| 1112 | 
            +
            k,n
         | 
| 1113 | 
            +
            �
         | 
| 1114 | 
            +
            ≥ αa, ∀k,
         | 
| 1115 | 
            +
            (36)
         | 
| 1116 | 
            +
            where
         | 
| 1117 | 
            +
            F(i)
         | 
| 1118 | 
            +
            k,n =
         | 
| 1119 | 
            +
            log2 e �AR
         | 
| 1120 | 
            +
            k,n
         | 
| 1121 | 
            +
            �
         | 
| 1122 | 
            +
            u(i−1)
         | 
| 1123 | 
            +
            I,n
         | 
| 1124 | 
            +
            �H �AR
         | 
| 1125 | 
            +
            k,nu(i−1)
         | 
| 1126 | 
            +
            I,n
         | 
| 1127 | 
            +
            + ζk,n,a
         | 
| 1128 | 
            +
            + Dk,n,
         | 
| 1129 | 
            +
            f(i)
         | 
| 1130 | 
            +
            k,n = bk,n − 2Dk,nu(i−1)
         | 
| 1131 | 
            +
            I,n
         | 
| 1132 | 
            +
            .
         | 
| 1133 | 
            +
            (37)
         | 
| 1134 | 
            +
            Finally, we focus on the constraint C4. From (13) and (24), we see that in the left-hand side
         | 
| 1135 | 
            +
            (LHS) of C4, Ek is neither convex nor concave w.r.t. uE,n. To apply the MM technique on LHS
         | 
| 1136 | 
            +
            of C4, we first define a parameter4 βk,n,a such that ∇2
         | 
| 1137 | 
            +
            uE,nEk
         | 
| 1138 | 
            +
            �
         | 
| 1139 | 
            +
            {uE,n}N
         | 
| 1140 | 
            +
            n=1
         | 
| 1141 | 
            +
            �
         | 
| 1142 | 
            +
            +βk,n,aIM2
         | 
| 1143 | 
            +
            R ⪰ 0, ∀k, n,
         | 
| 1144 | 
            +
            and write Ek as the sum of a convex and a concave function as
         | 
| 1145 | 
            +
            Ek
         | 
| 1146 | 
            +
            �
         | 
| 1147 | 
            +
            {uE,n}N
         | 
| 1148 | 
            +
            n=1
         | 
| 1149 | 
            +
            �
         | 
| 1150 | 
            +
            =Ek
         | 
| 1151 | 
            +
            �
         | 
| 1152 | 
            +
            {uE,n}N
         | 
| 1153 | 
            +
            n=1
         | 
| 1154 | 
            +
            �
         | 
| 1155 | 
            +
            + 1
         | 
| 1156 | 
            +
            2
         | 
| 1157 | 
            +
            N
         | 
| 1158 | 
            +
            �
         | 
| 1159 | 
            +
            n=1
         | 
| 1160 | 
            +
            βk,n,auH
         | 
| 1161 | 
            +
            E,nuE,n − 1
         | 
| 1162 | 
            +
            2
         | 
| 1163 | 
            +
            N
         | 
| 1164 | 
            +
            �
         | 
| 1165 | 
            +
            n=1
         | 
| 1166 | 
            +
            βk,n,auH
         | 
| 1167 | 
            +
            E,nuE,n, ∀k.
         | 
| 1168 | 
            +
            (38)
         | 
| 1169 | 
            +
            We now apply the MM technique to C4 and obtain a convex constraint. To do so, we keep the
         | 
| 1170 | 
            +
            concave part and minorize the convex part of (38) and rewrite C4 as
         | 
| 1171 | 
            +
            Ek
         | 
| 1172 | 
            +
            �
         | 
| 1173 | 
            +
            {u(i−1)
         | 
| 1174 | 
            +
            E,n }N
         | 
| 1175 | 
            +
            n=1
         | 
| 1176 | 
            +
            �
         | 
| 1177 | 
            +
            + 1
         | 
| 1178 | 
            +
            2
         | 
| 1179 | 
            +
            N
         | 
| 1180 | 
            +
            �
         | 
| 1181 | 
            +
            n=1
         | 
| 1182 | 
            +
            βk,n,a
         | 
| 1183 | 
            +
            �
         | 
| 1184 | 
            +
            u(i−1)
         | 
| 1185 | 
            +
            E,n
         | 
| 1186 | 
            +
            �H
         | 
| 1187 | 
            +
            u(i−1)
         | 
| 1188 | 
            +
            E,n
         | 
| 1189 | 
            +
            +
         | 
| 1190 | 
            +
            N
         | 
| 1191 | 
            +
            �
         | 
| 1192 | 
            +
            n=1
         | 
| 1193 | 
            +
            ℜ
         | 
| 1194 | 
            +
            �
         | 
| 1195 | 
            +
            ϑ(i)
         | 
| 1196 | 
            +
            k,n,a
         | 
| 1197 | 
            +
            �
         | 
| 1198 | 
            +
            uE,n − u(i−1)
         | 
| 1199 | 
            +
            E,n
         | 
| 1200 | 
            +
            ��
         | 
| 1201 | 
            +
            (39)
         | 
| 1202 | 
            +
            − 1
         | 
| 1203 | 
            +
            2
         | 
| 1204 | 
            +
            N
         | 
| 1205 | 
            +
            �
         | 
| 1206 | 
            +
            n=1
         | 
| 1207 | 
            +
            βk,n,auH
         | 
| 1208 | 
            +
            E,nuE,n ≥ Emin,k, ∀k,
         | 
| 1209 | 
            +
            4See Appendix C for a selection of βk,n,a.
         | 
| 1210 | 
            +
            January 3, 2023
         | 
| 1211 | 
            +
            DRAFT
         | 
| 1212 | 
            +
             | 
| 1213 | 
            +
            14
         | 
| 1214 | 
            +
            where
         | 
| 1215 | 
            +
            ϑ(i)
         | 
| 1216 | 
            +
            k,n,a =βk,n,a
         | 
| 1217 | 
            +
            �
         | 
| 1218 | 
            +
            u(i−1)
         | 
| 1219 | 
            +
            E,n
         | 
| 1220 | 
            +
            �H
         | 
| 1221 | 
            +
            + τexp�c
         | 
| 1222 | 
            +
            2
         | 
| 1223 | 
            +
            exp
         | 
| 1224 | 
            +
            �
         | 
| 1225 | 
            +
            �alog2ω(i)
         | 
| 1226 | 
            +
            k,a
         | 
| 1227 | 
            +
            � �
         | 
| 1228 | 
            +
            ω(i)
         | 
| 1229 | 
            +
            k,a
         | 
| 1230 | 
            +
            ��b−1 �
         | 
| 1231 | 
            +
            2�a log ω(i)
         | 
| 1232 | 
            +
            k,a + �b
         | 
| 1233 | 
            +
            � �
         | 
| 1234 | 
            +
            u(i−1)
         | 
| 1235 | 
            +
            E,n
         | 
| 1236 | 
            +
            �H ¯AR
         | 
| 1237 | 
            +
            k,n,
         | 
| 1238 | 
            +
            with ω(i)
         | 
| 1239 | 
            +
            k,a = 1
         | 
| 1240 | 
            +
            2
         | 
| 1241 | 
            +
            �N
         | 
| 1242 | 
            +
            n=1
         | 
| 1243 | 
            +
            �
         | 
| 1244 | 
            +
            u(i−1)
         | 
| 1245 | 
            +
            E,n
         | 
| 1246 | 
            +
            �H ¯AR
         | 
| 1247 | 
            +
            k,nu(i−1)
         | 
| 1248 | 
            +
            E,n . Therefore, the ith MM iteration for (19) is the solution
         | 
| 1249 | 
            +
            of the following convex problem
         | 
| 1250 | 
            +
            max
         | 
| 1251 | 
            +
            αa,{uE,n,uI,n}N
         | 
| 1252 | 
            +
            n=1
         | 
| 1253 | 
            +
            αa
         | 
| 1254 | 
            +
            (40)
         | 
| 1255 | 
            +
            s.t. C3 : (22), C4 : (39), C5 : (36),
         | 
| 1256 | 
            +
            which can be solved efficiently.
         | 
| 1257 | 
            +
            2) IRS System: By considering UE,n = Diag(θE), UI,n = Diag(θI) and adding the constraint
         | 
| 1258 | 
            +
            CIRS in (18), the optimization problem in (19) is considered in this subsection. Since UE,n and
         | 
| 1259 | 
            +
            UI,n are diagonal matrices, the expressions in (22)-(24) are modified as
         | 
| 1260 | 
            +
            τ
         | 
| 1261 | 
            +
            2θH
         | 
| 1262 | 
            +
            E �AIRS
         | 
| 1263 | 
            +
            E,nθE + T − τ
         | 
| 1264 | 
            +
            2
         | 
| 1265 | 
            +
            θH
         | 
| 1266 | 
            +
            I �AIRS
         | 
| 1267 | 
            +
            I,n θI ≤ Tprf
         | 
| 1268 | 
            +
            IRS, ∀n,
         | 
| 1269 | 
            +
            (41)
         | 
| 1270 | 
            +
            γk,n(θI) =
         | 
| 1271 | 
            +
            θH
         | 
| 1272 | 
            +
            I AIRS
         | 
| 1273 | 
            +
            k,n θI
         | 
| 1274 | 
            +
            θH
         | 
| 1275 | 
            +
            I �AIRS
         | 
| 1276 | 
            +
            k,n θI + δ2
         | 
| 1277 | 
            +
            k,n + σ2
         | 
| 1278 | 
            +
            k,n
         | 
| 1279 | 
            +
            , ∀k, n,
         | 
| 1280 | 
            +
            (42)
         | 
| 1281 | 
            +
            pE,k (θE) = 1
         | 
| 1282 | 
            +
            2
         | 
| 1283 | 
            +
            N
         | 
| 1284 | 
            +
            �
         | 
| 1285 | 
            +
            n=1
         | 
| 1286 | 
            +
            θH
         | 
| 1287 | 
            +
            E ¯AIRS
         | 
| 1288 | 
            +
            k,n θE, ∀k,
         | 
| 1289 | 
            +
            (43)
         | 
| 1290 | 
            +
            where their parameters are defined in Lemma 2 below.
         | 
| 1291 | 
            +
            Lemma 2. The parameters �AIRS
         | 
| 1292 | 
            +
            E,n, �AIRS
         | 
| 1293 | 
            +
            I,n , AIRS
         | 
| 1294 | 
            +
            k,n , �AIRS
         | 
| 1295 | 
            +
            k,n , and ¯AIRS
         | 
| 1296 | 
            +
            k,n are expressed as follows:
         | 
| 1297 | 
            +
            �AIRS
         | 
| 1298 | 
            +
            E,n =
         | 
| 1299 | 
            +
            �
         | 
| 1300 | 
            +
            HnsE,nsH
         | 
| 1301 | 
            +
            E,nHH
         | 
| 1302 | 
            +
            n
         | 
| 1303 | 
            +
            �T ⊙ IMIRS + σ2
         | 
| 1304 | 
            +
            nIMIRS,
         | 
| 1305 | 
            +
            (44)
         | 
| 1306 | 
            +
            �AIRS
         | 
| 1307 | 
            +
            I,n =
         | 
| 1308 | 
            +
            �
         | 
| 1309 | 
            +
            HnQI,nHH
         | 
| 1310 | 
            +
            n
         | 
| 1311 | 
            +
            �T ⊙ IMIRS + σ2
         | 
| 1312 | 
            +
            nIMIRS,
         | 
| 1313 | 
            +
            (45)
         | 
| 1314 | 
            +
            AIRS
         | 
| 1315 | 
            +
            k,n = pI,k,n
         | 
| 1316 | 
            +
            �
         | 
| 1317 | 
            +
            hk,nhH
         | 
| 1318 | 
            +
            k,n
         | 
| 1319 | 
            +
            �T ⊙ g∗
         | 
| 1320 | 
            +
            k,ngT
         | 
| 1321 | 
            +
            k,n,
         | 
| 1322 | 
            +
            (46)
         | 
| 1323 | 
            +
            �AIRS
         | 
| 1324 | 
            +
            k,n =
         | 
| 1325 | 
            +
            K
         | 
| 1326 | 
            +
            �
         | 
| 1327 | 
            +
            j=1,j̸=k
         | 
| 1328 | 
            +
            pI,j,n
         | 
| 1329 | 
            +
            �
         | 
| 1330 | 
            +
            hj,nhH
         | 
| 1331 | 
            +
            j,n
         | 
| 1332 | 
            +
            �T⊙ g∗
         | 
| 1333 | 
            +
            k,ngT
         | 
| 1334 | 
            +
            k,n+ σ2
         | 
| 1335 | 
            +
            nIMIRS⊙ g∗
         | 
| 1336 | 
            +
            k,ngT
         | 
| 1337 | 
            +
            k,n,
         | 
| 1338 | 
            +
            (47)
         | 
| 1339 | 
            +
            ¯AIRS
         | 
| 1340 | 
            +
            k,n =
         | 
| 1341 | 
            +
            �
         | 
| 1342 | 
            +
            HnsE,nsH
         | 
| 1343 | 
            +
            E,nHH
         | 
| 1344 | 
            +
            n
         | 
| 1345 | 
            +
            �T ⊙ g∗
         | 
| 1346 | 
            +
            k,ngT
         | 
| 1347 | 
            +
            k,n.
         | 
| 1348 | 
            +
            (48)
         | 
| 1349 | 
            +
            It is worth pointing out that the only difference between the parameters above and their corre-
         | 
| 1350 | 
            +
            sponding expressions in (21) and (25)-(27), is the symbol of multiplication, i.e., ⊗ and ⊙, in a
         | 
| 1351 | 
            +
            January 3, 2023
         | 
| 1352 | 
            +
            DRAFT
         | 
| 1353 | 
            +
             | 
| 1354 | 
            +
            15
         | 
| 1355 | 
            +
            proper dimension. The proper dimension consideration means MR → MIRS for all of the above
         | 
| 1356 | 
            +
            parameters and IM2
         | 
| 1357 | 
            +
            R → IMIRS for the second terms of �AIRS
         | 
| 1358 | 
            +
            E,n and �AIRS
         | 
| 1359 | 
            +
            I,n .
         | 
| 1360 | 
            +
            Proof. See Appendix D.
         | 
| 1361 | 
            +
            Next, we focus on constraint CIRS. First, let us introduce the following minorizer [33]
         | 
| 1362 | 
            +
            |x| ≥ ℜ
         | 
| 1363 | 
            +
            �
         | 
| 1364 | 
            +
            x∗ x0
         | 
| 1365 | 
            +
            |x0|
         | 
| 1366 | 
            +
            �
         | 
| 1367 | 
            +
            .
         | 
| 1368 | 
            +
            (49)
         | 
| 1369 | 
            +
            Then, considering the above minorizer, the constraint CIRS is expressed as the ith iteration of
         | 
| 1370 | 
            +
            MM as
         | 
| 1371 | 
            +
            ℜ
         | 
| 1372 | 
            +
            �
         | 
| 1373 | 
            +
            θ∗
         | 
| 1374 | 
            +
            E,m
         | 
| 1375 | 
            +
            θ(i−1)
         | 
| 1376 | 
            +
            E,m
         | 
| 1377 | 
            +
            |θ(i−1)
         | 
| 1378 | 
            +
            E,m |
         | 
| 1379 | 
            +
            �
         | 
| 1380 | 
            +
            ≥ 1, ℜ
         | 
| 1381 | 
            +
            �
         | 
| 1382 | 
            +
            θ∗
         | 
| 1383 | 
            +
            I,m
         | 
| 1384 | 
            +
            θ(i−1)
         | 
| 1385 | 
            +
            I,m
         | 
| 1386 | 
            +
            |θ(i−1)
         | 
| 1387 | 
            +
            I,m |
         | 
| 1388 | 
            +
            �
         | 
| 1389 | 
            +
            ≥ 1,
         | 
| 1390 | 
            +
            ∀m.
         | 
| 1391 | 
            +
            (50)
         | 
| 1392 | 
            +
            Therefore, the optimization problem in (28) is modified as
         | 
| 1393 | 
            +
            max
         | 
| 1394 | 
            +
            αa,θE,θI
         | 
| 1395 | 
            +
            αa
         | 
| 1396 | 
            +
            (51)
         | 
| 1397 | 
            +
            s.t.
         | 
| 1398 | 
            +
            C3 : (41), C4 : Ek (θE) ≥ Emin,k, ∀k, CIRS : (50),
         | 
| 1399 | 
            +
            C5 :
         | 
| 1400 | 
            +
            N
         | 
| 1401 | 
            +
            �
         | 
| 1402 | 
            +
            n=1
         | 
| 1403 | 
            +
            log2
         | 
| 1404 | 
            +
            �
         | 
| 1405 | 
            +
            1 +
         | 
| 1406 | 
            +
            θH
         | 
| 1407 | 
            +
            I AIRS
         | 
| 1408 | 
            +
            k,n θI
         | 
| 1409 | 
            +
            θH
         | 
| 1410 | 
            +
            I �AIRS
         | 
| 1411 | 
            +
            k,n θI + ζk,n,a
         | 
| 1412 | 
            +
            �
         | 
| 1413 | 
            +
            ≥ αa, ∀k,
         | 
| 1414 | 
            +
            where the steps for constraints C3-C5 in Subsection III-A1 are used exactly here.
         | 
| 1415 | 
            +
            B. Maximization over {sE,n, pI,n}
         | 
| 1416 | 
            +
            By introducing an auxiliary variable αb, the relay/IRS problem in (16) for fixed {UE,n, UI,n, τ}
         | 
| 1417 | 
            +
            boils down to the following optimization:
         | 
| 1418 | 
            +
            max
         | 
| 1419 | 
            +
            αb,{sE,n,pI,n}N
         | 
| 1420 | 
            +
            n=1
         | 
| 1421 | 
            +
            αb
         | 
| 1422 | 
            +
            (52)
         | 
| 1423 | 
            +
            s.t.
         | 
| 1424 | 
            +
            C2 : (3), pI,k,n ≥ 0, ∀k, n, C3 : (9), C4 : Ek
         | 
| 1425 | 
            +
            �
         | 
| 1426 | 
            +
            {sE}N
         | 
| 1427 | 
            +
            n=1
         | 
| 1428 | 
            +
            �
         | 
| 1429 | 
            +
            ≥ Emin,k, ∀k,
         | 
| 1430 | 
            +
            C5 :
         | 
| 1431 | 
            +
            N
         | 
| 1432 | 
            +
            �
         | 
| 1433 | 
            +
            n=1
         | 
| 1434 | 
            +
            log2 (1 + γk,n(pI,n)) ≥ αb, ∀k.
         | 
| 1435 | 
            +
            The constraints C4 and C5 of this sub-problem are non-convex. We first rewrite the SINR
         | 
| 1436 | 
            +
            associated with the kth pair in (11) as
         | 
| 1437 | 
            +
            γk,n(pI,n) =
         | 
| 1438 | 
            +
            aT
         | 
| 1439 | 
            +
            k,npI,n
         | 
| 1440 | 
            +
            bT
         | 
| 1441 | 
            +
            k,npI,n + σ2n �ψk,n + δ2
         | 
| 1442 | 
            +
            k,n + σ2
         | 
| 1443 | 
            +
            k,n
         | 
| 1444 | 
            +
            ,
         | 
| 1445 | 
            +
            (53)
         | 
| 1446 | 
            +
            where ak,n = ψk,k,nek, bk,n = [ψk,1,n, ψk,2,n, · · · , ψk,k−1,n, 0 , ψk,k+1,n, · · · , ψk,K,n]T, and ek is
         | 
| 1447 | 
            +
            the kth unit vector. Therefore, the LHS of C5 in (52) is written as
         | 
| 1448 | 
            +
            N
         | 
| 1449 | 
            +
            �
         | 
| 1450 | 
            +
            n=1
         | 
| 1451 | 
            +
            �
         | 
| 1452 | 
            +
            log2
         | 
| 1453 | 
            +
            �
         | 
| 1454 | 
            +
            qT
         | 
| 1455 | 
            +
            k,npI,n + ζk,n,b
         | 
| 1456 | 
            +
            �
         | 
| 1457 | 
            +
            − log2
         | 
| 1458 | 
            +
            �
         | 
| 1459 | 
            +
            bT
         | 
| 1460 | 
            +
            k,npI,n + ζk,n,b
         | 
| 1461 | 
            +
            � �
         | 
| 1462 | 
            +
            ,
         | 
| 1463 | 
            +
            (54)
         | 
| 1464 | 
            +
            January 3, 2023
         | 
| 1465 | 
            +
            DRAFT
         | 
| 1466 | 
            +
             | 
| 1467 | 
            +
            16
         | 
| 1468 | 
            +
            where qk,n = ak,n +bk,n and ζk,n,b = σ2
         | 
| 1469 | 
            +
            n �ψk,n +σ2
         | 
| 1470 | 
            +
            k,n +δ2
         | 
| 1471 | 
            +
            k,n. Then, similar to the procedure in Sub-
         | 
| 1472 | 
            +
            section III-A for C5, we resort to the MM technique. Precisely, considering the inequality in (30),
         | 
| 1473 | 
            +
            the second term in (54) is minorized by setting x = bT
         | 
| 1474 | 
            +
            k,npI,n + ζk,n,b and x0 = bT
         | 
| 1475 | 
            +
            k,np0
         | 
| 1476 | 
            +
            I,n + ζk,n,b.
         | 
| 1477 | 
            +
            By substituting the minorizer in (54), the constraint C5 at the ith iteration is obtained as
         | 
| 1478 | 
            +
            C5 :
         | 
| 1479 | 
            +
            N
         | 
| 1480 | 
            +
            �
         | 
| 1481 | 
            +
            n=1
         | 
| 1482 | 
            +
            �
         | 
| 1483 | 
            +
            log2
         | 
| 1484 | 
            +
            �
         | 
| 1485 | 
            +
            qT
         | 
| 1486 | 
            +
            k,npI,n + ζk,n,b
         | 
| 1487 | 
            +
            �
         | 
| 1488 | 
            +
            − log2(bT
         | 
| 1489 | 
            +
            k,np(i−1)
         | 
| 1490 | 
            +
            I,n
         | 
| 1491 | 
            +
            + ζk,n,b)
         | 
| 1492 | 
            +
            (55)
         | 
| 1493 | 
            +
            −
         | 
| 1494 | 
            +
            log2 e
         | 
| 1495 | 
            +
            bT
         | 
| 1496 | 
            +
            k,np(i−1)
         | 
| 1497 | 
            +
            I,n
         | 
| 1498 | 
            +
            + ζk,n,b
         | 
| 1499 | 
            +
            bT
         | 
| 1500 | 
            +
            k,n
         | 
| 1501 | 
            +
            �
         | 
| 1502 | 
            +
            pI,n − p(i−1)
         | 
| 1503 | 
            +
            I,n
         | 
| 1504 | 
            +
            � �
         | 
| 1505 | 
            +
            ≥ αb.
         | 
| 1506 | 
            +
            Next, we consider the non-convex constraint C4. It is observed that the term Ek
         | 
| 1507 | 
            +
            �
         | 
| 1508 | 
            +
            {sE,n}N
         | 
| 1509 | 
            +
            n=1
         | 
| 1510 | 
            +
            �
         | 
| 1511 | 
            +
            in
         | 
| 1512 | 
            +
            the LHS of the this constraint is neither convex nor concave w.r.t. sE,n. Therefore, similar to
         | 
| 1513 | 
            +
            the procedure in Subsection III-A, we apply the MM by selecting βk,n,b (see Appendix C) and
         | 
| 1514 | 
            +
            minorize C4 at the ith iteration by
         | 
| 1515 | 
            +
            Ek
         | 
| 1516 | 
            +
            ��
         | 
| 1517 | 
            +
            s(i−1)
         | 
| 1518 | 
            +
            E,n
         | 
| 1519 | 
            +
            �N
         | 
| 1520 | 
            +
            n=1
         | 
| 1521 | 
            +
            �
         | 
| 1522 | 
            +
            + 1
         | 
| 1523 | 
            +
            2
         | 
| 1524 | 
            +
            N
         | 
| 1525 | 
            +
            �
         | 
| 1526 | 
            +
            n=1
         | 
| 1527 | 
            +
            βk,n,b
         | 
| 1528 | 
            +
            �
         | 
| 1529 | 
            +
            s(i−1)
         | 
| 1530 | 
            +
            E,n
         | 
| 1531 | 
            +
            �H
         | 
| 1532 | 
            +
            s(i−1)
         | 
| 1533 | 
            +
            E,n
         | 
| 1534 | 
            +
            +
         | 
| 1535 | 
            +
            N
         | 
| 1536 | 
            +
            �
         | 
| 1537 | 
            +
            n=1
         | 
| 1538 | 
            +
            ℜ
         | 
| 1539 | 
            +
            �
         | 
| 1540 | 
            +
            ϑ(i)
         | 
| 1541 | 
            +
            k,n,b
         | 
| 1542 | 
            +
            �
         | 
| 1543 | 
            +
            sE,n − s(i−1)
         | 
| 1544 | 
            +
            E,n
         | 
| 1545 | 
            +
            ��
         | 
| 1546 | 
            +
            (56)
         | 
| 1547 | 
            +
            − 1
         | 
| 1548 | 
            +
            2
         | 
| 1549 | 
            +
            N
         | 
| 1550 | 
            +
            �
         | 
| 1551 | 
            +
            n=1
         | 
| 1552 | 
            +
            βk,n,bsH
         | 
| 1553 | 
            +
            E,nsE,n ≥ Emin,k, ∀k,
         | 
| 1554 | 
            +
            where we define
         | 
| 1555 | 
            +
            ϑ(i)
         | 
| 1556 | 
            +
            k,n,b =βk,n,b
         | 
| 1557 | 
            +
            �
         | 
| 1558 | 
            +
            s(i−1)
         | 
| 1559 | 
            +
            E,n
         | 
| 1560 | 
            +
            �H
         | 
| 1561 | 
            +
            + τ
         | 
| 1562 | 
            +
            ρexp�cexp
         | 
| 1563 | 
            +
            �
         | 
| 1564 | 
            +
            �alog2ω(i)
         | 
| 1565 | 
            +
            k,b
         | 
| 1566 | 
            +
            � �
         | 
| 1567 | 
            +
            ω(i)
         | 
| 1568 | 
            +
            k,b
         | 
| 1569 | 
            +
            ��b−1 �
         | 
| 1570 | 
            +
            2�a log ω(i)
         | 
| 1571 | 
            +
            k,b + �b
         | 
| 1572 | 
            +
            � �
         | 
| 1573 | 
            +
            s(i−1)
         | 
| 1574 | 
            +
            E,n
         | 
| 1575 | 
            +
            �H
         | 
| 1576 | 
            +
            Ξk,n,
         | 
| 1577 | 
            +
            with ω(i)
         | 
| 1578 | 
            +
            k,b =
         | 
| 1579 | 
            +
            1
         | 
| 1580 | 
            +
            2
         | 
| 1581 | 
            +
            �N
         | 
| 1582 | 
            +
            n=1
         | 
| 1583 | 
            +
            �
         | 
| 1584 | 
            +
            s(i−1)
         | 
| 1585 | 
            +
            E,n
         | 
| 1586 | 
            +
            �H
         | 
| 1587 | 
            +
            Ξk,ns(i−1)
         | 
| 1588 | 
            +
            E,n . Consequently, the ith iteration of the MM update
         | 
| 1589 | 
            +
            for (52) is obtained easily as the interior point solution of the following convex problem
         | 
| 1590 | 
            +
            max
         | 
| 1591 | 
            +
            αb,{sE,n,pI,n}N
         | 
| 1592 | 
            +
            n=1
         | 
| 1593 | 
            +
            αb
         | 
| 1594 | 
            +
            (57)
         | 
| 1595 | 
            +
            s.t.
         | 
| 1596 | 
            +
            C2, C3, C4 : (56), C5 : (55).
         | 
| 1597 | 
            +
            C. Maximization over τ
         | 
| 1598 | 
            +
            The optimization problem in (16) w.r.t. τ becomes
         | 
| 1599 | 
            +
            min
         | 
| 1600 | 
            +
            τ
         | 
| 1601 | 
            +
            τ
         | 
| 1602 | 
            +
            (58)
         | 
| 1603 | 
            +
            s.t.
         | 
| 1604 | 
            +
            C1 : 0 ≤ τ ≤ T,
         | 
| 1605 | 
            +
            C2 : τvk ≤ �vk, ∀k,
         | 
| 1606 | 
            +
            C3 : τ�v1 ≤ �v2,
         | 
| 1607 | 
            +
            C4 : τ ≥ ¯vk, ∀k,
         | 
| 1608 | 
            +
            where
         | 
| 1609 | 
            +
            vk = 1
         | 
| 1610 | 
            +
            2ρ
         | 
| 1611 | 
            +
            N
         | 
| 1612 | 
            +
            �
         | 
| 1613 | 
            +
            n=1
         | 
| 1614 | 
            +
            �
         | 
| 1615 | 
            +
            |sE,k,n|2 − pI,k,n
         | 
| 1616 | 
            +
            �
         | 
| 1617 | 
            +
            , ∀k,
         | 
| 1618 | 
            +
            �vk = T
         | 
| 1619 | 
            +
            N
         | 
| 1620 | 
            +
            �
         | 
| 1621 | 
            +
            n=1
         | 
| 1622 | 
            +
            �
         | 
| 1623 | 
            +
            prf
         | 
| 1624 | 
            +
            k,n − pI,k,n
         | 
| 1625 | 
            +
            2ρ
         | 
| 1626 | 
            +
            �
         | 
| 1627 | 
            +
            , ∀k,
         | 
| 1628 | 
            +
            (59)
         | 
| 1629 | 
            +
            January 3, 2023
         | 
| 1630 | 
            +
            DRAFT
         | 
| 1631 | 
            +
             | 
| 1632 | 
            +
            17
         | 
| 1633 | 
            +
            Algorithm 1 The Proposed Method for Minimum Rate Maximization in Relay/IRS Systems
         | 
| 1634 | 
            +
            1. Relay: Initialize U(l)
         | 
| 1635 | 
            +
            E,n, U(l)
         | 
| 1636 | 
            +
            I,n ∈ CMR×MR, τ (l) ∈ R+, l ← 0.
         | 
| 1637 | 
            +
            1. IRS: Initialize θ(l)
         | 
| 1638 | 
            +
            E , θ(l)
         | 
| 1639 | 
            +
            I
         | 
| 1640 | 
            +
            ∈ CMIRS, τ (l) ∈ R+, l ← 0.
         | 
| 1641 | 
            +
            repeat
         | 
| 1642 | 
            +
            2. Relay: Initialize U(i)
         | 
| 1643 | 
            +
            E,n and U(i)
         | 
| 1644 | 
            +
            I,n and set i = 0.
         | 
| 1645 | 
            +
            2. IRS: Initialize θ(i)
         | 
| 1646 | 
            +
            E , θ(i)
         | 
| 1647 | 
            +
            I
         | 
| 1648 | 
            +
            and set i = 0.
         | 
| 1649 | 
            +
            repeat
         | 
| 1650 | 
            +
            3. Relay: Solve (40) to obtain {UE,n, UI,n, αa}.
         | 
| 1651 | 
            +
            3. IRS: Solve (51) to obtain {θE, θI, αa}.
         | 
| 1652 | 
            +
            4. Update i ← i + 1.
         | 
| 1653 | 
            +
            until convergence
         | 
| 1654 | 
            +
            5. Relay/IRS: Initialize s(i)
         | 
| 1655 | 
            +
            E,n, p(i)
         | 
| 1656 | 
            +
            I,n and set i = 0.
         | 
| 1657 | 
            +
            repeat
         | 
| 1658 | 
            +
            6. Relay/IRS: Solve the convex problem in (57) to obtain {sE,n, pI,n, αb}.
         | 
| 1659 | 
            +
            7. Update i ← i + 1.
         | 
| 1660 | 
            +
            until convergence
         | 
| 1661 | 
            +
            8. Relay/IRS: Compute τ (l) via the closed-form solution in (63).
         | 
| 1662 | 
            +
            9. Update l ← l + 1.
         | 
| 1663 | 
            +
            until convergence
         | 
| 1664 | 
            +
            �v1 = 1
         | 
| 1665 | 
            +
            2ρ
         | 
| 1666 | 
            +
            N
         | 
| 1667 | 
            +
            �
         | 
| 1668 | 
            +
            n=1
         | 
| 1669 | 
            +
            �
         | 
| 1670 | 
            +
            sH
         | 
| 1671 | 
            +
            E,nVE,nsE,n + σ2
         | 
| 1672 | 
            +
            ntr
         | 
| 1673 | 
            +
            �
         | 
| 1674 | 
            +
            UE,nUH
         | 
| 1675 | 
            +
            E,n
         | 
| 1676 | 
            +
            �
         | 
| 1677 | 
            +
            − tr{QI,nVI,n} − σ2
         | 
| 1678 | 
            +
            ntr{UI,nUH
         | 
| 1679 | 
            +
            I,n}
         | 
| 1680 | 
            +
            �
         | 
| 1681 | 
            +
            ,
         | 
| 1682 | 
            +
            (60)
         | 
| 1683 | 
            +
            �v2 = T
         | 
| 1684 | 
            +
            N
         | 
| 1685 | 
            +
            �
         | 
| 1686 | 
            +
            n=1
         | 
| 1687 | 
            +
            �
         | 
| 1688 | 
            +
            prf
         | 
| 1689 | 
            +
            n − 1
         | 
| 1690 | 
            +
            2ρ
         | 
| 1691 | 
            +
            �
         | 
| 1692 | 
            +
            tr{QI,nVI,n} + σ2
         | 
| 1693 | 
            +
            ntr
         | 
| 1694 | 
            +
            �
         | 
| 1695 | 
            +
            UI,nUH
         | 
| 1696 | 
            +
            I,n
         | 
| 1697 | 
            +
            ���
         | 
| 1698 | 
            +
            ,
         | 
| 1699 | 
            +
            (61)
         | 
| 1700 | 
            +
            ¯vk =
         | 
| 1701 | 
            +
            ρEmin,k
         | 
| 1702 | 
            +
            exp
         | 
| 1703 | 
            +
            �
         | 
| 1704 | 
            +
            �alog2pE,k
         | 
| 1705 | 
            +
            �
         | 
| 1706 | 
            +
            p�b
         | 
| 1707 | 
            +
            E,kexp (�c)
         | 
| 1708 | 
            +
            , ∀k.
         | 
| 1709 | 
            +
            (62)
         | 
| 1710 | 
            +
            Therefore, a closed-form solution (for a non-empty feasible set5) can be obtained as
         | 
| 1711 | 
            +
            τopt = max{¯v1, ¯v2, ..., ¯vK}.
         | 
| 1712 | 
            +
            (63)
         | 
| 1713 | 
            +
            5The following conditions lead to a non-empty feasible set for the problem:
         | 
| 1714 | 
            +
            1) ¯vk ≤ T, ∀k, 2) �vk ≥ 0, ∀k, 3) �v2 ≥ 0, 4)
         | 
| 1715 | 
            +
            �vj
         | 
| 1716 | 
            +
            vj |K
         | 
| 1717 | 
            +
            j=1 ≥ ¯vk, ∀k (for vj ≥ 0, ∀j), 5) �v2
         | 
| 1718 | 
            +
            �v1 ≥ ¯vk, ∀k (for v1 ≥ 0).
         | 
| 1719 | 
            +
            January 3, 2023
         | 
| 1720 | 
            +
            DRAFT
         | 
| 1721 | 
            +
             | 
| 1722 | 
            +
            18
         | 
| 1723 | 
            +
            TABLE I
         | 
| 1724 | 
            +
            THE COMPUTATIONAL COMPLEXITY ORDER (PER INNER ITERATIONS) FOR STEP 3 OF THE ALGORITHM 1.
         | 
| 1725 | 
            +
            Relay
         | 
| 1726 | 
            +
            O
         | 
| 1727 | 
            +
            ��
         | 
| 1728 | 
            +
            2NM 2
         | 
| 1729 | 
            +
            R(1 + 2N)(1 + K)
         | 
| 1730 | 
            +
            �3.5�
         | 
| 1731 | 
            +
            Relay (t-static)
         | 
| 1732 | 
            +
            O
         | 
| 1733 | 
            +
            ��
         | 
| 1734 | 
            +
            NM 2
         | 
| 1735 | 
            +
            R(1 + N)(1 + 2K)
         | 
| 1736 | 
            +
            �3.5�
         | 
| 1737 | 
            +
            Relay (t-f-static)
         | 
| 1738 | 
            +
            O
         | 
| 1739 | 
            +
            ��
         | 
| 1740 | 
            +
            2M 2
         | 
| 1741 | 
            +
            R(1 + 2K)
         | 
| 1742 | 
            +
            �3.5�
         | 
| 1743 | 
            +
            IRS
         | 
| 1744 | 
            +
            O
         | 
| 1745 | 
            +
            �
         | 
| 1746 | 
            +
            (6MIRS(N + K + 1))3.5�
         | 
| 1747 | 
            +
            IRS (t-static)
         | 
| 1748 | 
            +
            O
         | 
| 1749 | 
            +
            �
         | 
| 1750 | 
            +
            (2MIRS(N + 2K + 1))3.5�
         | 
| 1751 | 
            +
            Algorithm 1 summarizes the discussions in Section III and represents the steps of the proposed
         | 
| 1752 | 
            +
            method for maximizing the minimum rate of all user pairs in relay/IRS WPC systems. Note that
         | 
| 1753 | 
            +
            similar mathematical derivations are used to develop t-f-static algorithm for relay system as well
         | 
| 1754 | 
            +
            as t-static algorithm for both relay and IRS systems.
         | 
| 1755 | 
            +
            Remark 4 (convergence). It has been shown that under some mild conditions, the MM technique
         | 
| 1756 | 
            +
            converges to the stationary points of the problem [34], [35].
         | 
| 1757 | 
            +
            D. Complexity Analysis
         | 
| 1758 | 
            +
            The main computational burdens in Algorithm 1 are associated with steps 3, 6, and 8. At
         | 
| 1759 | 
            +
            each inner iteration in step 3, the convex problems in (40) and (51) are solved via interior
         | 
| 1760 | 
            +
            point methods for relay and IRS system design, respectively, with a computational complexity
         | 
| 1761 | 
            +
            of O
         | 
| 1762 | 
            +
            �
         | 
| 1763 | 
            +
            (2NM2
         | 
| 1764 | 
            +
            R(1 + 2N)(1 + K))3.5�
         | 
| 1765 | 
            +
            and O
         | 
| 1766 | 
            +
            �
         | 
| 1767 | 
            +
            (6MIRS(N + K + 1))3.5�
         | 
| 1768 | 
            +
            [36]. Table I compares
         | 
| 1769 | 
            +
            the computational complexity of step 3 for other versions of relay/IRS models. Similar to step
         | 
| 1770 | 
            +
            3, the complexity (per inner iterations) for step 6 which solves (57) (e.g., by using the interior
         | 
| 1771 | 
            +
            point methods) is O
         | 
| 1772 | 
            +
            �
         | 
| 1773 | 
            +
            (KN(1 + 2N)(5 + 2K))3.5�
         | 
| 1774 | 
            +
            for all versions of relay/IRS models. In step
         | 
| 1775 | 
            +
            8, the closed-form expression in (63) must be calculated leading to the complexity of6 O(N3).
         | 
| 1776 | 
            +
            IV. NUMERICAL EXAMPLES
         | 
| 1777 | 
            +
            Here, we evaluate the proposed relay/IRS method in different scenarios. The channels from
         | 
| 1778 | 
            +
            transmitters to the relay and the channels from the relay to the receivers are modeled as Hn =
         | 
| 1779 | 
            +
            0.1
         | 
| 1780 | 
            +
            � �d1
         | 
| 1781 | 
            +
            d0
         | 
| 1782 | 
            +
            � −�γ
         | 
| 1783 | 
            +
            2 �Hn and Gn = 0.1
         | 
| 1784 | 
            +
            � �d2
         | 
| 1785 | 
            +
            d0
         | 
| 1786 | 
            +
            � −�γ
         | 
| 1787 | 
            +
            2 �Gn, respectively, where d0 = 1 m is a reference distance,
         | 
| 1788 | 
            +
            �d1 is the distance between Tk and the relay, �d2 is the distance between the relay and Rk, and
         | 
| 1789 | 
            +
            6This can be decreased to O(N 2.3) via finding the best order of matrix multiplications (see [37] for details).
         | 
| 1790 | 
            +
            January 3, 2023
         | 
| 1791 | 
            +
            DRAFT
         | 
| 1792 | 
            +
             | 
| 1793 | 
            +
            19
         | 
| 1794 | 
            +
            T1
         | 
| 1795 | 
            +
            T2
         | 
| 1796 | 
            +
            TK
         | 
| 1797 | 
            +
            Relay or IRS
         | 
| 1798 | 
            +
            rT
         | 
| 1799 | 
            +
            d3
         | 
| 1800 | 
            +
            d1
         | 
| 1801 | 
            +
            d2
         | 
| 1802 | 
            +
            rR
         | 
| 1803 | 
            +
            R1
         | 
| 1804 | 
            +
            ...
         | 
| 1805 | 
            +
            ...
         | 
| 1806 | 
            +
            R2
         | 
| 1807 | 
            +
            RK
         | 
| 1808 | 
            +
            Fig. 3. Simulation setup for relay/IRS WPC systems with K user pairs.
         | 
| 1809 | 
            +
            TABLE II
         | 
| 1810 | 
            +
            THE BASELINE BENCHMARK METHODS
         | 
| 1811 | 
            +
            Baseline 1
         | 
| 1812 | 
            +
            Baseline 2
         | 
| 1813 | 
            +
            Information Power Allocation
         | 
| 1814 | 
            +
            ✓
         | 
| 1815 | 
            +
            ✓
         | 
| 1816 | 
            +
            Energy Waveform Design
         | 
| 1817 | 
            +
            ✗
         | 
| 1818 | 
            +
            ✓
         | 
| 1819 | 
            +
            Time Allocation
         | 
| 1820 | 
            +
            ✓
         | 
| 1821 | 
            +
            ✓
         | 
| 1822 | 
            +
            Energy/Information Relay Beamforming
         | 
| 1823 | 
            +
            ✓
         | 
| 1824 | 
            +
            ✗
         | 
| 1825 | 
            +
            �γ = 3 is the path-loss exponent. It is assumed that the elements of �Hn and �Gn are i.i.d. CSCG
         | 
| 1826 | 
            +
            random variables with zero mean and unit variance. As shown in Fig. 3, the transmitters and
         | 
| 1827 | 
            +
            receivers are distributed uniformly within a circle with radius rT and rR, respectively. We set
         | 
| 1828 | 
            +
            the distance parameters as d1 = d2 = d3 = 10 m and rT = rR = 5 m. The maximum power
         | 
| 1829 | 
            +
            budget for Tk, relay, and IRS are set to prf
         | 
| 1830 | 
            +
            k,n = prf
         | 
| 1831 | 
            +
            R,n = 28 dBm, prf
         | 
| 1832 | 
            +
            IRS = 20 dBm, ∀k, n, and
         | 
| 1833 | 
            +
            the noise power at the relay, IRS and receivers are supposed to be σ2
         | 
| 1834 | 
            +
            R,n = σ2
         | 
| 1835 | 
            +
            k,n = δ2
         | 
| 1836 | 
            +
            k,n = −80
         | 
| 1837 | 
            +
            dBm, σ2
         | 
| 1838 | 
            +
            IRS,n = −100 dBm, ∀k, n. The total bandwidth is fixed to Bt = 1 MHz. We further
         | 
| 1839 | 
            +
            assume the total operation time T = 1. The curve fitting parameters for non-linear EH circuits
         | 
| 1840 | 
            +
            are equal to �a = −0.11, �b = −1.17, and �c = −12 [32]. Also, we set K = 5, N = 8, MR = 6,
         | 
| 1841 | 
            +
            and Emin,k = Emin = 10 µW, ∀k, unless otherwise specified. We solve the convex optimization
         | 
| 1842 | 
            +
            problems using CVX [38].
         | 
| 1843 | 
            +
            A. Relay System
         | 
| 1844 | 
            +
            Here, we compare the results of the proposed algorithms with partially optimized methods
         | 
| 1845 | 
            +
            (referred to as baseline schemes in the sequel) listed in Table II. For the first baseline method,
         | 
| 1846 | 
            +
            the energy signals are not optimized, and in the second baseline method, there is no optimization
         | 
| 1847 | 
            +
            January 3, 2023
         | 
| 1848 | 
            +
            DRAFT
         | 
| 1849 | 
            +
             | 
| 1850 | 
            +
            20
         | 
| 1851 | 
            +
            1
         | 
| 1852 | 
            +
            2
         | 
| 1853 | 
            +
            3
         | 
| 1854 | 
            +
            4
         | 
| 1855 | 
            +
            5
         | 
| 1856 | 
            +
            0
         | 
| 1857 | 
            +
            1
         | 
| 1858 | 
            +
            2
         | 
| 1859 | 
            +
            3
         | 
| 1860 | 
            +
            4
         | 
| 1861 | 
            +
            5
         | 
| 1862 | 
            +
            6
         | 
| 1863 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 1864 | 
            +
            Number of Outer Iterations
         | 
| 1865 | 
            +
            0.2
         | 
| 1866 | 
            +
            0.8
         | 
| 1867 | 
            +
            5.75
         | 
| 1868 | 
            +
            5.8
         | 
| 1869 | 
            +
            Different Initializations
         | 
| 1870 | 
            +
            (a)
         | 
| 1871 | 
            +
            1
         | 
| 1872 | 
            +
            2
         | 
| 1873 | 
            +
            3
         | 
| 1874 | 
            +
            4
         | 
| 1875 | 
            +
            5
         | 
| 1876 | 
            +
            6
         | 
| 1877 | 
            +
            7
         | 
| 1878 | 
            +
            0
         | 
| 1879 | 
            +
            1
         | 
| 1880 | 
            +
            2
         | 
| 1881 | 
            +
            3
         | 
| 1882 | 
            +
            4
         | 
| 1883 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 1884 | 
            +
            Number of Inner Iterations
         | 
| 1885 | 
            +
            (b)
         | 
| 1886 | 
            +
            1
         | 
| 1887 | 
            +
            2
         | 
| 1888 | 
            +
            3
         | 
| 1889 | 
            +
            4
         | 
| 1890 | 
            +
            5
         | 
| 1891 | 
            +
            6
         | 
| 1892 | 
            +
            7
         | 
| 1893 | 
            +
            8
         | 
| 1894 | 
            +
            9
         | 
| 1895 | 
            +
            10
         | 
| 1896 | 
            +
            11
         | 
| 1897 | 
            +
            4
         | 
| 1898 | 
            +
            4.2
         | 
| 1899 | 
            +
            4.4
         | 
| 1900 | 
            +
            4.6
         | 
| 1901 | 
            +
            4.8
         | 
| 1902 | 
            +
            5
         | 
| 1903 | 
            +
            Number of Inner Iterations
         | 
| 1904 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 1905 | 
            +
             
         | 
| 1906 | 
            +
             
         | 
| 1907 | 
            +
            (c)
         | 
| 1908 | 
            +
            Fig. 4.
         | 
| 1909 | 
            +
            Convergence behavior of the proposed method in Algorithm 1: (a) outer iterations for three random initial points,
         | 
| 1910 | 
            +
            (b) inner iterations associated with the sub-problem III-A1 in the first outer iteration, (c) inner iterations associated with the
         | 
| 1911 | 
            +
            sub-problem III-B in the first outer iteration.
         | 
| 1912 | 
            +
            for the relay beamformer; more precisely, the relay amplification matrices are assumed to be
         | 
| 1913 | 
            +
            identity matrices, i.e. UR
         | 
| 1914 | 
            +
            E,n = �αE,nIMR, ∀n, and UR
         | 
| 1915 | 
            +
            I,n = �αI,nIMR, ∀n, where the scalar parameters
         | 
| 1916 | 
            +
            �αE,n and �αI,n are employed to satisfy the feasible set Ω in (16). The convergence of the proposed
         | 
| 1917 | 
            +
            algorithm for inner and outer iterations (see Algorithm 1) are plotted in Fig. 4. This figure shows
         | 
| 1918 | 
            +
            that the proposed algorithm converges within a few outer iterations. Also, in this example, the
         | 
| 1919 | 
            +
            three different initializations lead to almost the same final value.
         | 
| 1920 | 
            +
            In Fig. 5.a, we illustrate the rate-energy region of the proposed method in comparison with the
         | 
| 1921 | 
            +
            first baseline method for different number of subbands. We can observe that the minimum rate
         | 
| 1922 | 
            +
            increases as N grows. The optimal time allocation parameter τopt w.r.t. the EH target is depicted
         | 
| 1923 | 
            +
            in Fig. 5.b. It is seen that the increased energy threshold Emin leads to a larger τ. As τ increases,
         | 
| 1924 | 
            +
            the duration of the ID phase decreases. Therefore, as we observe in Fig. 5.a, the minimum rate
         | 
| 1925 | 
            +
            reduces with increasing Emin. Also, the impact of the energy waveform design is evident in both
         | 
| 1926 | 
            +
            figures. In Fig. 6.a and Fig. 6.b, we compare the minimum rate of the proposed optimal and sub-
         | 
| 1927 | 
            +
            optimal approaches with baseline methods. As we can see in Fig. 6.a, increasing the number
         | 
| 1928 | 
            +
            of pairs results in lower minimum rate for all methods with MR = 9. Furthermore, Fig. 6.b
         | 
| 1929 | 
            +
            shows that a larger MR increases the minimum rate with an almost linear trend. The importance
         | 
| 1930 | 
            +
            of the energy waveform and relay beamforming design is observed through both figures. We
         | 
| 1931 | 
            +
            can see that the method with no relay beamforming has the worst performance compared to
         | 
| 1932 | 
            +
            other methods since without a relay amplification matrix design, inter-pair interference cannot
         | 
| 1933 | 
            +
            be managed.
         | 
| 1934 | 
            +
            January 3, 2023
         | 
| 1935 | 
            +
            DRAFT
         | 
| 1936 | 
            +
             | 
| 1937 | 
            +
            21
         | 
| 1938 | 
            +
            10 20 30 40 50 60 70 80 90 100110120130
         | 
| 1939 | 
            +
            0
         | 
| 1940 | 
            +
            1
         | 
| 1941 | 
            +
            2
         | 
| 1942 | 
            +
            3
         | 
| 1943 | 
            +
            4
         | 
| 1944 | 
            +
            5
         | 
| 1945 | 
            +
            6
         | 
| 1946 | 
            +
            7
         | 
| 1947 | 
            +
            EH Target, Emin (µW )
         | 
| 1948 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 1949 | 
            +
             
         | 
| 1950 | 
            +
             
         | 
| 1951 | 
            +
            Proposed - N = 8
         | 
| 1952 | 
            +
            Baseline 1 - N = 8
         | 
| 1953 | 
            +
            Proposed - N = 9
         | 
| 1954 | 
            +
            Baseline 1 - N = 9
         | 
| 1955 | 
            +
            (a) the rate-energy region
         | 
| 1956 | 
            +
            10 20 30 40 50 60 70 80 90 100110120130
         | 
| 1957 | 
            +
            0
         | 
| 1958 | 
            +
            0.2
         | 
| 1959 | 
            +
            0.4
         | 
| 1960 | 
            +
            0.6
         | 
| 1961 | 
            +
            0.8
         | 
| 1962 | 
            +
            1
         | 
| 1963 | 
            +
            EH Target, Emin (µW )
         | 
| 1964 | 
            +
            Time Allocation Parameter (s)
         | 
| 1965 | 
            +
             
         | 
| 1966 | 
            +
             
         | 
| 1967 | 
            +
            Proposed - N = 8
         | 
| 1968 | 
            +
            Baseline 1 - N = 8
         | 
| 1969 | 
            +
            Proposed - N = 9
         | 
| 1970 | 
            +
            Baseline 1 - N = 9
         | 
| 1971 | 
            +
            (b) the time allocation parameter τopt
         | 
| 1972 | 
            +
            Fig. 5. Comparison of the proposed and baseline 1 methods for different number of subbands N = 8, 9.
         | 
| 1973 | 
            +
            3
         | 
| 1974 | 
            +
            4
         | 
| 1975 | 
            +
            5
         | 
| 1976 | 
            +
            6
         | 
| 1977 | 
            +
            7
         | 
| 1978 | 
            +
            8
         | 
| 1979 | 
            +
            3
         | 
| 1980 | 
            +
            4
         | 
| 1981 | 
            +
            5
         | 
| 1982 | 
            +
            6
         | 
| 1983 | 
            +
            7
         | 
| 1984 | 
            +
            8
         | 
| 1985 | 
            +
            9
         | 
| 1986 | 
            +
            10
         | 
| 1987 | 
            +
            11
         | 
| 1988 | 
            +
            12
         | 
| 1989 | 
            +
            Number of Pairs, K
         | 
| 1990 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 1991 | 
            +
             
         | 
| 1992 | 
            +
             
         | 
| 1993 | 
            +
            Proposed 
         | 
| 1994 | 
            +
            Baseline 1
         | 
| 1995 | 
            +
            Proposed (t−static)
         | 
| 1996 | 
            +
            Proposed (t−f−static)
         | 
| 1997 | 
            +
            Baseline 2
         | 
| 1998 | 
            +
            (a) minimum rate versus number of pairs K
         | 
| 1999 | 
            +
            5
         | 
| 2000 | 
            +
            6
         | 
| 2001 | 
            +
            7
         | 
| 2002 | 
            +
            8
         | 
| 2003 | 
            +
            9
         | 
| 2004 | 
            +
            10
         | 
| 2005 | 
            +
            2
         | 
| 2006 | 
            +
            3
         | 
| 2007 | 
            +
            4
         | 
| 2008 | 
            +
            5
         | 
| 2009 | 
            +
            6
         | 
| 2010 | 
            +
            7
         | 
| 2011 | 
            +
            8
         | 
| 2012 | 
            +
            9
         | 
| 2013 | 
            +
            Number of Antennas, MR
         | 
| 2014 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 2015 | 
            +
             
         | 
| 2016 | 
            +
             
         | 
| 2017 | 
            +
            Proposed
         | 
| 2018 | 
            +
            Baseline 1
         | 
| 2019 | 
            +
            Proposed (t−static)
         | 
| 2020 | 
            +
            Proposed (t−f−static)
         | 
| 2021 | 
            +
            Baseline 2
         | 
| 2022 | 
            +
            (b) minimum rate versus number of antennas MR
         | 
| 2023 | 
            +
            Fig. 6. Comparison of the proposed optimal and sub-optimal methods with baseline methods.
         | 
| 2024 | 
            +
            B. IRS System
         | 
| 2025 | 
            +
            In this subsection, the performance of the proposed IRS-assisted WPC system is evaluated.
         | 
| 2026 | 
            +
            Since most of the studied scenarios for relay (i.e., Fig. 4, Fig. 5, and Fig. 6.a) have similar trends
         | 
| 2027 | 
            +
            for IRS, we only consider the scenario of Fig. 6.b, for the sake of brevity. As we can see from
         | 
| 2028 | 
            +
            Fig.7, in the case of IRS, the minimum rate has a super-linear ascent property versus increasing
         | 
| 2029 | 
            +
            MIRS.
         | 
| 2030 | 
            +
            V. CONCLUSION
         | 
| 2031 | 
            +
            In this paper, the max-min rate maximization in a multi-carrier relay/IRS WPC system with a
         | 
| 2032 | 
            +
            joint TS scheme was considered. A unified framework was proposed to maximize the minimum
         | 
| 2033 | 
            +
            rate of the user pairs in both relay and IRS systems by jointly designing the energy waveforms,
         | 
| 2034 | 
            +
            January 3, 2023
         | 
| 2035 | 
            +
            DRAFT
         | 
| 2036 | 
            +
             | 
| 2037 | 
            +
            22
         | 
| 2038 | 
            +
            7
         | 
| 2039 | 
            +
            10
         | 
| 2040 | 
            +
            13
         | 
| 2041 | 
            +
            16
         | 
| 2042 | 
            +
            19
         | 
| 2043 | 
            +
            22
         | 
| 2044 | 
            +
            3
         | 
| 2045 | 
            +
            3.5
         | 
| 2046 | 
            +
            4
         | 
| 2047 | 
            +
            4.5
         | 
| 2048 | 
            +
            5
         | 
| 2049 | 
            +
            5.5
         | 
| 2050 | 
            +
            Number of REs, MIRS
         | 
| 2051 | 
            +
            Minimum Rate (bps/Hz)
         | 
| 2052 | 
            +
             
         | 
| 2053 | 
            +
             
         | 
| 2054 | 
            +
            Proposed
         | 
| 2055 | 
            +
            Proposed (t−static)
         | 
| 2056 | 
            +
            Fig. 7. The effect of the number of REs MIRS for the proposed optimal and sub-optimal IRS methods.
         | 
| 2057 | 
            +
            power of information waveforms, amplification matrices, and the time allocation parameter.
         | 
| 2058 | 
            +
            The non-linearity in EH circuits was also considered in the design problem. The non-convex
         | 
| 2059 | 
            +
            problem was handled via the MM technique. Numerical results demonstrated the effectiveness of
         | 
| 2060 | 
            +
            the proposed algorithm in terms of the minimum rate. As a extended future work in this area, it
         | 
| 2061 | 
            +
            might be interesting to develop a distributed algorithm for design of multi-user relay/IRS WPC
         | 
| 2062 | 
            +
            systems.
         | 
| 2063 | 
            +
            APPENDIX A
         | 
| 2064 | 
            +
            THE DERIVATION OF THE EXPRESSIONS IN (21) AND (25)-(27)
         | 
| 2065 | 
            +
            Using tr
         | 
| 2066 | 
            +
            �
         | 
| 2067 | 
            +
            XHY
         | 
| 2068 | 
            +
            �
         | 
| 2069 | 
            +
            = vec(X)Hvec(Y) and vec(XYZ) = (ZT ⊗ X)vec(Y), the power of the
         | 
| 2070 | 
            +
            relay signal for ID mode in (7) can be obtained as
         | 
| 2071 | 
            +
            E
         | 
| 2072 | 
            +
            �
         | 
| 2073 | 
            +
            ∥�r(t)∥2
         | 
| 2074 | 
            +
            2
         | 
| 2075 | 
            +
            �
         | 
| 2076 | 
            +
            = 1
         | 
| 2077 | 
            +
            2
         | 
| 2078 | 
            +
            N
         | 
| 2079 | 
            +
            �
         | 
| 2080 | 
            +
            n=1
         | 
| 2081 | 
            +
            �
         | 
| 2082 | 
            +
            uH
         | 
| 2083 | 
            +
            I,nvec
         | 
| 2084 | 
            +
            �
         | 
| 2085 | 
            +
            UI,nHnQI,nHH
         | 
| 2086 | 
            +
            n
         | 
| 2087 | 
            +
            �
         | 
| 2088 | 
            +
            + σ2
         | 
| 2089 | 
            +
            nuH
         | 
| 2090 | 
            +
            I,nuI,n
         | 
| 2091 | 
            +
            �
         | 
| 2092 | 
            +
            = 1
         | 
| 2093 | 
            +
            2
         | 
| 2094 | 
            +
            N
         | 
| 2095 | 
            +
            �
         | 
| 2096 | 
            +
            n=1
         | 
| 2097 | 
            +
            �
         | 
| 2098 | 
            +
            uH
         | 
| 2099 | 
            +
            I,n
         | 
| 2100 | 
            +
            ��
         | 
| 2101 | 
            +
            HnQI,nHH
         | 
| 2102 | 
            +
            n
         | 
| 2103 | 
            +
            �T ⊗ IMR
         | 
| 2104 | 
            +
            �
         | 
| 2105 | 
            +
            uI,n + σ2
         | 
| 2106 | 
            +
            nuH
         | 
| 2107 | 
            +
            I,nuI,n
         | 
| 2108 | 
            +
            �
         | 
| 2109 | 
            +
            = 1
         | 
| 2110 | 
            +
            2
         | 
| 2111 | 
            +
            N
         | 
| 2112 | 
            +
            �
         | 
| 2113 | 
            +
            n=1
         | 
| 2114 | 
            +
            uH
         | 
| 2115 | 
            +
            I,n �AR
         | 
| 2116 | 
            +
            I,nuI,n.
         | 
| 2117 | 
            +
            Similarly, we can derive the power of the relay signal for the EH mode in (20) and the expressions
         | 
| 2118 | 
            +
            in (25)–(27).
         | 
| 2119 | 
            +
            January 3, 2023
         | 
| 2120 | 
            +
            DRAFT
         | 
| 2121 | 
            +
             | 
| 2122 | 
            +
            23
         | 
| 2123 | 
            +
            APPENDIX B
         | 
| 2124 | 
            +
            PROOF OF LEMMA 1
         | 
| 2125 | 
            +
            By defining a positive semi-definite matrix D such that ∇2
         | 
| 2126 | 
            +
            xs(x) ⪯ D, we can write the
         | 
| 2127 | 
            +
            following majorizer for s(x) as [39]
         | 
| 2128 | 
            +
            s(x) ≤ s(x0) + ℜ
         | 
| 2129 | 
            +
            �
         | 
| 2130 | 
            +
            (∇xs(x))H |x=x0(x − x0)
         | 
| 2131 | 
            +
            �
         | 
| 2132 | 
            +
            + (x − x0)HD(x − x0),
         | 
| 2133 | 
            +
            (64)
         | 
| 2134 | 
            +
            where the gradient and Hessian of s(x) are respectively expressed as
         | 
| 2135 | 
            +
            ∇xs(x) = −2 log2 e
         | 
| 2136 | 
            +
            xHTx + ν Tx,
         | 
| 2137 | 
            +
            (65)
         | 
| 2138 | 
            +
            ∇2
         | 
| 2139 | 
            +
            xs(x) =
         | 
| 2140 | 
            +
            �
         | 
| 2141 | 
            +
            −2T
         | 
| 2142 | 
            +
            xHTx + ν +
         | 
| 2143 | 
            +
            4TxxHT
         | 
| 2144 | 
            +
            (xHTx + ν)2
         | 
| 2145 | 
            +
            �
         | 
| 2146 | 
            +
            log2 e.
         | 
| 2147 | 
            +
            Since T ⪰ 0, the term
         | 
| 2148 | 
            +
            −2T
         | 
| 2149 | 
            +
            xHTx+ν is negative semi-definite, and thus we obtain ξ > 0 such that for
         | 
| 2150 | 
            +
            any ν ⩾ 0
         | 
| 2151 | 
            +
            4TxxHT
         | 
| 2152 | 
            +
            (xHTx + ν)2 log2 e ⩽ 4TxxHT
         | 
| 2153 | 
            +
            (xHTx)2 ⩽ ξIM2
         | 
| 2154 | 
            +
            R.
         | 
| 2155 | 
            +
            Also, as TxxHT is a rank-one matrix, we can choose ξ as ξ ⩾ 4φ, where φ is given as
         | 
| 2156 | 
            +
            φ = max
         | 
| 2157 | 
            +
            x
         | 
| 2158 | 
            +
            xHT2x
         | 
| 2159 | 
            +
            (xHTx)2.
         | 
| 2160 | 
            +
            (66)
         | 
| 2161 | 
            +
            Then by choosing a = VHx, where V is a full-rank matrix such that T = VVH, the following
         | 
| 2162 | 
            +
            optimization is equivalently obtained from (66) as
         | 
| 2163 | 
            +
            φ = max
         | 
| 2164 | 
            +
            a
         | 
| 2165 | 
            +
            aHVHVa
         | 
| 2166 | 
            +
            aHa
         | 
| 2167 | 
            +
            1
         | 
| 2168 | 
            +
            aHa.
         | 
| 2169 | 
            +
            (67)
         | 
| 2170 | 
            +
            Using xHQx ≤ P and applying a similar procedure in [39, Appendix B], we can write
         | 
| 2171 | 
            +
            φ ≤
         | 
| 2172 | 
            +
            Pλmax(T)
         | 
| 2173 | 
            +
            vH
         | 
| 2174 | 
            +
            1 V−1QV−Hv1
         | 
| 2175 | 
            +
            ,
         | 
| 2176 | 
            +
            where v1 is the principal eigenvector of VHV. Finally, from (64), (65), and ξ = 4φ, we obtain
         | 
| 2177 | 
            +
            b = ∇s(x)|x=x0 =
         | 
| 2178 | 
            +
            −2 log2 e
         | 
| 2179 | 
            +
            xH
         | 
| 2180 | 
            +
            0 Tx0+νTx0 and D =
         | 
| 2181 | 
            +
            4P
         | 
| 2182 | 
            +
            wH
         | 
| 2183 | 
            +
            1 Qw1IM2
         | 
| 2184 | 
            +
            R, where w1 is the principal eigenvector of
         | 
| 2185 | 
            +
            T.
         | 
| 2186 | 
            +
            January 3, 2023
         | 
| 2187 | 
            +
            DRAFT
         | 
| 2188 | 
            +
             | 
| 2189 | 
            +
            24
         | 
| 2190 | 
            +
            APPENDIX C
         | 
| 2191 | 
            +
            A SELECTION OF βk,n,a AND βk,n,b
         | 
| 2192 | 
            +
            The value of βk,n,b should be selected such that ∇2
         | 
| 2193 | 
            +
            sE,nEk
         | 
| 2194 | 
            +
            �
         | 
| 2195 | 
            +
            {sE,n}N
         | 
| 2196 | 
            +
            n=1
         | 
| 2197 | 
            +
            �
         | 
| 2198 | 
            +
            +βk,n,bIK ⪰ 0. The term
         | 
| 2199 | 
            +
            ∇2
         | 
| 2200 | 
            +
            sE,nEk
         | 
| 2201 | 
            +
            �
         | 
| 2202 | 
            +
            {sE,n}N
         | 
| 2203 | 
            +
            n=1
         | 
| 2204 | 
            +
            �
         | 
| 2205 | 
            +
            is straightforwardly calculated as
         | 
| 2206 | 
            +
            ∇2
         | 
| 2207 | 
            +
            sE,nEk
         | 
| 2208 | 
            +
            �
         | 
| 2209 | 
            +
            {sE,n}N
         | 
| 2210 | 
            +
            n=1
         | 
| 2211 | 
            +
            �
         | 
| 2212 | 
            +
            =̺k
         | 
| 2213 | 
            +
            N
         | 
| 2214 | 
            +
            �
         | 
| 2215 | 
            +
            n=1
         | 
| 2216 | 
            +
            Ξk,n + ηk
         | 
| 2217 | 
            +
            N
         | 
| 2218 | 
            +
            �
         | 
| 2219 | 
            +
            n=1
         | 
| 2220 | 
            +
            N
         | 
| 2221 | 
            +
            �
         | 
| 2222 | 
            +
            n′=1
         | 
| 2223 | 
            +
            Ξk,nsE,nsH
         | 
| 2224 | 
            +
            E,n′Ξk,n′,
         | 
| 2225 | 
            +
            (68)
         | 
| 2226 | 
            +
            where
         | 
| 2227 | 
            +
            ̺k = τ
         | 
| 2228 | 
            +
            ρexp�c exp
         | 
| 2229 | 
            +
            �
         | 
| 2230 | 
            +
            �alog2pE,k
         | 
| 2231 | 
            +
            �
         | 
| 2232 | 
            +
            p
         | 
| 2233 | 
            +
            �b−1
         | 
| 2234 | 
            +
            E,k
         | 
| 2235 | 
            +
            �
         | 
| 2236 | 
            +
            2�a log pE,k + �b
         | 
| 2237 | 
            +
            �
         | 
| 2238 | 
            +
            ,
         | 
| 2239 | 
            +
            ηk =
         | 
| 2240 | 
            +
            τexp�c exp
         | 
| 2241 | 
            +
            �
         | 
| 2242 | 
            +
            �alog2pE,k
         | 
| 2243 | 
            +
            �
         | 
| 2244 | 
            +
            p
         | 
| 2245 | 
            +
            �b−2
         | 
| 2246 | 
            +
            E,k
         | 
| 2247 | 
            +
            ρ
         | 
| 2248 | 
            +
            �
         | 
| 2249 | 
            +
            4�a2log2pE,k +
         | 
| 2250 | 
            +
            �
         | 
| 2251 | 
            +
            4�a�b − 2�a
         | 
| 2252 | 
            +
            �
         | 
| 2253 | 
            +
            log pE,k + �b2 −�b + 2�a
         | 
| 2254 | 
            +
            �
         | 
| 2255 | 
            +
            .
         | 
| 2256 | 
            +
            As �a < 0,�b < 0, Ξk,n ⪰ 0, and Ξk,nsE,nsH
         | 
| 2257 | 
            +
            E,nΞk,n ⪰ 0, it suffices to choose βk,n,b such that
         | 
| 2258 | 
            +
            βk,n,bIK ⪰ − �̺k
         | 
| 2259 | 
            +
            N
         | 
| 2260 | 
            +
            �
         | 
| 2261 | 
            +
            n=1
         | 
| 2262 | 
            +
            Ξk,n − �ηk
         | 
| 2263 | 
            +
            N
         | 
| 2264 | 
            +
            �
         | 
| 2265 | 
            +
            n=1
         | 
| 2266 | 
            +
            N
         | 
| 2267 | 
            +
            �
         | 
| 2268 | 
            +
            n′=1
         | 
| 2269 | 
            +
            Ξk,nsE,nsH
         | 
| 2270 | 
            +
            E,n′Ξk,n′,
         | 
| 2271 | 
            +
            (69)
         | 
| 2272 | 
            +
            where
         | 
| 2273 | 
            +
            �̺k = τ
         | 
| 2274 | 
            +
            ρ
         | 
| 2275 | 
            +
            �b exp�c exp
         | 
| 2276 | 
            +
            �
         | 
| 2277 | 
            +
            �alog2pE,k
         | 
| 2278 | 
            +
            �
         | 
| 2279 | 
            +
            p
         | 
| 2280 | 
            +
            �b−1
         | 
| 2281 | 
            +
            E,k ,
         | 
| 2282 | 
            +
            �ηk =τ
         | 
| 2283 | 
            +
            ρexp�c exp
         | 
| 2284 | 
            +
            �
         | 
| 2285 | 
            +
            �alog2pE,k
         | 
| 2286 | 
            +
            �
         | 
| 2287 | 
            +
            p
         | 
| 2288 | 
            +
            �b−2
         | 
| 2289 | 
            +
            E,k
         | 
| 2290 | 
            +
            �
         | 
| 2291 | 
            +
            log pE,k
         | 
| 2292 | 
            +
            �
         | 
| 2293 | 
            +
            4�a�b − 2�a
         | 
| 2294 | 
            +
            �
         | 
| 2295 | 
            +
            + 2�a
         | 
| 2296 | 
            +
            �
         | 
| 2297 | 
            +
            .
         | 
| 2298 | 
            +
            Thus from (3), we can write
         | 
| 2299 | 
            +
            ∥sE,n∥2
         | 
| 2300 | 
            +
            2 ≤ 2ρT
         | 
| 2301 | 
            +
            τ
         | 
| 2302 | 
            +
            K
         | 
| 2303 | 
            +
            �
         | 
| 2304 | 
            +
            k=1
         | 
| 2305 | 
            +
            prf
         | 
| 2306 | 
            +
            k,n.
         | 
| 2307 | 
            +
            (70)
         | 
| 2308 | 
            +
            Finally, using (16), (69), (70) and knowing that sH
         | 
| 2309 | 
            +
            E,nΞk,nsE,n ≤ ∥sE,n∥2
         | 
| 2310 | 
            +
            2λmax (Ξk,n), we can select
         | 
| 2311 | 
            +
            βk,n,b > βt
         | 
| 2312 | 
            +
            k,n,b where
         | 
| 2313 | 
            +
            βt
         | 
| 2314 | 
            +
            k,n,b = − τ
         | 
| 2315 | 
            +
            ρexp�c exp
         | 
| 2316 | 
            +
            �
         | 
| 2317 | 
            +
            2�alog2T
         | 
| 2318 | 
            +
            N
         | 
| 2319 | 
            +
            �
         | 
| 2320 | 
            +
            n=1
         | 
| 2321 | 
            +
            λmax (Ξk,n)
         | 
| 2322 | 
            +
            K
         | 
| 2323 | 
            +
            �
         | 
| 2324 | 
            +
            k=1
         | 
| 2325 | 
            +
            prf
         | 
| 2326 | 
            +
            k,n
         | 
| 2327 | 
            +
            �
         | 
| 2328 | 
            +
            �f
         | 
| 2329 | 
            +
            �b−2
         | 
| 2330 | 
            +
            k
         | 
| 2331 | 
            +
            � ��
         | 
| 2332 | 
            +
            4�a�b − 2�a
         | 
| 2333 | 
            +
            �
         | 
| 2334 | 
            +
            log �fk + 2�a
         | 
| 2335 | 
            +
            �
         | 
| 2336 | 
            +
            ×
         | 
| 2337 | 
            +
            N
         | 
| 2338 | 
            +
            �
         | 
| 2339 | 
            +
            n=1
         | 
| 2340 | 
            +
            N
         | 
| 2341 | 
            +
            �
         | 
| 2342 | 
            +
            n′=1
         | 
| 2343 | 
            +
            λmax (Ξk,nΞk,n′)
         | 
| 2344 | 
            +
            K
         | 
| 2345 | 
            +
            �
         | 
| 2346 | 
            +
            k=1
         | 
| 2347 | 
            +
            �
         | 
| 2348 | 
            +
            prf
         | 
| 2349 | 
            +
            k,nprf
         | 
| 2350 | 
            +
            k,n′ + �b �fk
         | 
| 2351 | 
            +
            N
         | 
| 2352 | 
            +
            �
         | 
| 2353 | 
            +
            n=1
         | 
| 2354 | 
            +
            λmax (Ξk,n)
         | 
| 2355 | 
            +
            �
         | 
| 2356 | 
            +
            ,
         | 
| 2357 | 
            +
            with �fk = exp
         | 
| 2358 | 
            +
            �
         | 
| 2359 | 
            +
            −�b−
         | 
| 2360 | 
            +
            �
         | 
| 2361 | 
            +
            �b2−4�a log
         | 
| 2362 | 
            +
            ρEmin,k
         | 
| 2363 | 
            +
            τexp�c
         | 
| 2364 | 
            +
            2�a
         | 
| 2365 | 
            +
            �
         | 
| 2366 | 
            +
            . We can take similar steps for selecting βt
         | 
| 2367 | 
            +
            k,n,a.
         | 
| 2368 | 
            +
            January 3, 2023
         | 
| 2369 | 
            +
            DRAFT
         | 
| 2370 | 
            +
             | 
| 2371 | 
            +
            25
         | 
| 2372 | 
            +
            APPENDIX D
         | 
| 2373 | 
            +
            PROOF OF LEMMA 2
         | 
| 2374 | 
            +
            The ID part of the relay power constraint in (20) is uH
         | 
| 2375 | 
            +
            I,n �AR
         | 
| 2376 | 
            +
            I,nuI,n. Only (iMIRS + i+ 1)th, 0 ≤
         | 
| 2377 | 
            +
            i ≤ MIRS − 1 entries of uI,n = vec(Diag(θI)) are non-zero for the IRS system. Thus, we can
         | 
| 2378 | 
            +
            rewrite uH
         | 
| 2379 | 
            +
            I,n �AR
         | 
| 2380 | 
            +
            I,nuI,n for IRS system as θH
         | 
| 2381 | 
            +
            I �AIRS
         | 
| 2382 | 
            +
            I,n θI, where �AIRS
         | 
| 2383 | 
            +
            I,n contains only the (kMIRS + k +
         | 
| 2384 | 
            +
            1, lMIRS +l+1)th, 0 ≤ k, l ≤ MIRS −1 entries of �AI,n which is the same as �AR
         | 
| 2385 | 
            +
            I,n with replacing
         | 
| 2386 | 
            +
            MR by MIRS. Therefore, from (21) and by using some matrix manipulations, we obtain
         | 
| 2387 | 
            +
            �AIRS
         | 
| 2388 | 
            +
            I,n =
         | 
| 2389 | 
            +
            �
         | 
| 2390 | 
            +
            HnQI,nHH
         | 
| 2391 | 
            +
            n
         | 
| 2392 | 
            +
            �T ⊙ IMIRS + σ2
         | 
| 2393 | 
            +
            nIMIRS.
         | 
| 2394 | 
            +
            (71)
         | 
| 2395 | 
            +
            Other expressions in (44)-(48) are similarly obtained.
         | 
| 2396 | 
            +
            REFERENCES
         | 
| 2397 | 
            +
            [1] C. K. Ho and R. Zhang, “Optimal energy allocation for wireless communications with energy harvesting constraints,”
         | 
| 2398 | 
            +
            IEEE Transactions on Signal Processing, vol. 60, no. 9, pp. 4808–4818, Sept. 2012.
         | 
| 2399 | 
            +
            [2] T. D. P. Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas, and J. Li, “Simultaneous wireless information and power
         | 
| 2400 | 
            +
            transfer (SWIPT): Recent advances and future challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp.
         | 
| 2401 | 
            +
            264–302, Firstquarter 2017.
         | 
| 2402 | 
            +
            [3] L. Liu, R. Zhang, and K.-C. Chua, “Wireless information transfer with opportunistic energy harvesting,” IEEE Transactions
         | 
| 2403 | 
            +
            on Wireless Communications, vol. 12, no. 1, pp. 288–300, January 2012.
         | 
| 2404 | 
            +
            [4] J. Rostampoor, S. M. Razavizadeh, and I. Lee, “Energy efficient precoding design for SWIPT in MIMO two-way relay
         | 
| 2405 | 
            +
            networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 7888–7896, Sept. 2017.
         | 
| 2406 | 
            +
            [5] C.-T. Lin, R. Y. Chang, and F.-S. Tseng, “Source and relay precoding for full-duplex MIMO relaying with a SWIPT-enabled
         | 
| 2407 | 
            +
            destination,” IEEE Communications Letters, vol. 22, no. 8, pp. 1700–1703, Aug. 2018.
         | 
| 2408 | 
            +
            [6] Y. Chen, Z. Wen, S. Wang, J. Sun, and M. Li, “Joint relay beamforming and source receiving in MIMO two-way AF relay
         | 
| 2409 | 
            +
            network with energy harvesting,” in IEEE Vehicular Technology Conference (VTC Spring), May 2015, pp. 1–5.
         | 
| 2410 | 
            +
            [7] M. D. Renzo, M. Debbah, D.-T. Phan-Huy, A. Zappone, M.-S. Alouini, C. Yuen, V. Sciancalepore, G. C. Alexandropoulos,
         | 
| 2411 | 
            +
            J. Hoydis, H. Gacanin et al., “Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose
         | 
| 2412 | 
            +
            time has come,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, pp. 1–20, 2019.
         | 
| 2413 | 
            +
            [8] Q. Wu and R. Zhang, “Weighted sum power maximization for intelligent reflecting surface aided SWIPT,” IEEE Wireless
         | 
| 2414 | 
            +
            Communications Letters, vol. 9, no. 5, pp. 586–590, 2019.
         | 
| 2415 | 
            +
            [9] A. Khalili, S. Zargari, Q. Wu, D. W. K. Ng, and R. Zhang, “Multi-objective resource allocation for IRS-aided SWIPT,”
         | 
| 2416 | 
            +
            IEEE Wireless Communications Letters, vol. 10, no. 6, pp. 1324–1328, 2021.
         | 
| 2417 | 
            +
            [10] Q. Wu and R. Zhang, “Joint active and passive beamforming optimization for intelligent reflecting surface assisted SWIPT
         | 
| 2418 | 
            +
            under QoS constraints,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 8, pp. 1735–1748, 2020.
         | 
| 2419 | 
            +
            [11] C. Pan, H. Ren, K. Wang, M. Elkashlan, A. Nallanathan, J. Wang, and L. Hanzo, “Intelligent reflecting surface aided
         | 
| 2420 | 
            +
            MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Journal on Selected Areas in
         | 
| 2421 | 
            +
            Communications, vol. 38, no. 8, pp. 1719–1734, 2020.
         | 
| 2422 | 
            +
            January 3, 2023
         | 
| 2423 | 
            +
            DRAFT
         | 
| 2424 | 
            +
             | 
| 2425 | 
            +
            26
         | 
| 2426 | 
            +
            [12] A. Boaventura, A. Collado, N. B. Carvalho, and A. Georgiadis, “Optimum behavior: Wireless power transmission system
         | 
| 2427 | 
            +
            design through behavioral models and efficient synthesis techniques,” IEEE Microwave Magazine, vol. 14, no. 2, pp. 26–35,
         | 
| 2428 | 
            +
            March-April 2013.
         | 
| 2429 | 
            +
            [13] B. Clerckx, E. Bayguzina, D. Yates, and P. D. Mitcheson, “Waveform optimization for wireless power transfer with
         | 
| 2430 | 
            +
            nonlinear energy harvester modeling,” in 2015 International Symposium on Wireless Communication Systems (ISWCS),
         | 
| 2431 | 
            +
            Aug. 2015, pp. 276–280.
         | 
| 2432 | 
            +
            [14] M. R. V. Moghadam, Y. Zeng, and R. Zhang, “Waveform optimization for radio-frequency wireless power transfer,” in
         | 
| 2433 | 
            +
            IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2017, pp. 1–6.
         | 
| 2434 | 
            +
            [15] B. Clerckx and E. Bayguzina, “Low-complexity adaptive multisine waveform design for wireless power transfer,” IEEE
         | 
| 2435 | 
            +
            Antennas and Wireless Propagation Letters, vol. 16, pp. 2207–2210, May 2017.
         | 
| 2436 | 
            +
            [16] Y. Huang and B. Clerckx, “Waveform design for wireless power transfer with limited feedback,” IEEE Transactions on
         | 
| 2437 | 
            +
            Wireless Communications, vol. 17, no. 1, pp. 415–429, Jan. 2017.
         | 
| 2438 | 
            +
            [17] Y. Zhao, B. Clerckx, and Z. Feng, “IRS-aided SWIPT: Joint waveform, active and passive beamforming design under
         | 
| 2439 | 
            +
            nonlinear harvester model,” IEEE Transactions on Communications, vol. 70, no. 2, pp. 1345–1359, 2021.
         | 
| 2440 | 
            +
            [18] Y. Huang and B. Clerckx, “Large-scale multiantenna multisine wireless power transfer,” IEEE Transactions on Signal
         | 
| 2441 | 
            +
            Processing, vol. 65, no. 21, pp. 5812–5827, Nov. 2017.
         | 
| 2442 | 
            +
            [19] B. Clerckx, Z. B. Zawawi, and K. Huang, “Wirelessly powered backscatter communications: Waveform design and SNR-
         | 
| 2443 | 
            +
            energy tradeoff,” IEEE Communications Letters, vol. 21, no. 10, pp. 2234–2237, Oct. 2017.
         | 
| 2444 | 
            +
            [20] Z. B. Zawawi, Y. Huang, and B. Clerckx, “Multiuser wirelessly powered backscatter communications: Nonlinearity,
         | 
| 2445 | 
            +
            waveform design, and SINR-energy tradeoff,” IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 241–253,
         | 
| 2446 | 
            +
            Jan. 2018.
         | 
| 2447 | 
            +
            [21] B. Clerckx, “Wireless information and power transfer: Nonlinearity, waveform design, and rate-energy tradeoff,” IEEE
         | 
| 2448 | 
            +
            Transactions on Signal Processing, vol. 66, no. 4, pp. 847–862, Feb. 2017.
         | 
| 2449 | 
            +
            [22] H. Lee, K. Lee, H. Kim, and I. Lee, “Joint transceiver optimization for MISO SWIPT systems with time switching,” IEEE
         | 
| 2450 | 
            +
            Transactions on Wireless Communications, vol. 17, no. 5, pp. 3298–3312, May 2018.
         | 
| 2451 | 
            +
            [23] Z. Zhang, L. Dai, X. Chen, C. Liu, F. Yang, R. Schober, and H. V. Poor, “Active RIS vs. passive RIS: Which will prevail
         | 
| 2452 | 
            +
            in 6G?” arXiv preprint arXiv:2103.15154, 2021.
         | 
| 2453 | 
            +
            [24] W. Shin, B. Lee, B. Shim, and J. Lee, “A MIMO relay with delayed feedback can improve DoF in k-user MISO interference
         | 
| 2454 | 
            +
            channel with no CSIT,” IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 10 188–10 192, 2016.
         | 
| 2455 | 
            +
            [25] T. Jiang and W. Yu, “Interference nulling using reconfigurable intelligent surface,” IEEE Journal on Selected Areas in
         | 
| 2456 | 
            +
            Communications, 2022.
         | 
| 2457 | 
            +
            [26] A. H. A. Bafghi, V. Jamali, M. Nasiri-Kenari, and R. Schober, “Degrees of freedom of the k-user interference channel in
         | 
| 2458 | 
            +
            the presence of intelligent reflecting surfaces,” arXiv preprint arXiv:2012.13787, 2020.
         | 
| 2459 | 
            +
            [27] Z. Cheng, N. Devroye, and T. Liu, “The degrees of freedom of full-duplex bidirectional interference networks with and
         | 
| 2460 | 
            +
            without a MIMO relay,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2912–2924, 2015.
         | 
| 2461 | 
            +
            [28] Z. Wang, L. Liu, and S. Cui, “Channel estimation for intelligent reflecting surface assisted multiuser communications:
         | 
| 2462 | 
            +
            Framework, algorithms, and analysis,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6607–6620,
         | 
| 2463 | 
            +
            2020.
         | 
| 2464 | 
            +
            [29] D. Kudathanthirige and G. A. A. Baduge, “Massive MIMO configurations for multi-cell multi-user relay networks,” IEEE
         | 
| 2465 | 
            +
            Transactions on Wireless Communications, vol. 17, no. 3, pp. 1849–1868, 2017.
         | 
| 2466 | 
            +
            [30] R. Long, Y.-C. Liang, Y. Pei, and E. G. Larsson, “Active reconfigurable intelligent surface-aided wireless communications,”
         | 
| 2467 | 
            +
            IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4962–4975, 2021.
         | 
| 2468 | 
            +
            January 3, 2023
         | 
| 2469 | 
            +
            DRAFT
         | 
| 2470 | 
            +
             | 
| 2471 | 
            +
            27
         | 
| 2472 | 
            +
            [31] J.-F. Bousquet, S. Magierowski, and G. G. Messier, “A 4-GHz active scatterer in 130-nm CMOS for phase sweep amplify-
         | 
| 2473 | 
            +
            and-forward,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 59, no. 3, pp. 529–540, 2011.
         | 
| 2474 | 
            +
            [32] B. Clerckx and J. Kim, “On the beneficial roles of fading and transmit diversity in wireless power transfer with nonlinear
         | 
| 2475 | 
            +
            energy harvesting,” IEEE Transactions on Wireless Communications, vol. 17, no. 11, pp. 7731–7743, Nov. 2018.
         | 
| 2476 | 
            +
            [33] J. Song, P. Babu, and D. P. Palomar, “Sequence design to minimize the weighted integrated and peak sidelobe levels,”
         | 
| 2477 | 
            +
            IEEE Transactions on Signal Processing, vol. 64, no. 8, pp. 2051–2064, 2015.
         | 
| 2478 | 
            +
            [34] O. Rezaei, M. M. Naghsh, Z. Rezaei, and R. Zhang, “Throughput optimization for wireless powered interference channels,”
         | 
| 2479 | 
            +
            IEEE Transactions on Wireless Communications, vol. 18, no. 5, pp. 2464–2476, May 2019.
         | 
| 2480 | 
            +
            [35] M. M. Naghsh, M. Masjedi, A. Adibi, and P. Stoica, “Max–min fairness design for MIMO interference channels: A
         | 
| 2481 | 
            +
            minorization–maximization approach,” IEEE Transactions on Signal Processing, vol. 67, no. 18, pp. 4707–4719, Sept.
         | 
| 2482 | 
            +
            2019.
         | 
| 2483 | 
            +
            [36] A. Ben-Tal and A. Nemirovski, Lectures on modern convex optimization: analysis, algorithms, and engineering applications.
         | 
| 2484 | 
            +
            SIAM, 2001.
         | 
| 2485 | 
            +
            [37] A. Czumaj, “Very fast approximation of the matrix chain product problem,” Journal of Algorithms, vol. 21, no. 1, pp.
         | 
| 2486 | 
            +
            71–79, 1996.
         | 
| 2487 | 
            +
            [38] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.0 beta, sept. 2012,” Available
         | 
| 2488 | 
            +
            on-line at http://cvxr. com/cvx.
         | 
| 2489 | 
            +
            [39] M. M. Naghsh, M. Soltanalian, P. Stoica, M. Masjedi, and B. Ottersten, “Efficient sum-rate maximization for medium-scale
         | 
| 2490 | 
            +
            MIMO AF-relay networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 6400–6411, Sept. 2016.
         | 
| 2491 | 
            +
            January 3, 2023
         | 
| 2492 | 
            +
            DRAFT
         | 
| 2493 | 
            +
             | 
    	
        X9AyT4oBgHgl3EQfWfd0/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        X9E4T4oBgHgl3EQfNwwL/content/tmp_files/2301.04958v1.pdf.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        X9E4T4oBgHgl3EQfNwwL/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        YdE2T4oBgHgl3EQfEQZV/content/tmp_files/2301.03633v1.pdf.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        YdE2T4oBgHgl3EQfEQZV/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/2301.11680v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1407 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            arXiv:2301.11680v1  [cs.IT]  27 Jan 2023
         | 
| 2 | 
            +
            Codes for Correcting Asymmetric Adjacent
         | 
| 3 | 
            +
            Transpositions and Deletions
         | 
| 4 | 
            +
            Shuche Wang∗, Van Khu Vu§, and Vincent Y. F. Tan†‡∗
         | 
| 5 | 
            +
            ∗ Institute of Operations Research and Analytics, National University of Singapore, Singapore
         | 
| 6 | 
            +
            † Department of Mathematics, National University of Singapore, Singapore
         | 
| 7 | 
            +
            ‡ Department of Electrical and Computer Engineering, National University of Singapore, Singapore
         | 
| 8 | 
            +
            § Department of Industrial Systems Engineering and Management, National University of Singapore, Singapore
         | 
| 9 | 
            +
            Emails: [email protected], [email protected], [email protected]
         | 
| 10 | 
            +
            Abstract
         | 
| 11 | 
            +
            Owing to the vast applications in DNA-based data storage, Gabrys, Yaakobi, and Milenkovic recently proposed to study codes
         | 
| 12 | 
            +
            in the Damerau–Levenshtein metric, where both deletion and adjacent transposition errors occur. In particular, they designed a
         | 
| 13 | 
            +
            code correcting a single deletion and s adjacent transpositions with at most (1 + 2s) log n bits of redundancy. In this work, we
         | 
| 14 | 
            +
            consider a new setting where both asymmetric adjacent transpositions (also known as right-shifts or left-shifts) and deletions occur.
         | 
| 15 | 
            +
            We present several constructions of the codes correcting these errors in various cases. In particular, we design a code correcting
         | 
| 16 | 
            +
            a single deletion, s+ right-shift, and s− left-shift errors with at most (1 + s) log(n + s + 1) + 1 bits of redundancy where
         | 
| 17 | 
            +
            s = s+ + s−. In addition, we investigate codes correcting t 0-deletions and s adjacent transpositions with both unique decoding
         | 
| 18 | 
            +
            and list-decoding algorithms. Our main contribution here is a construction of a list-decodable code with list-size O(nmin{s+1,t})
         | 
| 19 | 
            +
            and has at most (max{t, s + 1}) log n + O(1) bits of redundancy. Finally, we provide both non-systematic and systematic codes
         | 
| 20 | 
            +
            for correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
         | 
| 21 | 
            +
            I. INTRODUCTION
         | 
| 22 | 
            +
            The Levenshtein (edit) distance of two different strings is the smallest number of operations (including deletions, insertions,
         | 
| 23 | 
            +
            and substitutions) required to transform one string into the other. This metric has a long history and has attracted a lot of research
         | 
| 24 | 
            +
            in computer science in the past as well as recently [2]–[4]. Codes in the Levenshtein metric have been investigated extensively
         | 
| 25 | 
            +
            recently due to theoretical interests and their numerous applications, including racetrack memory [5]–[7] and DNA-based data
         | 
| 26 | 
            +
            storage [8]–[10].
         | 
| 27 | 
            +
            This paper was presented in part at the 2022 IEEE Information Theory Workshop (ITW) [1].
         | 
| 28 | 
            +
             | 
| 29 | 
            +
            1
         | 
| 30 | 
            +
            In some channels, such as DNA-based data storage ones, we observe that, besides deletions, insertions, and substitutions,
         | 
| 31 | 
            +
            there are also adjacent transpositions. Hence, there exists some recent work concerning the Damerau–Levenshtein distance
         | 
| 32 | 
            +
            which is motivated by applications to DNA-based data storage. The distance is a generalization of the well-known Levenshtein
         | 
| 33 | 
            +
            distance taking into account adjacent transpositions. More precisely, the Damerau–Levenshtein metric is the smallest number
         | 
| 34 | 
            +
            of operations (including deletions, insertions, substitutions, and adjacent transpositions) required to transform one string into
         | 
| 35 | 
            +
            another. We note that it is possible to compute the exact Damerau–Levenshtein distance of two strings in polynomial time [11]
         | 
| 36 | 
            +
            but it is not known if we can compute the distance in linear time. Recently, Gabrys, Yaaboki, and Milenkovic [12] proposed
         | 
| 37 | 
            +
            to study codes in the Damerau–Levenshtein distance. They provided several constructions of codes correcting both deletions
         | 
| 38 | 
            +
            and adjacent transpositions. However, these codes are not optimal in general. For example, to correct a single deletion and
         | 
| 39 | 
            +
            at most s adjacent transpositions, the authors require (1 + 2s) log n bits of redundancy. Designing an optimal code correcting
         | 
| 40 | 
            +
            both deletions and multiple adjacent transpositions has turned out to be a formidable challenge for coding theorists in recent
         | 
| 41 | 
            +
            times.
         | 
| 42 | 
            +
            The problem of constructing codes for correcting synchronization errors, including deletions and insertions, was first
         | 
| 43 | 
            +
            investigated by Levenshtein [13] and Ullman [14], [15]. Sticky deletions/insertions and duplication deletions can be considered
         | 
| 44 | 
            +
            as asymmetric deletions/insertions via the Gray mapping [16]. Owing to various applications, such as in flash memories [17],
         | 
| 45 | 
            +
            [18], racetrack memories [6], and DNA data storage systems [19], [20], codes for correcting asymmetric deletions/insertions
         | 
| 46 | 
            +
            have garnered significant attention recently. Tallini et al. [16], [21]–[24] provided a series of theories and code designs for
         | 
| 47 | 
            +
            correcting these kinds of errors. Especially, Mahdavifar and Vardy [18] provided some efficient encoding/decoding algorithms
         | 
| 48 | 
            +
            for an optimal code correcting sticky-insertion and thus for an optimal code correcting 0-deletion.
         | 
| 49 | 
            +
            Codes correcting adjacent transposition errors have been investigated for a long time as codes for shift errors [25]–[27].
         | 
| 50 | 
            +
            Codes correcting asymmetric shift errors have also been studied recently [28]. In this work, we are interested in codes correcting
         | 
| 51 | 
            +
            a combination of both asymmetric adjacent transposition errors and deletion errors. We aim to obtain some optimal codes with
         | 
| 52 | 
            +
            simple efficient encoding/decoding algorithms.
         | 
| 53 | 
            +
            We note that codes correcting substitutions, deletions, and their combinations have attracted a lot of research recently [29],
         | 
| 54 | 
            +
            [30]. However, there are only a few code constructions that correct a combination of adjacent transposition and other kinds of
         | 
| 55 | 
            +
            errors. Klove [31] proposed a class of perfect constant-weight codes capable of correcting a single deletion, a single insertion or
         | 
| 56 | 
            +
            an adjacent transposition. Gabrys, Yaakobi, and Milenkovic [12] presented several codes correcting a combination of deletions
         | 
| 57 | 
            +
            and adjacent transpositions. If there is a single adjacent transposition or a single deletion, there exist codes correcting the error
         | 
| 58 | 
            +
            with at most log n + O(log log n) bits of redundancy [32]. The best-known codes correcting a single deletion and at most s
         | 
| 59 | 
            +
             | 
| 60 | 
            +
            2
         | 
| 61 | 
            +
            adjacent transpositions require (1 + 2s) log n bits of redundancy [12]. In this work, we design several new families of codes
         | 
| 62 | 
            +
            in numerous cases. We provide our main contributions as follows.
         | 
| 63 | 
            +
            Our first contribution in this work is Construction 1, which presents a construction of an optimal code correcting a single
         | 
| 64 | 
            +
            adjacent transposition or a single 0-deletion. Analyzing the size of our code, we obtain the following result.
         | 
| 65 | 
            +
            Theorem 1. There is a code correcting a single 0-deletion or a single adjacent transposition with at most log n + 2 bits of
         | 
| 66 | 
            +
            redundancy.
         | 
| 67 | 
            +
            Next, we construct a code correcting t 0-deletions and s adjacent transpositions with at most (t + 2s) log n + o((t +
         | 
| 68 | 
            +
            2s) log n) bits of redundancy. The constructed code is the best known that corrects multiple 0-deletions and multiple adjacent
         | 
| 69 | 
            +
            transpositions. See Theorem 7 for the detail.
         | 
| 70 | 
            +
            Theorem2. There is a code correcting t 0-deletions and s adjacent transpositions with at most (t+2s) log n+o((t+2s) log n)
         | 
| 71 | 
            +
            bits of redundancy.
         | 
| 72 | 
            +
            Further, we construct an optimal code for correcting a single deletion, s+ right-shift and s− left-shift errors. Throughout
         | 
| 73 | 
            +
            this paper, we denote the adjacent transposition as 01 → 10 or 10 → 01, right-shift of 0 as 01 → 10 and left-shift of 0 as
         | 
| 74 | 
            +
            10 → 01. See Construction 2 and Theorem 8 for the detail.
         | 
| 75 | 
            +
            Theorem 3. There is a code correcting a single deletion, s+ right-shift and s− left-shift errors with at most (1 + s) log(n +
         | 
| 76 | 
            +
            s + 1) + 1 bits of redundancy where s = s+ + s−.
         | 
| 77 | 
            +
            Compare the results in [12], where the code for correcting a single deletion and s adjacent transpositions needs at most
         | 
| 78 | 
            +
            (1 + 2s) log(n + 2s + 1) redundancy. If we know the direction of these s adjacent transpositions containing s+ right-shifts
         | 
| 79 | 
            +
            of 0 and s− left-shifts of 0, the redundancy of the code can be further reduced to at most (1 + s) log(n + s + 1) + 1 where
         | 
| 80 | 
            +
            s = s+ + s−.
         | 
| 81 | 
            +
            We also investigate list-decodable codes of small list-size and construct a list-decodable code for at most t 0-deletions and
         | 
| 82 | 
            +
            s adjacent transpositions. See the proof of Theorem 9 for the construction. Our results are the first known list-decodable codes
         | 
| 83 | 
            +
            for the asymmetric Damerau–Levenshtein distance.
         | 
| 84 | 
            +
            Theorem 4. There is a list-decodable code that can correct t 0-deletions and s adjacent transpositions with list size
         | 
| 85 | 
            +
            O(nmin(t,s+1)) and has max(t, s + 1) log n + O(1) bits of redundancy.
         | 
| 86 | 
            +
            Finally, we construct both non-systematic and systematic codes for correcting t blocks of 0-deletions with ℓ-limited-magnitude
         | 
| 87 | 
            +
            and s adjacent transpositions. See the proof of Theorem 10 for the construction.
         | 
| 88 | 
            +
             | 
| 89 | 
            +
            3
         | 
| 90 | 
            +
            Theorem5. There is a code capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions
         | 
| 91 | 
            +
            with at most ⌈2(t + 2s)(1 − 1/p)⌉ log(n + 1) + O(1) bits of redundancy, where p is the smallest prime larger than tℓ + 2.
         | 
| 92 | 
            +
            The rest of this paper is organized as follows. Section II provides the notation and preliminaries. Section III presents three
         | 
| 93 | 
            +
            uniquely-decodable codes for correcting asymmetric deletions and adjacent transpositions. Section IV proposes list-decodable
         | 
| 94 | 
            +
            codes for correcting asymmetric deletions and adjacent transpositions with low redundancy. In Section V, we construct codes
         | 
| 95 | 
            +
            both non-systematic and systematic codes are capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s
         | 
| 96 | 
            +
            adjacent transpositions. Finally, Section VI concludes this paper.
         | 
| 97 | 
            +
            II. NOTATION AND PRELIMINARIES
         | 
| 98 | 
            +
            We now describe the notations used throughout this paper. Σq denotes the finite alphabet of size q and Σn
         | 
| 99 | 
            +
            q represents the set
         | 
| 100 | 
            +
            of all sequences of length n over Σq. Without loss of generality, we assume Σq = {0, 1, . . ., q − 1}. For two integers i < j,
         | 
| 101 | 
            +
            let [i, j] denote the set {i, i + 1, i + 2, . . . , j}. The size of a binary code C ⊆ Σn
         | 
| 102 | 
            +
            2 is denoted |C| and its redundancy is defined
         | 
| 103 | 
            +
            as n − log |C|, where all logarithms without a base in this paper are to the base 2.
         | 
| 104 | 
            +
            We write sequences with bold letters, such as x and their elements with plain letters, e.g., x = x1 · · · xn for x ∈ Σn
         | 
| 105 | 
            +
            q . The
         | 
| 106 | 
            +
            length of the sequence x is denoted |x|. The weight wt(x) of a sequence x represents the number of non-zero symbols in it.
         | 
| 107 | 
            +
            A run is a maximal substring consisting of identical symbols and nr(x) denotes the number of runs of the sequence x. For
         | 
| 108 | 
            +
            functions, if the output is a sequence, we also write them with bold letters, such as φ(x). The ith position in φ(x) is denoted
         | 
| 109 | 
            +
            φ(x)i. In addition, for a sequence u ∈ Σn
         | 
| 110 | 
            +
            q , denote (u mod a) = (u1 mod a, u2 mod a, . . . , un mod a), where a < q.
         | 
| 111 | 
            +
            For a binary sequence x ∈ Σn
         | 
| 112 | 
            +
            2, we can uniquely write it as x = 0u110u210u3 . . . 10uw+1, where w = wt(x).
         | 
| 113 | 
            +
            Definition 1. Define function φ
         | 
| 114 | 
            +
            :
         | 
| 115 | 
            +
            Σn
         | 
| 116 | 
            +
            2
         | 
| 117 | 
            +
            →
         | 
| 118 | 
            +
            Σw+1 and φ(x)
         | 
| 119 | 
            +
            def=
         | 
| 120 | 
            +
            (u1, u2, u3, . . . , uw+1)
         | 
| 121 | 
            +
            ∈
         | 
| 122 | 
            +
            Σw+1, where x
         | 
| 123 | 
            +
            =
         | 
| 124 | 
            +
            0u110u210u3 . . . 10uw+1 with w = wt(x).
         | 
| 125 | 
            +
            Example 1. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0). Then, φ(x) = (1, 0, 0, 1, 1, 2).
         | 
| 126 | 
            +
            Definition 2. Define function ψ : Σn
         | 
| 127 | 
            +
            2 → Σn
         | 
| 128 | 
            +
            2 such that ψ(x) = (x1, x1 + x2, . . . , x1 + x2 + · · · + xn).
         | 
| 129 | 
            +
            Definition 3. The Lee weight of an element xi ∈ Σq is defined by
         | 
| 130 | 
            +
            wL(xi) =
         | 
| 131 | 
            +
            
         | 
| 132 | 
            +
            
         | 
| 133 | 
            +
            
         | 
| 134 | 
            +
            
         | 
| 135 | 
            +
            
         | 
| 136 | 
            +
            
         | 
| 137 | 
            +
            
         | 
| 138 | 
            +
            
         | 
| 139 | 
            +
            
         | 
| 140 | 
            +
            xi,
         | 
| 141 | 
            +
            if 0 ≤ xi ≤ q/2
         | 
| 142 | 
            +
            q − xi,
         | 
| 143 | 
            +
            otherwise
         | 
| 144 | 
            +
            For a sequence x ∈ Σn
         | 
| 145 | 
            +
            q , the Lee weight of x is
         | 
| 146 | 
            +
            wL(x) =
         | 
| 147 | 
            +
            n
         | 
| 148 | 
            +
            �
         | 
| 149 | 
            +
            i=1
         | 
| 150 | 
            +
            wL(xi).
         | 
| 151 | 
            +
             | 
| 152 | 
            +
            4
         | 
| 153 | 
            +
            Define the Lee distance of two sequences x, x′ ∈ Σn
         | 
| 154 | 
            +
            q as
         | 
| 155 | 
            +
            dL(x, x′) = wL(x − x′).
         | 
| 156 | 
            +
            Example 2. Suppose x ∈ Σ7
         | 
| 157 | 
            +
            6 = (1, 4, 0, 5, 2, 3, 4). Then, wL(x) = 1 + 2 + 0 + 1 + 2 + 3 + 2 = 11.
         | 
| 158 | 
            +
            Example 3. Suppose x ∈ Σ7
         | 
| 159 | 
            +
            6 = (1, 4, 0, 5, 2, 3, 4) and x′ ∈ Σ7
         | 
| 160 | 
            +
            6 = (0, 3, 0, 5, 3, 3, 3). Then, x − x′ = (1, 1, 0, 0, 5, 0, 1) and
         | 
| 161 | 
            +
            dL(x, x′) = wL(x − x′) = 4.
         | 
| 162 | 
            +
            For any x ∈ Σn
         | 
| 163 | 
            +
            2, denote Bt,s(x) as the error ball of x under t 0-deletions and s adjacent transpositions. The code Ct,s(n) is
         | 
| 164 | 
            +
            a unique-decodable code for correcting t 0-deletions and s adjacent transpositions, for which holds that Bt,s(c1)∩Bt,s(c2) = ∅
         | 
| 165 | 
            +
            for all c1, c2 ∈ Ct,s(n). The code CList
         | 
| 166 | 
            +
            t,s (n) is a list-decodable code for correcting t 0-deletions and s adjacent transpositions
         | 
| 167 | 
            +
            with list size L such that for any corrupted sequence x′ ∈ Σn−t
         | 
| 168 | 
            +
            2
         | 
| 169 | 
            +
            there exist at most L codewords in CList
         | 
| 170 | 
            +
            t,s (n) that can be
         | 
| 171 | 
            +
            obtained by t 0-deletions and s adjacent transpositions.
         | 
| 172 | 
            +
            Example 4. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0), the first and last 0 bits are deleted and two pairs of ((4th, 5th) and (7th,
         | 
| 173 | 
            +
            8th)) adjacent bits are transposed in x = (❆0, 1, 1, 1, 0, 1, 0, 1, 0, ❆0). Then, x′ = (1, 1, 0, 1, 1, 1, 0, 0) ∈ B2,2(x).
         | 
| 174 | 
            +
            Proposition 1. Once a 0-deletion occurs in x and we receive x′, there is an index i such that φ(x)i − 1 = φ(x′)i.
         | 
| 175 | 
            +
            Proposition 2. Suppose an adjacent transposition occurs in x at the ith 1, the corresponding changes in φ(x) can be shown
         | 
| 176 | 
            +
            as follows:
         | 
| 177 | 
            +
            1) 10 → 01: (φ(x)′
         | 
| 178 | 
            +
            i, φ(x)′
         | 
| 179 | 
            +
            i+1) = (φ(x)i + 1, φ(x)i+1 − 1).
         | 
| 180 | 
            +
            2) 01 → 10: (φ(x)′
         | 
| 181 | 
            +
            i, φ(x)′
         | 
| 182 | 
            +
            i+1) = (φ(x)i − 1, φ(x)i+1 + 1).
         | 
| 183 | 
            +
            Example 5. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0), φ(x) = (1, 0, 0, 1, 1, 2) and the adjacent transposition is occurred in
         | 
| 184 | 
            +
            the 4-th bit 1 and the following bit 0 in x. Then, x′ = (0, 1, 1, 1, 0, 0, 1, 1, 0, 0) and φ(x′) = (1, 0, 0, 2, 0, 2), where
         | 
| 185 | 
            +
            (φ(x′)4, φ(x′)5) = (φ(x)4 + 1, φ(x)5 − 1).
         | 
| 186 | 
            +
            The well-known Varshamov–Tenengol’ts (VT) code will be use of in this paper, and we will introduce the following lemma.
         | 
| 187 | 
            +
            For x ∈ Σn
         | 
| 188 | 
            +
            2, we define the syndrome of VT code as VT(x) = �n
         | 
| 189 | 
            +
            i=1 ixi.
         | 
| 190 | 
            +
            Lemma 1 (Varshamov-Tenengol’ts (VT) code [33]). For integers n and a ∈ [0, n],
         | 
| 191 | 
            +
            VTa(n) = {x ∈ Σn
         | 
| 192 | 
            +
            2 : VT(x) ≡ a mod (n + 1)}
         | 
| 193 | 
            +
            is capable of correcting a single deletion.
         | 
| 194 | 
            +
            Define Mt,s(n) as maximal size of binary codes for correcting t deletions and s adjacent transpositions.
         | 
| 195 | 
            +
             | 
| 196 | 
            +
            5
         | 
| 197 | 
            +
            Lemma 2 (cf. Levenstein [2]). For enough large n, Mt,s(n) ≤ (s + t)! 2n
         | 
| 198 | 
            +
            ns+t .
         | 
| 199 | 
            +
            Proof. t deletions and s adjacent transpositions in x can be considered as t deletions and s substitutions in ψ(x). An asymptotic
         | 
| 200 | 
            +
            bound for the size of any codes is capable of correcting up to t deletions, insertions and substitutions have been shown in [2],
         | 
| 201 | 
            +
            which is (t! · 2n)/nt. Since the function ψ is a one-to-one mapping function, an upper bound of binary codes for correcting t
         | 
| 202 | 
            +
            deletions and s adjacent transpositions can be derived.
         | 
| 203 | 
            +
            From Lemma 2, we can obtain a lower bound of the minimal redundancy of the code for correcting t 0-deletions and s
         | 
| 204 | 
            +
            adjacent transpositions.
         | 
| 205 | 
            +
            Corollary1. A lower bound of the minimal redundancy of binary codes for correcting t 0-deletions and s adjacent transpositions
         | 
| 206 | 
            +
            is (t + s) log n − O(1).1
         | 
| 207 | 
            +
            III. UNIQUELY-DECODABLE CODES FOR ASYMMETRIC DELETIONS AND ADJACENT TRANSPOSITIONS
         | 
| 208 | 
            +
            In this section, we will present three uniquely-decodable codes for correcting asymmetric deletions and adjacent transposi-
         | 
| 209 | 
            +
            tions, that is, once there are some errors, we can correct these errors to recover the original codeword uniquely.
         | 
| 210 | 
            +
            A. Codes for correcting a single 0-deletion or a single adjacent transposition
         | 
| 211 | 
            +
            In this subsection, we present the first construction of an optimal code correcting a single 0-deletion or a single adjacent
         | 
| 212 | 
            +
            transposition.
         | 
| 213 | 
            +
            Construction 1. The code C1(n, a; p) is defined as the set of all x ∈ Σn
         | 
| 214 | 
            +
            2 such that the syndrome
         | 
| 215 | 
            +
            S(x) =
         | 
| 216 | 
            +
            w+1
         | 
| 217 | 
            +
            �
         | 
| 218 | 
            +
            i=1
         | 
| 219 | 
            +
            i2φ(x)i ≡ a mod p
         | 
| 220 | 
            +
            where w = wt(x) and p is a prime such that p > 2n.
         | 
| 221 | 
            +
            Theorem 6. The code C1(n, a; p) in Construction 1 can correct a single 0-deletion or a single adjacent transposition.
         | 
| 222 | 
            +
            Proof. Let x = (x1, . . . , xn) ∈ Σn
         | 
| 223 | 
            +
            2 be the original vector and x′ be the received vector after a single 0-deletion or a single
         | 
| 224 | 
            +
            adjacent transposition.
         | 
| 225 | 
            +
            If x′ ∈ Σn−1
         | 
| 226 | 
            +
            2
         | 
| 227 | 
            +
            , that is the length of x′ is n−1, then there is a single 0 deletion. In this case, we compute the vector φ(x′) and
         | 
| 228 | 
            +
            a′ < p such that a′ = S(x′) mod p. We note that dL(φ(x), φ(x′)) = 1 and there is an index i such that φ(x)i − 1 = φ(x′)i.
         | 
| 229 | 
            +
            Hence, S(x) − S(x′) = i2. That is, a − a′ = i2 mod p. Since i2 − j2 ̸= 0 mod p for all i ̸= j, i, j < n < p/2, we can
         | 
| 230 | 
            +
            determine the unique index i such that a − a′ = i2 mod p. And thus, we locate the error and can correct it.
         | 
| 231 | 
            +
            1The difference between the lower bound of the redundancy for correcting general t deletions and t 0-deletions is only O(1). [17]
         | 
| 232 | 
            +
             | 
| 233 | 
            +
            6
         | 
| 234 | 
            +
            If x′ ∈ Σn
         | 
| 235 | 
            +
            2, that is the length of x′ is n, then there is no 0 deletion and at most a single adjacent transposition. Similar to
         | 
| 236 | 
            +
            the previous case, we also compute the vector φ(x′) and a′ < p such that a′ = S(x′) mod p. Once an adjacent transposition
         | 
| 237 | 
            +
            occurs, there are two types of errors: a symbol 0 moves to the left and a symbol 0 moves to the right. If a symbol 0 moves
         | 
| 238 | 
            +
            to the left, there exists 0 ≤ j ≤ n − 1 such that a − a′ = 2j + 1 mod p. Otherwise, if a symbol 0 moves to the right,
         | 
| 239 | 
            +
            there is 0 ≤ j ≤ n − 1 such that a − a′ = −2j − 1 mod p. Since p > 2n, for all i, j < n < p/2 and i ̸= j, these four
         | 
| 240 | 
            +
            values, {2i + 1, −2i − 1, 2j + 1, −2j − 1} are distinct. Hence, we can determine the type of error and the unique j such that
         | 
| 241 | 
            +
            a − a′ = 2j + 1 mod p or a − a′ = −2j − 1 mod p. And thus, we can correct the error.
         | 
| 242 | 
            +
            In conclusion, either a 0 deletion occurs or an adjacent transposition occurs, we always can correct the error and recover
         | 
| 243 | 
            +
            the original vector. The theorem is proven.
         | 
| 244 | 
            +
            From the well-known Bertrand–Chebyshev theorem, there exists a prime p such that 2n < p < 4n. Hence, by the pigeonhole
         | 
| 245 | 
            +
            principle, there exists a code C1(n, a; p) of size at least 2n/(4n). That is, it is possible to construct the code C1(n, a; p) at most
         | 
| 246 | 
            +
            log n + 2 redundancy. Therefore, we can conclude that we can correct a single 0-deletion or a single adjacent transposition
         | 
| 247 | 
            +
            with at most log n + 2 redundancy.
         | 
| 248 | 
            +
            B. Codes for correcting t 0-deletions and s adjacent transpositions
         | 
| 249 | 
            +
            In this subsection, we explore the general case in the asymmetric Damerau–Levenshtein distance scheme. We investigate a
         | 
| 250 | 
            +
            code correcting at most t 0-deletions and s adjacent transpositions, given constants t and s.
         | 
| 251 | 
            +
            We observe that the asymmetric Damerau–Levenshtein distance between two vectors x and y is closely related to Lee
         | 
| 252 | 
            +
            distance between φ(x) and φ(y). Indeed, once an adjacent transposition occurs in x, the Lee weight of x is changed by two
         | 
| 253 | 
            +
            based on Proposition 2 and once a 0-deletion occurs in x, the Lee weight of x is changed by one. Hence, if there are at most
         | 
| 254 | 
            +
            s adjacent transpositions and t 0-deletions, the Lee weight of x is changed by at most t + 2s. Now, we present a well-known
         | 
| 255 | 
            +
            BCH code in the Lee distance.
         | 
| 256 | 
            +
            Lemma 3. ( [18], [34]) The systematic BCH code CBCH(n, t + 1; p) : x ∈ Σm
         | 
| 257 | 
            +
            2 → E(x) ∈ Σn
         | 
| 258 | 
            +
            p with the lower bound of
         | 
| 259 | 
            +
            minimum Lee distance
         | 
| 260 | 
            +
            dL(CBCH(n, t + 1; p)) ≥
         | 
| 261 | 
            +
            
         | 
| 262 | 
            +
            
         | 
| 263 | 
            +
            
         | 
| 264 | 
            +
            
         | 
| 265 | 
            +
            
         | 
| 266 | 
            +
            
         | 
| 267 | 
            +
            
         | 
| 268 | 
            +
            
         | 
| 269 | 
            +
            
         | 
| 270 | 
            +
            2(t + 1),
         | 
| 271 | 
            +
            if t ≤ (p − 3)/2
         | 
| 272 | 
            +
            p,
         | 
| 273 | 
            +
            if (p − 1)/2 ≤ t ≤ p
         | 
| 274 | 
            +
            can correct errors up to t Lee weight with redundancy t log n + o(t log n), where p is a prime.
         | 
| 275 | 
            +
            Furthermore, Mahdavifar and Vardy [18] used the above code to construct a code C(n, r) of length n correcting r 0
         | 
| 276 | 
            +
            insertions with at most r log n + o(r log n) bits of redundancy. It is known that for any two words c1, c2 ∈ C(n, r), we
         | 
| 277 | 
            +
             | 
| 278 | 
            +
            7
         | 
| 279 | 
            +
            have dL(φ(c1), φ(c2)) ≥ 2(r + 1) by Lemma 3. Hence, we can use the code C(n, r) to correct t 0-deletions and s adjacent
         | 
| 280 | 
            +
            transpositions.
         | 
| 281 | 
            +
            Theorem 7. The code C(n, r) can correct at most t 0-deletions and s adjacent transpositions, given t + 2s = r.
         | 
| 282 | 
            +
            Proof. Let x = (x1, . . . , xn) ∈ Σn
         | 
| 283 | 
            +
            2 be the original vector and x′ ∈ Σn−t
         | 
| 284 | 
            +
            2
         | 
| 285 | 
            +
            be the received vector after t 0-deletions and s
         | 
| 286 | 
            +
            adjacent transpositions. Hence, we obtain the vector y′ = φ(x′). We consider two vectors φ(x) and φ(x′). We observe that
         | 
| 287 | 
            +
            once an adjacent transposition occurs in x, the Lee weight of x is changed by at most two based on Proposition 2 and once
         | 
| 288 | 
            +
            a 0-deletion occurs in x, the Lee weight of x is changed by one. Hence, if there are at most s adjacent transpositions and t
         | 
| 289 | 
            +
            0-deletions, the Lee weight of x is changed by at most t + 2s. That is, the Lee distance between two vectors φ(x) and φ(x′)
         | 
| 290 | 
            +
            is dL(φ(x), φ(x′)) ≤ t + 2s. Therefore, we set r = t + 2s and then the code C(n, r) can correct at most t 0-deletions and s
         | 
| 291 | 
            +
            adjacent transpositions with redundancy (t + 2s) log n + o((t + 2s) log n).
         | 
| 292 | 
            +
            C. Codes for correcting a single deletion and multiple right-shifts
         | 
| 293 | 
            +
            In previous two subsections, we focus on the error type of 0-deletions and arbitrary adjacent transposition (both 01 → 10
         | 
| 294 | 
            +
            and 10 → 01 can occur) in the asymmetric Damerau-Levenshtein distance. In this subsection, we propose an optimal code for
         | 
| 295 | 
            +
            correcting a single deletion and s right-shifts of 0. We denote the adjacent transposition as 01 → 10 or 10 → 01, right-shift
         | 
| 296 | 
            +
            of 0 as 01 → 10 and left-shift of 0 as 10 → 01 throughout this subsection.
         | 
| 297 | 
            +
            Construction 2. The code C(n, a, b) is defined as follows.
         | 
| 298 | 
            +
            C(n, a, b) = {x ∈ Σn
         | 
| 299 | 
            +
            2 : VT(x) ≡ a mod (n + s + 1),
         | 
| 300 | 
            +
            n
         | 
| 301 | 
            +
            �
         | 
| 302 | 
            +
            i=1
         | 
| 303 | 
            +
            xi ≡ b mod 2, ψ(x) ∈ CH(n, 2s + 1)},
         | 
| 304 | 
            +
            where CH(n, 2s + 1) is a linear binary code capable of correcting errors with 2s + 1 distance.
         | 
| 305 | 
            +
            Proposition 3. (cf. [12]) A single adjacent transposition (01 → 10 or 10 → 01) in x is equivalent to a single substitution in
         | 
| 306 | 
            +
            ψ(x).
         | 
| 307 | 
            +
            Proposition 4. Suppose there are s right-shifts of 0 occurs in x, we have VT(x) − VT(x′) = s.
         | 
| 308 | 
            +
            Proof. Suppose a right-shift of 0 (01 → 10) occurs at the i-th 1 in x. The index of this 1 in x′ will be i − 1. Thus, for
         | 
| 309 | 
            +
            a single right-shift of 0, the change of the VT syndrome will be 1. If there are s right-shifts of 0 occurs in x, we have
         | 
| 310 | 
            +
            VT(x) − VT(x′) = s.
         | 
| 311 | 
            +
            Lemma 4. The following statements are true:
         | 
| 312 | 
            +
             | 
| 313 | 
            +
            8
         | 
| 314 | 
            +
            • Suppose a 0 is deleted before p-th 1 in x, and insert a 0 before (p + v)-th 1 to get ˆx. x can be obtained from ˆx by v
         | 
| 315 | 
            +
            adjacent transpositions.
         | 
| 316 | 
            +
            • Suppose a 1 is deleted after p-th 0 in x, and insert a 1 after (p − v)-th 0 to get ˆx. x can be obtained from ˆx by v
         | 
| 317 | 
            +
            adjacent transpositions.
         | 
| 318 | 
            +
            Proof. Denote the indexes of p-th 1, (p + 1)-th 1, . . . , (p + v − 1)-th 1 in x as ip, ip+1, . . . , ip+v−1. Then, we can see that
         | 
| 319 | 
            +
            the indexes of these 1s in ˆx should be ip − 1, ip+1 − 1, . . . , ip+v−1 − 1. Since 0 is inserted before (p + v)-th 1, we can swap
         | 
| 320 | 
            +
            the (ip+v−1 − 1)-th and ip+v−1-th bits and hence ˆx[ip+v−1,ip+v] = x[ip+v−1,ip+v]. Continuing this process, we can see that x
         | 
| 321 | 
            +
            can be recovered from ˆx by v adjacent transpositions. The case of deleting 1 is the same deleting 0, hence we can have the
         | 
| 322 | 
            +
            above two statements.
         | 
| 323 | 
            +
            Theorem 8. For all a ∈ [0, n + s] and b ∈ [0, 1], the code C(n, a, b) can correct a single deletion and s right-shifts of 0 with
         | 
| 324 | 
            +
            redundancy at most (1 + s) log(n + s + 1) + 1.
         | 
| 325 | 
            +
            Proof. Denote the retrieved sequence as x′ ∈ Σ2 through a single deletion and at most s right-shifts of 0. We first use the VT
         | 
| 326 | 
            +
            syndrome to correct the deletion and then apply the CH(n, 2s + 1) on ψ(x) to correct the right-shifts of 0.
         | 
| 327 | 
            +
            Further, let ∆ = VT(x) − VT(x′), w be the weight of x′ and p be the index of deletion. Then, let L0 be the number of 0s
         | 
| 328 | 
            +
            on the left of the deleted bits in x′ and R0 on its left. Similarly, denote L1, R1. We have the following cases when recover x
         | 
| 329 | 
            +
            by x′:
         | 
| 330 | 
            +
            • If x′ = Σn
         | 
| 331 | 
            +
            2, it means no deletion occurs in x and there are at most s right-shifts of 0. Based on Proposition 3, there are
         | 
| 332 | 
            +
            at most s substitutions in ψ(x). Hence we can recover ψ(x) by ψ(x′) since ψ(x) ∈ CH(n, 2s + 1), and then recover x.
         | 
| 333 | 
            +
            • If x′ = Σn−1
         | 
| 334 | 
            +
            2
         | 
| 335 | 
            +
            and suppose a 0 is deleted. From Proposition 4, then ∆ = R1 + k, where k is the actual number of
         | 
| 336 | 
            +
            right-shifts of 0s. We can first recover ˆx by inserting 0 in the rightmost index of (∆ − s) 1s. Since ∆ = R1 + k and we
         | 
| 337 | 
            +
            insert 0 in the rightmost index of (R1 + k − s) 1s. Based on the Case 1 of Lemma 4, we can have that there are at least
         | 
| 338 | 
            +
            (s − k) adjacent transpositions between ˆx and x. In addition, there are also k right-shifts of 0s occur in x. Therefore, x
         | 
| 339 | 
            +
            can be obtained from ˆx by total s adjacent transpositions. Hence, we can recover ψ(x) by ψ(ˆx) and then x.
         | 
| 340 | 
            +
            • If x′ = Σn−1
         | 
| 341 | 
            +
            2
         | 
| 342 | 
            +
            and suppose a 1 is deleted. From Proposition 4, then ∆ = p + R1 + k = w + L0 + k + 1. We recover ˆx
         | 
| 343 | 
            +
            by inserting 1 in the leftmost index of (∆ − w − s − 1) 0s. Similar as Case 2, since ∆ = w + L0 + k + 1 and we insert
         | 
| 344 | 
            +
            1 in the leftmost index of (L0 + k − s) 0s. Based on the Case 2 of Lemma 4, we can have that there are at least (s − k)
         | 
| 345 | 
            +
            adjacent transpositions between ˆx and x. Similarly, x can be obtained from ˆx by total s adjacent transpositions. Hence,
         | 
| 346 | 
            +
            we can recover ψ(x) by ψ(ˆx) and then x.
         | 
| 347 | 
            +
             | 
| 348 | 
            +
            9
         | 
| 349 | 
            +
            It is worth noticing that Case 1 and Case 2, 3 can be distinguished by the length of the retrieved sequence x′. Case 2 and
         | 
| 350 | 
            +
            Case 3 can distinguished based on the constraint of �n
         | 
| 351 | 
            +
            i=1 xi ≡ b mod 2, from where we can know the deleted bit is 0 or 1.
         | 
| 352 | 
            +
            There are three constraints on the sequence x ∈ C(n, a, b) including a VT code, a parity check bit and a linear binary
         | 
| 353 | 
            +
            (n, 2s + 1)-code. It can be easily shown that the redundancy of the code C(n, a, b) is log(n + s + 1) + s log n + 1. Thus, the
         | 
| 354 | 
            +
            redundancy of the code C(n, a, b) is at most (1 + s) log(n + s + 1) + 1.
         | 
| 355 | 
            +
            The decoding algorithm of the code C(n, a, b) for correcting a single deletion and s right-shifts of 0 is summarized in
         | 
| 356 | 
            +
            Algorithm 1.
         | 
| 357 | 
            +
            Algorithm 1: Decoding procedure of C(n, a, b)
         | 
| 358 | 
            +
            Input: Corrupted Sequence x′
         | 
| 359 | 
            +
            Output: Original Sequence x ∈ C(n, a, b)
         | 
| 360 | 
            +
            ∆ = VT(x) − VT(x′), b = �n
         | 
| 361 | 
            +
            i=1 xi − �|x′|
         | 
| 362 | 
            +
            i=1 x′
         | 
| 363 | 
            +
            i and w = wt(x′).
         | 
| 364 | 
            +
            if |x′| = n then
         | 
| 365 | 
            +
            Recover ψ(x) by ψ(x′) and then x.
         | 
| 366 | 
            +
            else
         | 
| 367 | 
            +
            if b = 0 then
         | 
| 368 | 
            +
            Insert a 0 in the rightmost index of (∆ − s) 1s to get ˆx. Recover ψ(x) by ψ(ˆx) and then x.
         | 
| 369 | 
            +
            else
         | 
| 370 | 
            +
            Insert a 1 in the leftmost index of (∆ − w − s − 1) 0s to get ˆx. Recover ψ(x) by ψ(ˆx) and then x.
         | 
| 371 | 
            +
            end
         | 
| 372 | 
            +
            end
         | 
| 373 | 
            +
            Further, Construction 2 and Theorem 8 can be naturally extended to construct codes for correcting a single deletion, s+
         | 
| 374 | 
            +
            right-shifts of 0 and s− left-shifts of 0 with s = s+ + s−.
         | 
| 375 | 
            +
            Corollary 2. For all a ∈ [0, n + s] and b ∈ [0, 1], the code C2(n, a, b) such that
         | 
| 376 | 
            +
            C2(n, a, b) = {x ∈ Σn
         | 
| 377 | 
            +
            2 : VT(x) ≡ a mod (n + s + 1),
         | 
| 378 | 
            +
            n
         | 
| 379 | 
            +
            �
         | 
| 380 | 
            +
            i=1
         | 
| 381 | 
            +
            xi ≡ b mod 2, ψ(x) ∈ CH(n, 2s + 1)}.
         | 
| 382 | 
            +
            can correct a single deletion, s+ right-shifts of 0 and s− left-shifts of 0 with redundancy at most (1 + s) log(n + s + 1) + 1,
         | 
| 383 | 
            +
            where s = s+ + s−.
         | 
| 384 | 
            +
            Proof. Similar as Proposition 4, suppose there are at most s− left-shifts of 0s, the change of VT syndrome is VT(x) −
         | 
| 385 | 
            +
            VT(x′) = −s−. Suppose a 0 is deleted, and the same as the proof of Theorem 8 with the same notations, we can also have
         | 
| 386 | 
            +
            ∆ = R1 + k+ − k−, where k+ and k− are actual number of right-shifts and left-shifts of 0 occur. Also, we still insert a 0 in
         | 
| 387 | 
            +
             | 
| 388 | 
            +
            10
         | 
| 389 | 
            +
            the index of rightmost of (∆ − s+ + s−) 1s to obtain ˆx. Based on the Case 1 of Lemma 4, we can have that there are at least
         | 
| 390 | 
            +
            ((s+ − s−) − (k+ − k−)) adjacent transpositions between ˆx and x and there are k+ + k− adjacent transpositions occur in x.
         | 
| 391 | 
            +
            Therefore, the total number of adjacent transpositions that x can be obtained from ˆx is at most
         | 
| 392 | 
            +
            (s+ − s−) − (k+ − k−) + (k+ + k−) = s+ − s− + 2k− ≤ s+ + s− = s
         | 
| 393 | 
            +
            Hence, we can recover ψ(x) by ψ(ˆx) since there are at most s substitutions and then x. Also, the analysis of redundancy is
         | 
| 394 | 
            +
            the same as the proof of Theorem 8.
         | 
| 395 | 
            +
            Compare the results in [12], where the code for correcting a single deletion and s adjacent transpositions needs at most
         | 
| 396 | 
            +
            (1 + 2s) log(n + 2s + 1) redundancy. If we know the direction of these s adjacent transpositions containing s+ right-shifts
         | 
| 397 | 
            +
            of 0 and s− left-shifts of 0, the redundancy of the code can be further reduced to at most (1 + s) log(n + s + 1) + 1 where
         | 
| 398 | 
            +
            s = s+ + s−.
         | 
| 399 | 
            +
            IV. LIST-DECODABLE CODES FOR CORRECTING ASYMMETRIC DELETIONS AND ADJACENT TRANSPOSITIONS
         | 
| 400 | 
            +
            In this section, we aim to construct List-Decodable codes with low redundancy. For correcting t 0-deletions without s
         | 
| 401 | 
            +
            adjacent transpositions, Dolecek and Anatharam [17] proposed a well-known construction with optimal redundancy t log n.
         | 
| 402 | 
            +
            Inspired by this, we have the following construction:
         | 
| 403 | 
            +
            Construction 3. The construction CList
         | 
| 404 | 
            +
            t,s (n, K, a; p) is defined as the set of all x ∈ Σn
         | 
| 405 | 
            +
            2 such that
         | 
| 406 | 
            +
            w+1
         | 
| 407 | 
            +
            �
         | 
| 408 | 
            +
            i=1
         | 
| 409 | 
            +
            imφ(x)i ≡ am mod p, ∀m ∈ {1, . . . , K}.
         | 
| 410 | 
            +
            where the prime p such that p > 2n and a = (a1, a2, . . . , aK).
         | 
| 411 | 
            +
            Let x = (x1, . . . , xn) ∈ Σn
         | 
| 412 | 
            +
            2 be the original vector and x′ ∈ Σn−t
         | 
| 413 | 
            +
            2
         | 
| 414 | 
            +
            be the received vector after t 0-deletions and s adjacent
         | 
| 415 | 
            +
            transpositions. Hence, we obtain the vector φ(x′) and the corresponding a′ at the receiver. Let a′
         | 
| 416 | 
            +
            m = �w+1
         | 
| 417 | 
            +
            i=1 imφ(x′)i and
         | 
| 418 | 
            +
            a′′
         | 
| 419 | 
            +
            m = am − a′
         | 
| 420 | 
            +
            m, ∀m ∈ {1, . . . , K}.
         | 
| 421 | 
            +
            Proposition 5. Suppose there is only a single adjacent transposition occurs in x at the position of j-th 1, the change of
         | 
| 422 | 
            +
            syndrome a′′
         | 
| 423 | 
            +
            m can be shown as follows:
         | 
| 424 | 
            +
            1) 10 → 01:
         | 
| 425 | 
            +
            a′′
         | 
| 426 | 
            +
            m = (j + 1)m − jm mod p =
         | 
| 427 | 
            +
            m−1
         | 
| 428 | 
            +
            �
         | 
| 429 | 
            +
            i=0
         | 
| 430 | 
            +
            �m
         | 
| 431 | 
            +
            i
         | 
| 432 | 
            +
            �
         | 
| 433 | 
            +
            ji mod p
         | 
| 434 | 
            +
            2) 01 → 10:
         | 
| 435 | 
            +
            a′′
         | 
| 436 | 
            +
            m = jm − (j + 1)m mod p = −
         | 
| 437 | 
            +
            m−1
         | 
| 438 | 
            +
            �
         | 
| 439 | 
            +
            i=0
         | 
| 440 | 
            +
            �m
         | 
| 441 | 
            +
            i
         | 
| 442 | 
            +
            �
         | 
| 443 | 
            +
            ji mod p
         | 
| 444 | 
            +
             | 
| 445 | 
            +
            11
         | 
| 446 | 
            +
            Then, suppose t 0-deletions occur in the 0-run before the (d1, d2, . . . , dt)-th 1, respectively, where d1 ≤ d2 ≤ · · · ≤ dt.
         | 
| 447 | 
            +
            Also, ℓ (10 → 01) adjacent transpositions occur in (j1, j2, . . . , jℓ)-th 1 and r (01 → 10) adjacent transpositions occur in
         | 
| 448 | 
            +
            (k1, k2, . . . , kr)-th 1, respectively.
         | 
| 449 | 
            +
            Based on Proposition 5, considering all t 0-deletions and s adjacent transpositions and set K = t + s, we have a set of
         | 
| 450 | 
            +
            equations showing the change of syndromes for all m ∈ {1, . . ., t + s} as follows:
         | 
| 451 | 
            +
            a′′
         | 
| 452 | 
            +
            m ≡
         | 
| 453 | 
            +
            t
         | 
| 454 | 
            +
            �
         | 
| 455 | 
            +
            u=1
         | 
| 456 | 
            +
            dm
         | 
| 457 | 
            +
            u +
         | 
| 458 | 
            +
            m−1
         | 
| 459 | 
            +
            �
         | 
| 460 | 
            +
            i=0
         | 
| 461 | 
            +
            ��m
         | 
| 462 | 
            +
            i
         | 
| 463 | 
            +
            ��
         | 
| 464 | 
            +
            ℓ
         | 
| 465 | 
            +
            �
         | 
| 466 | 
            +
            v=1
         | 
| 467 | 
            +
            ji
         | 
| 468 | 
            +
            v −
         | 
| 469 | 
            +
            r
         | 
| 470 | 
            +
            �
         | 
| 471 | 
            +
            w=1
         | 
| 472 | 
            +
            ki
         | 
| 473 | 
            +
            w
         | 
| 474 | 
            +
            ��
         | 
| 475 | 
            +
            mod p.
         | 
| 476 | 
            +
            (1)
         | 
| 477 | 
            +
            If there are only t 0-deletions without s adjacent transpositions, Dolecek and Anantharam [17] showed that the following
         | 
| 478 | 
            +
            system of equations has the unique solution.
         | 
| 479 | 
            +
            Lemma 5 (Dolecek and Anatharam [17]). Without s adjacent transpositions, (1) can be rewritten as the following set of
         | 
| 480 | 
            +
            constraints with t equations such that
         | 
| 481 | 
            +
            
         | 
| 482 | 
            +
            
         | 
| 483 | 
            +
            
         | 
| 484 | 
            +
            
         | 
| 485 | 
            +
            
         | 
| 486 | 
            +
            
         | 
| 487 | 
            +
            
         | 
| 488 | 
            +
            
         | 
| 489 | 
            +
            
         | 
| 490 | 
            +
            
         | 
| 491 | 
            +
            
         | 
| 492 | 
            +
            
         | 
| 493 | 
            +
            
         | 
| 494 | 
            +
            
         | 
| 495 | 
            +
            
         | 
| 496 | 
            +
            
         | 
| 497 | 
            +
            
         | 
| 498 | 
            +
            
         | 
| 499 | 
            +
            
         | 
| 500 | 
            +
            
         | 
| 501 | 
            +
            
         | 
| 502 | 
            +
            
         | 
| 503 | 
            +
            
         | 
| 504 | 
            +
            
         | 
| 505 | 
            +
            
         | 
| 506 | 
            +
            
         | 
| 507 | 
            +
            
         | 
| 508 | 
            +
            
         | 
| 509 | 
            +
            
         | 
| 510 | 
            +
            a′′
         | 
| 511 | 
            +
            1 ≡ d1 + d2 + . . . + dt mod p,
         | 
| 512 | 
            +
            a′′
         | 
| 513 | 
            +
            2 ≡ d2
         | 
| 514 | 
            +
            1 + d2
         | 
| 515 | 
            +
            2 + . . . + d2
         | 
| 516 | 
            +
            t mod p,
         | 
| 517 | 
            +
            ...
         | 
| 518 | 
            +
            a′′
         | 
| 519 | 
            +
            t ≡ dt
         | 
| 520 | 
            +
            1 + dt
         | 
| 521 | 
            +
            2 + . . . + dt
         | 
| 522 | 
            +
            t mod p.
         | 
| 523 | 
            +
            (2)
         | 
| 524 | 
            +
            which can uniquely determine the solution set {d1, d2, . . . , dt}, where p is a prime such that p > 2n and d1 ≤ d2 ≤ · · · ≤ dt.
         | 
| 525 | 
            +
            Following the technique in [17], if we can determine uniquely the solution set {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} of (1), we
         | 
| 526 | 
            +
            also can correct t 0-deletions and s adjacent transpositions with at most (t + s) log n bits of redundancy. However, the result
         | 
| 527 | 
            +
            is not known to us and is still open for future work.
         | 
| 528 | 
            +
            In this section, we focus on List-Decodable code CList
         | 
| 529 | 
            +
            t,s (n, κ, a; p) for correcting t 0-deletions and s adjacent transpositions.
         | 
| 530 | 
            +
            Set K = κ in Construction 3, where κ = max(t, s + 1) and p is a prime such that p > 2n. For the following system of
         | 
| 531 | 
            +
            equations, we can determine the solution set uniquely.
         | 
| 532 | 
            +
            Lemma 6. A set of constraints with s equations such that
         | 
| 533 | 
            +
            
         | 
| 534 | 
            +
            
         | 
| 535 | 
            +
            
         | 
| 536 | 
            +
            
         | 
| 537 | 
            +
            
         | 
| 538 | 
            +
            
         | 
| 539 | 
            +
            
         | 
| 540 | 
            +
            
         | 
| 541 | 
            +
            
         | 
| 542 | 
            +
            
         | 
| 543 | 
            +
            
         | 
| 544 | 
            +
            
         | 
| 545 | 
            +
            
         | 
| 546 | 
            +
            
         | 
| 547 | 
            +
            
         | 
| 548 | 
            +
            
         | 
| 549 | 
            +
            
         | 
| 550 | 
            +
            
         | 
| 551 | 
            +
            
         | 
| 552 | 
            +
            
         | 
| 553 | 
            +
            
         | 
| 554 | 
            +
            
         | 
| 555 | 
            +
            
         | 
| 556 | 
            +
            
         | 
| 557 | 
            +
            
         | 
| 558 | 
            +
            
         | 
| 559 | 
            +
            
         | 
| 560 | 
            +
            
         | 
| 561 | 
            +
            
         | 
| 562 | 
            +
            b′′
         | 
| 563 | 
            +
            1 ≡ �ℓ
         | 
| 564 | 
            +
            v=1 j1
         | 
| 565 | 
            +
            v − �r
         | 
| 566 | 
            +
            w=1 k1
         | 
| 567 | 
            +
            w mod p,
         | 
| 568 | 
            +
            b′′
         | 
| 569 | 
            +
            2 ≡ �ℓ
         | 
| 570 | 
            +
            v=1 j2
         | 
| 571 | 
            +
            v − �r
         | 
| 572 | 
            +
            w=1 k2
         | 
| 573 | 
            +
            w mod p,
         | 
| 574 | 
            +
            ...
         | 
| 575 | 
            +
            b′′
         | 
| 576 | 
            +
            s ≡ �ℓ
         | 
| 577 | 
            +
            v=1 js
         | 
| 578 | 
            +
            v − �r
         | 
| 579 | 
            +
            w=1 ks
         | 
| 580 | 
            +
            w mod p.
         | 
| 581 | 
            +
            (3)
         | 
| 582 | 
            +
             | 
| 583 | 
            +
            12
         | 
| 584 | 
            +
            is capable of uniquely determining the solution set {j1, . . . , jℓ, k1, . . . , kr}, where p is a prime such that p > 2n. Also, ℓ+r ≤ s,
         | 
| 585 | 
            +
            j1 < j2 < · · · < jℓ, k1 < k2 < · · · < kr and jv ̸= kw, ∀v ∈ {1, . . . , ℓ}, w ∈ {1, . . . , r}.
         | 
| 586 | 
            +
            We note that Lemma 6 is similar to Lemma 5. The only difference is that the coefficients of all terms in Lemma 5 are
         | 
| 587 | 
            +
            positive while the coefficients of all terms in Lemma 6 can be either positive or negative. Hence, we can use the same technique
         | 
| 588 | 
            +
            in Lemma 5 to prove Lemma 6.
         | 
| 589 | 
            +
            Proof. Define the polynomials
         | 
| 590 | 
            +
            σ+(x) =
         | 
| 591 | 
            +
            ℓ
         | 
| 592 | 
            +
            �
         | 
| 593 | 
            +
            v=1
         | 
| 594 | 
            +
            (1 − jvx)
         | 
| 595 | 
            +
            and
         | 
| 596 | 
            +
            σ−(x) =
         | 
| 597 | 
            +
            r
         | 
| 598 | 
            +
            �
         | 
| 599 | 
            +
            w=1
         | 
| 600 | 
            +
            (1 − kwx).
         | 
| 601 | 
            +
            Let σ(x) = �s
         | 
| 602 | 
            +
            m=0 σmxm be defined by
         | 
| 603 | 
            +
            σ(x) = σ+(x)/σ−(x) mod xs
         | 
| 604 | 
            +
            Then, we define σ∗(x) = σ(x) mod p.
         | 
| 605 | 
            +
            We also define
         | 
| 606 | 
            +
            S∗(x) =
         | 
| 607 | 
            +
            ∞
         | 
| 608 | 
            +
            �
         | 
| 609 | 
            +
            m=1
         | 
| 610 | 
            +
            �
         | 
| 611 | 
            +
            ℓ
         | 
| 612 | 
            +
            �
         | 
| 613 | 
            +
            v=1
         | 
| 614 | 
            +
            jm
         | 
| 615 | 
            +
            v −
         | 
| 616 | 
            +
            r
         | 
| 617 | 
            +
            �
         | 
| 618 | 
            +
            w=1
         | 
| 619 | 
            +
            km
         | 
| 620 | 
            +
            w
         | 
| 621 | 
            +
            �
         | 
| 622 | 
            +
            xm.
         | 
| 623 | 
            +
            and S∗
         | 
| 624 | 
            +
            m = �ℓ
         | 
| 625 | 
            +
            v=1 jm
         | 
| 626 | 
            +
            v − �r
         | 
| 627 | 
            +
            w=1 km
         | 
| 628 | 
            +
            w mod p.
         | 
| 629 | 
            +
            Then, we have Newton’s identities over GF(p) as follows
         | 
| 630 | 
            +
            σ∗(x)S∗(x) + x(σ∗(x))′ = 0
         | 
| 631 | 
            +
            u−1
         | 
| 632 | 
            +
            �
         | 
| 633 | 
            +
            m=0
         | 
| 634 | 
            +
            σ∗
         | 
| 635 | 
            +
            mS∗
         | 
| 636 | 
            +
            u−m + uσ∗
         | 
| 637 | 
            +
            u = 0, u ≥ 1.
         | 
| 638 | 
            +
            (4)
         | 
| 639 | 
            +
            where (σ∗(x))′ is derivative of σ∗(x). (see [35, Lemma 10.3] for details)
         | 
| 640 | 
            +
            Using the similar technique as the proof of Lemma 5, from (4), σ∗
         | 
| 641 | 
            +
            m can be recursively obtained by {S∗
         | 
| 642 | 
            +
            1, . . . , S∗
         | 
| 643 | 
            +
            m} and
         | 
| 644 | 
            +
            {σ∗
         | 
| 645 | 
            +
            1, . . . , σ∗
         | 
| 646 | 
            +
            m−1}, where {S∗
         | 
| 647 | 
            +
            1, . . . , S∗
         | 
| 648 | 
            +
            m} = {b′′
         | 
| 649 | 
            +
            1, . . . , b′′
         | 
| 650 | 
            +
            m}, which follows that all the coefficients of the polynomial σ∗(x) =
         | 
| 651 | 
            +
            �s
         | 
| 652 | 
            +
            m=0 σ∗
         | 
| 653 | 
            +
            mxm mod p are known. Further, we know that the polynomial σ∗(x) has at most s solutions by Lagrange Theorem.
         | 
| 654 | 
            +
            Denote I0 = {j1, . . . , jℓ, k1, . . . , kr} with the value of each element in I0 is less than p and let Im = {j1 + mp, . . . , jℓ +
         | 
| 655 | 
            +
            mp, k1+mp, . . . , kr+mp} be one of the incongruent solution sets of I0. We can have I0∩Im = ∅ due to p > 2n, which follows
         | 
| 656 | 
            +
            that all incongruent solutions are distinguishable. Therefore, we can conclude that the solution set {j1, . . . , jℓ, k1, . . . , kr} is
         | 
| 657 | 
            +
            unique.
         | 
| 658 | 
            +
            Theorem 9. The list-decodable code CList
         | 
| 659 | 
            +
            t,s (n, κ, a; p) has redundancy κ log n, where κ = max(t, s + 1) and prime p > 2n. If
         | 
| 660 | 
            +
            there are at most t 0-deletions and s adjacent transpositions, we can do list-decoding with list size O(nmin(t,s+1)).
         | 
| 661 | 
            +
             | 
| 662 | 
            +
            13
         | 
| 663 | 
            +
            Proof. Let x = (x1, . . . , xn) ∈ Σn
         | 
| 664 | 
            +
            2 be the original vector and x′ be the received vector after t 0-deletions and s single adjacent
         | 
| 665 | 
            +
            transpositions. Hence, we can compute φ(x′) and a′ from x′. Also, we can obtain a′′ = a′ − a, where a′′ = {a′′
         | 
| 666 | 
            +
            1, . . . , a′′
         | 
| 667 | 
            +
            κ}.
         | 
| 668 | 
            +
            Suppose t ≥ s + 1 and expand (1). We have the following set of equations with κ = t:
         | 
| 669 | 
            +
            
         | 
| 670 | 
            +
            
         | 
| 671 | 
            +
            
         | 
| 672 | 
            +
            
         | 
| 673 | 
            +
            
         | 
| 674 | 
            +
            
         | 
| 675 | 
            +
            
         | 
| 676 | 
            +
            
         | 
| 677 | 
            +
            
         | 
| 678 | 
            +
            
         | 
| 679 | 
            +
            
         | 
| 680 | 
            +
            
         | 
| 681 | 
            +
            
         | 
| 682 | 
            +
            
         | 
| 683 | 
            +
            
         | 
| 684 | 
            +
            
         | 
| 685 | 
            +
            
         | 
| 686 | 
            +
            
         | 
| 687 | 
            +
            
         | 
| 688 | 
            +
            
         | 
| 689 | 
            +
            
         | 
| 690 | 
            +
            
         | 
| 691 | 
            +
            
         | 
| 692 | 
            +
            
         | 
| 693 | 
            +
            
         | 
| 694 | 
            +
            
         | 
| 695 | 
            +
            
         | 
| 696 | 
            +
            
         | 
| 697 | 
            +
            
         | 
| 698 | 
            +
            
         | 
| 699 | 
            +
            
         | 
| 700 | 
            +
            
         | 
| 701 | 
            +
            
         | 
| 702 | 
            +
            
         | 
| 703 | 
            +
            
         | 
| 704 | 
            +
            
         | 
| 705 | 
            +
            
         | 
| 706 | 
            +
            
         | 
| 707 | 
            +
            
         | 
| 708 | 
            +
            a′′
         | 
| 709 | 
            +
            1 ≡ �t
         | 
| 710 | 
            +
            u=1 du + (ℓ − r) mod p,
         | 
| 711 | 
            +
            a′′
         | 
| 712 | 
            +
            2 ≡ �t
         | 
| 713 | 
            +
            u=1 d2
         | 
| 714 | 
            +
            u + (ℓ − r) + 2(�ℓ
         | 
| 715 | 
            +
            v=1 j1
         | 
| 716 | 
            +
            v − �r
         | 
| 717 | 
            +
            w=1 k1
         | 
| 718 | 
            +
            w) mod p,
         | 
| 719 | 
            +
            ...
         | 
| 720 | 
            +
            a′′
         | 
| 721 | 
            +
            t ≡ �t
         | 
| 722 | 
            +
            u=1 dt
         | 
| 723 | 
            +
            u + (ℓ − r) + t(�ℓ
         | 
| 724 | 
            +
            v=1 j1
         | 
| 725 | 
            +
            v − �r
         | 
| 726 | 
            +
            w=1 k1
         | 
| 727 | 
            +
            w)
         | 
| 728 | 
            +
            + · · · + t(�ℓ
         | 
| 729 | 
            +
            v=1 jt−1
         | 
| 730 | 
            +
            v
         | 
| 731 | 
            +
            − �r
         | 
| 732 | 
            +
            w=1 kt−1
         | 
| 733 | 
            +
            w
         | 
| 734 | 
            +
            ) mod p.
         | 
| 735 | 
            +
            (5)
         | 
| 736 | 
            +
            Recall that we can decode uniquely if we can determine the unique solution set of (5). However, the method to solve (5)
         | 
| 737 | 
            +
            uniquely is not known to us. We know that, given e = {e1, . . . , es+1}, we can solve the following equations uniquely.
         | 
| 738 | 
            +
            
         | 
| 739 | 
            +
            
         | 
| 740 | 
            +
            
         | 
| 741 | 
            +
            
         | 
| 742 | 
            +
            
         | 
| 743 | 
            +
            
         | 
| 744 | 
            +
            
         | 
| 745 | 
            +
            
         | 
| 746 | 
            +
            
         | 
| 747 | 
            +
            
         | 
| 748 | 
            +
            
         | 
| 749 | 
            +
            
         | 
| 750 | 
            +
            
         | 
| 751 | 
            +
            
         | 
| 752 | 
            +
            
         | 
| 753 | 
            +
            
         | 
| 754 | 
            +
            
         | 
| 755 | 
            +
            
         | 
| 756 | 
            +
            
         | 
| 757 | 
            +
            
         | 
| 758 | 
            +
            
         | 
| 759 | 
            +
            
         | 
| 760 | 
            +
            
         | 
| 761 | 
            +
            
         | 
| 762 | 
            +
            
         | 
| 763 | 
            +
            
         | 
| 764 | 
            +
            
         | 
| 765 | 
            +
            
         | 
| 766 | 
            +
            
         | 
| 767 | 
            +
            
         | 
| 768 | 
            +
            
         | 
| 769 | 
            +
            
         | 
| 770 | 
            +
            
         | 
| 771 | 
            +
            
         | 
| 772 | 
            +
            
         | 
| 773 | 
            +
            
         | 
| 774 | 
            +
            
         | 
| 775 | 
            +
            
         | 
| 776 | 
            +
            
         | 
| 777 | 
            +
            e1 ≡ ℓ − r mod p,
         | 
| 778 | 
            +
            e2 ≡ (ℓ − r) + 2(�ℓ
         | 
| 779 | 
            +
            v=1 j1
         | 
| 780 | 
            +
            v − �r
         | 
| 781 | 
            +
            w=1 k1
         | 
| 782 | 
            +
            w) mod p,
         | 
| 783 | 
            +
            ...
         | 
| 784 | 
            +
            es+1 ≡ (ℓ − r) + (s + 1)(�ℓ
         | 
| 785 | 
            +
            v=1 j1
         | 
| 786 | 
            +
            v − �r
         | 
| 787 | 
            +
            w=1 k1
         | 
| 788 | 
            +
            w)
         | 
| 789 | 
            +
            + · · · + (s + 1)(�ℓ
         | 
| 790 | 
            +
            v=1 js
         | 
| 791 | 
            +
            v − �r
         | 
| 792 | 
            +
            w=1 ks
         | 
| 793 | 
            +
            w) mod p.
         | 
| 794 | 
            +
            (6)
         | 
| 795 | 
            +
            Indeed, denote e′ = {e′
         | 
| 796 | 
            +
            1, . . . , e′
         | 
| 797 | 
            +
            s+1} with me′
         | 
| 798 | 
            +
            m = em − �m−1
         | 
| 799 | 
            +
            i=1
         | 
| 800 | 
            +
            �� m
         | 
| 801 | 
            +
            i−1
         | 
| 802 | 
            +
            �
         | 
| 803 | 
            +
            e′
         | 
| 804 | 
            +
            i
         | 
| 805 | 
            +
            �
         | 
| 806 | 
            +
            for all m ∈ {2, . . ., s + 1} and e���
         | 
| 807 | 
            +
            1 = e1, we can
         | 
| 808 | 
            +
            rearrange (6) to be similar to Lemma 6 as follows.
         | 
| 809 | 
            +
            
         | 
| 810 | 
            +
            
         | 
| 811 | 
            +
            
         | 
| 812 | 
            +
            
         | 
| 813 | 
            +
            
         | 
| 814 | 
            +
            
         | 
| 815 | 
            +
            
         | 
| 816 | 
            +
            
         | 
| 817 | 
            +
            
         | 
| 818 | 
            +
            
         | 
| 819 | 
            +
            
         | 
| 820 | 
            +
            
         | 
| 821 | 
            +
            
         | 
| 822 | 
            +
            
         | 
| 823 | 
            +
            
         | 
| 824 | 
            +
            
         | 
| 825 | 
            +
            
         | 
| 826 | 
            +
            
         | 
| 827 | 
            +
            
         | 
| 828 | 
            +
            
         | 
| 829 | 
            +
            
         | 
| 830 | 
            +
            
         | 
| 831 | 
            +
            
         | 
| 832 | 
            +
            
         | 
| 833 | 
            +
            
         | 
| 834 | 
            +
            
         | 
| 835 | 
            +
            
         | 
| 836 | 
            +
            
         | 
| 837 | 
            +
            
         | 
| 838 | 
            +
            e′
         | 
| 839 | 
            +
            1 ≡ ℓ − r mod p,
         | 
| 840 | 
            +
            e′
         | 
| 841 | 
            +
            2 ≡ �ℓ
         | 
| 842 | 
            +
            v=1 j1
         | 
| 843 | 
            +
            v − �r
         | 
| 844 | 
            +
            w=1 k1
         | 
| 845 | 
            +
            w mod p,
         | 
| 846 | 
            +
            ...
         | 
| 847 | 
            +
            e′
         | 
| 848 | 
            +
            s+1 ≡ �ℓ
         | 
| 849 | 
            +
            v=1 js
         | 
| 850 | 
            +
            v − �r
         | 
| 851 | 
            +
            w=1 ks
         | 
| 852 | 
            +
            w mod p.
         | 
| 853 | 
            +
            (7)
         | 
| 854 | 
            +
            Therefore, based on Lemma 6, we can obtain the unique solution set {j1, . . . , jℓ, k1, . . . , kr} from (7).
         | 
| 855 | 
            +
            Once the solution set {j1, . . . , jℓ, k1, . . . , kr} is obtained, we can compute the following values {es+2, . . . , et}.
         | 
| 856 | 
            +
            em =
         | 
| 857 | 
            +
            m−1
         | 
| 858 | 
            +
            �
         | 
| 859 | 
            +
            i=0
         | 
| 860 | 
            +
            ��m
         | 
| 861 | 
            +
            i
         | 
| 862 | 
            +
            ��
         | 
| 863 | 
            +
            ℓ
         | 
| 864 | 
            +
            �
         | 
| 865 | 
            +
            v=1
         | 
| 866 | 
            +
            ji
         | 
| 867 | 
            +
            v −
         | 
| 868 | 
            +
            r
         | 
| 869 | 
            +
            �
         | 
| 870 | 
            +
            w=1
         | 
| 871 | 
            +
            ki
         | 
| 872 | 
            +
            w
         | 
| 873 | 
            +
            ��
         | 
| 874 | 
            +
            mod p.
         | 
| 875 | 
            +
            (8)
         | 
| 876 | 
            +
            where m ∈ {s + 2, . . . , t}.
         | 
| 877 | 
            +
             | 
| 878 | 
            +
            14
         | 
| 879 | 
            +
            Denote a∗ = {a∗
         | 
| 880 | 
            +
            1, . . . , a∗
         | 
| 881 | 
            +
            t } with a∗
         | 
| 882 | 
            +
            m = a′′
         | 
| 883 | 
            +
            m − em, ∀m ∈ {1, . . ., t}. Substituting (6) and (8) into (5), we obtain the following
         | 
| 884 | 
            +
            set of equations.
         | 
| 885 | 
            +
            
         | 
| 886 | 
            +
            
         | 
| 887 | 
            +
            
         | 
| 888 | 
            +
            
         | 
| 889 | 
            +
            
         | 
| 890 | 
            +
            
         | 
| 891 | 
            +
            
         | 
| 892 | 
            +
            
         | 
| 893 | 
            +
            
         | 
| 894 | 
            +
            
         | 
| 895 | 
            +
            
         | 
| 896 | 
            +
            
         | 
| 897 | 
            +
            
         | 
| 898 | 
            +
            
         | 
| 899 | 
            +
            
         | 
| 900 | 
            +
            
         | 
| 901 | 
            +
            
         | 
| 902 | 
            +
            
         | 
| 903 | 
            +
            
         | 
| 904 | 
            +
            
         | 
| 905 | 
            +
            
         | 
| 906 | 
            +
            
         | 
| 907 | 
            +
            
         | 
| 908 | 
            +
            
         | 
| 909 | 
            +
            
         | 
| 910 | 
            +
            
         | 
| 911 | 
            +
            
         | 
| 912 | 
            +
            
         | 
| 913 | 
            +
            
         | 
| 914 | 
            +
            a∗
         | 
| 915 | 
            +
            1 ≡ �t
         | 
| 916 | 
            +
            u=1 du mod p,
         | 
| 917 | 
            +
            a∗
         | 
| 918 | 
            +
            2 ≡ �t
         | 
| 919 | 
            +
            u=1 d2
         | 
| 920 | 
            +
            u mod p,
         | 
| 921 | 
            +
            ...
         | 
| 922 | 
            +
            a∗
         | 
| 923 | 
            +
            t ≡ �t
         | 
| 924 | 
            +
            u=1 dt
         | 
| 925 | 
            +
            u mod p.
         | 
| 926 | 
            +
            (9)
         | 
| 927 | 
            +
            The set of equations (9) provides the unique solution set {d1, . . . , dt} by Lemma 5. Therefore, the unique solution of all
         | 
| 928 | 
            +
            positions of 0-deletions and adjacent transpositions {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} can be obtained. So, for each set of
         | 
| 929 | 
            +
            s+1 values {e1, . . . , es+1}, we can obtain the set {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr}. There are ps+1 sets of these values. One
         | 
| 930 | 
            +
            of these sets corresponds to the true value of x and gives us the correct vector x. So, we can do list-decoding with the list
         | 
| 931 | 
            +
            size O(ns+1) since p = O(n). Moreover, the size of the list-decodable code CList
         | 
| 932 | 
            +
            t,s (n, κ, a; p) with κ = t is at least 2n/(4n)t,
         | 
| 933 | 
            +
            that is, we need at most κ log n bits of redundancy to construct the code CList
         | 
| 934 | 
            +
            t,s (n, κ, a; p).
         | 
| 935 | 
            +
            When t < s + 1, we can do similarly to the case t ≤ s + 1. In this case, we can do list-decoding with the list-size O(nt).
         | 
| 936 | 
            +
            The size of the code CList
         | 
| 937 | 
            +
            t,s (n, κ, a; p) is at least 2n/(4n)s+1.
         | 
| 938 | 
            +
            Then, we can conclude that the list-decodable code CList
         | 
| 939 | 
            +
            t,s (n, κ, a; p) can correct t 0-deletions and s adjacent transpositions
         | 
| 940 | 
            +
            with list size at most O(nmin(t,s+1)) and has redundancy κ log n+O(1), where both t, s are constant and κ = max(t, s+1).
         | 
| 941 | 
            +
            The decoding algorithm of the list-decodable code CList
         | 
| 942 | 
            +
            t,s (n, κ, a; p) for correcting t 0-deletions and s adjacent transpositions
         | 
| 943 | 
            +
            is summarized in Algorithm 2, where t > s + 1.
         | 
| 944 | 
            +
            Algorithm 2: List decoding procedure
         | 
| 945 | 
            +
            Input: Corrupted Sequence x′ ∈ Σn−t
         | 
| 946 | 
            +
            2
         | 
| 947 | 
            +
            Output: O(ns+1) possible sequences, including the original codeword x ∈ CList
         | 
| 948 | 
            +
            t,s (n, κ, a; p)
         | 
| 949 | 
            +
            Compute φ(x′) based on x′ and compute a′′ to obtain (5).
         | 
| 950 | 
            +
            for e = (e1, . . . , es+1) such that ei ∈ {0, 1, . . ., p − 1}, ∀i ∈ {1, . . . , s + 1} do
         | 
| 951 | 
            +
            Get the solution set {j1, . . . , jℓ, k1, . . . , kr} by (6) and (7).
         | 
| 952 | 
            +
            Compute em from the solution set {j1, . . . , jℓ, k1, . . . , kr} using (8) for each s + 2 ≤ m ≤ t. Compute
         | 
| 953 | 
            +
            a∗
         | 
| 954 | 
            +
            m = a′′
         | 
| 955 | 
            +
            m − em. Solve (9) to obtain the unique solution set {d1, . . . , dt}.
         | 
| 956 | 
            +
            end
         | 
| 957 | 
            +
            For each fixed e, we can recover φ(x) from φ(x′) by a set of error positions {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} and
         | 
| 958 | 
            +
            then output x.
         | 
| 959 | 
            +
             | 
| 960 | 
            +
            15
         | 
| 961 | 
            +
            Next, we will present the result for a special case t = 1.
         | 
| 962 | 
            +
            Corollary 3. The list-decodable code CList
         | 
| 963 | 
            +
            1,s (n, s + 1, a; p) can correct a single 0-deletion and s adjacent transpositions with
         | 
| 964 | 
            +
            list size at most 2s and has redundancy (s + 1) log n + O(1).
         | 
| 965 | 
            +
            Proof. When t = 1, It can be noticed that when the deletion position is determined, means d is known. Since l, r ∈ {1, . . . , s}
         | 
| 966 | 
            +
            and a′′
         | 
| 967 | 
            +
            1 ≡ d + (ℓ − r) mod p, hence there are 2s choice for d, which means that the list size of CList
         | 
| 968 | 
            +
            1,s (n, s + 1, a; p) is at most
         | 
| 969 | 
            +
            2s.
         | 
| 970 | 
            +
            The above code CList
         | 
| 971 | 
            +
            1,s (n, s + 1, a; p) is capable of correcting a single 0-deletion and s adjacent transpositions with constant
         | 
| 972 | 
            +
            list size at most 2s and has redundancy (s + 1) log n + O(1). The list size is constant 2s, which is less than the list size O(n)
         | 
| 973 | 
            +
            when we directly substitute t = 1 to Theorem 9.
         | 
| 974 | 
            +
            V. CODES FOR CORRECTING LIMITED-MAGNITUDE BLOCKS OF 0-DELETIONS AND ADJACENT TRANSPOSITIONS
         | 
| 975 | 
            +
            In this section, we focus on studying the error of t blocks of asymmetric deletions with ℓ-limited-magnitude and s adjacent
         | 
| 976 | 
            +
            transpositions. t blocks of asymmetric deletions with ℓ-limited-magnitude denotes that there are at most t blocks of 0s are
         | 
| 977 | 
            +
            deleted with the length of each block is at most ℓ. Therefore, at most tℓ 0s are deleted and these t blocks of 0-deletions may
         | 
| 978 | 
            +
            occur in at most t 0 runs.
         | 
| 979 | 
            +
            For the sake of convenience in the following paper, we append a bit 1 at the end of x and denote it as x1. Since the sequence
         | 
| 980 | 
            +
            x1 always ends with 1, x1 can be always written as x1 = 0u110u210u3 . . . 0uw1, where w = wt(x1). In addition, we revisit
         | 
| 981 | 
            +
            the definition of function φ : Σn
         | 
| 982 | 
            +
            2 → Σw and φ(x)
         | 
| 983 | 
            +
            def= (u1, u2, u3, . . . , uw) �� Σw. Then, combining with Proposition 2, we can
         | 
| 984 | 
            +
            have that the length of each 0 run increase by at most 1 and decrease by at most tℓ + 1 through t blocks of 0-deletions with
         | 
| 985 | 
            +
            ℓ-limited-magnitude and s adjacent transpositions. Then, the definition of t blocks of 0-deletions with ℓ-limited-magnitude and
         | 
| 986 | 
            +
            s adjacent transpositions is provided as follows.
         | 
| 987 | 
            +
            Definition 4. Define the error ball B(n, t, k+, k−) such that
         | 
| 988 | 
            +
            B(n, t, k+, k−) = {u ∈ Σn
         | 
| 989 | 
            +
            q : −k− ≤ ui ≤ k+, wt(u) ≤ t}.
         | 
| 990 | 
            +
            where at most t entries increase by at most k+ and decrease by at most k− for a sequence with length n.
         | 
| 991 | 
            +
            Definition 5. t blocks of asymmetric deletions with ℓ-limited-magnitude and s adjacent transpositions denote that given a
         | 
| 992 | 
            +
            sequence x ∈ Σn
         | 
| 993 | 
            +
            2 , the retrieved sequence x′ through this type of error can be written as φ(x′1) = φ(x1) + v, where
         | 
| 994 | 
            +
            v ∈ B(w, t + 2s, 1, tℓ + 1) and w = wt(x′1) = wt(x1)
         | 
| 995 | 
            +
             | 
| 996 | 
            +
            16
         | 
| 997 | 
            +
            Example 6. Suppose we have x = 0100101001 ∈ Σ10
         | 
| 998 | 
            +
            2
         | 
| 999 | 
            +
            with ℓ = 2, t = 3 and s = 1, then φ(x1) = 12120. If the retrieved
         | 
| 1000 | 
            +
            sequence x′ = 0110110 ∈ Σ6
         | 
| 1001 | 
            +
            2 and the corresponding φ(x′1) = 10101, by comparing φ(x1) and φ(x′1), we can see
         | 
| 1002 | 
            +
            v = (0, −2, 0, −2, 1) ∈ B(5, 5, 1, 7).
         | 
| 1003 | 
            +
            Denote Φ be the set of mapping Σn
         | 
| 1004 | 
            +
            2 by the function φ and Σn
         | 
| 1005 | 
            +
            2 is the set containing all binary sequences with length n.
         | 
| 1006 | 
            +
            Lemma 7. The cardinality of Φ is:
         | 
| 1007 | 
            +
            |Φ| =
         | 
| 1008 | 
            +
            n+1
         | 
| 1009 | 
            +
            �
         | 
| 1010 | 
            +
            w=1
         | 
| 1011 | 
            +
            �
         | 
| 1012 | 
            +
            n
         | 
| 1013 | 
            +
            w − 1
         | 
| 1014 | 
            +
            �
         | 
| 1015 | 
            +
            = 2n.
         | 
| 1016 | 
            +
            (10)
         | 
| 1017 | 
            +
            Proof. For a binary sequence x ∈ Σn
         | 
| 1018 | 
            +
            2, the corresponding sequence φ(x1) is with length w = w(x1) and wt(φ(x1)) = n+1−w.
         | 
| 1019 | 
            +
            Also, the cardinality of Φ can be considered the number of ways of arranging n + 1 − w indistinguishable objects in w
         | 
| 1020 | 
            +
            distinguishable boxes. Thus, we can get the cardinality of Φ as shown in Lemma 7.
         | 
| 1021 | 
            +
            On the other side, since the mapping function φ is a one-to-one mapping function, the cardinality of Φ should be the same
         | 
| 1022 | 
            +
            as |Σn
         | 
| 1023 | 
            +
            2| = 2n.
         | 
| 1024 | 
            +
            Proposition 6. (cf. [36]) The code C(n, t, ℓ, s) for correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent
         | 
| 1025 | 
            +
            transpositions is equivalent to a packing to Σw by the error ball B(w, t+2s, 1, tℓ+1), where w = wt(x) and x ∈ C(n, t, ℓ, s).
         | 
| 1026 | 
            +
            A. Non-systematic Code Construction
         | 
| 1027 | 
            +
            In this section, we will provide a non-systematic construction for the code capable of correcting t blocks of 0-deletions with
         | 
| 1028 | 
            +
            ℓ-limited-magnitude and s adjacent transpositions. Then, we present the decoding algorithm of this code and a lower bound
         | 
| 1029 | 
            +
            of the code size.
         | 
| 1030 | 
            +
            Construction 4. The code C(n, t, ℓ, s) is defined as
         | 
| 1031 | 
            +
            C(n, t, ℓ, s) = {x ∈ Σn
         | 
| 1032 | 
            +
            2 : φ(x1) mod p ∈ Cp, wt(φ(x1)) = n + 1 − w},
         | 
| 1033 | 
            +
            where w = wt(x1) and Cp is a code over Σp with p is the smallest prime larger than tℓ + 2.
         | 
| 1034 | 
            +
            Lemma 8. C(n, t, ℓ, s) is capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions
         | 
| 1035 | 
            +
            for x ∈ C(n, t, ℓ, s) if Cp is capable of correcting t + 2s symmetric errors for φ(x1).
         | 
| 1036 | 
            +
            Lemma 9. ( [37], Theorem 10 ) Let p be a prime such that the distance 2 ≤ d ≤ p⌈m/2⌉−1 and n = pm − 1. Then, there
         | 
| 1037 | 
            +
            exists a narrow-sense [n, k, d]-BCH code Cp over Σp with
         | 
| 1038 | 
            +
            n − k = ⌈(d − 1)(1 − 1/p)⌉m.
         | 
| 1039 | 
            +
             | 
| 1040 | 
            +
            17
         | 
| 1041 | 
            +
            Theorem 10. Let p be the smallest prime such that p ≥ tℓ + 2, w = pm − 1, w = wt(x1) and Cp is a primitive narrow-sense
         | 
| 1042 | 
            +
            [w, k, 2(t + 2s) + 1]-BCH code with w − k = ⌈2(t + 2s)(1 − 1/p)⌉m, the code C(n, t, ℓ, s) such that
         | 
| 1043 | 
            +
            C(n, t, ℓ, s) = {x ∈ Σn
         | 
| 1044 | 
            +
            2 : φ(x1) mod p ∈ Cp, wt(φ(x1)) = n + 1 − w}.
         | 
| 1045 | 
            +
            is capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
         | 
| 1046 | 
            +
            Proof. Let x ∈ C(n, t, ℓ, s) be a codeword, and x′ be the output through the channel that has t blocks of 0-deletions with
         | 
| 1047 | 
            +
            ℓ-limited-magnitude and s adjacent transpositions. Let z′ = φ(x′1) mod p, where p is the smallest prime larger than tℓ + 2.
         | 
| 1048 | 
            +
            Run the decoding algorithm of Cp on z′ and output z∗. Thus, z∗ is also a linear code in Cp and it can be shown that
         | 
| 1049 | 
            +
            z∗ = φ(x1) mod p. Denote ǫ′ = (z′ − z∗) mod p, we can have that
         | 
| 1050 | 
            +
            (φ(x′1) − φ(x1)) mod p = (z′ − z∗) mod p = ǫ′.
         | 
| 1051 | 
            +
            (11)
         | 
| 1052 | 
            +
            and the error vector ǫ satisfies
         | 
| 1053 | 
            +
            ǫi =
         | 
| 1054 | 
            +
            
         | 
| 1055 | 
            +
            
         | 
| 1056 | 
            +
            
         | 
| 1057 | 
            +
            
         | 
| 1058 | 
            +
            
         | 
| 1059 | 
            +
            
         | 
| 1060 | 
            +
            
         | 
| 1061 | 
            +
            
         | 
| 1062 | 
            +
            
         | 
| 1063 | 
            +
            ǫ′
         | 
| 1064 | 
            +
            i,
         | 
| 1065 | 
            +
            if 0 ≤ ǫ′
         | 
| 1066 | 
            +
            i ≤ 1
         | 
| 1067 | 
            +
            ǫ′
         | 
| 1068 | 
            +
            i − p,
         | 
| 1069 | 
            +
            otherwise
         | 
| 1070 | 
            +
            .
         | 
| 1071 | 
            +
            (12)
         | 
| 1072 | 
            +
            Hence, the output is φ(x1) = φ(x′1) − ǫ and then recover x from φ(x1).
         | 
| 1073 | 
            +
            The detailed decoding steps are shown in Algorithm 3.
         | 
| 1074 | 
            +
            Algorithm 3: Decoding Algorithm of C(n, t, ℓ, s)
         | 
| 1075 | 
            +
            Input: Retrieved sequence x′
         | 
| 1076 | 
            +
            Output: Decoded sequence x ∈ C(n, t, ℓ, s).
         | 
| 1077 | 
            +
            Initialization: Let p be the smallest prime larger than tℓ + 2. Also, append 1 at the end of x′ and get φ(x′1).
         | 
| 1078 | 
            +
            Step 1: z′ = φ(x′1) mod p. Run the decoding algorithm of Cp on z′ to get the output z∗.
         | 
| 1079 | 
            +
            Step 2: ǫ′ = (z′ − z∗) mod p and then ǫ. φ(x1) = φ(x′1) − ǫ.
         | 
| 1080 | 
            +
            Step 3: Output x1 = φ−1(φ(x1)) and then x.
         | 
| 1081 | 
            +
            Example 7. Suppose x = 0100101001 and x′ = 0110110 ∈ Σ6
         | 
| 1082 | 
            +
            2 with ℓ = 2, t = 3 and s = 1. Since the retrieved sequence
         | 
| 1083 | 
            +
            x′ = 0110110, then φ(x′1) = 10101 and z′ = φ(x′) mod 11 = 10101, where p = 11 is smallest prime such that p ≥ tℓ + 2.
         | 
| 1084 | 
            +
            Run the decoding algorithm of Cp on z′ ∈ Cp, we have the output sequence z∗ = 12120. Hence ǫ′ = (z − z∗) mod 11 =
         | 
| 1085 | 
            +
            (0, 9, 0, 9, 1) and ǫ = (0, −2, 0, −2, 1). Thus, the output of the decoding algorithm φ(x1) = φ(x′1) − ǫ = (1, 0, 1, 0, 1) −
         | 
| 1086 | 
            +
            (0, −2, 0, −2, 1) = (1, 2, 1, 2, 0). Finally, x1 = 01001010011 and x = 0100101001.
         | 
| 1087 | 
            +
            Next, we will present a lower bound of the size of C(n, t, ℓ, s).
         | 
| 1088 | 
            +
             | 
| 1089 | 
            +
            18
         | 
| 1090 | 
            +
            Theorem 11. The size of the code C(n, t, ℓ, s) in Theorem 10 is bounded by
         | 
| 1091 | 
            +
            |C(n, t, ℓ, s)| ≥
         | 
| 1092 | 
            +
            2n
         | 
| 1093 | 
            +
            p(n + 1)⌈2(t+2s)(1−1/p)⌉ .
         | 
| 1094 | 
            +
            where p is the smallest prime larger than tℓ + 2.
         | 
| 1095 | 
            +
            Proof. Denote z = φ(x1) mod p. φ(x1) can be written as φ(x1) → (z, a) such that φ(x1) = z + p · a, where a is a
         | 
| 1096 | 
            +
            vector with the same length as φ(x1) and z. Further, since z ∈ Cp and Cp is a linear code, the code Cp with length w can be
         | 
| 1097 | 
            +
            considered as a set which is obtained by Σw
         | 
| 1098 | 
            +
            p partitioned into pw−k classes.
         | 
| 1099 | 
            +
            Denote φ(x1)w as the φ(x1) with length w. Thus, for any fixed number of weight w, the cardinality of φ(x1)w such that
         | 
| 1100 | 
            +
            φ(x1)w mod p ∈ Cp with length w is:
         | 
| 1101 | 
            +
            |φ(x1)w| =
         | 
| 1102 | 
            +
            �
         | 
| 1103 | 
            +
            n
         | 
| 1104 | 
            +
            w−1
         | 
| 1105 | 
            +
            �
         | 
| 1106 | 
            +
            pw−k .
         | 
| 1107 | 
            +
            Then, the size of the code C(n, t, ℓ, s) in Theorem 10 can be shown as:
         | 
| 1108 | 
            +
            |C(n, t, ℓ, s)| =
         | 
| 1109 | 
            +
            n+1
         | 
| 1110 | 
            +
            �
         | 
| 1111 | 
            +
            w=1
         | 
| 1112 | 
            +
            |φ(x1)w| =
         | 
| 1113 | 
            +
            n+1
         | 
| 1114 | 
            +
            �
         | 
| 1115 | 
            +
            w=1
         | 
| 1116 | 
            +
            �� n
         | 
| 1117 | 
            +
            w−1
         | 
| 1118 | 
            +
            �
         | 
| 1119 | 
            +
            pw−k
         | 
| 1120 | 
            +
            �
         | 
| 1121 | 
            +
            ≥
         | 
| 1122 | 
            +
            �n+1
         | 
| 1123 | 
            +
            w=1
         | 
| 1124 | 
            +
            �
         | 
| 1125 | 
            +
            n
         | 
| 1126 | 
            +
            w−1
         | 
| 1127 | 
            +
            �
         | 
| 1128 | 
            +
            pn+1−k
         | 
| 1129 | 
            +
            =
         | 
| 1130 | 
            +
            2n
         | 
| 1131 | 
            +
            pn+1−k .
         | 
| 1132 | 
            +
            (13)
         | 
| 1133 | 
            +
            From Lemma 9 and Theorem 10, let d = 2(t + 2s) + 1 and m = logp(n + 1).
         | 
| 1134 | 
            +
            pn−k+1 = p⌈2(t+2s)(1−1/p)⌉·logp(n+1)+1 = p(n + 1)⌈2(t+2s)(1−1/p)⌉.
         | 
| 1135 | 
            +
            (14)
         | 
| 1136 | 
            +
            Therefore, from (13) and (14), the size of the code C(n, t, ℓ, s) in Theorem 10 is bounded by
         | 
| 1137 | 
            +
            |C(n, t, ℓ, s)| ≥
         | 
| 1138 | 
            +
            2n
         | 
| 1139 | 
            +
            p(n + 1)⌈2(t+2s)(1−1/p)⌉ .
         | 
| 1140 | 
            +
            where p is the smallest prime larger than tℓ + 2.
         | 
| 1141 | 
            +
            B. Systematic Code Construction
         | 
| 1142 | 
            +
            In the previous subsection, we propose a non-systematic code C(n, t, ℓ, s) for correcting t blocks of 0-deletions with ℓ-limited-
         | 
| 1143 | 
            +
            magnitude and s adjacent transpositions. In this subsection, we will provide the efficient encoding and decoding function based
         | 
| 1144 | 
            +
            on the code C(n, t, ℓ, s) presented in Theorem 10.
         | 
| 1145 | 
            +
            1) Efficient Encoding: Before providing the efficient systematic encoding algorithm, we now introduce a useful lemma
         | 
| 1146 | 
            +
            proposed in [38] for encoding balanced sequences efficiently. The balanced sequence denotes the binary sequence with an
         | 
| 1147 | 
            +
            equal number of 0s and 1s, which will be used for distinguishing the boundary of redundancy.
         | 
| 1148 | 
            +
             | 
| 1149 | 
            +
            19
         | 
| 1150 | 
            +
            Lemma 10. (cf. [38]) Given the input x ∈ Σk
         | 
| 1151 | 
            +
            2, let the function s′ : Σk
         | 
| 1152 | 
            +
            2 → Σn
         | 
| 1153 | 
            +
            2 such that s′(x) ∈ Σn
         | 
| 1154 | 
            +
            2 is a balanced sequence,
         | 
| 1155 | 
            +
            where n = k + log k.
         | 
| 1156 | 
            +
            Definition 6. Given the input x ∈ Σk
         | 
| 1157 | 
            +
            2, let the function s : Σk
         | 
| 1158 | 
            +
            2 → Σn′
         | 
| 1159 | 
            +
            2 such that s(x) ∈ Σn′
         | 
| 1160 | 
            +
            2 whose first bit is 1 and s(x)[2,n′]
         | 
| 1161 | 
            +
            is balanced sequence with (n′ − 1)/2 0s and (n′ − 1)/2 1s, where n′ = k + log k + 1.
         | 
| 1162 | 
            +
            An adjacent transposition can be considered as two substitutions, hence the maximum total number of deletions and
         | 
| 1163 | 
            +
            substitutions in the t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions is r = tℓ+2s. The following
         | 
| 1164 | 
            +
            lemma is used for correcting deletions, insertions and substitutions up to r = tℓ + 2s in a binary sequence.
         | 
| 1165 | 
            +
            Lemma 11. (cf. [39]) Let t, ℓ, s be constants with respect to k. There exist an integer a ≤ 22r log k+o(log k) and a labeling
         | 
| 1166 | 
            +
            function fr : Σk
         | 
| 1167 | 
            +
            2 → Σ2Rr(k), where Rr(k) = O(r4 log k) such that {(x, a, fr(x) mod a) : x ∈ Σk
         | 
| 1168 | 
            +
            2} can correct deletions,
         | 
| 1169 | 
            +
            insertions and substitutions up to r = tℓ + 2s. Let gr(x) = (a, fr(x) mod a) ∈ Σ4r log k+o(log k)
         | 
| 1170 | 
            +
            2
         | 
| 1171 | 
            +
            for given x ∈ Σk
         | 
| 1172 | 
            +
            2.
         | 
| 1173 | 
            +
            Next, we define the mapping function from non-binary to binary.
         | 
| 1174 | 
            +
            Definition 7. Given the input x ∈ Σk
         | 
| 1175 | 
            +
            2, define the function b : Σk
         | 
| 1176 | 
            +
            p → Σn
         | 
| 1177 | 
            +
            2 such that b(u)[i·⌈log p⌉+1,(i+1)·⌈log p⌉] is the binary
         | 
| 1178 | 
            +
            form of ui, where n = k · ⌈log p⌉.
         | 
| 1179 | 
            +
            Given the parameters t, ℓ and s, let p be the smallest prime larger than tℓ + 2 and Cp in Lemma 9 be the p-ary primitive
         | 
| 1180 | 
            +
            narrow-sense [n, k, 2(t + 2s) + 1]-BCH codes.
         | 
| 1181 | 
            +
            Definition 8. Define the labeling function as g : Σk
         | 
| 1182 | 
            +
            p → Σn−k
         | 
| 1183 | 
            +
            p
         | 
| 1184 | 
            +
            such that (x, g(x)) is a p-ary primitive narrow-sense [n, k, 2(t +
         | 
| 1185 | 
            +
            2s) + 1]-BCH codes, where n = k + ⌈2(t + 2s)(1 − 1/p)⌉m and n = pm − 1.
         | 
| 1186 | 
            +
            Suppose the input sequence is c ∈ Σk
         | 
| 1187 | 
            +
            2, and we have φ(c1) with length rc = wt(c1). Then, let c′ = φ(c1) mod p ∈ Σrc
         | 
| 1188 | 
            +
            p ,
         | 
| 1189 | 
            +
            where p is the smallest prime larger than tℓ + 2, and append 0k+1−rc at the end of c′. Hence, we denote ¯c ∈ Σk+1
         | 
| 1190 | 
            +
            p
         | 
| 1191 | 
            +
            =
         | 
| 1192 | 
            +
            (c′, 0k+1−rc).
         | 
| 1193 | 
            +
            Next, encode ¯c via the labeling function g of the p-ary primitive narrow-sense [n, k, 2(t + 2s) + 1]-BCH code and output
         | 
| 1194 | 
            +
            the redundancy part g(¯c). We map the redundancy part g(¯c) into binary sequence b(g(¯c)) and make b(g(¯c)) to the balanced
         | 
| 1195 | 
            +
            sequence s(b(g(¯c))). Then, we prepend two 1s as the protecting bits at the beginning of s(b(g(¯c))) and denote h1(¯c) =
         | 
| 1196 | 
            +
            (1, 1, s(b(g(¯c)))).
         | 
| 1197 | 
            +
            Further, we need to protect the redundancy part h1(¯c). The idea is to apply the code in Lemma 11 on h1(¯c) since the code
         | 
| 1198 | 
            +
            in Lemma 11 is capable of correcting at most tℓ + 2s deletions and substitutions. Then, we output gr(h1(¯c)). In addition,
         | 
| 1199 | 
            +
            make gr(h1(¯c)) to balanced sequence s(gr(h1(¯c))) and repeat its each bit 2tℓ + 3 times. Let h2(¯c) = Rep2tℓ+3s(gr(h1(¯c))),
         | 
| 1200 | 
            +
             | 
| 1201 | 
            +
            20
         | 
| 1202 | 
            +
            where Repkx is the k-fold repetition of x.
         | 
| 1203 | 
            +
            Finally, we have the output Enc(c) = (c, h(c)), where h(c) = (h1(¯c), h2(¯c)). The detailed encoding steps are summarized
         | 
| 1204 | 
            +
            in the following Algorithm 4.
         | 
| 1205 | 
            +
            Algorithm 4: Encoding Algorithm
         | 
| 1206 | 
            +
            Input: c ∈ Σk
         | 
| 1207 | 
            +
            2
         | 
| 1208 | 
            +
            Output: Encoded sequence Enc(c) ∈ ΣN
         | 
| 1209 | 
            +
            2
         | 
| 1210 | 
            +
            Initialization: Let p be the smallest prime larger than tℓ + 2.
         | 
| 1211 | 
            +
            Step 1: Append 1 at the end of c and get φ(c1) with length rc = wt(c1).
         | 
| 1212 | 
            +
            Step 2: c′ = φ(c1) mod p ∈ Σrc
         | 
| 1213 | 
            +
            p . Append 0k+1−rc at the end of c′, then ¯c = (c′, 0k+1−rc).
         | 
| 1214 | 
            +
            Step 3: Encode ¯c via Cp and output g(¯c). Mapping g(¯c) to balanced binary sequence s(b(g(¯c))) and introduce
         | 
| 1215 | 
            +
            protecting bits h1(¯c) = (1, 1, s(b(g(¯c)))).
         | 
| 1216 | 
            +
            Step 4: Protect h1(¯c) via gr and obtain the total redundancy h(c) = (h1(¯c), h2(¯c)).
         | 
| 1217 | 
            +
            Step 5: Output Enc(c) = (c, h(c)) ∈ ΣN
         | 
| 1218 | 
            +
            2 .
         | 
| 1219 | 
            +
            Lemma 12. Given a sequence c ∈ Σk
         | 
| 1220 | 
            +
            2, Algorithm 4 outputs an encoded sequence Enc(c) ∈ ΣN
         | 
| 1221 | 
            +
            2 capable of correcting t blocks
         | 
| 1222 | 
            +
            of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
         | 
| 1223 | 
            +
            Therefore, the redundancy of the code h(c) = (h1(¯c), h2(¯c)) via this encoding process can be shown as follows.
         | 
| 1224 | 
            +
            Theorem 12. The total redundancy of the code Enc(c) ∈ ΣN
         | 
| 1225 | 
            +
            2 by given input c ∈ Σk
         | 
| 1226 | 
            +
            2 is
         | 
| 1227 | 
            +
            N − k = ⌈2(t + 2s)(1 − 1/p)⌉ · ⌈log p⌉
         | 
| 1228 | 
            +
            log p
         | 
| 1229 | 
            +
            log(N + 1) + O(log log N).
         | 
| 1230 | 
            +
            where p is smallest prime such that p ≥ tℓ + 2.
         | 
| 1231 | 
            +
            Proof. Let m = logp(N + 1), hence N = pm − 1. The lengths of the redundancy parts are as follows:
         | 
| 1232 | 
            +
            • n′′
         | 
| 1233 | 
            +
            1 is the length of g(¯c): n′′
         | 
| 1234 | 
            +
            1 = ⌈2(t + 2s)(1 − 1/p)⌉m;
         | 
| 1235 | 
            +
            • n′
         | 
| 1236 | 
            +
            1 is the length of b(g(¯c)): n′
         | 
| 1237 | 
            +
            1 = n′′
         | 
| 1238 | 
            +
            1 · ⌈log p⌉;
         | 
| 1239 | 
            +
            • n1 is the length of h1(¯c): n1 = n′
         | 
| 1240 | 
            +
            1 + log n′
         | 
| 1241 | 
            +
            1 + 3;
         | 
| 1242 | 
            +
            • n′′
         | 
| 1243 | 
            +
            2 is the length of gr(h1(¯c)): n′′
         | 
| 1244 | 
            +
            2 = 4(tℓ + 2s) log n1 + log n1;
         | 
| 1245 | 
            +
            • n′
         | 
| 1246 | 
            +
            2 is the length of s(f0(h1(¯c))): n′
         | 
| 1247 | 
            +
            2 = n′′
         | 
| 1248 | 
            +
            2 + log n′′
         | 
| 1249 | 
            +
            2 + 1;
         | 
| 1250 | 
            +
            • n2 is the length of h2(¯c): n2 = (2tℓ + 3)n′
         | 
| 1251 | 
            +
            2;
         | 
| 1252 | 
            +
             | 
| 1253 | 
            +
            21
         | 
| 1254 | 
            +
            Based on the above statement, we can see that N − k = n1 + n2, where
         | 
| 1255 | 
            +
            n′
         | 
| 1256 | 
            +
            1 = (⌈2(t + 2s)(1 − 1/p)⌉m) · ⌈log p⌉
         | 
| 1257 | 
            +
            with m = logp(N + 1). Hence, we have
         | 
| 1258 | 
            +
            n′
         | 
| 1259 | 
            +
            1 = ⌈2(t + 2s)(1 − 1/p)⌉ · ⌈log p⌉
         | 
| 1260 | 
            +
            log p
         | 
| 1261 | 
            +
            log(N + 1)
         | 
| 1262 | 
            +
            Since both t, p and s are constants, then log n′
         | 
| 1263 | 
            +
            1 = O(log log N) and n2 = O(log log N). Therefore, the total redundancy of
         | 
| 1264 | 
            +
            the code Enc(c) ∈ ΣN
         | 
| 1265 | 
            +
            2 given the input c ∈ Σk
         | 
| 1266 | 
            +
            2 can be shown as the Theorem 12.
         | 
| 1267 | 
            +
            2) Decoding Algorithm: Without loss of generality, suppose the encoded sequence Enc(c) ∈ ΣN
         | 
| 1268 | 
            +
            2 is transmitted through the
         | 
| 1269 | 
            +
            t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions channel, and we have the retrieved sequence
         | 
| 1270 | 
            +
            d ∈ ΣN−tℓ
         | 
| 1271 | 
            +
            2
         | 
| 1272 | 
            +
            . In this subsection, we will introduce the decoding algorithm for obtaining Dec(d) ∈ Σk
         | 
| 1273 | 
            +
            2 by given d ∈ ΣN−tℓ
         | 
| 1274 | 
            +
            2
         | 
| 1275 | 
            +
            .
         | 
| 1276 | 
            +
            First, we need to distinguish where the redundancy part begins. Since the error type is at most t blocks of 0-deletions with
         | 
| 1277 | 
            +
            ℓ-limited-magnitude and s adjacent transpositions, the number of 1s in d is the same as that of in Enc(c). Thus, we can
         | 
| 1278 | 
            +
            count the number of 1s from the end of d to find the beginning of the redundancy since the redundancy part is the balanced
         | 
| 1279 | 
            +
            sequence.
         | 
| 1280 | 
            +
            Hence, we find the (n2 + 2tℓ + 3)/2-th 1 and (n1/2 + n2/2 + tℓ + 3)-th 1 from the end of d and denote their entries as
         | 
| 1281 | 
            +
            ir2 and ir1, respectively. For the subsequence d[ir2,N−tℓ], since there are at most tℓ 0s deletions and s adjacent transpositions
         | 
| 1282 | 
            +
            occur in Enc(c)[N−n2+1,N], the (2tℓ + 3)-fold repetition code can help recover s(gr(h1(¯c))). Further, we can obtain parity
         | 
| 1283 | 
            +
            bits gr(h1(¯c)).
         | 
| 1284 | 
            +
            For the subsequence d[ir1,ir2−1], there are also at most tℓ 0-deletions and 2s substitutions occur in Enc(c)[N−n1−n2+1,N−n2].
         | 
| 1285 | 
            +
            The recovered parity bits gr(h1(¯c)) can help recover h1(¯c). Further, we remove the two 1 bits at the beginning of h1(¯c) and
         | 
| 1286 | 
            +
            get the g(¯c) from h1(¯c) = s(b(g(¯c))).
         | 
| 1287 | 
            +
            Finally, denote z = (φ(d[1,ir1−1], 1), 0k+1−rc) and z′ = z mod p, where rc is the length of φ(d[1,ir1−1], 1) and k =
         | 
| 1288 | 
            +
            N − n1 − n2. Then, the following decoding steps are the same as Algorithm 3 where z′ is the input of Step 1 of Algorithm 3.
         | 
| 1289 | 
            +
            The only difference is we need to first remove 0k+1−rc at the end before the last step of φ−1. Therefore, the main steps for
         | 
| 1290 | 
            +
            decoding d ∈ ΣN−tℓ
         | 
| 1291 | 
            +
            2
         | 
| 1292 | 
            +
            is summerized in Algorithm 5.
         | 
| 1293 | 
            +
            3) Time Complexity: For the encoding algorithm, it can be easily shown that the time complexity is dominated by the p-ary
         | 
| 1294 | 
            +
            narrow-sense BCH code and the code in Lemma 11, which is O(tn log n + (log n)2(tℓ+2s)+1).
         | 
| 1295 | 
            +
            For the decoding algorithm, the time complexity is also dominated by the decoding of the p-ary narrow-sense BCH code
         | 
| 1296 | 
            +
            and decoding for the code in Lemma 11. Therefore, the total time complexity of decoding is O(tn + (log n)tℓ+2s+1).
         | 
| 1297 | 
            +
             | 
| 1298 | 
            +
            22
         | 
| 1299 | 
            +
            Algorithm 5: Decoding Algorithm
         | 
| 1300 | 
            +
            Input: d ∈ ΣN−tℓ
         | 
| 1301 | 
            +
            2
         | 
| 1302 | 
            +
            Output: Decoded sequence Dec(d) ∈ Σk
         | 
| 1303 | 
            +
            2
         | 
| 1304 | 
            +
            Initialization: Let p be the smallest prime larger than tℓ + 2.
         | 
| 1305 | 
            +
            Step 1: Find the (n2 + 2tℓ + 3)/2-th 1 and (n1/2 + n2/2 + tℓ + 3)-th 1 from the end of d and denote their entries as
         | 
| 1306 | 
            +
            ir2 and ir1, respectively.
         | 
| 1307 | 
            +
            Step 2: Recover s(gr(h1(¯c))) from d[ir2,N−tℓ] and then get gr(h1(¯c)).
         | 
| 1308 | 
            +
            Step 3: Recover h1(¯c) via gr(h1(¯c)) and then obtain h1(¯c).
         | 
| 1309 | 
            +
            Step 4: Denote z′ = (φ(d[1,ir1−1], 1), 0k+1−rc) mod p. Input z′ to Step 1 of Algorithm 3 and run the remaining steps
         | 
| 1310 | 
            +
            of Algorithm 3.
         | 
| 1311 | 
            +
            Step 5: Output Dec(d).
         | 
| 1312 | 
            +
            VI. CONCLUSION
         | 
| 1313 | 
            +
            In this paper, motivated by the errors in the DNA data storage and flash memories, we presented codes for correcting
         | 
| 1314 | 
            +
            asymmetric deletions and adjacent transpositions. We first present three uniquely-decodable codes for different types of
         | 
| 1315 | 
            +
            asymmetric deletions and adjacent transpositions. We then construct a list-decodable code for correcting asymmetric deletions
         | 
| 1316 | 
            +
            and adjacent transpositions with low redundancy. At last, we present the code for correcting t blocks of 0-deletions with
         | 
| 1317 | 
            +
            ℓ-limited-magnitude and s adjacent transpositions.
         | 
| 1318 | 
            +
            However, there still remain some interesting problems.
         | 
| 1319 | 
            +
            • Construct codes that are capable of correcting symmetric t deletions and s adjacent transpositions with low redundancy.
         | 
| 1320 | 
            +
            • Construct codes that are capable of correcting t deletions/insertions + k substitutions + s adjacent transpositions.
         | 
| 1321 | 
            +
            • Construct codes for Damerau-Levenshtein distance for larger number of errors, not only constant t and s.
         | 
| 1322 | 
            +
            REFERENCES
         | 
| 1323 | 
            +
            [1] S. Wang, V. K. Vu, and V. Y. Tan, “Codes for the asymmetric Damerau–Levenshtein distance,” in 2022 IEEE Information Theory Workshop (ITW).
         | 
| 1324 | 
            +
            IEEE, 2022, pp. 558–563.
         | 
| 1325 | 
            +
            [2] V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” in Soviet physics doklady, vol. 10, no. 8.
         | 
| 1326 | 
            +
            Soviet Union,
         | 
| 1327 | 
            +
            1966, pp. 707–710.
         | 
| 1328 | 
            +
            [3] R. A. Wagner and M. J. Fischer, “The string-to-string correction problem,” Journal of the ACM (JACM), vol. 21, no. 1, pp. 168–173, 1974.
         | 
| 1329 | 
            +
            [4] J. Brakensiek and A. Rubinstein, “Constant-factor approximation of near-linear edit distance in near-linear time,” in Proceedings of the 52nd Annual
         | 
| 1330 | 
            +
            ACM SIGACT Symposium on Theory of Computing, 2020, pp. 685–698.
         | 
| 1331 | 
            +
             | 
| 1332 | 
            +
            23
         | 
| 1333 | 
            +
            [5] Y. M. Chee, H. M. Kiah, A. Vardy, V. K. Vu, and E. Yaakobi, “Codes correcting limited-shift errors in racetrack memories,” in 2018 IEEE International
         | 
| 1334 | 
            +
            Symposium on Information Theory (ISIT).
         | 
| 1335 | 
            +
            IEEE, 2018, pp. 96–100.
         | 
| 1336 | 
            +
            [6] Y. M. Chee, H. M. Kiah, A. Vardy, E. Yaakobi et al., “Coding for racetrack memories,” IEEE Transactions on Information Theory, vol. 64, no. 11, pp.
         | 
| 1337 | 
            +
            7094–7112, 2018.
         | 
| 1338 | 
            +
            [7] S. Archer, G. Mappouras, R. Calderbank, and D. Sorin, “Foosball coding: Correcting shift errors and bit flip errors in 3d racetrack memory,” in 2020
         | 
| 1339 | 
            +
            50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
         | 
| 1340 | 
            +
            IEEE, 2020, pp. 331–342.
         | 
| 1341 | 
            +
            [8] S. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free DNA-based data storage,” Scientific reports, vol. 7, no. 1, pp. 1–6, 2017.
         | 
| 1342 | 
            +
            [9] S. H. T. Yazdi, H. M. Kiah, E. Garcia-Ruiz, J. Ma, H. Zhao, and O. Milenkovic, “DNA-based storage: Trends and methods,” IEEE Transactions on
         | 
| 1343 | 
            +
            Molecular, Biological and Multi-Scale Communications, vol. 1, no. 3, pp. 230–248, 2015.
         | 
| 1344 | 
            +
            [10] K. Cai, Y. M. Chee, R. Gabrys, H. M. Kiah, and T. T. Nguyen, “Correcting a single indel/edit for DNA-based data storage: Linear-time encoders and
         | 
| 1345 | 
            +
            order-optimality,” IEEE Transactions on Information Theory, vol. 67, no. 6, pp. 3438–3451, 2021.
         | 
| 1346 | 
            +
            [11] C. Zhao and S. Sahni, “String correction using the Damerau-Levenshtein distance,” BMC bioinformatics, vol. 20, no. 11, pp. 1–28, 2019.
         | 
| 1347 | 
            +
            [12] R. Gabrys, E. Yaakobi, and O. Milenkovic, “Codes in the Damerau distance for deletion and adjacent transposition correction,” IEEE Transactions on
         | 
| 1348 | 
            +
            Information Theory, vol. 64, no. 4, pp. 2550–2570, 2017.
         | 
| 1349 | 
            +
            [13] V. I. Levenshtein, “Binary codes with correction for deletions and insertions of the symbol 1,” Problemy Peredachi Informatsii, vol. 1, no. 1, pp. 12–25,
         | 
| 1350 | 
            +
            1965.
         | 
| 1351 | 
            +
            [14] J. Ullman, “Near-optimal, single-synchronization-error-correcting code,” IEEE Transactions on Information Theory, vol. 12, no. 4, pp. 418–424, 1966.
         | 
| 1352 | 
            +
            [15] ——, “On the capabilities of codes to correct synchronization errors,” IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 95–105, 1967.
         | 
| 1353 | 
            +
            [16] L. G. Tallini, N. Elarief, and B. Bose, “On efficient repetition error correcting codes,” in 2010 IEEE International Symposium on Information Theory.
         | 
| 1354 | 
            +
            IEEE, 2010, pp. 1012–1016.
         | 
| 1355 | 
            +
            [17] L. Dolecek and V. Anantharam, “Repetition error correcting sets: Explicit constructions and prefixing methods,” SIAM Journal on Discrete Mathematics,
         | 
| 1356 | 
            +
            vol. 23, no. 4, pp. 2120–2146, 2010.
         | 
| 1357 | 
            +
            [18] H. Mahdavifar and A. Vardy, “Asymptotically optimal sticky-insertion-correcting codes with efficient encoding and decoding,” in 2017 IEEE International
         | 
| 1358 | 
            +
            Symposium on Information Theory (ISIT).
         | 
| 1359 | 
            +
            IEEE, 2017, pp. 2683–2687.
         | 
| 1360 | 
            +
            [19] S. Jain, F. F. Hassanzadeh, M. Schwartz, and J. Bruck, “Duplication-correcting codes for data storage in the DNA of living organisms,” IEEE Transactions
         | 
| 1361 | 
            +
            on Information Theory, vol. 63, no. 8, pp. 4996–5010, 2017.
         | 
| 1362 | 
            +
            [20] M. Kovaˇcevi´c and V. Y. Tan, “Asymptotically optimal codes correcting fixed-length duplication errors in dna storage systems,” IEEE Communications
         | 
| 1363 | 
            +
            Letters, vol. 22, no. 11, pp. 2194–2197, 2018.
         | 
| 1364 | 
            +
            [21] L. G. Tallini and B. Bose, “On a new class of error control codes and symmetric functions,” in 2008 IEEE International Symposium on Information
         | 
| 1365 | 
            +
            Theory.
         | 
| 1366 | 
            +
            IEEE, 2008, pp. 980–984.
         | 
| 1367 | 
            +
            [22] ——, “On L1-distance error control codes,” in 2011 IEEE International Symposium on Information Theory Proceedings.
         | 
| 1368 | 
            +
            IEEE, 2011, pp. 1061–1065.
         | 
| 1369 | 
            +
            [23] ——, “On L1 metric asymmetric/unidirectional error control codes, constrained weight codes and σ-codes,” in 2013 IEEE International Symposium on
         | 
| 1370 | 
            +
            Information Theory.
         | 
| 1371 | 
            +
            IEEE, 2013, pp. 694–698.
         | 
| 1372 | 
            +
            [24] L. G. Tallini, N. Alqwaifly, and B. Bose, “Deletions and insertions of the symbol “0” and asymmetric/unidirectional error control codes for the L1
         | 
| 1373 | 
            +
            metric,” IEEE Transactions on Information Theory, vol. 69, no. 1, pp. 86–106, 2022.
         | 
| 1374 | 
            +
            [25] L. Nunnelley, M. Burleson, L. Williams, and I. Beardsley, “Analysis of asymmetric deterministic bitshift errors in a hard disk file,” IEEE transactions
         | 
| 1375 | 
            +
            on magnetics, vol. 26, no. 5, pp. 2306–2308, 1990.
         | 
| 1376 | 
            +
            [26] A. Kuznetsov and A. H. Vinck, “The application of q-ary codes for the correction of single peak-shifts, deletions and insertions of zeros,” in Proceedings.
         | 
| 1377 | 
            +
            IEEE International Symposium on Information Theory.
         | 
| 1378 | 
            +
            IEEE, 1993, pp. 128–128.
         | 
| 1379 | 
            +
             | 
| 1380 | 
            +
            24
         | 
| 1381 | 
            +
            [27] S. Shamai and G. Kaplan, “Bounds on the cut-off rate of the peak shift magnetic recording channel,” European Transactions on Telecommunications,
         | 
| 1382 | 
            +
            vol. 4, no. 2, pp. 149–156, 1993.
         | 
| 1383 | 
            +
            [28] M. Kovaˇcevi´c, “Runlength-limited sequences and shift-correcting codes: Asymptotic analysis,” IEEE Transactions on Information Theory, vol. 65, no. 8,
         | 
| 1384 | 
            +
            pp. 4804–4814, 2019.
         | 
| 1385 | 
            +
            [29] I. Smagloy, L. Welter, A. Wachter-Zeh, and E. Yaakobi, “Single-deletion single-substitution correcting codes,” in 2020 IEEE International Symposium
         | 
| 1386 | 
            +
            on Information Theory (ISIT).
         | 
| 1387 | 
            +
            IEEE, 2020, pp. 775–780.
         | 
| 1388 | 
            +
            [30] W. Song, K. Cai, and T. T. Nguyen, “List-decodable codes for single-deletion single-substitution with list-size two,” in 2022 IEEE International Symposium
         | 
| 1389 | 
            +
            on Information Theory (ISIT).
         | 
| 1390 | 
            +
            IEEE, 2022, pp. 1004–1009.
         | 
| 1391 | 
            +
            [31] T. Klove, “Codes correcting a single insertion/deletion of a zero or a single peak-shift,” IEEE transactions on information theory, vol. 41, no. 1, pp.
         | 
| 1392 | 
            +
            279–283, 1995.
         | 
| 1393 | 
            +
            [32] R. Gabrys, V. Guruswami, J. Ribeiro, and K. Wu, “Beyond single-deletion correcting codes: Substitutions and transpositions,” IEEE Transactions on
         | 
| 1394 | 
            +
            Information Theory, vol. 69, no. 1, pp. 169–186, 2023.
         | 
| 1395 | 
            +
            [33] N. J. Sloane, “On single-deletion-correcting codes,” Codes and designs, vol. 10, pp. 273–291, 2000.
         | 
| 1396 | 
            +
            [34] R. M. Roth and P. H. Siegel, “Lee-metric BCH codes and their application to constrained and partial-response channels,” IEEE Transactions on Information
         | 
| 1397 | 
            +
            Theory, vol. 40, no. 4, pp. 1083–1096, 1994.
         | 
| 1398 | 
            +
            [35] R. Roth, Introduction to Coding Theory.
         | 
| 1399 | 
            +
            Cambridge University Press, 2006.
         | 
| 1400 | 
            +
            [36] H. Wei, X. Wang, and M. Schwartz, “On lattice packings and coverings of asymmetric limited-magnitude balls,” IEEE Transactions on Information
         | 
| 1401 | 
            +
            Theory, vol. 67, no. 8, pp. 5104–5115, 2021.
         | 
| 1402 | 
            +
            [37] S. A. Aly, A. Klappenecker, and P. K. Sarvepalli, “On quantum and classical BCH codes,” IEEE Transactions on Information Theory, vol. 53, no. 3,
         | 
| 1403 | 
            +
            pp. 1183–1188, 2007.
         | 
| 1404 | 
            +
            [38] D. Knuth, “Efficient balanced codes,” IEEE Transactions on Information Theory, vol. 32, no. 1, pp. 51–53, 1986.
         | 
| 1405 | 
            +
            [39] J. Sima, R. Gabrys, and J. Bruck, “Optimal systematic t-deletion correcting codes,” in 2020 IEEE International Symposium on Information Theory (ISIT).
         | 
| 1406 | 
            +
            IEEE, 2020, pp. 769–774.
         | 
| 1407 | 
            +
             | 
    	
        Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        _9AyT4oBgHgl3EQfRfam/content/tmp_files/2301.00068v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,488 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            On the Inconsistencies of Conditionals Learned by Masked Language
         | 
| 2 | 
            +
            Models
         | 
| 3 | 
            +
            Tom Young
         | 
| 4 | 
            +
            Yang You
         | 
| 5 | 
            +
            School of Computing,
         | 
| 6 | 
            +
            National University of Singapore
         | 
| 7 | |
| 8 | |
| 9 | 
            +
            Abstract
         | 
| 10 | 
            +
            Learning to predict masked tokens in a se-
         | 
| 11 | 
            +
            quence has been shown to be a powerful
         | 
| 12 | 
            +
            pretraining objective for large-scale language
         | 
| 13 | 
            +
            models. After training, such masked language
         | 
| 14 | 
            +
            models can provide distributions of tokens con-
         | 
| 15 | 
            +
            ditioned on bidirectional context.
         | 
| 16 | 
            +
            In this short draft, we show that such bidirec-
         | 
| 17 | 
            +
            tional conditionals often demonstrate consider-
         | 
| 18 | 
            +
            able inconsistencies, i.e., they can not be de-
         | 
| 19 | 
            +
            rived from a coherent joint distribution when
         | 
| 20 | 
            +
            considered together. We empirically quantify
         | 
| 21 | 
            +
            such inconsistencies in the simple scenario of
         | 
| 22 | 
            +
            bigrams for two common styles of masked lan-
         | 
| 23 | 
            +
            guage models: T5-style and BERT-style 1. For
         | 
| 24 | 
            +
            example, we show that T5 models often con-
         | 
| 25 | 
            +
            fuse its own preference regarding two similar
         | 
| 26 | 
            +
            bigrams.
         | 
| 27 | 
            +
            Such inconsistencies may represent a theoreti-
         | 
| 28 | 
            +
            cal pitfall for the research work on sampling
         | 
| 29 | 
            +
            sequences based on the bidirectional condi-
         | 
| 30 | 
            +
            tionals learned by BERT-style MLMs. This
         | 
| 31 | 
            +
            phenomenon also means that T5-style MLMs
         | 
| 32 | 
            +
            capable of infilling will generate discrepant
         | 
| 33 | 
            +
            results depending on how much masking is
         | 
| 34 | 
            +
            given, which may represent a particular trust
         | 
| 35 | 
            +
            issue.
         | 
| 36 | 
            +
            1
         | 
| 37 | 
            +
            Introduction
         | 
| 38 | 
            +
            Pretraining objectives of large language models
         | 
| 39 | 
            +
            can be roughly divided into two categories. First,
         | 
| 40 | 
            +
            vanilla next token prediction (Brown et al., 2020)
         | 
| 41 | 
            +
            aims to learn the distribution of the next token in a
         | 
| 42 | 
            +
            sequence given the context to the left. Second, the
         | 
| 43 | 
            +
            masked language modeling (MLM) objective (De-
         | 
| 44 | 
            +
            vlin et al., 2018; Raffel et al., 2020), which masks
         | 
| 45 | 
            +
            out a portion of the tokens in a sequence and asks
         | 
| 46 | 
            +
            the model to predict them, aims to learn the distri-
         | 
| 47 | 
            +
            bution of one or more tokens given bidirectional
         | 
| 48 | 
            +
            context.
         | 
| 49 | 
            +
            1https://github.com/tomyoung903/MLM_
         | 
| 50 | 
            +
            inconsistencies
         | 
| 51 | 
            +
            While the major breakthrough, aka, GPT3
         | 
| 52 | 
            +
            (Brown et al., 2020) was demonstrated using
         | 
| 53 | 
            +
            vanilla next token prediction, recent work (Tay
         | 
| 54 | 
            +
            et al., 2022; Zeng et al., 2022; Bavarian et al., 2022)
         | 
| 55 | 
            +
            has hinted that incorporating the masked language
         | 
| 56 | 
            +
            modeling objective may be highly beneficial. In ad-
         | 
| 57 | 
            +
            dition, (Tay et al., 2022) has demonstrated that such
         | 
| 58 | 
            +
            bidirectional conditionals provide strong infilling
         | 
| 59 | 
            +
            capabilities.
         | 
| 60 | 
            +
            One may notice that, unlike the unidirectional
         | 
| 61 | 
            +
            conditional distributions that vanilla next token pre-
         | 
| 62 | 
            +
            diction learns, the bidirectional conditionals that
         | 
| 63 | 
            +
            MLMs learn are overly abundant in terms of rep-
         | 
| 64 | 
            +
            resenting a coherent joint distribution. Therefore,
         | 
| 65 | 
            +
            they are not guaranteed to be self-consistent (see
         | 
| 66 | 
            +
            Chapter 2).
         | 
| 67 | 
            +
            A very simple example for such inconsisten-
         | 
| 68 | 
            +
            cies is shown in Figure 1. In this example, we
         | 
| 69 | 
            +
            obtain the bidirectional conditional distributions
         | 
| 70 | 
            +
            that the T5 model learned using two input masked
         | 
| 71 | 
            +
            sequences. The two similar sequences are designed
         | 
| 72 | 
            +
            with a small difference, in order to examine if the
         | 
| 73 | 
            +
            resulting conditionals satisfy a basic law of prob-
         | 
| 74 | 
            +
            abilities (hold consistency). Results clearly show
         | 
| 75 | 
            +
            otherwise. We design experiments to quantify such
         | 
| 76 | 
            +
            inconsistencies in Chapter 3.
         | 
| 77 | 
            +
            One interesting line of research in the litera-
         | 
| 78 | 
            +
            ture focused on whether and how the bidirectional
         | 
| 79 | 
            +
            conditionals that BERT-style MLMs provide can
         | 
| 80 | 
            +
            be used to construct the joint probability of a se-
         | 
| 81 | 
            +
            quence in a principled manner (Goyal et al., 2021;
         | 
| 82 | 
            +
            Ghazvininejad et al., 2019; Wang et al., 2019), just
         | 
| 83 | 
            +
            like vanilla next token prediction models. But the
         | 
| 84 | 
            +
            numerous papers on this topic have overlooked
         | 
| 85 | 
            +
            the concern of inconsistencies. (Yamakoshi et al.,
         | 
| 86 | 
            +
            2022) stated that “any deviations (supposedly) tend
         | 
| 87 | 
            +
            to be negligible with large datasets”. The experi-
         | 
| 88 | 
            +
            ments shown in Chapter 4 demonstrate that this is
         | 
| 89 | 
            +
            not the case at all. We thus posit that addressing the
         | 
| 90 | 
            +
            consistency issue should be treated as the first step
         | 
| 91 | 
            +
            in modeling the joint distribution with BERT-style
         | 
| 92 | 
            +
            arXiv:2301.00068v1  [cs.CL]  30 Dec 2022
         | 
| 93 | 
            +
             | 
| 94 | 
            +
            MLMs.
         | 
| 95 | 
            +
            2
         | 
| 96 | 
            +
            Why inconsistencies can occur in
         | 
| 97 | 
            +
            MLMs
         | 
| 98 | 
            +
            For a set of conditional distributions to be self-
         | 
| 99 | 
            +
            consistent, they need to be able to be derived from
         | 
| 100 | 
            +
            a single coherent joint distribution.
         | 
| 101 | 
            +
            One essential reason for the inconsistencies to
         | 
| 102 | 
            +
            occur among the conditionals provided by a trained
         | 
| 103 | 
            +
            MLM is that the number of conditionals it can
         | 
| 104 | 
            +
            calculate far exceeds the number of degrees of free-
         | 
| 105 | 
            +
            dom of a joint distribution.
         | 
| 106 | 
            +
            Consider a sequence of length L and with vo-
         | 
| 107 | 
            +
            cabulary V , the joint distribution of the tokens in
         | 
| 108 | 
            +
            such a sequence is defined by |V |L probabilities
         | 
| 109 | 
            +
            that sum to 1. Therefore, the number of degrees of
         | 
| 110 | 
            +
            freedom (D) of such a joint distribution is given
         | 
| 111 | 
            +
            by:
         | 
| 112 | 
            +
            Djoint = |V |L − 1,
         | 
| 113 | 
            +
            (1)
         | 
| 114 | 
            +
            Vanilla next token prediction models or MLMs
         | 
| 115 | 
            +
            essentially learn conditionals that predict some
         | 
| 116 | 
            +
            tokens in the sequence given others. Such con-
         | 
| 117 | 
            +
            ditional probabilities and probabilities from the
         | 
| 118 | 
            +
            joint distribution can be linearly derived from each
         | 
| 119 | 
            +
            other. Therefore, each free conditional that the
         | 
| 120 | 
            +
            language model is capable of specifying provides
         | 
| 121 | 
            +
            an additional constraint on the joint distribution.
         | 
| 122 | 
            +
            One can easily verify that a vanilla next token pre-
         | 
| 123 | 
            +
            diction based language model provides |V |L − 1
         | 
| 124 | 
            +
            free conditionals 2 to just exactly determine the
         | 
| 125 | 
            +
            joint distribution.
         | 
| 126 | 
            +
            Therefore, a vanilla next to-
         | 
| 127 | 
            +
            ken prediction model (no matter how it is trained,
         | 
| 128 | 
            +
            or even untrained) would never suffer from self-
         | 
| 129 | 
            +
            inconsistencies.
         | 
| 130 | 
            +
            MLMs, which can provide distributions of
         | 
| 131 | 
            +
            masked tokens given bidirectional context, could
         | 
| 132 | 
            +
            specify far more free conditionals.
         | 
| 133 | 
            +
            Even for the simplest case, where the MLM pre-
         | 
| 134 | 
            +
            dicts the distribution of only 1 (masked) token
         | 
| 135 | 
            +
            given L − 1 other (unmasked) tokens in the se-
         | 
| 136 | 
            +
            quence, the total number of free conditionals (N)
         | 
| 137 | 
            +
            is
         | 
| 138 | 
            +
            Nmlm(1) = L × (|V |L − |V |L−1),
         | 
| 139 | 
            +
            (2)
         | 
| 140 | 
            +
            Just Nmlm(1) is already far larger than Djoint.
         | 
| 141 | 
            +
            We leave the discussions for Nmlm(k) for later
         | 
| 142 | 
            +
            2A single softmax operation over V essentially gives |V |−
         | 
| 143 | 
            +
            1 free conditionals. Here we call conditionals free when they
         | 
| 144 | 
            +
            can be assigned any values decided by an underlying neural
         | 
| 145 | 
            +
            network.
         | 
| 146 | 
            +
            work. This fact sets up room for there to be in-
         | 
| 147 | 
            +
            consistencies among the conditionals an MLM pro-
         | 
| 148 | 
            +
            vides.
         | 
| 149 | 
            +
            We explain our strategies and quantification
         | 
| 150 | 
            +
            methods for diagnosing T5-style and BERT-style
         | 
| 151 | 
            +
            MLMs in the next 2 sections.
         | 
| 152 | 
            +
            3
         | 
| 153 | 
            +
            Diagnosing T5-style MLMs
         | 
| 154 | 
            +
            T5-style MLMs are capable of modeling the dis-
         | 
| 155 | 
            +
            tribution of segments of variable length in a given
         | 
| 156 | 
            +
            bidirectional context. Here we use the simple bi-
         | 
| 157 | 
            +
            gram scenario to expose the inconsistencies that
         | 
| 158 | 
            +
            exist among such distributions. Consider two bi-
         | 
| 159 | 
            +
            grams x1x21 and x1x22 that share a same token x1
         | 
| 160 | 
            +
            in the first position, the conditional distributions
         | 
| 161 | 
            +
            concerning such two bigrams should satisfy
         | 
| 162 | 
            +
            p(x21|x1)
         | 
| 163 | 
            +
            p(x22|x1) = p(x1x21)
         | 
| 164 | 
            +
            p(x1x22)
         | 
| 165 | 
            +
            (3)
         | 
| 166 | 
            +
            The left hand side can be obtained by only mask-
         | 
| 167 | 
            +
            ing the second token, leaving x1 in the context.
         | 
| 168 | 
            +
            While the right hand side can be obtained by mask-
         | 
| 169 | 
            +
            ing the whole bigram. For the example in Figure 1,
         | 
| 170 | 
            +
            “chicken” corresponds to x1. “Salad” and “breast”
         | 
| 171 | 
            +
            correspond to x21 and x22.
         | 
| 172 | 
            +
            We automatically build such a dataset of bigram
         | 
| 173 | 
            +
            pairs in a given context by running BART (Lewis
         | 
| 174 | 
            +
            et al., 2019) on a portion of the C4 dataset (Raffel
         | 
| 175 | 
            +
            et al., 2020) to generate another plausible bigram
         | 
| 176 | 
            +
            alternative to an existing one. We then use the two
         | 
| 177 | 
            +
            sequences to test T5’s inconsistencies regarding
         | 
| 178 | 
            +
            Equation 3 3.
         | 
| 179 | 
            +
            We can use relative difference (dr) of the left
         | 
| 180 | 
            +
            and right hand side of Equation 3 to quantify the
         | 
| 181 | 
            +
            inconsistency.
         | 
| 182 | 
            +
            dr = |lhs(3) − rhs(3)|
         | 
| 183 | 
            +
            lhs(3)
         | 
| 184 | 
            +
            (4)
         | 
| 185 | 
            +
            dr is expected to be 0 for a self-consistent MLM.
         | 
| 186 | 
            +
            Table 1 shows that dr is typically very large for
         | 
| 187 | 
            +
            the T5 family, although scaling up the model has a
         | 
| 188 | 
            +
            markable effect on reducing it.
         | 
| 189 | 
            +
            Another way to quantify the inconsistency re-
         | 
| 190 | 
            +
            garding the two bigrams is to count how often a
         | 
| 191 | 
            +
            severe case happens where the MLM disagrees
         | 
| 192 | 
            +
            with itself on which bigram it prefers. I.e., some-
         | 
| 193 | 
            +
            times lhs(3) > 1 and rhs(3) < 1, or lhs(3) < 1
         | 
| 194 | 
            +
            3We focus on plausible bigrams in this draft because they
         | 
| 195 | 
            +
            are most relevant in practice but Equation 3 should hold for
         | 
| 196 | 
            +
            all bigrams in all sentences in all corpora in a self-consistent
         | 
| 197 | 
            +
            MLM.
         | 
| 198 | 
            +
             | 
| 199 | 
            +
            The
         | 
| 200 | 
            +
            is a common choice of food.
         | 
| 201 | 
            +
            <mask>
         | 
| 202 | 
            +
            option
         | 
| 203 | 
            +
            𝑝
         | 
| 204 | 
            +
            …
         | 
| 205 | 
            +
            …
         | 
| 206 | 
            +
            breast
         | 
| 207 | 
            +
            0.030
         | 
| 208 | 
            +
            …
         | 
| 209 | 
            +
            …
         | 
| 210 | 
            +
            salad
         | 
| 211 | 
            +
            0.024
         | 
| 212 | 
            +
            …
         | 
| 213 | 
            +
            …
         | 
| 214 | 
            +
            The
         | 
| 215 | 
            +
            is a common choice of food.
         | 
| 216 | 
            +
            <mask>
         | 
| 217 | 
            +
            option
         | 
| 218 | 
            +
            𝑝
         | 
| 219 | 
            +
            …
         | 
| 220 | 
            +
            …
         | 
| 221 | 
            +
            chicken salad
         | 
| 222 | 
            +
            0.00028
         | 
| 223 | 
            +
            …
         | 
| 224 | 
            +
            …
         | 
| 225 | 
            +
            chicken breast
         | 
| 226 | 
            +
            0.00017
         | 
| 227 | 
            +
            …
         | 
| 228 | 
            +
            …
         | 
| 229 | 
            +
            Basic law of probabilities
         | 
| 230 | 
            +
            𝑝 salad chicken)
         | 
| 231 | 
            +
            𝑝 breast chicken) = 𝑝(chicken salad)
         | 
| 232 | 
            +
            𝑝(chicken breast)
         | 
| 233 | 
            +
            𝑝 breast chicken) > 𝑝 salad chicken)
         | 
| 234 | 
            +
            𝑝(chicken breast) < 𝑝(chicken salad)
         | 
| 235 | 
            +
            chicken
         | 
| 236 | 
            +
            Figure 1: A simple bigram example that exposes the inconsistencies in the T5 model. The conditional probabilities
         | 
| 237 | 
            +
            that the model learned (quoted from t5-11b fed with the shown masked sequences) contradict each other greatly.
         | 
| 238 | 
            +
            Not only are the ratios unbalanced, the model confuses its own preference of the two bigrams.
         | 
| 239 | 
            +
            and rhs(3) > 1.
         | 
| 240 | 
            +
            Figure 1 shows such a case,
         | 
| 241 | 
            +
            where t5-11b prefers “chicken salad” over “chicken
         | 
| 242 | 
            +
            breast” when considering the conditionals provided
         | 
| 243 | 
            +
            in rhs(3), yet its preference flips when considering
         | 
| 244 | 
            +
            lhs(3). Table 1 shows that disagreement on com-
         | 
| 245 | 
            +
            parison happens with considerable frequency, but
         | 
| 246 | 
            +
            scaling up models helps reduce it.
         | 
| 247 | 
            +
            4
         | 
| 248 | 
            +
            Diagnosing BERT-style MLMs
         | 
| 249 | 
            +
            Ever since the success of BERT (Devlin et al.,
         | 
| 250 | 
            +
            2018), there has been research effort (Goyal et al.,
         | 
| 251 | 
            +
            2021; Wang et al., 2019; Yamakoshi et al., 2022)
         | 
| 252 | 
            +
            on sampling sequences from it by modeling its
         | 
| 253 | 
            +
            implicitly specified joint distribution one way or
         | 
| 254 | 
            +
            another. For example, (Goyal et al., 2021) views
         | 
| 255 | 
            +
            it as an energy-based model defined using the
         | 
| 256 | 
            +
            bidirectional conditionals of the masked tokens.
         | 
| 257 | 
            +
            Such research effort is based on the intuition that
         | 
| 258 | 
            +
            bidirectional conditionals could be more robust
         | 
| 259 | 
            +
            than auto-regressive (unidirectional) conditionals
         | 
| 260 | 
            +
            (Goyal, 2021).
         | 
| 261 | 
            +
            This line of research operates based on the as-
         | 
| 262 | 
            +
            sumption that the overly abundant bidirectional
         | 
| 263 | 
            +
            conditionals that the BERT-style MLMs provide
         | 
| 264 | 
            +
            are self-consistent. (Yamakoshi et al., 2022) based
         | 
| 265 | 
            +
            on (Heckerman et al., 2000; Neville and Jensen,
         | 
| 266 | 
            +
            2007) stated that “any deviations (supposedly) tend
         | 
| 267 | 
            +
            to be negligible”.
         | 
| 268 | 
            +
            We demonstrate in this section that this is not
         | 
| 269 | 
            +
            the case at all. There are considerable inconsis-
         | 
| 270 | 
            +
            tencies that exist among the bidirectional condi-
         | 
| 271 | 
            +
            tionals that a trained BERT-style model provides.
         | 
| 272 | 
            +
            Figure 2 demonstrates such an example. Again
         | 
| 273 | 
            +
            we use bigrams as the simplest example to expose
         | 
| 274 | 
            +
            the inconsistencies. Because BERT-style MLMs
         | 
| 275 | 
            +
            cannot directly model the distribution of multiple
         | 
| 276 | 
            +
            tokens together (local joint distribution), we con-
         | 
| 277 | 
            +
            sider 4 bigrams this time: x11x21, x11x22, x12x21
         | 
| 278 | 
            +
            and x12x22. x11 and x12 are two possible tokens
         | 
| 279 | 
            +
            that the first position can take. x21 and x22 the sec-
         | 
| 280 | 
            +
            ond. One can easily verify 4 that the 8 conditional
         | 
| 281 | 
            +
            distributions concerning such four bigrams should
         | 
| 282 | 
            +
            theoretically satisfy
         | 
| 283 | 
            +
            p(x21|x11)
         | 
| 284 | 
            +
            p(x22|x11) × p(x11|x22)
         | 
| 285 | 
            +
            p(x12|x22) =
         | 
| 286 | 
            +
            p(x11|x21)
         | 
| 287 | 
            +
            p(x12|x21) × p(x21|x12)
         | 
| 288 | 
            +
            p(x22|x12)
         | 
| 289 | 
            +
            (5)
         | 
| 290 | 
            +
            One way to test the inconsistencies among the 8
         | 
| 291 | 
            +
            conditionals is to try to solve one using the other
         | 
| 292 | 
            +
            7 and compare the solved conditional with the
         | 
| 293 | 
            +
            original (inferred by model) one. We show the
         | 
| 294 | 
            +
            solved conditionals in the example in Figure 2. It
         | 
| 295 | 
            +
            clearly demonstrates that the probabilities given by
         | 
| 296 | 
            +
            4Clue: converting each term to local joint distributions.
         | 
| 297 | 
            +
             | 
| 298 | 
            +
            I had
         | 
| 299 | 
            +
            eggs
         | 
| 300 | 
            +
            <mask>
         | 
| 301 | 
            +
            I had
         | 
| 302 | 
            +
            at lunch.
         | 
| 303 | 
            +
            <mask>
         | 
| 304 | 
            +
            𝑝
         | 
| 305 | 
            +
            Inferred
         | 
| 306 | 
            +
            Solved
         | 
| 307 | 
            +
            𝑝 duck eggs)
         | 
| 308 | 
            +
            1.7 × 10−4
         | 
| 309 | 
            +
            9.0 × 10−6
         | 
| 310 | 
            +
            𝑝 chicken eggs)
         | 
| 311 | 
            +
            1.1 × 10−3
         | 
| 312 | 
            +
            0.020
         | 
| 313 | 
            +
            𝑝 duck soup)
         | 
| 314 | 
            +
            3.1 × 10−4
         | 
| 315 | 
            +
            5.8 × 10−3
         | 
| 316 | 
            +
            𝑝 chicken soup)
         | 
| 317 | 
            +
            0.17
         | 
| 318 | 
            +
            9.2 × 10−3
         | 
| 319 | 
            +
            𝑝 eggs duck)
         | 
| 320 | 
            +
            5.7 × 10−3
         | 
| 321 | 
            +
            0.11
         | 
| 322 | 
            +
            𝑝 soup duck)
         | 
| 323 | 
            +
            0.23
         | 
| 324 | 
            +
            0.012
         | 
| 325 | 
            +
            𝑝 eggs chicken)
         | 
| 326 | 
            +
            6.8 × 10−4
         | 
| 327 | 
            +
            3.7 × 10−5
         | 
| 328 | 
            +
            𝑝 soup chicken)
         | 
| 329 | 
            +
            0.13
         | 
| 330 | 
            +
            2.31
         | 
| 331 | 
            +
            𝑝(eggs|duck)
         | 
| 332 | 
            +
            𝑝(soup|duck) ×
         | 
| 333 | 
            +
            𝑝(duck|soup)
         | 
| 334 | 
            +
            𝑝(chicken|soup) =
         | 
| 335 | 
            +
            𝑝(duck|eggs)
         | 
| 336 | 
            +
            𝑝(chicken|eggs) × 𝑝(eggs|chicken)
         | 
| 337 | 
            +
            𝑝(soup|chicken)
         | 
| 338 | 
            +
            at lunch.
         | 
| 339 | 
            +
            I had
         | 
| 340 | 
            +
            soup
         | 
| 341 | 
            +
            <mask>
         | 
| 342 | 
            +
            at lunch.
         | 
| 343 | 
            +
            duck
         | 
| 344 | 
            +
            I had
         | 
| 345 | 
            +
            at lunch.
         | 
| 346 | 
            +
            <mask>
         | 
| 347 | 
            +
            chicken
         | 
| 348 | 
            +
            Figure 2: An example of inconsistencies in the BERT-style MLM. Each “inferred” value refers to the probability
         | 
| 349 | 
            +
            given by the MLM (RoBERTa-large in this figure). Each “solved” value is obtained by passing the other 7 “inferred”
         | 
| 350 | 
            +
            values to the equation in the red square. We see that the difference between each inferred and solved value is
         | 
| 351 | 
            +
            significant. And the solved value may even be larger than 1.
         | 
| 352 | 
            +
            Metric
         | 
| 353 | 
            +
            T5-base
         | 
| 354 | 
            +
            T5-large
         | 
| 355 | 
            +
            T5-3b
         | 
| 356 | 
            +
            T5-11b
         | 
| 357 | 
            +
            Relative difference (dr, median, %)
         | 
| 358 | 
            +
            47.5
         | 
| 359 | 
            +
            45.8
         | 
| 360 | 
            +
            44.7
         | 
| 361 | 
            +
            42.0
         | 
| 362 | 
            +
            Disagreement on comparison (%)
         | 
| 363 | 
            +
            9.64
         | 
| 364 | 
            +
            8.85
         | 
| 365 | 
            +
            7.53
         | 
| 366 | 
            +
            6.54
         | 
| 367 | 
            +
            Table 1: Inconsistencies in the T5 model tested on 19399 pairs of bigrams. We show the median value for relative
         | 
| 368 | 
            +
            difference as it is resilient to outliers.
         | 
| 369 | 
            +
            a BERT-style MLM can be in serious inconsisten-
         | 
| 370 | 
            +
            cies with each other. We build a testing dataset
         | 
| 371 | 
            +
            with 4 such plausible bigrams for each context and
         | 
| 372 | 
            +
            quantify consistencies in using difference of log
         | 
| 373 | 
            +
            probabilities:
         | 
| 374 | 
            +
            | log psolved − log pinferred|
         | 
| 375 | 
            +
            (6)
         | 
| 376 | 
            +
            Table 2 shows the results.
         | 
| 377 | 
            +
            5
         | 
| 378 | 
            +
            Summary
         | 
| 379 | 
            +
            This draft demonstrates and naively quantifies the
         | 
| 380 | 
            +
            inconsistencies that exist in large MLMs in the
         | 
| 381 | 
            +
            simple scenario of bigrams. Such inconsistencies
         | 
| 382 | 
            +
            originate from the fact that the number of bidirec-
         | 
| 383 | 
            +
            tional conditionals MLMs can learn far exceeds
         | 
| 384 | 
            +
            what is needed for constructing the joint distribu-
         | 
| 385 | 
            +
            tion. Given the recent evidence that MLM-based
         | 
| 386 | 
            +
            pretraining might be a powerful paradigm, we think
         | 
| 387 | 
            +
            that resolving the its consistency issue could be a
         | 
| 388 | 
            +
            necessary step for future work.
         | 
| 389 | 
            +
            Acknowledgements
         | 
| 390 | 
            +
            We would like to thank Fuzhao Xue for the useful
         | 
| 391 | 
            +
            discussions.
         | 
| 392 | 
            +
            References
         | 
| 393 | 
            +
            Mohammad Bavarian, Heewoo Jun, Nikolas Tezak,
         | 
| 394 | 
            +
            John Schulman, Christine McLeavey, Jerry Tworek,
         | 
| 395 | 
            +
            and Mark Chen. 2022.
         | 
| 396 | 
            +
            Efficient training of lan-
         | 
| 397 | 
            +
            guage models to fill in the middle. arXiv preprint
         | 
| 398 | 
            +
            arXiv:2207.14255.
         | 
| 399 | 
            +
            Tom B Brown, Benjamin Mann, Nick Ryder, Melanie
         | 
| 400 | 
            +
            Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind
         | 
| 401 | 
            +
            Neelakantan, Pranav Shyam, Girish Sastry, Amanda
         | 
| 402 | 
            +
            Askell, et al. 2020. Language models are few-shot
         | 
| 403 | 
            +
            learners. arXiv preprint arXiv:2005.14165.
         | 
| 404 | 
            +
            Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
         | 
| 405 | 
            +
            Kristina Toutanova. 2018. Bert: Pre-training of deep
         | 
| 406 | 
            +
            bidirectional transformers for language understand-
         | 
| 407 | 
            +
            ing. arXiv preprint arXiv:1810.04805.
         | 
| 408 | 
            +
            Marjan Ghazvininejad, Omer Levy, Yinhan Liu, and
         | 
| 409 | 
            +
            Luke Zettlemoyer. 2019.
         | 
| 410 | 
            +
            Mask-predict: Parallel
         | 
| 411 | 
            +
             | 
| 412 | 
            +
            Metric
         | 
| 413 | 
            +
            Roberta-base
         | 
| 414 | 
            +
            Roberta-large
         | 
| 415 | 
            +
            log-probability difference
         | 
| 416 | 
            +
            0.836
         | 
| 417 | 
            +
            0.792
         | 
| 418 | 
            +
            Table 2: Difference of log-probabilities between inferred and solved conditionals. The difference would be 0 for
         | 
| 419 | 
            +
            self-consistent MLMs. Roughly a 0.8 difference means that one is 120% larger than the other.
         | 
| 420 | 
            +
            decoding of conditional masked language models.
         | 
| 421 | 
            +
            arXiv preprint arXiv:1904.09324.
         | 
| 422 | 
            +
            K. Goyal. 2021. Characterizing and overcoming the
         | 
| 423 | 
            +
            limitations of neural autoregressive models.
         | 
| 424 | 
            +
            PhD
         | 
| 425 | 
            +
            thesis.
         | 
| 426 | 
            +
            Kartik Goyal, Chris Dyer, and Taylor Berg-Kirkpatrick.
         | 
| 427 | 
            +
            2021. Exposing the implicit energy networks behind
         | 
| 428 | 
            +
            masked language models via metropolis–hastings.
         | 
| 429 | 
            +
            arXiv preprint arXiv:2106.02736.
         | 
| 430 | 
            +
            David
         | 
| 431 | 
            +
            Heckerman,
         | 
| 432 | 
            +
            David
         | 
| 433 | 
            +
            Maxwell
         | 
| 434 | 
            +
            Chickering,
         | 
| 435 | 
            +
            Christopher Meek, Robert Rounthwaite, and Carl
         | 
| 436 | 
            +
            Kadie. 2000. Dependency networks for inference,
         | 
| 437 | 
            +
            collaborative filtering, and data visualization. Jour-
         | 
| 438 | 
            +
            nal of Machine Learning Research, 1(Oct):49–75.
         | 
| 439 | 
            +
            Mike
         | 
| 440 | 
            +
            Lewis,
         | 
| 441 | 
            +
            Yinhan
         | 
| 442 | 
            +
            Liu,
         | 
| 443 | 
            +
            Naman
         | 
| 444 | 
            +
            Goyal,
         | 
| 445 | 
            +
            Mar-
         | 
| 446 | 
            +
            jan Ghazvininejad, Abdelrahman Mohamed, Omer
         | 
| 447 | 
            +
            Levy, Ves Stoyanov, and Luke Zettlemoyer. 2019.
         | 
| 448 | 
            +
            Bart: Denoising sequence-to-sequence pre-training
         | 
| 449 | 
            +
            for natural language generation, translation, and
         | 
| 450 | 
            +
            comprehension. arXiv preprint arXiv:1910.13461.
         | 
| 451 | 
            +
            Jennifer Neville and David Jensen. 2007. Relational
         | 
| 452 | 
            +
            dependency networks. Journal of Machine Learning
         | 
| 453 | 
            +
            Research, 8(3).
         | 
| 454 | 
            +
            Colin Raffel, Noam Shazeer, Adam Roberts, Katherine
         | 
| 455 | 
            +
            Lee, Sharan Narang, Michael Matena, Yanqi Zhou,
         | 
| 456 | 
            +
            Wei Li, Peter J Liu, et al. 2020. Exploring the limits
         | 
| 457 | 
            +
            of transfer learning with a unified text-to-text trans-
         | 
| 458 | 
            +
            former. J. Mach. Learn. Res., 21(140):1–67.
         | 
| 459 | 
            +
            Yi Tay, Jason Wei, Hyung Won Chung, Vinh Q
         | 
| 460 | 
            +
            Tran, David R So, Siamak Shakeri, Xavier Gar-
         | 
| 461 | 
            +
            cia, Huaixiu Steven Zheng, Jinfeng Rao, Aakanksha
         | 
| 462 | 
            +
            Chowdhery, et al. 2022.
         | 
| 463 | 
            +
            Transcending scaling
         | 
| 464 | 
            +
            laws with 0.1% extra compute.
         | 
| 465 | 
            +
            arXiv preprint
         | 
| 466 | 
            +
            arXiv:2210.11399.
         | 
| 467 | 
            +
            Alex
         | 
| 468 | 
            +
            Wang,
         | 
| 469 | 
            +
            Kyunghyun
         | 
| 470 | 
            +
            Cho,
         | 
| 471 | 
            +
            and
         | 
| 472 | 
            +
            CIFAR
         | 
| 473 | 
            +
            Azrieli Global Scholar. 2019.
         | 
| 474 | 
            +
            Bert has a mouth,
         | 
| 475 | 
            +
            and it must speak: Bert as a markov random field
         | 
| 476 | 
            +
            language model. NAACL HLT 2019, page 30.
         | 
| 477 | 
            +
            Takateru Yamakoshi, Thomas L Griffiths, and Robert
         | 
| 478 | 
            +
            Hawkins. 2022. Probing bert’s priors with serial re-
         | 
| 479 | 
            +
            production chains. In Findings of the Association
         | 
| 480 | 
            +
            for Computational Linguistics: ACL 2022, pages
         | 
| 481 | 
            +
            3977–3992.
         | 
| 482 | 
            +
            Aohan Zeng, Xiao Liu, Zhengxiao Du, Zihan Wang,
         | 
| 483 | 
            +
            Hanyu Lai, Ming Ding, Zhuoyi Yang, Yifan Xu,
         | 
| 484 | 
            +
            Wendi Zheng, Xiao Xia, et al. 2022.
         | 
| 485 | 
            +
            Glm-130b:
         | 
| 486 | 
            +
            An open bilingual pre-trained model. arXiv preprint
         | 
| 487 | 
            +
            arXiv:2210.02414.
         | 
| 488 | 
            +
             | 
    	
        _9AyT4oBgHgl3EQfRfam/content/tmp_files/load_file.txt
    ADDED
    
    | @@ -0,0 +1,238 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf,len=237
         | 
| 2 | 
            +
            page_content='On the Inconsistencies of Conditionals Learned by Masked Language  Models  Tom Young  Yang You  School of Computing,  National University of Singapore  tomyoung@nus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 3 | 
            +
            page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 4 | 
            +
            page_content='sg  youy@comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 5 | 
            +
            page_content='nus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 6 | 
            +
            page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 7 | 
            +
            page_content='sg  Abstract  Learning to predict masked tokens in a se-  quence has been shown to be a powerful  pretraining objective for large-scale language  models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 8 | 
            +
            page_content=' After training, such masked language  models can provide distributions of tokens con-  ditioned on bidirectional context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 9 | 
            +
            page_content='  In this short draft, we show that such bidirec-  tional conditionals often demonstrate consider-  able inconsistencies, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 10 | 
            +
            page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 11 | 
            +
            page_content=', they can not be de-  rived from a coherent joint distribution when  considered together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 12 | 
            +
            page_content=' We empirically quantify  such inconsistencies in the simple scenario of  bigrams for two common styles of masked lan-  guage models: T5-style and BERT-style 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 13 | 
            +
            page_content=' For  example, we show that T5 models often con-  fuse its own preference regarding two similar  bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 14 | 
            +
            page_content='  Such inconsistencies may represent a theoreti-  cal pitfall for the research work on sampling  sequences based on the bidirectional condi-  tionals learned by BERT-style MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 15 | 
            +
            page_content=' This  phenomenon also means that T5-style MLMs  capable of infilling will generate discrepant  results depending on how much masking is  given, which may represent a particular trust  issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 16 | 
            +
            page_content='  1  Introduction  Pretraining objectives of large language models  can be roughly divided into two categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 17 | 
            +
            page_content=' First,  vanilla next token prediction (Brown et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 18 | 
            +
            page_content=', 2020)  aims to learn the distribution of the next token in a  sequence given the context to the left.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 19 | 
            +
            page_content=' Second, the  masked language modeling (MLM) objective (De-  vlin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 20 | 
            +
            page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 21 | 
            +
            page_content=' Raffel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 22 | 
            +
            page_content=', 2020), which masks  out a portion of the tokens in a sequence and asks  the model to predict them, aims to learn the distri-  bution of one or more tokens given bidirectional  context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 23 | 
            +
            page_content='  1https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 24 | 
            +
            page_content='com/tomyoung903/MLM_  inconsistencies  While the major breakthrough, aka, GPT3  (Brown et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 25 | 
            +
            page_content=', 2020) was demonstrated using  vanilla next token prediction, recent work (Tay  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 26 | 
            +
            page_content=', 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 27 | 
            +
            page_content=' Zeng et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 28 | 
            +
            page_content=', 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 29 | 
            +
            page_content=' Bavarian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 30 | 
            +
            page_content=', 2022)  has hinted that incorporating the masked language  modeling objective may be highly beneficial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 31 | 
            +
            page_content=' In ad-  dition, (Tay et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 32 | 
            +
            page_content=', 2022) has demonstrated that such  bidirectional conditionals provide strong infilling  capabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 33 | 
            +
            page_content='  One may notice that, unlike the unidirectional  conditional distributions that vanilla next token pre-  diction learns, the bidirectional conditionals that  MLMs learn are overly abundant in terms of rep-  resenting a coherent joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 34 | 
            +
            page_content=' Therefore,  they are not guaranteed to be self-consistent (see  Chapter 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 35 | 
            +
            page_content='  A very simple example for such inconsisten-  cies is shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 36 | 
            +
            page_content=' In this example, we  obtain the bidirectional conditional distributions  that the T5 model learned using two input masked  sequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 37 | 
            +
            page_content=' The two similar sequences are designed  with a small difference, in order to examine if the  resulting conditionals satisfy a basic law of prob-  abilities (hold consistency).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 38 | 
            +
            page_content=' Results clearly show  otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 39 | 
            +
            page_content=' We design experiments to quantify such  inconsistencies in Chapter 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 40 | 
            +
            page_content='  One interesting line of research in the litera-  ture focused on whether and how the bidirectional  conditionals that BERT-style MLMs provide can  be used to construct the joint probability of a se-  quence in a principled manner (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 41 | 
            +
            page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 42 | 
            +
            page_content='  Ghazvininejad et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 43 | 
            +
            page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 44 | 
            +
            page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 45 | 
            +
            page_content=', 2019), just  like vanilla next token prediction models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 46 | 
            +
            page_content=' But the  numerous papers on this topic have overlooked  the concern of inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 47 | 
            +
            page_content=' (Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 48 | 
            +
            page_content=',  2022) stated that “any deviations (supposedly) tend  to be negligible with large datasets”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 49 | 
            +
            page_content=' The experi-  ments shown in Chapter 4 demonstrate that this is  not the case at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 50 | 
            +
            page_content=' We thus posit that addressing the  consistency issue should be treated as the first step  in modeling the joint distribution with BERT-style  arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 51 | 
            +
            page_content='00068v1  [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 52 | 
            +
            page_content='CL]  30 Dec 2022  MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 53 | 
            +
            page_content='  2  Why inconsistencies can occur in  MLMs  For a set of conditional distributions to be self-  consistent, they need to be able to be derived from  a single coherent joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 54 | 
            +
            page_content='  One essential reason for the inconsistencies to  occur among the conditionals provided by a trained  MLM is that the number of conditionals it can  calculate far exceeds the number of degrees of free-  dom of a joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 55 | 
            +
            page_content='  Consider a sequence of length L and with vo-  cabulary V , the joint distribution of the tokens in  such a sequence is defined by |V |L probabilities  that sum to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 56 | 
            +
            page_content=' Therefore, the number of degrees of  freedom (D) of such a joint distribution is given  by:  Djoint = |V |L − 1,  (1)  Vanilla next token prediction models or MLMs  essentially learn conditionals that predict some  tokens in the sequence given others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 57 | 
            +
            page_content=' Such con-  ditional probabilities and probabilities from the  joint distribution can be linearly derived from each  other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 58 | 
            +
            page_content=' Therefore, each free conditional that the  language model is capable of specifying provides  an additional constraint on the joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 59 | 
            +
            page_content='  One can easily verify that a vanilla next token pre-  diction based language model provides |V |L − 1  free conditionals 2 to just exactly determine the  joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 60 | 
            +
            page_content='  Therefore, a vanilla next to-  ken prediction model (no matter how it is trained,  or even untrained) would never suffer from self-  inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 61 | 
            +
            page_content='  MLMs, which can provide distributions of  masked tokens given bidirectional context, could  specify far more free conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 62 | 
            +
            page_content='  Even for the simplest case, where the MLM pre-  dicts the distribution of only 1 (masked) token  given L − 1 other (unmasked) tokens in the se-  quence, the total number of free conditionals (N)  is  Nmlm(1) = L × (|V |L − |V |L−1),  (2)  Just Nmlm(1) is already far larger than Djoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 63 | 
            +
            page_content='  We leave the discussions for Nmlm(k) for later  2A single softmax operation over V essentially gives |V |−  1 free conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 64 | 
            +
            page_content=' Here we call conditionals free when they  can be assigned any values decided by an underlying neural  network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 65 | 
            +
            page_content='  work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 66 | 
            +
            page_content=' This fact sets up room for there to be in-  consistencies among the conditionals an MLM pro-  vides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 67 | 
            +
            page_content='  We explain our strategies and quantification  methods for diagnosing T5-style and BERT-style  MLMs in the next 2 sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 68 | 
            +
            page_content='  3  Diagnosing T5-style MLMs  T5-style MLMs are capable of modeling the dis-  tribution of segments of variable length in a given  bidirectional context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 69 | 
            +
            page_content=' Here we use the simple bi-  gram scenario to expose the inconsistencies that  exist among such distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 70 | 
            +
            page_content=' Consider two bi-  grams x1x21 and x1x22 that share a same token x1  in the first position, the conditional distributions  concerning such two bigrams should satisfy  p(x21|x1)  p(x22|x1) = p(x1x21)  p(x1x22)  (3)  The left hand side can be obtained by only mask-  ing the second token, leaving x1 in the context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 71 | 
            +
            page_content='  While the right hand side can be obtained by mask-  ing the whole bigram.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 72 | 
            +
            page_content=' For the example in Figure 1,  “chicken” corresponds to x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 73 | 
            +
            page_content=' “Salad” and “breast”  correspond to x21 and x22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 74 | 
            +
            page_content='  We automatically build such a dataset of bigram  pairs in a given context by running BART (Lewis  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 75 | 
            +
            page_content=', 2019) on a portion of the C4 dataset (Raffel  et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 76 | 
            +
            page_content=', 2020) to generate another plausible bigram  alternative to an existing one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 77 | 
            +
            page_content=' We then use the two  sequences to test T5’s inconsistencies regarding  Equation 3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 78 | 
            +
            page_content='  We can use relative difference (dr) of the left  and right hand side of Equation 3 to quantify the  inconsistency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 79 | 
            +
            page_content='  dr = |lhs(3) − rhs(3)|  lhs(3)  (4)  dr is expected to be 0 for a self-consistent MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 80 | 
            +
            page_content='  Table 1 shows that dr is typically very large for  the T5 family, although scaling up the model has a  markable effect on reducing it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 81 | 
            +
            page_content='  Another way to quantify the inconsistency re-  garding the two bigrams is to count how often a  severe case happens where the MLM disagrees  with itself on which bigram it prefers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 82 | 
            +
            page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 83 | 
            +
            page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 84 | 
            +
            page_content=', some-  times lhs(3) > 1 and rhs(3) < 1, or lhs(3) < 1  3We focus on plausible bigrams in this draft because they  are most relevant in practice but Equation 3 should hold for  all bigrams in all sentences in all corpora in a self-consistent  MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 85 | 
            +
            page_content='  The  is a common choice of food.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 86 | 
            +
            page_content='  <mask>  option  𝑝  …  …  breast  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 87 | 
            +
            page_content='030  …  …  salad  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 88 | 
            +
            page_content='024  …  …  The  is a common choice of food.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 89 | 
            +
            page_content='  <mask>  option  𝑝  …  …  chicken salad  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 90 | 
            +
            page_content='00028  …  …  chicken breast  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 91 | 
            +
            page_content='00017  …  …  Basic law of probabilities  𝑝 salad chicken)  𝑝 breast chicken) = 𝑝(chicken salad)  𝑝(chicken breast)  𝑝 breast chicken) > 𝑝 salad chicken)  𝑝(chicken breast) < 𝑝(chicken salad)  chicken  Figure 1: A simple bigram example that exposes the inconsistencies in the T5 model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 92 | 
            +
            page_content=' The conditional probabilities  that the model learned (quoted from t5-11b fed with the shown masked sequences) contradict each other greatly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 93 | 
            +
            page_content='  Not only are the ratios unbalanced, the model confuses its own preference of the two bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 94 | 
            +
            page_content='  and rhs(3) > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 95 | 
            +
            page_content='  Figure 1 shows such a case,  where t5-11b prefers “chicken salad” over “chicken  breast” when considering the conditionals provided  in rhs(3), yet its preference flips when considering  lhs(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 96 | 
            +
            page_content=' Table 1 shows that disagreement on com-  parison happens with considerable frequency, but  scaling up models helps reduce it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 97 | 
            +
            page_content='  4  Diagnosing BERT-style MLMs  Ever since the success of BERT (Devlin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 98 | 
            +
            page_content=',  2018), there has been research effort (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 99 | 
            +
            page_content=',  2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 100 | 
            +
            page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 101 | 
            +
            page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 102 | 
            +
            page_content=' Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 103 | 
            +
            page_content=', 2022)  on sampling sequences from it by modeling its  implicitly specified joint distribution one way or  another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 104 | 
            +
            page_content=' For example, (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 105 | 
            +
            page_content=', 2021) views  it as an energy-based model defined using the  bidirectional conditionals of the masked tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 106 | 
            +
            page_content='  Such research effort is based on the intuition that  bidirectional conditionals could be more robust  than auto-regressive (unidirectional) conditionals  (Goyal, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 107 | 
            +
            page_content='  This line of research operates based on the as-  sumption that the overly abundant bidirectional  conditionals that the BERT-style MLMs provide  are self-consistent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 108 | 
            +
            page_content=' (Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 109 | 
            +
            page_content=', 2022) based  on (Heckerman et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 110 | 
            +
            page_content=', 2000;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 111 | 
            +
            page_content=' Neville and Jensen,  2007) stated that “any deviations (supposedly) tend  to be negligible”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 112 | 
            +
            page_content='  We demonstrate in this section that this is not  the case at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 113 | 
            +
            page_content=' There are considerable inconsis-  tencies that exist among the bidirectional condi-  tionals that a trained BERT-style model provides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 114 | 
            +
            page_content='  Figure 2 demonstrates such an example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 115 | 
            +
            page_content=' Again  we use bigrams as the simplest example to expose  the inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 116 | 
            +
            page_content=' Because BERT-style MLMs  cannot directly model the distribution of multiple  tokens together (local joint distribution), we con-  sider 4 bigrams this time: x11x21, x11x22, x12x21  and x12x22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 117 | 
            +
            page_content=' x11 and x12 are two possible tokens  that the first position can take.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 118 | 
            +
            page_content=' x21 and x22 the sec-  ond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 119 | 
            +
            page_content=' One can easily verify 4 that the 8 conditional  distributions concerning such four bigrams should  theoretically satisfy  p(x21|x11)  p(x22|x11) × p(x11|x22)  p(x12|x22) =  p(x11|x21)  p(x12|x21) × p(x21|x12)  p(x22|x12)  (5)  One way to test the inconsistencies among the 8  conditionals is to try to solve one using the other  7 and compare the solved conditional with the  original (inferred by model) one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 120 | 
            +
            page_content=' We show the  solved conditionals in the example in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 121 | 
            +
            page_content=' It  clearly demonstrates that the probabilities given by  4Clue: converting each term to local joint distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 122 | 
            +
            page_content='  I had  eggs  <mask>  I had  at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 123 | 
            +
            page_content='  <mask>  𝑝  Inferred  Solved  𝑝 duck eggs)  1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 124 | 
            +
            page_content='7 × 10−4  9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 125 | 
            +
            page_content='0 × 10−6  𝑝 chicken eggs)  1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 126 | 
            +
            page_content='1 × 10−3  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 127 | 
            +
            page_content='020  𝑝 duck soup)  3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 128 | 
            +
            page_content='1 × 10−4  5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 129 | 
            +
            page_content='8 × 10−3  𝑝 chicken soup)  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 130 | 
            +
            page_content='17  9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 131 | 
            +
            page_content='2 × 10−3  𝑝 eggs duck)  5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 132 | 
            +
            page_content='7 × 10−3  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 133 | 
            +
            page_content='11  𝑝 soup duck)  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 134 | 
            +
            page_content='23  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 135 | 
            +
            page_content='012  𝑝 eggs chicken)  6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 136 | 
            +
            page_content='8 × 10−4  3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 137 | 
            +
            page_content='7 × 10−5  𝑝 soup chicken)  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 138 | 
            +
            page_content='13  2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 139 | 
            +
            page_content='31  𝑝(eggs|duck)  𝑝(soup|duck) ×  𝑝(duck|soup)  𝑝(chicken|soup) =  𝑝(duck|eggs)  𝑝(chicken|eggs) × 𝑝(eggs|chicken)  𝑝(soup|chicken)  at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 140 | 
            +
            page_content='  I had  soup  <mask>  at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 141 | 
            +
            page_content='  duck  I had  at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 142 | 
            +
            page_content='  <mask>  chicken  Figure 2: An example of inconsistencies in the BERT-style MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 143 | 
            +
            page_content=' Each “inferred” value refers to the probability  given by the MLM (RoBERTa-large in this figure).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 144 | 
            +
            page_content=' Each “solved” value is obtained by passing the other 7 “inferred”  values to the equation in the red square.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 145 | 
            +
            page_content=' We see that the difference between each inferred and solved value is  significant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 146 | 
            +
            page_content=' And the solved value may even be larger than 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 147 | 
            +
            page_content='  Metric  T5-base  T5-large  T5-3b  T5-11b  Relative difference (dr, median, %)  47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 148 | 
            +
            page_content='5  45.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 149 | 
            +
            page_content='8  44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 150 | 
            +
            page_content='7  42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 151 | 
            +
            page_content='0  Disagreement on comparison (%)  9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 152 | 
            +
            page_content='64  8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 153 | 
            +
            page_content='85  7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 154 | 
            +
            page_content='53  6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 155 | 
            +
            page_content='54  Table 1: Inconsistencies in the T5 model tested on 19399 pairs of bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 156 | 
            +
            page_content=' We show the median value for relative  difference as it is resilient to outliers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 157 | 
            +
            page_content='  a BERT-style MLM can be in serious inconsisten-  cies with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 158 | 
            +
            page_content=' We build a testing dataset  with 4 such plausible bigrams for each context and  quantify consistencies in using difference of log  probabilities:  | log psolved − log pinferred|  (6)  Table 2 shows the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 159 | 
            +
            page_content='  5  Summary  This draft demonstrates and naively quantifies the  inconsistencies that exist in large MLMs in the  simple scenario of bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 160 | 
            +
            page_content=' Such inconsistencies  originate from the fact that the number of bidirec-  tional conditionals MLMs can learn far exceeds  what is needed for constructing the joint distribu-  tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 161 | 
            +
            page_content=' Given the recent evidence that MLM-based  pretraining might be a powerful paradigm, we think  that resolving the its consistency issue could be a  necessary step for future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 162 | 
            +
            page_content='  Acknowledgements  We would like to thank Fuzhao Xue for the useful  discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 163 | 
            +
            page_content='  References  Mohammad Bavarian, Heewoo Jun, Nikolas Tezak,  John Schulman, Christine McLeavey, Jerry Tworek,  and Mark Chen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 164 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 165 | 
            +
            page_content='  Efficient training of lan-  guage models to fill in the middle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 166 | 
            +
            page_content=' arXiv preprint  arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 167 | 
            +
            page_content='14255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 168 | 
            +
            page_content='  Tom B Brown, Benjamin Mann, Nick Ryder, Melanie  Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind  Neelakantan, Pranav Shyam, Girish Sastry, Amanda  Askell, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 169 | 
            +
            page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 170 | 
            +
            page_content=' Language models are few-shot  learners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 171 | 
            +
            page_content=' arXiv preprint arXiv:2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 172 | 
            +
            page_content='14165.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 173 | 
            +
            page_content='  Jacob Devlin, Ming-Wei Chang, Kenton Lee, and  Kristina Toutanova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 174 | 
            +
            page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 175 | 
            +
            page_content=' Bert: Pre-training of deep  bidirectional transformers for language understand-  ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 176 | 
            +
            page_content=' arXiv preprint arXiv:1810.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 177 | 
            +
            page_content='04805.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 178 | 
            +
            page_content='  Marjan Ghazvininejad, Omer Levy, Yinhan Liu, and  Luke Zettlemoyer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 179 | 
            +
            page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 180 | 
            +
            page_content='  Mask-predict: Parallel  Metric  Roberta-base  Roberta-large  log-probability difference  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 181 | 
            +
            page_content='836  0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 182 | 
            +
            page_content='792  Table 2: Difference of log-probabilities between inferred and solved conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 183 | 
            +
            page_content=' The difference would be 0 for  self-consistent MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 184 | 
            +
            page_content=' Roughly a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 185 | 
            +
            page_content='8 difference means that one is 120% larger than the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 186 | 
            +
            page_content='  decoding of conditional masked language models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 187 | 
            +
            page_content='  arXiv preprint arXiv:1904.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 188 | 
            +
            page_content='09324.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 189 | 
            +
            page_content='  K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 190 | 
            +
            page_content=' Goyal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 191 | 
            +
            page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 192 | 
            +
            page_content=' Characterizing and overcoming the  limitations of neural autoregressive models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 193 | 
            +
            page_content='  PhD  thesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 194 | 
            +
            page_content='  Kartik Goyal, Chris Dyer, and Taylor Berg-Kirkpatrick.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 195 | 
            +
            page_content='  2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 196 | 
            +
            page_content=' Exposing the implicit energy networks behind  masked language models via metropolis–hastings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 197 | 
            +
            page_content='  arXiv preprint arXiv:2106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 198 | 
            +
            page_content='02736.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 199 | 
            +
            page_content='  David  Heckerman,  David  Maxwell  Chickering,  Christopher Meek, Robert Rounthwaite, and Carl  Kadie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 200 | 
            +
            page_content=' 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 201 | 
            +
            page_content=' Dependency networks for inference,  collaborative filtering, and data visualization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 202 | 
            +
            page_content=' Jour-  nal of Machine Learning Research, 1(Oct):49–75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 203 | 
            +
            page_content='  Mike  Lewis,  Yinhan  Liu,  Naman  Goyal,  Mar-  jan Ghazvininejad, Abdelrahman Mohamed, Omer  Levy, Ves Stoyanov, and Luke Zettlemoyer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 204 | 
            +
            page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 205 | 
            +
            page_content='  Bart: Denoising sequence-to-sequence pre-training  for natural language generation, translation, and  comprehension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 206 | 
            +
            page_content=' arXiv preprint arXiv:1910.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 207 | 
            +
            page_content='13461.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 208 | 
            +
            page_content='  Jennifer Neville and David Jensen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 209 | 
            +
            page_content=' 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 210 | 
            +
            page_content=' Relational  dependency networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 211 | 
            +
            page_content=' Journal of Machine Learning  Research, 8(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 212 | 
            +
            page_content='  Colin Raffel, Noam Shazeer, Adam Roberts, Katherine  Lee, Sharan Narang, Michael Matena, Yanqi Zhou,  Wei Li, Peter J Liu, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 213 | 
            +
            page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 214 | 
            +
            page_content=' Exploring the limits  of transfer learning with a unified text-to-text trans-  former.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 215 | 
            +
            page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 216 | 
            +
            page_content=' Mach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 217 | 
            +
            page_content=' Learn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 218 | 
            +
            page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 219 | 
            +
            page_content=', 21(140):1–67.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 220 | 
            +
            page_content='  Yi Tay, Jason Wei, Hyung Won Chung, Vinh Q  Tran, David R So, Siamak Shakeri, Xavier Gar-  cia, Huaixiu Steven Zheng, Jinfeng Rao, Aakanksha  Chowdhery, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 221 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 222 | 
            +
            page_content='  Transcending scaling  laws with 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 223 | 
            +
            page_content='1% extra compute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 224 | 
            +
            page_content='  arXiv preprint  arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 225 | 
            +
            page_content='11399.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 226 | 
            +
            page_content='  Alex  Wang,  Kyunghyun  Cho,  and  CIFAR  Azrieli Global Scholar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 227 | 
            +
            page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 228 | 
            +
            page_content='  Bert has a mouth,  and it must speak: Bert as a markov random field  language model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 229 | 
            +
            page_content=' NAACL HLT 2019, page 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 230 | 
            +
            page_content='  Takateru Yamakoshi, Thomas L Griffiths, and Robert  Hawkins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 231 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 232 | 
            +
            page_content=' Probing bert’s priors with serial re-  production chains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 233 | 
            +
            page_content=' In Findings of the Association  for Computational Linguistics: ACL 2022, pages  3977–3992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 234 | 
            +
            page_content='  Aohan Zeng, Xiao Liu, Zhengxiao Du, Zihan Wang,  Hanyu Lai, Ming Ding, Zhuoyi Yang, Yifan Xu,  Wendi Zheng, Xiao Xia, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 235 | 
            +
            page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 236 | 
            +
            page_content='  Glm-130b:  An open bilingual pre-trained model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 237 | 
            +
            page_content=' arXiv preprint  arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
| 238 | 
            +
            page_content='02414.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
         | 
    	
        _dA0T4oBgHgl3EQfPf96/content/tmp_files/2301.02176v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,1309 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            Draft version January 6, 2023
         | 
| 2 | 
            +
            Preprint typeset using LATEX style AASTeX6 v. 1.0
         | 
| 3 | 
            +
            AN EQUATION OF STATE OF CO FOR USE IN PLANETARY MODELING
         | 
| 4 | 
            +
            M. Podolak
         | 
| 5 | 
            +
            Dept. of Geosciences, Tel Aviv University, Tel Aviv, 69978 Israel
         | 
| 6 | 
            +
            A. Levi
         | 
| 7 | 
            +
            Braude College of Engineering, Karmiel, 2161002 Israel
         | 
| 8 | 
            +
            A. Vazan
         | 
| 9 | 
            +
            Astrophysics Research Center (ARCO), Dept. of Natural Sciences, Open University of Israel, Raanana, 43107 Israel
         | 
| 10 | 
            +
            U. Malamud
         | 
| 11 | 
            +
            Dept. of Geosciences, Tel Aviv University, Tel Aviv, 69978 Israel
         | 
| 12 | 
            +
            Department of Physics, Technion – Israel Institute of Technology, Technion City, 3200003 Haifa, Israel
         | 
| 13 | 
            +
            ABSTRACT
         | 
| 14 | 
            +
            Although carbon monoxide (CO) is an abundant molecule and may have great importance for planetary interiors,
         | 
| 15 | 
            +
            measurements of its properties are difficult due to its extreme volatility. We calculate the equation of state for CO over
         | 
| 16 | 
            +
            a range of temperature and density that is applicable to the conditions in planetary interiors. Previous experimental
         | 
| 17 | 
            +
            and theoretical studies cover only a limited temperature-density range. Our calculations match these early results
         | 
| 18 | 
            +
            well, but now cover the full range of relevance. The method of calculation is based on the general-purpose quotidian
         | 
| 19 | 
            +
            equation of state described by More et al. (1988), which is here used in order to generate a freely downloadable look-up
         | 
| 20 | 
            +
            table to be used by the community.
         | 
| 21 | 
            +
            1. INTRODUCTION
         | 
| 22 | 
            +
            When modeling planetary interiors, it is necessary to have adequate descriptions for the behavior of the constituent
         | 
| 23 | 
            +
            materials.
         | 
| 24 | 
            +
            Thus equation of state (EOS) tables have been produced for the two most abundant elements in the
         | 
| 25 | 
            +
            universe, hydrogen and helium (see, e.g. Chabrier et al. 2019), as well as other materials expected to be of importance
         | 
| 26 | 
            +
            for planet models, such as water (see, e.g. Haldemann et al. 2020), various silicates such as dunite (Benz et al. 1989),
         | 
| 27 | 
            +
            granite (Pierazzo et al. 1997), basalt (Pierazzo et al. 2005), quartz (Melosh 2007) and important metals such as iron
         | 
| 28 | 
            +
            (e.g. Emsenhuber et al. 2018).
         | 
| 29 | 
            +
            Since both carbon and oxygen have relatively high cosmic abundances, and since CO is a very stable molecule, CO
         | 
| 30 | 
            +
            could be an important constituent in planetary interiors (see, e.g. Lisse et al. 2022). Yet this possibility cannot be
         | 
| 31 | 
            +
            properly addressed because only limited regions of the CO EOS have been studied, and there are no complete equation
         | 
| 32 | 
            +
            of state tables available in the literature. Empirical measurements of the density of solid (α-cubic, β-hexagonal) and
         | 
| 33 | 
            +
            liquid CO have been made (Boon et al. 1967; Bierhals 2001), in addition to various other physical properties such as
         | 
| 34 | 
            +
            viscosity, heat capacity (Rudesko & Schubnikow 1934; Tancredi et al. 1994), and elastic constants (Gammon 1978). All
         | 
| 35 | 
            +
            of these studies are applicable to extremely low temperature and pressure conditions, and are ill-suited for planetary
         | 
| 36 | 
            +
            interior applications. The behavior of CO at higher pressures and temperatures has been studied, to a limited extent
         | 
| 37 | 
            +
            by Nellis et al. (1981) who reported the results of shock experiments.
         | 
| 38 | 
            +
            More recent work by Zhang et al. (2011)
         | 
| 39 | 
            +
            gives a more refined hugoniot for CO. In addition, theoretical calculations by Goodwin (1985) have investigated the
         | 
| 40 | 
            +
            region of pressures below 100 MPa. Individual pressure-temperature-density points have been computed from quantum
         | 
| 41 | 
            +
            molecular dynamics calculations by Massacrier et al. (2011), Wang & Zhang (2010), and Leonhardi & Militzer (2017).
         | 
| 42 | 
            +
            However, all of this data is insufficient for planetary modeling, where a much larger range of pressures and temperatures
         | 
| 43 | 
            +
            are encountered.
         | 
| 44 | 
            +
            The fact that shock-derived carbon condensates have diameters of the order of a few nanometers (Titov et al. 1989;
         | 
| 45 | 
            +
            Viecelli et al. 2001; Kr¨uger et al. 2005), and growth timescales of 100’s of picoseconds (Armstrong et al. 2020)) make
         | 
| 46 | |
| 47 | 
            +
            arXiv:2301.02176v1  [astro-ph.EP]  5 Jan 2023
         | 
| 48 | 
            +
             | 
| 49 | 
            +
            2
         | 
| 50 | 
            +
            direct DFT based molecular dynamics simulations of this system particularly challenging. Overcoming such immense
         | 
| 51 | 
            +
            difficulties often requires some synthesis between a DFT based approach and more classical force field models using
         | 
| 52 | 
            +
            various training models often referred to as machine learning approaches (see, e.g. Lindsey et al. 2020; Singraber et al.
         | 
| 53 | 
            +
            2019). These techniques are very demanding computationally. Therefore, our model which is in good agreement with
         | 
| 54 | 
            +
            experimental data and covers a very wide pressure-temperature domain is of merit.
         | 
| 55 | 
            +
            To this end we have generated an equation of state table for CO which we describe below.
         | 
| 56 | 
            +
            Our calculation is
         | 
| 57 | 
            +
            admittedly more crude, but it should be sufficiently close to reality so as to be useful in establishing model trends such
         | 
| 58 | 
            +
            as was done in the models of Podolak et al. (2022), for example. This paper is structured as follows: Section 2 gives a
         | 
| 59 | 
            +
            brief description of the method for computing the quotidian EOS (QEOS). This computation requires the knowledge
         | 
| 60 | 
            +
            of the density and bulk modulus at low energy. The DFT calculation of these parameters is described in section 3,
         | 
| 61 | 
            +
            and the results are given in section 4. The resulting EOS table and its comparison to experimental and theoretical
         | 
| 62 | 
            +
            work described above is given in section 5. It is hoped that this work will encourage more detailed EOS modeling for
         | 
| 63 | 
            +
            CO in the future.
         | 
| 64 | 
            +
            2. QUOTIDIAN EQUATION OF STATE
         | 
| 65 | 
            +
            More et al. (1988) present a general-purpose method for computing equations of state at high pressure, called the
         | 
| 66 | 
            +
            Quotidian Equation of State (QEOS). The QEOS is a statistical-mechanics-based method, in which thermodynamic
         | 
| 67 | 
            +
            quantities are derived from the Helmholtz free energy. The Helmholtz free energy term is composed of three parts: an
         | 
| 68 | 
            +
            ionic contribution, an electronic contribution, and a bonding correction. The ionic part is calculated by the Cowan
         | 
| 69 | 
            +
            model, a semi-empirical model which interpolates between known limiting physical cases (ideal gas law, Lindemann
         | 
| 70 | 
            +
            melting law, Dulong-Petit law, Gr¨uniesen EOS, Debye lattice). The electronic part is calculated using a modified
         | 
| 71 | 
            +
            Thomas-Fermi (TF) model. The TF model neglects attractive (bonding) forces between neutral atoms and therefore
         | 
| 72 | 
            +
            overestimates the critical point and the pressure near normal conditions. The bonding correction is used here to correct
         | 
| 73 | 
            +
            for the electronic part failure by calibration of the EOS with density and bulk modulus at reference conditions of zero
         | 
| 74 | 
            +
            (low) energy.
         | 
| 75 | 
            +
            This method has been used to develop EOS tables for Fe, SiO2 and H2O for use in planetary modeling which compare
         | 
| 76 | 
            +
            well with other EOS tables such as SESAME and ANEOS for these substances (Vazan et al. 2013, 2018, 2022). The
         | 
| 77 | 
            +
            QEOS input variables are: atomic number, atomic weight, and reference conditions density and bulk modulus. The
         | 
| 78 | 
            +
            calculated quantities are: pressure, specific internal energy, and specific entropy. The temperature-density range of
         | 
| 79 | 
            +
            the calculation is 11.6 < T < 1.16 × 106 K, and 2.5 × 10−13 < ρ < 100 g cm−3. The liquid-vapor phase transition is
         | 
| 80 | 
            +
            determined with regard to the Maxwell construction, based on finding equal Gibbs free energy on the liquid and the
         | 
| 81 | 
            +
            vapor sides of each isotherm (up to the critical temperature). As a result, there is no coexistence of vapor and liquid
         | 
| 82 | 
            +
            phases in the resulting smooth QEOS.
         | 
| 83 | 
            +
            In order to calculate a QEOS for CO, the method requires prior knowledge of the density and bulk modulus of the
         | 
| 84 | 
            +
            material at very low temperature and pressure. Unfortunately there have been no measurements of these quantities for
         | 
| 85 | 
            +
            the α-phase of CO. We therefore performed a first-principles calculation for this state using density-functional theory
         | 
| 86 | 
            +
            (DFT). This calculation described in the next section.
         | 
| 87 | 
            +
            3. COMPUTATIONAL METHODS
         | 
| 88 | 
            +
            Here we study the equation of state of α-CO at 0 K. The structure is taken from Hall & James (1976). We performed
         | 
| 89 | 
            +
            static total energy relaxations with the CP2K code (K¨uhne et al. 2020). We use the quickstep framework within CP2K
         | 
| 90 | 
            +
            with the Gaussian and plane waves mixed bases (GPW). We adopt the Gaussian basis sets from VandeVondele et al.
         | 
| 91 | 
            +
            (2005); VandeVondele & Hutter (2007), in conjunction with the pseudopotentials (GTH-PBE) of Goedecker, Teter,
         | 
| 92 | 
            +
            and Hutter (Goedecker et al. 1996; Hartwigsen et al. 1998; Krack 2005).
         | 
| 93 | 
            +
            Our system is converged for a planewave cutoff energy of 600 Ry and a REL CUTOFF of 40 Ry. We use the revised
         | 
| 94 | 
            +
            PBE exchange functional GGA X PBE R from Zhang & Yang (1998) and a PBE correlation functional, GGA C PBE
         | 
| 95 | 
            +
            (Perdew et al. 1996, 1997). These are found to be adequate choices when describing an aqueous system in conjunction
         | 
| 96 | 
            +
            with the non-local van der Waals correlation using the Grimme D3 method (Grimme et al. 2010), achieving convergence
         | 
| 97 | 
            +
            for R CUTOFF of 14. The calculations were done done on a 2x2x2 supercell consisting of 32 CO molecules. The
         | 
| 98 | 
            +
            derived data at 0 K is obtained using CELL OPT within CP2K and reported below.
         | 
| 99 | 
            +
            4. THE EQUATION OF STATE
         | 
| 100 | 
            +
            In table 1 and fig. 1 we give the volumes and energies derived for different pressures at 0 K. This data is fitted to a
         | 
| 101 | 
            +
            third order Birch-Murnaghan equation of state with a bulk modulus B= 6.556 ± 0.074 GPa, a pressure derivative for
         | 
| 102 | 
            +
             | 
| 103 | 
            +
            3
         | 
| 104 | 
            +
            Table 1.
         | 
| 105 | 
            +
            The volume, internal energy,
         | 
| 106 | 
            +
            and derived enthalpy as a function of pres-
         | 
| 107 | 
            +
            sure for the α-CO solid. Data is for a cubic
         | 
| 108 | 
            +
            supercell consisting of 32 CO molecules.
         | 
| 109 | 
            +
            P
         | 
| 110 | 
            +
            V
         | 
| 111 | 
            +
            U
         | 
| 112 | 
            +
            H
         | 
| 113 | 
            +
            [bar]
         | 
| 114 | 
            +
            [˚A3]
         | 
| 115 | 
            +
            [Ha]
         | 
| 116 | 
            +
            [Ha]
         | 
| 117 | 
            +
            30,000
         | 
| 118 | 
            +
            1012.664
         | 
| 119 | 
            +
            -694.3516
         | 
| 120 | 
            +
            -693.6548
         | 
| 121 | 
            +
            20,000
         | 
| 122 | 
            +
            1063.250
         | 
| 123 | 
            +
            -694.3819
         | 
| 124 | 
            +
            -693.8941
         | 
| 125 | 
            +
            10,000
         | 
| 126 | 
            +
            1134.213
         | 
| 127 | 
            +
            -694.4058
         | 
| 128 | 
            +
            -694.1456
         | 
| 129 | 
            +
            5000
         | 
| 130 | 
            +
            1186.408
         | 
| 131 | 
            +
            -694.4146
         | 
| 132 | 
            +
            -694.2785
         | 
| 133 | 
            +
            1000
         | 
| 134 | 
            +
            1243.957
         | 
| 135 | 
            +
            -694.4184
         | 
| 136 | 
            +
            -694.3899
         | 
| 137 | 
            +
            500
         | 
| 138 | 
            +
            1252.903
         | 
| 139 | 
            +
            -694.4185
         | 
| 140 | 
            +
            -694.4041
         | 
| 141 | 
            +
            250
         | 
| 142 | 
            +
            1257.361
         | 
| 143 | 
            +
            -694.4186
         | 
| 144 | 
            +
            -694.4114
         | 
| 145 | 
            +
            100
         | 
| 146 | 
            +
            1260.298
         | 
| 147 | 
            +
            -694.4186
         | 
| 148 | 
            +
            -694.4157
         | 
| 149 | 
            +
            50
         | 
| 150 | 
            +
            1261.144
         | 
| 151 | 
            +
            -694.4186
         | 
| 152 | 
            +
            -694.4172
         | 
| 153 | 
            +
            25
         | 
| 154 | 
            +
            1261.663
         | 
| 155 | 
            +
            -694.4186
         | 
| 156 | 
            +
            -694.4179
         | 
| 157 | 
            +
            10
         | 
| 158 | 
            +
            1261.931
         | 
| 159 | 
            +
            -694.4186
         | 
| 160 | 
            +
            -694.4183
         | 
| 161 | 
            +
            1
         | 
| 162 | 
            +
            1262.103
         | 
| 163 | 
            +
            -694.4186
         | 
| 164 | 
            +
            -694.4186
         | 
| 165 | 
            +
            the bulk modulus of B′ = 6.846 ± 0.120, and a zero pressure volume of V0 = 157.80 ± 0.05 ˚A3. The error bars are at
         | 
| 166 | 
            +
            the 2σ level. As mentioned above, the QEOS requires a knowledge of ρ and B at reference conditions of zero energy,
         | 
| 167 | 
            +
            and, based on this calculation, and a fit to the four lowest pressure points we take ρ = 1.179 g cm−3 and B= 2.676 GPa
         | 
| 168 | 
            +
            as the input parameters. Note that this value of B falls between the best fit value of 6.556 GPa given above and the
         | 
| 169 | 
            +
            value of 1.3 GPa measured by Gammon (1978) for β-CO.
         | 
| 170 | 
            +
            125
         | 
| 171 | 
            +
            130
         | 
| 172 | 
            +
            135
         | 
| 173 | 
            +
            140
         | 
| 174 | 
            +
            145
         | 
| 175 | 
            +
            150
         | 
| 176 | 
            +
            155
         | 
| 177 | 
            +
            160
         | 
| 178 | 
            +
            0
         | 
| 179 | 
            +
            0.5
         | 
| 180 | 
            +
            1
         | 
| 181 | 
            +
            1.5
         | 
| 182 | 
            +
            2
         | 
| 183 | 
            +
            2.5
         | 
| 184 | 
            +
            3
         | 
| 185 | 
            +
            3.5
         | 
| 186 | 
            +
            P [ GPa ]
         | 
| 187 | 
            +
            Fitted data to BM3
         | 
| 188 | 
            +
            Figure 1. Pressure versus unit cell volume for α-CO. The blue circles are unit cell volumes from our optimization data at 0 K, and the
         | 
| 189 | 
            +
            solid red curve is the fitted third order Birch-Murnaghan equation of state (BM3).
         | 
| 190 | 
            +
            Using the results of the DFT calculation described above in the quotidian code, we produced an equation of state
         | 
| 191 | 
            +
             | 
| 192 | 
            +
            4
         | 
| 193 | 
            +
            table giving the pressure, energy and entropy of CO for a large range of temperatures and densities.
         | 
| 194 | 
            +
            5. COMPARISON TO OTHER RESULTS
         | 
| 195 | 
            +
            0
         | 
| 196 | 
            +
            2
         | 
| 197 | 
            +
            4
         | 
| 198 | 
            +
            6
         | 
| 199 | 
            +
            8
         | 
| 200 | 
            +
            10
         | 
| 201 | 
            +
            12
         | 
| 202 | 
            +
            14
         | 
| 203 | 
            +
            16
         | 
| 204 | 
            +
            18
         | 
| 205 | 
            +
            20
         | 
| 206 | 
            +
            1.0E+08
         | 
| 207 | 
            +
            1.0E+09
         | 
| 208 | 
            +
            1.0E+10
         | 
| 209 | 
            +
            1.0E+11
         | 
| 210 | 
            +
            1.0E+12
         | 
| 211 | 
            +
            1.0E+13
         | 
| 212 | 
            +
            1.0E+14
         | 
| 213 | 
            +
            Density (g/cc)
         | 
| 214 | 
            +
            Pressure (Pa)
         | 
| 215 | 
            +
            Figure 2. Density as a function of pressure at zero temperature for the quotidian equation of state (black curve), and for the S-Z equation
         | 
| 216 | 
            +
            of state (blue curve). The red dots are the results of the DFT calculation.
         | 
| 217 | 
            +
            Salpeter & Zapolsky (1967) (S-Z) describe a semi-empirical formula for predicting the zero temperature pressure-
         | 
| 218 | 
            +
            density relation for materials with any average atomic number. In principle, the S-Z EOS is similar to the More et al.
         | 
| 219 | 
            +
            (1988) approach, since it relies on a Thomas-Fermi-Dirac model of the atom. However it does not include the effect
         | 
| 220 | 
            +
            of temperature, so it is not always suitable for planet modeling. Fig. 2 shows the comparison between our quotidian
         | 
| 221 | 
            +
            equation of state (QEOS) at zero temperature, and the S-Z EOS. As can be seen, the agreement is excellent, and
         | 
| 222 | 
            +
            improves at higher pressures, as expected. The red dots in the figure are the DFT calculations given in table 1 and
         | 
| 223 | 
            +
            fig. 1. These fall right on the QEOS curve.
         | 
| 224 | 
            +
            The QEOS can be compared to experimental data at higher temperatures as well.
         | 
| 225 | 
            +
            Goodwin (1985) gives the
         | 
| 226 | 
            +
            thermophysical properties of CO up to a pressure of 100 MPa. Fig. 3 shows that data for an isotherm at 1000 K (red
         | 
| 227 | 
            +
            dots) compared to the QEOS isotherm at that temperature (black curve). The discontinuity in the QEOS is due to
         | 
| 228 | 
            +
            the fact that the QEOS finds two phases in present in this pressure-temperature range and traverses this region using
         | 
| 229 | 
            +
            a Maxwell construction. As a result, the computed pressure remains constant over the relevant density range. The
         | 
| 230 | 
            +
            actual pressure, as shown by the red dots, increases along the extrapolation of the lower part of the curve, as expected.
         | 
| 231 | 
            +
            The exact position of the phase transition is sensitive to the choice of input parameters (zero energy density and bulk
         | 
| 232 | 
            +
            modulus), and the actual value may be shifted somewhat.
         | 
| 233 | 
            +
             | 
| 234 | 
            +
            5
         | 
| 235 | 
            +
            1.0E-04
         | 
| 236 | 
            +
            1.0E-03
         | 
| 237 | 
            +
            1.0E-02
         | 
| 238 | 
            +
            1.0E-01
         | 
| 239 | 
            +
            1.0E+00
         | 
| 240 | 
            +
            1.0E+01
         | 
| 241 | 
            +
            1.0E+02
         | 
| 242 | 
            +
            1.0E+06
         | 
| 243 | 
            +
            1.0E+07
         | 
| 244 | 
            +
            1.0E+08
         | 
| 245 | 
            +
            1.0E+09
         | 
| 246 | 
            +
            1.0E+10
         | 
| 247 | 
            +
            1.0E+11
         | 
| 248 | 
            +
            1.0E+12
         | 
| 249 | 
            +
            1.0E+13
         | 
| 250 | 
            +
            1.0E+14
         | 
| 251 | 
            +
            1.0E+15
         | 
| 252 | 
            +
            Density (g/cc)
         | 
| 253 | 
            +
            Pressure (Pa)
         | 
| 254 | 
            +
            Figure 3. Density as a function of pressure for an isotherm at T = 1000 K (black curve), compared to the data in Goodwin (1985) (red
         | 
| 255 | 
            +
            dots). See text for details.
         | 
| 256 | 
            +
            At still higher pressures and temperatures, there are the shock wave experiments of Nellis et al. (1981). In this case
         | 
| 257 | 
            +
            the temperatures are only inferred from the Hugoniot relations, and are different for the different pressures. More
         | 
| 258 | 
            +
            recently, Zhang et al. (2011) have used quantum molecular dynamics calculations to compute points along a hugoniot.
         | 
| 259 | 
            +
            These are shown (blue dots) together with the hugoniot calculated from our QEOS in Fig. 4. The black dots are the
         | 
| 260 | 
            +
            experimental points of Nellis et al. (1981). As can be seen, the agreement is quite good and is in the range of these
         | 
| 261 | 
            +
            works. At the highest temperatures (T ≳ 105 K) dissociation and ionization become important, and these effects are
         | 
| 262 | 
            +
            not directly included in our calculation. Nonetheless, the energies we compute for CO at T = 5 × 105 K for densities
         | 
| 263 | 
            +
            of 0.1, 1, 10, and 100 g cm−3 all fall within a factor of 1.5 or less from the values shown in fig. 9 of Massacrier et al.
         | 
| 264 | 
            +
            (2011).
         | 
| 265 | 
            +
            The full QEOS is summarized in Fig. 5. A short version for a range of pressures and temperatures that are expected
         | 
| 266 | 
            +
            to be important for planetary interior modeling given in table 2, while the complete table is available at the following
         | 
| 267 | 
            +
            site: CO EOS download.
         | 
| 268 | 
            +
             | 
| 269 | 
            +
            6
         | 
| 270 | 
            +
            0
         | 
| 271 | 
            +
            0.5
         | 
| 272 | 
            +
            1
         | 
| 273 | 
            +
            1.5
         | 
| 274 | 
            +
            2
         | 
| 275 | 
            +
            2.5
         | 
| 276 | 
            +
            3
         | 
| 277 | 
            +
            3.5
         | 
| 278 | 
            +
            4
         | 
| 279 | 
            +
            0
         | 
| 280 | 
            +
            50
         | 
| 281 | 
            +
            100
         | 
| 282 | 
            +
            150
         | 
| 283 | 
            +
            200
         | 
| 284 | 
            +
            250
         | 
| 285 | 
            +
            300
         | 
| 286 | 
            +
            350
         | 
| 287 | 
            +
            Density (g/cc)
         | 
| 288 | 
            +
            Pressure (GPa)
         | 
| 289 | 
            +
            Figure 4. Density as a function of pressure for a hugoniot (blue curve) corresponding to the conditions of the shock experiments of Nellis
         | 
| 290 | 
            +
            et al. (1981) (black dots) and the quantum molecular dynamics calculations of Zhang et al. (2011) (blue dots).
         | 
| 291 | 
            +
             | 
| 292 | 
            +
            7
         | 
| 293 | 
            +
            Figure 5. Thermodynamic properties of CO as a function of density and temperature as computed from the quotidian equation of state.
         | 
| 294 | 
            +
            Upper left: total pressure. Upper right: pressure divided by ideal gas pressure. This shows the region where an ideal gas approximation
         | 
| 295 | 
            +
            may be used. Lower left: specific internal energy. Lower right: specific entropy.
         | 
| 296 | 
            +
             | 
| 297 | 
            +
            co: 1
         | 
| 298 | 
            +
            CO: log p (Pa)
         | 
| 299 | 
            +
            0
         | 
| 300 | 
            +
            0
         | 
| 301 | 
            +
            log p (g/cm3)
         | 
| 302 | 
            +
            10
         | 
| 303 | 
            +
            log p (g/cm3)
         | 
| 304 | 
            +
            5
         | 
| 305 | 
            +
            5
         | 
| 306 | 
            +
            0og p (/pideal
         | 
| 307 | 
            +
            5
         | 
| 308 | 
            +
            4
         | 
| 309 | 
            +
            3
         | 
| 310 | 
            +
            2
         | 
| 311 | 
            +
            1-10
         | 
| 312 | 
            +
            -10
         | 
| 313 | 
            +
            -5
         | 
| 314 | 
            +
            2
         | 
| 315 | 
            +
            4
         | 
| 316 | 
            +
            6
         | 
| 317 | 
            +
            2
         | 
| 318 | 
            +
            logT(K)
         | 
| 319 | 
            +
            Co: log u (erg/g)
         | 
| 320 | 
            +
            CO: Io
         | 
| 321 | 
            +
            14
         | 
| 322 | 
            +
            0
         | 
| 323 | 
            +
            0
         | 
| 324 | 
            +
            13
         | 
| 325 | 
            +
            -5
         | 
| 326 | 
            +
            -5
         | 
| 327 | 
            +
            12
         | 
| 328 | 
            +
            11
         | 
| 329 | 
            +
            .10
         | 
| 330 | 
            +
            -10
         | 
| 331 | 
            +
            2
         | 
| 332 | 
            +
            4
         | 
| 333 | 
            +
            6
         | 
| 334 | 
            +
            2
         | 
| 335 | 
            +
            log T (K)0
         | 
| 336 | 
            +
            4
         | 
| 337 | 
            +
            6
         | 
| 338 | 
            +
            log T (K)
         | 
| 339 | 
            +
            gs(erg/g/K)
         | 
| 340 | 
            +
            9
         | 
| 341 | 
            +
            8
         | 
| 342 | 
            +
            7
         | 
| 343 | 
            +
            6
         | 
| 344 | 
            +
            5
         | 
| 345 | 
            +
            4
         | 
| 346 | 
            +
            3
         | 
| 347 | 
            +
            4
         | 
| 348 | 
            +
            6
         | 
| 349 | 
            +
            log T (K)8
         | 
| 350 | 
            +
            h
         | 
| 351 | 
            +
            Table 2. Equation of state for CO.
         | 
| 352 | 
            +
            log T
         | 
| 353 | 
            +
            log ρ
         | 
| 354 | 
            +
            log P
         | 
| 355 | 
            +
            log u
         | 
| 356 | 
            +
            log s
         | 
| 357 | 
            +
            [K]
         | 
| 358 | 
            +
            [g/cc]
         | 
| 359 | 
            +
            [Pa]
         | 
| 360 | 
            +
            [erg/g]
         | 
| 361 | 
            +
            [erg/g − K]
         | 
| 362 | 
            +
            1.06465
         | 
| 363 | 
            +
            0.10
         | 
| 364 | 
            +
            8.25060
         | 
| 365 | 
            +
            10.33294
         | 
| 366 | 
            +
            4.12858
         | 
| 367 | 
            +
            1.06465
         | 
| 368 | 
            +
            0.20
         | 
| 369 | 
            +
            9.33277
         | 
| 370 | 
            +
            10.36235
         | 
| 371 | 
            +
            3.94748
         | 
| 372 | 
            +
            1.06465
         | 
| 373 | 
            +
            0.30
         | 
| 374 | 
            +
            9.90369
         | 
| 375 | 
            +
            10.46041
         | 
| 376 | 
            +
            3.83167
         | 
| 377 | 
            +
            1.06465
         | 
| 378 | 
            +
            0.40
         | 
| 379 | 
            +
            10.35107
         | 
| 380 | 
            +
            10.63593
         | 
| 381 | 
            +
            3.74763
         | 
| 382 | 
            +
            1.06465
         | 
| 383 | 
            +
            0.50
         | 
| 384 | 
            +
            10.73560
         | 
| 385 | 
            +
            10.86075
         | 
| 386 | 
            +
            3.67754
         | 
| 387 | 
            +
            1.06465
         | 
| 388 | 
            +
            0.60
         | 
| 389 | 
            +
            11.08026
         | 
| 390 | 
            +
            11.10070
         | 
| 391 | 
            +
            3.61334
         | 
| 392 | 
            +
            1.06465
         | 
| 393 | 
            +
            0.70
         | 
| 394 | 
            +
            11.39668
         | 
| 395 | 
            +
            11.33587
         | 
| 396 | 
            +
            3.55157
         | 
| 397 | 
            +
            1.06465
         | 
| 398 | 
            +
            0.80
         | 
| 399 | 
            +
            11.69173
         | 
| 400 | 
            +
            11.55846
         | 
| 401 | 
            +
            3.49070
         | 
| 402 | 
            +
            1.06465
         | 
| 403 | 
            +
            0.90
         | 
| 404 | 
            +
            11.96991
         | 
| 405 | 
            +
            11.76663
         | 
| 406 | 
            +
            3.43006
         | 
| 407 | 
            +
            1.06465
         | 
| 408 | 
            +
            1.00
         | 
| 409 | 
            +
            12.23437
         | 
| 410 | 
            +
            11.96089
         | 
| 411 | 
            +
            3.36933
         | 
| 412 | 
            +
            1.06465
         | 
| 413 | 
            +
            1.10
         | 
| 414 | 
            +
            12.48741
         | 
| 415 | 
            +
            12.14250
         | 
| 416 | 
            +
            3.30834
         | 
| 417 | 
            +
            1.06465
         | 
| 418 | 
            +
            1.20
         | 
| 419 | 
            +
            12.73083
         | 
| 420 | 
            +
            12.31285
         | 
| 421 | 
            +
            3.24704
         | 
| 422 | 
            +
            1.06465
         | 
| 423 | 
            +
            1.30
         | 
| 424 | 
            +
            12.96602
         | 
| 425 | 
            +
            12.47327
         | 
| 426 | 
            +
            3.18540
         | 
| 427 | 
            +
            1.56465
         | 
| 428 | 
            +
            0.10
         | 
| 429 | 
            +
            8.25291
         | 
| 430 | 
            +
            10.33305
         | 
| 431 | 
            +
            5.29718
         | 
| 432 | 
            +
            1.56465
         | 
| 433 | 
            +
            0.20
         | 
| 434 | 
            +
            9.33286
         | 
| 435 | 
            +
            10.36239
         | 
| 436 | 
            +
            4.92635
         | 
| 437 | 
            +
            1.56465
         | 
| 438 | 
            +
            0.30
         | 
| 439 | 
            +
            9.90370
         | 
| 440 | 
            +
            10.46043
         | 
| 441 | 
            +
            4.63269
         | 
| 442 | 
            +
            1.56465
         | 
| 443 | 
            +
            0.40
         | 
| 444 | 
            +
            10.35107
         | 
| 445 | 
            +
            10.63594
         | 
| 446 | 
            +
            4.42170
         | 
| 447 | 
            +
            1.56465
         | 
| 448 | 
            +
            0.50
         | 
| 449 | 
            +
            10.73560
         | 
| 450 | 
            +
            10.86075
         | 
| 451 | 
            +
            4.27449
         | 
| 452 | 
            +
            1.56465
         | 
| 453 | 
            +
            0.60
         | 
| 454 | 
            +
            11.08026
         | 
| 455 | 
            +
            11.10070
         | 
| 456 | 
            +
            4.16723
         | 
| 457 | 
            +
            1.56465
         | 
| 458 | 
            +
            0.70
         | 
| 459 | 
            +
            11.39668
         | 
| 460 | 
            +
            11.33587
         | 
| 461 | 
            +
            4.08205
         | 
| 462 | 
            +
            1.56465
         | 
| 463 | 
            +
            0.80
         | 
| 464 | 
            +
            11.69173
         | 
| 465 | 
            +
            11.55846
         | 
| 466 | 
            +
            4.00839
         | 
| 467 | 
            +
            1.56465
         | 
| 468 | 
            +
            0.90
         | 
| 469 | 
            +
            11.96991
         | 
| 470 | 
            +
            11.76663
         | 
| 471 | 
            +
            3.94060
         | 
| 472 | 
            +
            1.56465
         | 
| 473 | 
            +
            1.00
         | 
| 474 | 
            +
            12.23437
         | 
| 475 | 
            +
            11.96089
         | 
| 476 | 
            +
            3.87576
         | 
| 477 | 
            +
            1.56465
         | 
| 478 | 
            +
            1.10
         | 
| 479 | 
            +
            12.48741
         | 
| 480 | 
            +
            12.14250
         | 
| 481 | 
            +
            3.81236
         | 
| 482 | 
            +
            1.56465
         | 
| 483 | 
            +
            1.20
         | 
| 484 | 
            +
            12.73083
         | 
| 485 | 
            +
            12.31285
         | 
| 486 | 
            +
            3.74960
         | 
| 487 | 
            +
            1.56465
         | 
| 488 | 
            +
            1.30
         | 
| 489 | 
            +
            12.96602
         | 
| 490 | 
            +
            12.47327
         | 
| 491 | 
            +
            3.68706
         | 
| 492 | 
            +
            2.06465
         | 
| 493 | 
            +
            0.10
         | 
| 494 | 
            +
            8.32026
         | 
| 495 | 
            +
            10.33617
         | 
| 496 | 
            +
            6.33748
         | 
| 497 | 
            +
            2.06465
         | 
| 498 | 
            +
            0.20
         | 
| 499 | 
            +
            9.33736
         | 
| 500 | 
            +
            10.36427
         | 
| 501 | 
            +
            6.10876
         | 
| 502 | 
            +
            2.06465
         | 
| 503 | 
            +
            0.30
         | 
| 504 | 
            +
            9.90446
         | 
| 505 | 
            +
            10.46124
         | 
| 506 | 
            +
            5.82885
         | 
| 507 | 
            +
            2.06465
         | 
| 508 | 
            +
            0.40
         | 
| 509 | 
            +
            10.35123
         | 
| 510 | 
            +
            10.63621
         | 
| 511 | 
            +
            5.53226
         | 
| 512 | 
            +
            2.06465
         | 
| 513 | 
            +
            0.50
         | 
| 514 | 
            +
            10.73564
         | 
| 515 | 
            +
            10.86083
         | 
| 516 | 
            +
            5.24767
         | 
| 517 | 
            +
            2.06465
         | 
| 518 | 
            +
            0.60
         | 
| 519 | 
            +
            11.08027
         | 
| 520 | 
            +
            11.10073
         | 
| 521 | 
            +
            5.00266
         | 
| 522 | 
            +
            2.06465
         | 
| 523 | 
            +
            0.70
         | 
| 524 | 
            +
            11.39669
         | 
| 525 | 
            +
            11.33588
         | 
| 526 | 
            +
            4.80674
         | 
| 527 | 
            +
            2.06465
         | 
| 528 | 
            +
            0.80
         | 
| 529 | 
            +
            11.69174
         | 
| 530 | 
            +
            11.55846
         | 
| 531 | 
            +
            4.65419
         | 
| 532 | 
            +
            2.06465
         | 
| 533 | 
            +
            0.90
         | 
| 534 | 
            +
            11.96991
         | 
| 535 | 
            +
            11.76663
         | 
| 536 | 
            +
            4.53392
         | 
| 537 | 
            +
            2.06465
         | 
| 538 | 
            +
            1.00
         | 
| 539 | 
            +
            12.23437
         | 
| 540 | 
            +
            11.96089
         | 
| 541 | 
            +
            4.43538
         | 
| 542 | 
            +
            2.06465
         | 
| 543 | 
            +
            1.10
         | 
| 544 | 
            +
            12.48741
         | 
| 545 | 
            +
            12.14250
         | 
| 546 | 
            +
            4.35065
         | 
| 547 | 
            +
            2.06465
         | 
| 548 | 
            +
            1.20
         | 
| 549 | 
            +
            12.73083
         | 
| 550 | 
            +
            12.31285
         | 
| 551 | 
            +
            4.27440
         | 
| 552 | 
            +
            2.06465
         | 
| 553 | 
            +
            1.30
         | 
| 554 | 
            +
            12.96602
         | 
| 555 | 
            +
            12.47327
         | 
| 556 | 
            +
            4.20327
         | 
| 557 | 
            +
            2.56465
         | 
| 558 | 
            +
            0.10
         | 
| 559 | 
            +
            8.59818
         | 
| 560 | 
            +
            10.35536
         | 
| 561 | 
            +
            6.81650
         | 
| 562 | 
            +
            2.56465
         | 
| 563 | 
            +
            0.20
         | 
| 564 | 
            +
            9.37536
         | 
| 565 | 
            +
            10.38058
         | 
| 566 | 
            +
            6.71214
         | 
| 567 | 
            +
            2.56465
         | 
| 568 | 
            +
            0.30
         | 
| 569 | 
            +
            9.91516
         | 
| 570 | 
            +
            10.47251
         | 
| 571 | 
            +
            6.59233
         | 
| 572 | 
            +
            2.56465
         | 
| 573 | 
            +
            0.40
         | 
| 574 | 
            +
            10.35484
         | 
| 575 | 
            +
            10.64227
         | 
| 576 | 
            +
            6.45354
         | 
| 577 | 
            +
            2.56465
         | 
| 578 | 
            +
            0.50
         | 
| 579 | 
            +
            10.73692
         | 
| 580 | 
            +
            10.86349
         | 
| 581 | 
            +
            6.29013
         | 
| 582 | 
            +
             | 
| 583 | 
            +
            9
         | 
| 584 | 
            +
            Table 2. Equation of state for CO continued
         | 
| 585 | 
            +
            log T
         | 
| 586 | 
            +
            log ρ
         | 
| 587 | 
            +
            log P
         | 
| 588 | 
            +
            log u
         | 
| 589 | 
            +
            log s
         | 
| 590 | 
            +
            [K]
         | 
| 591 | 
            +
            [g/cc]
         | 
| 592 | 
            +
            [Pa]
         | 
| 593 | 
            +
            [erg/g]
         | 
| 594 | 
            +
            [erg/g − K]
         | 
| 595 | 
            +
            2.56465
         | 
| 596 | 
            +
            0.60
         | 
| 597 | 
            +
            11.08076
         | 
| 598 | 
            +
            11.10182
         | 
| 599 | 
            +
            6.11803
         | 
| 600 | 
            +
            2.56465
         | 
| 601 | 
            +
            0.70
         | 
| 602 | 
            +
            11.39686
         | 
| 603 | 
            +
            11.33629
         | 
| 604 | 
            +
            5.91384
         | 
| 605 | 
            +
            2.56465
         | 
| 606 | 
            +
            0.80
         | 
| 607 | 
            +
            11.69180
         | 
| 608 | 
            +
            11.55861
         | 
| 609 | 
            +
            5.70071
         | 
| 610 | 
            +
            2.56465
         | 
| 611 | 
            +
            0.90
         | 
| 612 | 
            +
            11.96994
         | 
| 613 | 
            +
            11.76669
         | 
| 614 | 
            +
            5.48884
         | 
| 615 | 
            +
            2.56465
         | 
| 616 | 
            +
            1.00
         | 
| 617 | 
            +
            12.23438
         | 
| 618 | 
            +
            11.96091
         | 
| 619 | 
            +
            5.29094
         | 
| 620 | 
            +
            2.56465
         | 
| 621 | 
            +
            1.10
         | 
| 622 | 
            +
            12.48742
         | 
| 623 | 
            +
            12.14251
         | 
| 624 | 
            +
            5.11592
         | 
| 625 | 
            +
            2.56465
         | 
| 626 | 
            +
            1.20
         | 
| 627 | 
            +
            12.73083
         | 
| 628 | 
            +
            12.31286
         | 
| 629 | 
            +
            4.96608
         | 
| 630 | 
            +
            2.56465
         | 
| 631 | 
            +
            1.30
         | 
| 632 | 
            +
            12.96602
         | 
| 633 | 
            +
            12.47328
         | 
| 634 | 
            +
            4.83886
         | 
| 635 | 
            +
            3.06465
         | 
| 636 | 
            +
            0.10
         | 
| 637 | 
            +
            8.96463
         | 
| 638 | 
            +
            10.41261
         | 
| 639 | 
            +
            7.05238
         | 
| 640 | 
            +
            3.06465
         | 
| 641 | 
            +
            0.20
         | 
| 642 | 
            +
            9.49348
         | 
| 643 | 
            +
            10.43930
         | 
| 644 | 
            +
            7.00870
         | 
| 645 | 
            +
            3.06465
         | 
| 646 | 
            +
            0.30
         | 
| 647 | 
            +
            9.95968
         | 
| 648 | 
            +
            10.52059
         | 
| 649 | 
            +
            6.94781
         | 
| 650 | 
            +
            3.06465
         | 
| 651 | 
            +
            0.40
         | 
| 652 | 
            +
            10.37374
         | 
| 653 | 
            +
            10.67408
         | 
| 654 | 
            +
            6.87899
         | 
| 655 | 
            +
            3.06465
         | 
| 656 | 
            +
            0.50
         | 
| 657 | 
            +
            10.74579
         | 
| 658 | 
            +
            10.88182
         | 
| 659 | 
            +
            6.80456
         | 
| 660 | 
            +
            3.06465
         | 
| 661 | 
            +
            0.60
         | 
| 662 | 
            +
            11.08515
         | 
| 663 | 
            +
            11.11162
         | 
| 664 | 
            +
            6.72332
         | 
| 665 | 
            +
            3.06465
         | 
| 666 | 
            +
            0.70
         | 
| 667 | 
            +
            11.39912
         | 
| 668 | 
            +
            11.34141
         | 
| 669 | 
            +
            6.63379
         | 
| 670 | 
            +
            3.06465
         | 
| 671 | 
            +
            0.80
         | 
| 672 | 
            +
            11.69298
         | 
| 673 | 
            +
            11.56126
         | 
| 674 | 
            +
            6.53419
         | 
| 675 | 
            +
            3.06465
         | 
| 676 | 
            +
            0.90
         | 
| 677 | 
            +
            11.97055
         | 
| 678 | 
            +
            11.76803
         | 
| 679 | 
            +
            6.42218
         | 
| 680 | 
            +
            3.06465
         | 
| 681 | 
            +
            1.00
         | 
| 682 | 
            +
            12.23471
         | 
| 683 | 
            +
            11.96163
         | 
| 684 | 
            +
            6.31293
         | 
| 685 | 
            +
            3.06465
         | 
| 686 | 
            +
            1.10
         | 
| 687 | 
            +
            12.48758
         | 
| 688 | 
            +
            12.14285
         | 
| 689 | 
            +
            6.16560
         | 
| 690 | 
            +
            3.06465
         | 
| 691 | 
            +
            1.20
         | 
| 692 | 
            +
            12.73092
         | 
| 693 | 
            +
            12.31302
         | 
| 694 | 
            +
            6.00969
         | 
| 695 | 
            +
            3.06465
         | 
| 696 | 
            +
            1.30
         | 
| 697 | 
            +
            12.96606
         | 
| 698 | 
            +
            12.47335
         | 
| 699 | 
            +
            5.84475
         | 
| 700 | 
            +
            3.56465
         | 
| 701 | 
            +
            0.10
         | 
| 702 | 
            +
            9.36962
         | 
| 703 | 
            +
            10.57254
         | 
| 704 | 
            +
            7.21587
         | 
| 705 | 
            +
            3.56465
         | 
| 706 | 
            +
            0.20
         | 
| 707 | 
            +
            9.69405
         | 
| 708 | 
            +
            10.59071
         | 
| 709 | 
            +
            7.18659
         | 
| 710 | 
            +
            3.56465
         | 
| 711 | 
            +
            0.30
         | 
| 712 | 
            +
            10.06369
         | 
| 713 | 
            +
            10.65281
         | 
| 714 | 
            +
            7.15510
         | 
| 715 | 
            +
            3.56465
         | 
| 716 | 
            +
            0.40
         | 
| 717 | 
            +
            10.43076
         | 
| 718 | 
            +
            10.77475
         | 
| 719 | 
            +
            7.12114
         | 
| 720 | 
            +
            3.56465
         | 
| 721 | 
            +
            0.50
         | 
| 722 | 
            +
            10.77783
         | 
| 723 | 
            +
            10.94870
         | 
| 724 | 
            +
            7.08214
         | 
| 725 | 
            +
            3.56465
         | 
| 726 | 
            +
            0.60
         | 
| 727 | 
            +
            11.10251
         | 
| 728 | 
            +
            11.15104
         | 
| 729 | 
            +
            7.03402
         | 
| 730 | 
            +
            3.56465
         | 
| 731 | 
            +
            0.70
         | 
| 732 | 
            +
            11.40902
         | 
| 733 | 
            +
            11.36430
         | 
| 734 | 
            +
            6.98398
         | 
| 735 | 
            +
            3.56465
         | 
| 736 | 
            +
            0.80
         | 
| 737 | 
            +
            11.69886
         | 
| 738 | 
            +
            11.57468
         | 
| 739 | 
            +
            6.93149
         | 
| 740 | 
            +
            3.56465
         | 
| 741 | 
            +
            0.90
         | 
| 742 | 
            +
            11.97416
         | 
| 743 | 
            +
            11.77606
         | 
| 744 | 
            +
            6.87593
         | 
| 745 | 
            +
            3.56465
         | 
| 746 | 
            +
            1.00
         | 
| 747 | 
            +
            12.23696
         | 
| 748 | 
            +
            11.96647
         | 
| 749 | 
            +
            6.81651
         | 
| 750 | 
            +
            3.56465
         | 
| 751 | 
            +
            1.10
         | 
| 752 | 
            +
            12.48903
         | 
| 753 | 
            +
            12.14584
         | 
| 754 | 
            +
            6.75230
         | 
| 755 | 
            +
            3.56465
         | 
| 756 | 
            +
            1.20
         | 
| 757 | 
            +
            12.73184
         | 
| 758 | 
            +
            12.31488
         | 
| 759 | 
            +
            6.68219
         | 
| 760 | 
            +
            3.56465
         | 
| 761 | 
            +
            1.30
         | 
| 762 | 
            +
            12.96665
         | 
| 763 | 
            +
            12.47450
         | 
| 764 | 
            +
            6.60487
         | 
| 765 | 
            +
            4.06465
         | 
| 766 | 
            +
            -1.00
         | 
| 767 | 
            +
            8.72672
         | 
| 768 | 
            +
            11.12752
         | 
| 769 | 
            +
            7.61469
         | 
| 770 | 
            +
            4.06465
         | 
| 771 | 
            +
            -0.90
         | 
| 772 | 
            +
            8.84338
         | 
| 773 | 
            +
            11.11787
         | 
| 774 | 
            +
            7.60037
         | 
| 775 | 
            +
            4.06465
         | 
| 776 | 
            +
            -0.80
         | 
| 777 | 
            +
            8.96101
         | 
| 778 | 
            +
            11.10873
         | 
| 779 | 
            +
            7.58527
         | 
| 780 | 
            +
            4.06465
         | 
| 781 | 
            +
            -0.70
         | 
| 782 | 
            +
            9.07819
         | 
| 783 | 
            +
            11.09997
         | 
| 784 | 
            +
            7.56926
         | 
| 785 | 
            +
            4.06465
         | 
| 786 | 
            +
            -0.60
         | 
| 787 | 
            +
            9.19305
         | 
| 788 | 
            +
            11.09161
         | 
| 789 | 
            +
            7.55219
         | 
| 790 | 
            +
            4.06465
         | 
| 791 | 
            +
            -0.50
         | 
| 792 | 
            +
            9.30353
         | 
| 793 | 
            +
            11.08214
         | 
| 794 | 
            +
            7.53390
         | 
| 795 | 
            +
            4.06465
         | 
| 796 | 
            +
            -0.40
         | 
| 797 | 
            +
            9.40769
         | 
| 798 | 
            +
            11.07207
         | 
| 799 | 
            +
            7.51424
         | 
| 800 | 
            +
            4.06465
         | 
| 801 | 
            +
            -0.30
         | 
| 802 | 
            +
            9.50433
         | 
| 803 | 
            +
            11.06010
         | 
| 804 | 
            +
            7.49310
         | 
| 805 | 
            +
            4.06465
         | 
| 806 | 
            +
            -0.20
         | 
| 807 | 
            +
            9.59411
         | 
| 808 | 
            +
            11.04556
         | 
| 809 | 
            +
            7.47045
         | 
| 810 | 
            +
            4.06465
         | 
| 811 | 
            +
            -0.10
         | 
| 812 | 
            +
            9.68161
         | 
| 813 | 
            +
            11.02824
         | 
| 814 | 
            +
            7.44633
         | 
| 815 | 
            +
            4.06465
         | 
| 816 | 
            +
            0.00
         | 
| 817 | 
            +
            9.77804
         | 
| 818 | 
            +
            11.00927
         | 
| 819 | 
            +
            7.42091
         | 
| 820 | 
            +
            4.06465
         | 
| 821 | 
            +
            0.10
         | 
| 822 | 
            +
            9.90243
         | 
| 823 | 
            +
            10.99228
         | 
| 824 | 
            +
            7.39448
         | 
| 825 | 
            +
            4.06465
         | 
| 826 | 
            +
            0.20
         | 
| 827 | 
            +
            10.07443
         | 
| 828 | 
            +
            10.98353
         | 
| 829 | 
            +
            7.36684
         | 
| 830 | 
            +
             | 
| 831 | 
            +
            10
         | 
| 832 | 
            +
            Table 2. Equation of state for CO continued
         | 
| 833 | 
            +
            log T
         | 
| 834 | 
            +
            log ρ
         | 
| 835 | 
            +
            log P
         | 
| 836 | 
            +
            log u
         | 
| 837 | 
            +
            log s
         | 
| 838 | 
            +
            [K]
         | 
| 839 | 
            +
            [g/cc]
         | 
| 840 | 
            +
            [Pa]
         | 
| 841 | 
            +
            [erg/g]
         | 
| 842 | 
            +
            [erg/g − K]
         | 
| 843 | 
            +
            4.06465
         | 
| 844 | 
            +
            0.30
         | 
| 845 | 
            +
            10.30242
         | 
| 846 | 
            +
            10.99646
         | 
| 847 | 
            +
            7.33856
         | 
| 848 | 
            +
            4.06465
         | 
| 849 | 
            +
            0.40
         | 
| 850 | 
            +
            10.57225
         | 
| 851 | 
            +
            11.04588
         | 
| 852 | 
            +
            7.30967
         | 
| 853 | 
            +
            4.06465
         | 
| 854 | 
            +
            0.50
         | 
| 855 | 
            +
            10.86205
         | 
| 856 | 
            +
            11.14146
         | 
| 857 | 
            +
            7.28014
         | 
| 858 | 
            +
            4.06465
         | 
| 859 | 
            +
            0.60
         | 
| 860 | 
            +
            11.15517
         | 
| 861 | 
            +
            11.27981
         | 
| 862 | 
            +
            7.24992
         | 
| 863 | 
            +
            4.06465
         | 
| 864 | 
            +
            0.70
         | 
| 865 | 
            +
            11.44272
         | 
| 866 | 
            +
            11.44692
         | 
| 867 | 
            +
            7.21887
         | 
| 868 | 
            +
            4.06465
         | 
| 869 | 
            +
            0.80
         | 
| 870 | 
            +
            11.72104
         | 
| 871 | 
            +
            11.62736
         | 
| 872 | 
            +
            7.18684
         | 
| 873 | 
            +
            4.06465
         | 
| 874 | 
            +
            0.90
         | 
| 875 | 
            +
            11.98825
         | 
| 876 | 
            +
            11.80866
         | 
| 877 | 
            +
            7.14860
         | 
| 878 | 
            +
            4.06465
         | 
| 879 | 
            +
            1.00
         | 
| 880 | 
            +
            12.24611
         | 
| 881 | 
            +
            11.98690
         | 
| 882 | 
            +
            7.10900
         | 
| 883 | 
            +
            4.06465
         | 
| 884 | 
            +
            1.10
         | 
| 885 | 
            +
            12.49512
         | 
| 886 | 
            +
            12.15893
         | 
| 887 | 
            +
            7.06828
         | 
| 888 | 
            +
            4.06465
         | 
| 889 | 
            +
            1.20
         | 
| 890 | 
            +
            12.73600
         | 
| 891 | 
            +
            12.32343
         | 
| 892 | 
            +
            7.02608
         | 
| 893 | 
            +
            4.06465
         | 
| 894 | 
            +
            1.30
         | 
| 895 | 
            +
            12.96954
         | 
| 896 | 
            +
            12.48020
         | 
| 897 | 
            +
            6.98198
         | 
| 898 | 
            +
            4.56465
         | 
| 899 | 
            +
            -1.00
         | 
| 900 | 
            +
            9.39391
         | 
| 901 | 
            +
            11.85300
         | 
| 902 | 
            +
            7.82194
         | 
| 903 | 
            +
            4.56465
         | 
| 904 | 
            +
            -0.90
         | 
| 905 | 
            +
            9.49858
         | 
| 906 | 
            +
            11.83884
         | 
| 907 | 
            +
            7.80733
         | 
| 908 | 
            +
            4.56465
         | 
| 909 | 
            +
            -0.80
         | 
| 910 | 
            +
            9.60479
         | 
| 911 | 
            +
            11.82481
         | 
| 912 | 
            +
            7.79226
         | 
| 913 | 
            +
            4.56465
         | 
| 914 | 
            +
            -0.70
         | 
| 915 | 
            +
            9.71228
         | 
| 916 | 
            +
            11.81091
         | 
| 917 | 
            +
            7.77665
         | 
| 918 | 
            +
            4.56465
         | 
| 919 | 
            +
            -0.60
         | 
| 920 | 
            +
            9.82054
         | 
| 921 | 
            +
            11.79708
         | 
| 922 | 
            +
            7.76038
         | 
| 923 | 
            +
            4.56465
         | 
| 924 | 
            +
            -0.50
         | 
| 925 | 
            +
            9.92889
         | 
| 926 | 
            +
            11.78321
         | 
| 927 | 
            +
            7.74336
         | 
| 928 | 
            +
            4.56465
         | 
| 929 | 
            +
            -0.40
         | 
| 930 | 
            +
            10.03655
         | 
| 931 | 
            +
            11.76908
         | 
| 932 | 
            +
            7.72545
         | 
| 933 | 
            +
            4.56465
         | 
| 934 | 
            +
            -0.30
         | 
| 935 | 
            +
            10.14277
         | 
| 936 | 
            +
            11.75438
         | 
| 937 | 
            +
            7.70651
         | 
| 938 | 
            +
            4.56465
         | 
| 939 | 
            +
            -0.20
         | 
| 940 | 
            +
            10.24707
         | 
| 941 | 
            +
            11.73869
         | 
| 942 | 
            +
            7.68639
         | 
| 943 | 
            +
            4.56465
         | 
| 944 | 
            +
            -0.10
         | 
| 945 | 
            +
            10.34964
         | 
| 946 | 
            +
            11.72211
         | 
| 947 | 
            +
            7.66492
         | 
| 948 | 
            +
            4.56465
         | 
| 949 | 
            +
            0.00
         | 
| 950 | 
            +
            10.45180
         | 
| 951 | 
            +
            11.70292
         | 
| 952 | 
            +
            7.64198
         | 
| 953 | 
            +
            4.56465
         | 
| 954 | 
            +
            0.10
         | 
| 955 | 
            +
            10.55668
         | 
| 956 | 
            +
            11.68314
         | 
| 957 | 
            +
            7.61745
         | 
| 958 | 
            +
            4.56465
         | 
| 959 | 
            +
            0.20
         | 
| 960 | 
            +
            10.66971
         | 
| 961 | 
            +
            11.66302
         | 
| 962 | 
            +
            7.59129
         | 
| 963 | 
            +
            4.56465
         | 
| 964 | 
            +
            0.30
         | 
| 965 | 
            +
            10.79841
         | 
| 966 | 
            +
            11.64539
         | 
| 967 | 
            +
            7.56357
         | 
| 968 | 
            +
            4.56465
         | 
| 969 | 
            +
            0.40
         | 
| 970 | 
            +
            10.95060
         | 
| 971 | 
            +
            11.63526
         | 
| 972 | 
            +
            7.53444
         | 
| 973 | 
            +
            4.56465
         | 
| 974 | 
            +
            0.50
         | 
| 975 | 
            +
            11.13044
         | 
| 976 | 
            +
            11.64026
         | 
| 977 | 
            +
            7.50411
         | 
| 978 | 
            +
            4.56465
         | 
| 979 | 
            +
            0.60
         | 
| 980 | 
            +
            11.33652
         | 
| 981 | 
            +
            11.66954
         | 
| 982 | 
            +
            7.47311
         | 
| 983 | 
            +
            4.56465
         | 
| 984 | 
            +
            0.70
         | 
| 985 | 
            +
            11.56221
         | 
| 986 | 
            +
            11.72900
         | 
| 987 | 
            +
            7.44136
         | 
| 988 | 
            +
            4.56465
         | 
| 989 | 
            +
            0.80
         | 
| 990 | 
            +
            11.79910
         | 
| 991 | 
            +
            11.82012
         | 
| 992 | 
            +
            7.40932
         | 
| 993 | 
            +
            4.56465
         | 
| 994 | 
            +
            0.90
         | 
| 995 | 
            +
            12.04056
         | 
| 996 | 
            +
            11.93746
         | 
| 997 | 
            +
            7.37731
         | 
| 998 | 
            +
            4.56465
         | 
| 999 | 
            +
            1.00
         | 
| 1000 | 
            +
            12.28172
         | 
| 1001 | 
            +
            12.07201
         | 
| 1002 | 
            +
            7.34534
         | 
| 1003 | 
            +
            4.56465
         | 
| 1004 | 
            +
            1.10
         | 
| 1005 | 
            +
            12.51981
         | 
| 1006 | 
            +
            12.21535
         | 
| 1007 | 
            +
            7.31336
         | 
| 1008 | 
            +
            4.56465
         | 
| 1009 | 
            +
            1.20
         | 
| 1010 | 
            +
            12.75346
         | 
| 1011 | 
            +
            12.36132
         | 
| 1012 | 
            +
            7.28123
         | 
| 1013 | 
            +
            4.56465
         | 
| 1014 | 
            +
            1.30
         | 
| 1015 | 
            +
            12.98189
         | 
| 1016 | 
            +
            12.50572
         | 
| 1017 | 
            +
            7.24694
         | 
| 1018 | 
            +
            5.06465
         | 
| 1019 | 
            +
            -2.20
         | 
| 1020 | 
            +
            9.01221
         | 
| 1021 | 
            +
            12.79781
         | 
| 1022 | 
            +
            8.22267
         | 
| 1023 | 
            +
            5.06465
         | 
| 1024 | 
            +
            -2.10
         | 
| 1025 | 
            +
            9.10356
         | 
| 1026 | 
            +
            12.78341
         | 
| 1027 | 
            +
            8.20949
         | 
| 1028 | 
            +
            5.06465
         | 
| 1029 | 
            +
            -2.00
         | 
| 1030 | 
            +
            9.19496
         | 
| 1031 | 
            +
            12.76882
         | 
| 1032 | 
            +
            8.19617
         | 
| 1033 | 
            +
            5.06465
         | 
| 1034 | 
            +
            -1.90
         | 
| 1035 | 
            +
            9.28643
         | 
| 1036 | 
            +
            12.75405
         | 
| 1037 | 
            +
            8.18271
         | 
| 1038 | 
            +
            5.06465
         | 
| 1039 | 
            +
            -1.80
         | 
| 1040 | 
            +
            9.37804
         | 
| 1041 | 
            +
            12.73910
         | 
| 1042 | 
            +
            8.16910
         | 
| 1043 | 
            +
            5.06465
         | 
| 1044 | 
            +
            -1.70
         | 
| 1045 | 
            +
            9.46983
         | 
| 1046 | 
            +
            12.72399
         | 
| 1047 | 
            +
            8.15535
         | 
| 1048 | 
            +
            5.06465
         | 
| 1049 | 
            +
            -1.60
         | 
| 1050 | 
            +
            9.56187
         | 
| 1051 | 
            +
            12.70871
         | 
| 1052 | 
            +
            8.14144
         | 
| 1053 | 
            +
            5.06465
         | 
| 1054 | 
            +
            -1.50
         | 
| 1055 | 
            +
            9.65423
         | 
| 1056 | 
            +
            12.69328
         | 
| 1057 | 
            +
            8.12737
         | 
| 1058 | 
            +
            5.06465
         | 
| 1059 | 
            +
            -1.40
         | 
| 1060 | 
            +
            9.74698
         | 
| 1061 | 
            +
            12.67771
         | 
| 1062 | 
            +
            8.11312
         | 
| 1063 | 
            +
            5.06465
         | 
| 1064 | 
            +
            -1.30
         | 
| 1065 | 
            +
            9.84023
         | 
| 1066 | 
            +
            12.66200
         | 
| 1067 | 
            +
            8.09870
         | 
| 1068 | 
            +
            5.06465
         | 
| 1069 | 
            +
            -1.20
         | 
| 1070 | 
            +
            9.93407
         | 
| 1071 | 
            +
            12.64619
         | 
| 1072 | 
            +
            8.08407
         | 
| 1073 | 
            +
            5.06465
         | 
| 1074 | 
            +
            -1.10
         | 
| 1075 | 
            +
            10.02860
         | 
| 1076 | 
            +
            12.63027
         | 
| 1077 | 
            +
            8.06923
         | 
| 1078 | 
            +
             | 
| 1079 | 
            +
            11
         | 
| 1080 | 
            +
            Table 2. Equation of state for CO continued
         | 
| 1081 | 
            +
            log T
         | 
| 1082 | 
            +
            log ρ
         | 
| 1083 | 
            +
            log P
         | 
| 1084 | 
            +
            log u
         | 
| 1085 | 
            +
            log s
         | 
| 1086 | 
            +
            [K]
         | 
| 1087 | 
            +
            [g/cc]
         | 
| 1088 | 
            +
            [Pa]
         | 
| 1089 | 
            +
            [erg/g]
         | 
| 1090 | 
            +
            [erg/g − K]
         | 
| 1091 | 
            +
            5.06465
         | 
| 1092 | 
            +
            -1.00
         | 
| 1093 | 
            +
            10.12395
         | 
| 1094 | 
            +
            12.61427
         | 
| 1095 | 
            +
            8.05415
         | 
| 1096 | 
            +
            5.06465
         | 
| 1097 | 
            +
            -0.90
         | 
| 1098 | 
            +
            10.22023
         | 
| 1099 | 
            +
            12.59820
         | 
| 1100 | 
            +
            8.03880
         | 
| 1101 | 
            +
            5.06465
         | 
| 1102 | 
            +
            -0.80
         | 
| 1103 | 
            +
            10.31750
         | 
| 1104 | 
            +
            12.58210
         | 
| 1105 | 
            +
            8.02315
         | 
| 1106 | 
            +
            5.06465
         | 
| 1107 | 
            +
            -0.70
         | 
| 1108 | 
            +
            10.41581
         | 
| 1109 | 
            +
            12.56597
         | 
| 1110 | 
            +
            8.00716
         | 
| 1111 | 
            +
            5.06465
         | 
| 1112 | 
            +
            -0.60
         | 
| 1113 | 
            +
            10.51516
         | 
| 1114 | 
            +
            12.54983
         | 
| 1115 | 
            +
            7.99078
         | 
| 1116 | 
            +
            5.06465
         | 
| 1117 | 
            +
            -0.50
         | 
| 1118 | 
            +
            10.61545
         | 
| 1119 | 
            +
            12.53369
         | 
| 1120 | 
            +
            7.97396
         | 
| 1121 | 
            +
            5.06465
         | 
| 1122 | 
            +
            -0.40
         | 
| 1123 | 
            +
            10.71652
         | 
| 1124 | 
            +
            12.51752
         | 
| 1125 | 
            +
            7.95663
         | 
| 1126 | 
            +
            5.06465
         | 
| 1127 | 
            +
            -0.30
         | 
| 1128 | 
            +
            10.81818
         | 
| 1129 | 
            +
            12.50129
         | 
| 1130 | 
            +
            7.93872
         | 
| 1131 | 
            +
            5.06465
         | 
| 1132 | 
            +
            -0.20
         | 
| 1133 | 
            +
            10.92019
         | 
| 1134 | 
            +
            12.48494
         | 
| 1135 | 
            +
            7.92015
         | 
| 1136 | 
            +
            5.06465
         | 
| 1137 | 
            +
            -0.10
         | 
| 1138 | 
            +
            11.02242
         | 
| 1139 | 
            +
            12.46839
         | 
| 1140 | 
            +
            7.90082
         | 
| 1141 | 
            +
            5.06465
         | 
| 1142 | 
            +
            0.00
         | 
| 1143 | 
            +
            11.12490
         | 
| 1144 | 
            +
            12.45155
         | 
| 1145 | 
            +
            7.88063
         | 
| 1146 | 
            +
            5.06465
         | 
| 1147 | 
            +
            0.10
         | 
| 1148 | 
            +
            11.22793
         | 
| 1149 | 
            +
            12.43435
         | 
| 1150 | 
            +
            7.85947
         | 
| 1151 | 
            +
            5.06465
         | 
| 1152 | 
            +
            0.20
         | 
| 1153 | 
            +
            11.33226
         | 
| 1154 | 
            +
            12.41683
         | 
| 1155 | 
            +
            7.83721
         | 
| 1156 | 
            +
            5.06465
         | 
| 1157 | 
            +
            0.30
         | 
| 1158 | 
            +
            11.43918
         | 
| 1159 | 
            +
            12.39913
         | 
| 1160 | 
            +
            7.81373
         | 
| 1161 | 
            +
            5.06465
         | 
| 1162 | 
            +
            0.40
         | 
| 1163 | 
            +
            11.55056
         | 
| 1164 | 
            +
            12.38222
         | 
| 1165 | 
            +
            7.78890
         | 
| 1166 | 
            +
            5.06465
         | 
| 1167 | 
            +
            0.50
         | 
| 1168 | 
            +
            11.66886
         | 
| 1169 | 
            +
            12.36618
         | 
| 1170 | 
            +
            7.76260
         | 
| 1171 | 
            +
            5.06465
         | 
| 1172 | 
            +
            0.60
         | 
| 1173 | 
            +
            11.79684
         | 
| 1174 | 
            +
            12.35360
         | 
| 1175 | 
            +
            7.73472
         | 
| 1176 | 
            +
            5.06465
         | 
| 1177 | 
            +
            0.70
         | 
| 1178 | 
            +
            11.93708
         | 
| 1179 | 
            +
            12.34707
         | 
| 1180 | 
            +
            7.70521
         | 
| 1181 | 
            +
            5.06465
         | 
| 1182 | 
            +
            0.80
         | 
| 1183 | 
            +
            12.09132
         | 
| 1184 | 
            +
            12.35034
         | 
| 1185 | 
            +
            7.67410
         | 
| 1186 | 
            +
            5.06465
         | 
| 1187 | 
            +
            0.90
         | 
| 1188 | 
            +
            12.26000
         | 
| 1189 | 
            +
            12.36788
         | 
| 1190 | 
            +
            7.64155
         | 
| 1191 | 
            +
            5.06465
         | 
| 1192 | 
            +
            1.00
         | 
| 1193 | 
            +
            12.44186
         | 
| 1194 | 
            +
            12.40353
         | 
| 1195 | 
            +
            7.60770
         | 
| 1196 | 
            +
            5.06465
         | 
| 1197 | 
            +
            1.10
         | 
| 1198 | 
            +
            12.63451
         | 
| 1199 | 
            +
            12.45973
         | 
| 1200 | 
            +
            7.57309
         | 
| 1201 | 
            +
            5.06465
         | 
| 1202 | 
            +
            1.20
         | 
| 1203 | 
            +
            12.83475
         | 
| 1204 | 
            +
            12.53549
         | 
| 1205 | 
            +
            7.53795
         | 
| 1206 | 
            +
            5.06465
         | 
| 1207 | 
            +
            1.30
         | 
| 1208 | 
            +
            13.03937
         | 
| 1209 | 
            +
            12.62723
         | 
| 1210 | 
            +
            7.50218
         | 
| 1211 | 
            +
             | 
| 1212 | 
            +
            12
         | 
| 1213 | 
            +
            6. ACKNOWLEDGEMENTS
         | 
| 1214 | 
            +
            The authors wish to thank Gilles Chabrier and an anonymous referee for many constructive comments. M.P. is
         | 
| 1215 | 
            +
            supported by a grant from the Pazy Fund of the Israel Atomic Energy Commission. A.L. is supported by a grant from
         | 
| 1216 | 
            +
            the Simons Foundation (SCOL #290360 to D.S.). The computations for this paper were run on the Odyssey cluster
         | 
| 1217 | 
            +
            supported by the FAS Division of Science, Research Computing Group at Harvard University. A.L. is grateful to the
         | 
| 1218 | 
            +
            administrative staff for their technical support. A.V. acknowledges support from ISF grants 770/21 and 773/21.
         | 
| 1219 | 
            +
            REFERENCES
         | 
| 1220 | 
            +
            Armstrong, M. R., Lindsey, R. K., Goldman, N., et al. 2020,
         | 
| 1221 | 
            +
            Nature Communications, 11, 353 1
         | 
| 1222 | 
            +
            Benz, W., Cameron, A. G. W., & Melosh, H. J. 1989, Icarus, 81,
         | 
| 1223 | 
            +
            113, doi: 10.1016/0019-1035(89)90129-2 1
         | 
| 1224 | 
            +
            Bierhals, J. 2001, in Ullmann’s Encyclopedia of Industrial
         | 
| 1225 | 
            +
            Chemistry, ed. F. Ullman (John Wiley & Sons, Ltd),
         | 
| 1226 | 
            +
            doi: https://doi.org/10.1002/14356007.a05_203 1
         | 
| 1227 | 
            +
            Boon, J. P., Legros, J. C., & Thomaes, G. 1967, Physica, 33, 547,
         | 
| 1228 | 
            +
            doi: 10.1016/0031-8914(67)90203-0 1
         | 
| 1229 | 
            +
            Chabrier, G., Mazevet, S., & Soubiran, F. 2019, ApJ, 872, 51,
         | 
| 1230 | 
            +
            doi: 10.3847/1538-4357/aaf99f 1
         | 
| 1231 | 
            +
            Emsenhuber, A., Jutzi, M., & Benz, W. 2018, Icarus, 301, 247,
         | 
| 1232 | 
            +
            doi: 10.1016/j.icarus.2017.09.017 1
         | 
| 1233 | 
            +
            Gammon, P. H. 1978, Master’s thesis, Memorial University of
         | 
| 1234 | 
            +
            Newfoundland 1, 4
         | 
| 1235 | 
            +
            Goedecker, S., Teter, M., & Hutter, J. 1996, Phys. Rev. B, 54,
         | 
| 1236 | 
            +
            1703, doi: 10.1103/PhysRevB.54.1703 3
         | 
| 1237 | 
            +
            Goodwin, R. D. 1985, Journal of Physical and Chemical
         | 
| 1238 | 
            +
            Reference Data, 14, 849, doi: 10.1063/1.555742 1, 5, 3
         | 
| 1239 | 
            +
            Grimme, S., Antony, J., Ehrlich, S., & Krieg, H. 2010, The
         | 
| 1240 | 
            +
            Journal of Chemical Physics, 132, 154104,
         | 
| 1241 | 
            +
            doi: 10.1063/1.3382344 3
         | 
| 1242 | 
            +
            Haldemann, J., Alibert, Y., Mordasini, C., & Benz, W. 2020,
         | 
| 1243 | 
            +
            A&A, 643, A105, doi: 10.1051/0004-6361/202038367 1
         | 
| 1244 | 
            +
            Hall, B. O., & James, H. M. 1976, Phys. Rev. B, 13, 3590,
         | 
| 1245 | 
            +
            doi: 10.1103/PhysRevB.13.3590 3
         | 
| 1246 | 
            +
            Hartwigsen, C., Goedecker, S., & Hutter, J. 1998, Phys. Rev. B,
         | 
| 1247 | 
            +
            58, 3641, doi: 10.1103/PhysRevB.58.3641 3
         | 
| 1248 | 
            +
            K¨uhne, T. D., Iannuzzi, M., Del Ben, M., et al. 2020, The Journal
         | 
| 1249 | 
            +
            of Chemical Physics, 152, 194103, doi: 10.1063/5.0007045 3
         | 
| 1250 | 
            +
            Krack, M. 2005, Theoretical Chemistry Accounts, 114, 145,
         | 
| 1251 | 
            +
            doi: 10.1007/s00214-005-0655-y 3
         | 
| 1252 | 
            +
            Kr¨uger, A., Kataoka, F., Ozawa, M., et al. 2005, Carbon, 43, 1722
         | 
| 1253 | 
            +
            1
         | 
| 1254 | 
            +
            Leonhardi, T. C., & Militzer, B. 2017, High Energy Density
         | 
| 1255 | 
            +
            Physics, 22, 41,
         | 
| 1256 | 
            +
            doi: https://doi.org/10.1016/j.hedp.2017.02.005 1
         | 
| 1257 | 
            +
            Lindsey, R. K., Goldman, N., Fried, L. E., & Bastea, S. 2020, J.
         | 
| 1258 | 
            +
            Chem. Phys., 153, 054103 1
         | 
| 1259 | 
            +
            Lisse, C. M., Gladstone, G. R., Young, L. A., et al. 2022, The
         | 
| 1260 | 
            +
            Planetary Science Journal, 3, 112, doi: 10.3847/PSJ/ac6097 1
         | 
| 1261 | 
            +
            Massacrier, G., Potekhin, A., & Chabrier, G. 2011, Phys. Rev. E,
         | 
| 1262 | 
            +
            84, doi: 10.1103/PhysRevE.84.056406 1, 5
         | 
| 1263 | 
            +
            Melosh, H. J. 2007, Meteoritics and Planetary Science, 42, 2079,
         | 
| 1264 | 
            +
            doi: 10.1111/j.1945-5100.2007.tb01009.x 1
         | 
| 1265 | 
            +
            More, R. M., Warren, D. A., Young, D. A., & Zimmerman, G. B.
         | 
| 1266 | 
            +
            1988, Physics of Fluids, 31, 3059 (document), 2, 5
         | 
| 1267 | 
            +
            Nellis, W. J., Ree, F. H., van Thiel, M., & Mitchell, A. C. 1981,
         | 
| 1268 | 
            +
            J. Chem. Phys., 75, 3055, doi: 10.1063/1.442401 1, 5, 4
         | 
| 1269 | 
            +
            Perdew, J. P., Burke, K., & Ernzerhof, M. 1996, Phys. Rev. Lett.,
         | 
| 1270 | 
            +
            77, 3865, doi: 10.1103/PhysRevLett.77.3865 3
         | 
| 1271 | 
            +
            —. 1997, Phys. Rev. Lett., 78, 1396,
         | 
| 1272 | 
            +
            doi: 10.1103/PhysRevLett.78.1396 3
         | 
| 1273 | 
            +
            Pierazzo, E., Artemieva, N., & Ivanov, B. 2005, in Large
         | 
| 1274 | 
            +
            Meteorite Impacts III (Geological Society of America),
         | 
| 1275 | 
            +
            doi: 10.1130/0-8137-2384-1.443 1
         | 
| 1276 | 
            +
            Pierazzo, E., Vickery, A. M., & Melosh, H. J. 1997, Icarus, 127,
         | 
| 1277 | 
            +
            408, doi: 10.1006/icar.1997.5713 1
         | 
| 1278 | 
            +
            Podolak, J., Malamud, U., & Podolak, M. 2022, Icarus, 382,
         | 
| 1279 | 
            +
            doi: 10.1016/j.icarus.2022.115017 1
         | 
| 1280 | 
            +
            Rudesko, N. S., & Schubnikow, L. W. 1934, Phys. Z. Sowjet., 6,
         | 
| 1281 | 
            +
            470 1
         | 
| 1282 | 
            +
            Salpeter, E. E., & Zapolsky, H. S. 1967, Phys. Rev., 158, 876,
         | 
| 1283 | 
            +
            doi: 10.1103/PhysRev.158.876 5
         | 
| 1284 | 
            +
            Singraber, A., Behler, J., & Dellago, C. 2019, J. Chem. Theory
         | 
| 1285 | 
            +
            Comput., 15, 1827 1
         | 
| 1286 | 
            +
            Tancredi, G., Rickman, H., & Greenberg, J. M. 1994, Astronomy
         | 
| 1287 | 
            +
            and Astrophysics, 286, 659 1
         | 
| 1288 | 
            +
            Titov, V. M., Anisichkin, V. F., & Mal’kov, I. Y. 1989, Combust.
         | 
| 1289 | 
            +
            Explos. Shock Waves, 25, 372 1
         | 
| 1290 | 
            +
            VandeVondele, J., & Hutter, J. 2007, The Journal of Chemical
         | 
| 1291 | 
            +
            Physics, 127, 114105, doi: 10.1063/1.2770708 3
         | 
| 1292 | 
            +
            VandeVondele, J., Krack, M., Mohamed, F., et al. 2005,
         | 
| 1293 | 
            +
            Computer Physics Communications, 167, 103 ,
         | 
| 1294 | 
            +
            doi: https://doi.org/10.1016/j.cpc.2004.12.014 3
         | 
| 1295 | 
            +
            Vazan, A., Kovetz, A., Podolak, M., & Helled, R. 2013, MNRAS,
         | 
| 1296 | 
            +
            434, 3283, doi: 10.1093/mnras/stt1248 2
         | 
| 1297 | 
            +
            Vazan, A., Ormel, C. W., Noack, L., & Dominik, C. 2018, ApJ,
         | 
| 1298 | 
            +
            869, 163, doi: 10.3847/1538-4357/aaef33 2
         | 
| 1299 | 
            +
            Vazan, A., Sari, R., & Kessel, R. 2022, ApJ, 926, 150,
         | 
| 1300 | 
            +
            doi: 10.3847/1538-4357/ac458c 2
         | 
| 1301 | 
            +
            Viecelli, J. A., Bastea, S., Glosli, J. N., & Ree, F. H. 2001, J.
         | 
| 1302 | 
            +
            Chem. Phys., 115, 2730 1
         | 
| 1303 | 
            +
            Wang, C., & Zhang, P. 2010, J. Chem. Phys., 133,
         | 
| 1304 | 
            +
            doi: 10.1063/1.3491834 1
         | 
| 1305 | 
            +
            Zhang, Y., Wang, C., Li, D., & Zhang, P. 2011, J. Chem. Phys.,
         | 
| 1306 | 
            +
            135, doi: 10.1063/1.3624920 1, 5, 4
         | 
| 1307 | 
            +
            Zhang, Y., & Yang, W. 1998, Phys. Rev. Lett., 80, 890,
         | 
| 1308 | 
            +
            doi: 10.1103/PhysRevLett.80.890 3
         | 
| 1309 | 
            +
             | 
    	
        _dA0T4oBgHgl3EQfPf96/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        _dAyT4oBgHgl3EQfdvdN/content/tmp_files/2301.00307v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,834 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            Bending Deformation Driven by Molecular Rotation
         | 
| 2 | 
            +
            Pedro A. Santos-Florez,1 Shinnosuke Hattori,2 and Qiang Zhu1, ∗
         | 
| 3 | 
            +
            1Department of Physics and Astronomy, University of Nevada, Las Vegas, NV 89154, USA
         | 
| 4 | 
            +
            2Advanced Research Laboratory, R&D Center, Sony Group Corporation, 4-14-1 Asahi-cho, Atsugi-shi 243-0014, Japan
         | 
| 5 | 
            +
            (Dated: January 3, 2023)
         | 
| 6 | 
            +
            Recently, some molecular crystals have been found to be surprisingly flexible by undergoing a large extent
         | 
| 7 | 
            +
            of elastic or plastic deformation upon various mechanical loads. Despite the increasing experimental reports on
         | 
| 8 | 
            +
            mechanically flexible crystals, this phenomenon has never been reproduced in numerical simulation and thus
         | 
| 9 | 
            +
            there is no atomistic mechanism to explain its physical origin. Using three recently reported naphthalene diimide
         | 
| 10 | 
            +
            derivatives as the examples, we perform the first direct molecular dynamics simulation to model their mechanical
         | 
| 11 | 
            +
            behaviors from brittle fracture to elastic/plastic deformation upon mechanical bending. Our simulation reveals
         | 
| 12 | 
            +
            that molecular rotational freedom is the key factor to determine the crystal’s mechanical response. Furthermore,
         | 
| 13 | 
            +
            we propose the use of rotation-dependent potential energy surface to classify organic materials’ mechanical
         | 
| 14 | 
            +
            response and screen new mechanically flexible candidates in future.
         | 
| 15 | 
            +
            While most molecular crystals are known to be brittle, there
         | 
| 16 | 
            +
            exists a class of compliant organic crystals that can easily bend
         | 
| 17 | 
            +
            under a large mechanical stress loading1,2. Since early 2000,
         | 
| 18 | 
            +
            there has been a growing number of experimental identifi-
         | 
| 19 | 
            +
            cations of mechanically flexible crystals3–9. In general, the
         | 
| 20 | 
            +
            mechanical response of an organic solid depends on both the
         | 
| 21 | 
            +
            molecular substance and the corresponding crystal packing.
         | 
| 22 | 
            +
            A remarkable example is shown in Fig.
         | 
| 23 | 
            +
            1, three crystals,
         | 
| 24 | 
            +
            made of similar molecules from naphthalene diimide deriva-
         | 
| 25 | 
            +
            tives, were found to exhibit distinct responses from brittle
         | 
| 26 | 
            +
            fracture to compliant deformation with either reversible (elas-
         | 
| 27 | 
            +
            tic) or irreversible (plastic) characteristic10. The flexible na-
         | 
| 28 | 
            +
            ture of such organic materials is vital for a variety of appli-
         | 
| 29 | 
            +
            cations, e.g., high-performance modular organic solar cells11,
         | 
| 30 | 
            +
            actuators12, photochemistry13, electronics14, optics15, as well
         | 
| 31 | 
            +
            as drug tabulation16.
         | 
| 32 | 
            +
            In the recent years, various computational techniques have
         | 
| 33 | 
            +
            been introduced to characterize the observed mechanical
         | 
| 34 | 
            +
            properties on different molecular systems10,17–19.
         | 
| 35 | 
            +
            They in-
         | 
| 36 | 
            +
            clude the topological analysis, elastic properties calculation17,
         | 
| 37 | 
            +
            and the simulation of shear/tensile deformations10,18. These
         | 
| 38 | 
            +
            techniques are partially successful in identifying the brittle
         | 
| 39 | 
            +
            materials which usually exhibit a complex three dimensional
         | 
| 40 | 
            +
            packing. Within such an interlocked environment, molecu-
         | 
| 41 | 
            +
            lar motions are largely restricted, resulting a brittleness un-
         | 
| 42 | 
            +
            der bending. On the other hand, the compliant class of ma-
         | 
| 43 | 
            +
            terials are featured by a strong anisotropy with plausible slip
         | 
| 44 | 
            +
            planes17,20. Therefore, these materials become compliant over
         | 
| 45 | 
            +
            a broad range of applied stress along some specific crystallo-
         | 
| 46 | 
            +
            graphic directions. However, all available techniques fail to
         | 
| 47 | 
            +
            explain the difference between the elastic and plastic materi-
         | 
| 48 | 
            +
            als. While there have been plenty of studies on the bending of
         | 
| 49 | 
            +
            metals21–26, to our knowledge, no attempts have been made to
         | 
| 50 | 
            +
            directly simulate the bending of organic materials at the atom-
         | 
| 51 | 
            +
            istic level.
         | 
| 52 | 
            +
            Among the compliant crystals, ductile materials are often
         | 
| 53 | 
            +
            favored in engineering applications16. Hence, researchers at-
         | 
| 54 | 
            +
            tempted to use the well established dislocation theory to ex-
         | 
| 55 | 
            +
            plain the observed plasticity on organic materials2,3. Simi-
         | 
| 56 | 
            +
            lar to the plastic deformation in ductile metals, it was found
         | 
| 57 | 
            +
            that mechanical shearing can also occur via the slippage of
         | 
| 58 | 
            +
            dislocated molecular layers on the molecular crystals with a
         | 
| 59 | 
            +
            β
         | 
| 60 | 
            +
            α
         | 
| 61 | 
            +
            γ
         | 
| 62 | 
            +
            α
         | 
| 63 | 
            +
            β
         | 
| 64 | 
            +
            γ
         | 
| 65 | 
            +
            (a)
         | 
| 66 | 
            +
            (b)
         | 
| 67 | 
            +
            (c)
         | 
| 68 | 
            +
             (degree)
         | 
| 69 | 
            +
            α
         | 
| 70 | 
            +
            x
         | 
| 71 | 
            +
            z
         | 
| 72 | 
            +
            x
         | 
| 73 | 
            +
            y
         | 
| 74 | 
            +
            z
         | 
| 75 | 
            +
            γ
         | 
| 76 | 
            +
            β
         | 
| 77 | 
            +
            α
         | 
| 78 | 
            +
            y
         | 
| 79 | 
            +
            y
         | 
| 80 | 
            +
            z
         | 
| 81 | 
            +
            x
         | 
| 82 | 
            +
            -30
         | 
| 83 | 
            +
            30
         | 
| 84 | 
            +
            0
         | 
| 85 | 
            +
            FIG. 1.
         | 
| 86 | 
            +
            The simulated bending on three different materials based
         | 
| 87 | 
            +
            on naphthalene diimide derivatives. (a) brittle Pr (50.3×7.0×6.8
         | 
| 88 | 
            +
            nm3), (b) elastic Et (50.7×6.4×6.6 nm3) and (c) elastic/plastic Me
         | 
| 89 | 
            +
            (50.2×6.4×6.9 nm3). These three crystals consist of very similar
         | 
| 90 | 
            +
            molecules that differ only in the side groups. In the left panel, the
         | 
| 91 | 
            +
            initial and finally deformed configurations are colored by the molec-
         | 
| 92 | 
            +
            ular alignment (α) along the x-axis. The corresponding molecules
         | 
| 93 | 
            +
            and the definition of rotation angles are shown in the right panel.
         | 
| 94 | 
            +
            layered packing27,28. Using these facile slip planes, a bend-
         | 
| 95 | 
            +
            ing model was proposed accordingly to explain the underly-
         | 
| 96 | 
            +
            ing mechanism3. Although the dislocation is not uncommon
         | 
| 97 | 
            +
            in molecular crystals29,30, there has been no direct experimen-
         | 
| 98 | 
            +
            tal evidence to support that the dislocation is present in the
         | 
| 99 | 
            +
            organic crystals under bending. Furthermore, this mechanism
         | 
| 100 | 
            +
            fails to explain the observed crystals that can also bend elas-
         | 
| 101 | 
            +
            tically to a large extent. In fact, two crystals as shown in Fig.
         | 
| 102 | 
            +
            arXiv:2301.00307v1  [cond-mat.mtrl-sci]  31 Dec 2022
         | 
| 103 | 
            +
             | 
| 104 | 
            +
            X
         | 
| 105 | 
            +
            z7X
         | 
| 106 | 
            +
            z2
         | 
| 107 | 
            +
            1b-c possess very similar crystal packing. Give the apparent
         | 
| 108 | 
            +
            similarity in both molecular structure and crystal packing, it
         | 
| 109 | 
            +
            is expected that the elastic crystal (Fig. 1b) should undergo
         | 
| 110 | 
            +
            similar molecular events like the plastic crystal (Fig. 1c) by
         | 
| 111 | 
            +
            following the ending mechanism. But the actual deformation
         | 
| 112 | 
            +
            was observed to be elastic. Clearly, our current understanding
         | 
| 113 | 
            +
            on the elasticity and plasticity remains limited.
         | 
| 114 | 
            +
            In this work, we present our efforts in questing the molec-
         | 
| 115 | 
            +
            ular bending mechanism with the aid of atomistic simula-
         | 
| 116 | 
            +
            tion.
         | 
| 117 | 
            +
            To achieve this goal, we start by developing a ro-
         | 
| 118 | 
            +
            bust simulation protocol that can directly model the bend-
         | 
| 119 | 
            +
            ing of organic crystals at the atomic level. Specifically, we
         | 
| 120 | 
            +
            employed a three-point bending model within a partial peri-
         | 
| 121 | 
            +
            odic boundary condition31. In our calculation, we performed
         | 
| 122 | 
            +
            non-equilibrium molecular dynamics simulation by applying
         | 
| 123 | 
            +
            the indentation on the center of molecular slab under finite
         | 
| 124 | 
            +
            temperature31.
         | 
| 125 | 
            +
            We also carefully tested the choice of slab
         | 
| 126 | 
            +
            models and thermal equilibration to ensure the robustness of
         | 
| 127 | 
            +
            our simulation set up. In order to automate the simulation,
         | 
| 128 | 
            +
            we developed a computational pipeline to automate the gen-
         | 
| 129 | 
            +
            eration of molecular force fields from the AmberTools20
         | 
| 130 | 
            +
            software32. Force field parameters are assigned by the Gen-
         | 
| 131 | 
            +
            eral Amber Force Field (GAFF) with atomic charges using
         | 
| 132 | 
            +
            semi-empirical (AM1) with bond charge correction (BCC)33.
         | 
| 133 | 
            +
            All simulations were performed on the LAMMPS package34 at
         | 
| 134 | 
            +
            room temperature with the strain rate of 10 m/s.
         | 
| 135 | 
            +
            In the following, we will focus on three naphthalenete-
         | 
| 136 | 
            +
            tracarboxylic diimide crystals as discussed in Fig. 1. The
         | 
| 137 | 
            +
            three molecules share the same backbone while differing only
         | 
| 138 | 
            +
            in the side chains. The brittle crystal consists of the molecules
         | 
| 139 | 
            +
            with the propyl group, featured by the orthorhombic space
         | 
| 140 | 
            +
            group Pbca with one molecule in the asymmetric unit. On the
         | 
| 141 | 
            +
            other hand, the elastic/plastic crystals have the ethyl/methyl
         | 
| 142 | 
            +
            groups, both adopting the monoclinic space group P21/c with
         | 
| 143 | 
            +
            half a molecule in the asymmetric unit. For convenience, we
         | 
| 144 | 
            +
            follow the previous literature10 to name these systems accord-
         | 
| 145 | 
            +
            ing to their molecular functional groups (i.e., Pr, Et, Me).
         | 
| 146 | 
            +
            In all three cases, the weak interaction are formed by alkyl
         | 
| 147 | 
            +
            groups at the (001) plane. However, the overall molecular
         | 
| 148 | 
            +
            packing in the brittle-Pr crystal are more complex since there
         | 
| 149 | 
            +
            exist eight different types of molecular alignments due to the
         | 
| 150 | 
            +
            mmm symmetry operations. On the contrary, there are two
         | 
| 151 | 
            +
            types of molecular alignments in the Et/Me crystals, and each
         | 
| 152 | 
            +
            (001) layer contains only one type of molecular alignment (see
         | 
| 153 | 
            +
            Fig. S1 and table S1).
         | 
| 154 | 
            +
            Fig.
         | 
| 155 | 
            +
            2 summarized the simulated evolution of average
         | 
| 156 | 
            +
            molecular potential energy as a function of indentation depth
         | 
| 157 | 
            +
            for all three materials. For a fair comparison, we set up the
         | 
| 158 | 
            +
            model size close to ∼ 50.0 × 7.0 × 7.0 nm3. Encouragingly,
         | 
| 159 | 
            +
            our calculations reproduced the experimentally observed brit-
         | 
| 160 | 
            +
            tle fracture, elastic deformation and plastic bending, respec-
         | 
| 161 | 
            +
            tively. First, Pr is clearly brittle as evidenced by the abrupt
         | 
| 162 | 
            +
            drop of energy in Fig. 2a, which is also consistent to the
         | 
| 163 | 
            +
            appearance of crack pattern in Fig. 1a when the indentation
         | 
| 164 | 
            +
            depth reaches 3.5 nm. On the other hand, Et is more com-
         | 
| 165 | 
            +
            plaint with a maximum indentation of 6.2 nm. Apply further
         | 
| 166 | 
            +
            loading would lead to the formation of crack as well. If we re-
         | 
| 167 | 
            +
            lease the indentation before Et reaches 6.2 nm, the simulation
         | 
| 168 | 
            +
            FIG. 2.
         | 
| 169 | 
            +
            The evolution of average molecular potential energy as
         | 
| 170 | 
            +
            a function of indentation depth upon (a) loading and (b) unloading.
         | 
| 171 | 
            +
            In (b), only two samples (Me-elastic and Me-plastic) are shown for
         | 
| 172 | 
            +
            clarity.
         | 
| 173 | 
            +
            will roughly return to the original state. Therefore, the defor-
         | 
| 174 | 
            +
            mation is elastic. Interestingly, Me can survive under more
         | 
| 175 | 
            +
            than 10 nm indentation without breaking with two different
         | 
| 176 | 
            +
            setups. For the slab after a full isobaric-isothermal equilibra-
         | 
| 177 | 
            +
            tion, it bends elastically, as evidenced by the reversible energy
         | 
| 178 | 
            +
            versus indentation depth relation (denoted as Me-elastic in
         | 
| 179 | 
            +
            Fig. 2b). When the slab has a small strain in the initial config-
         | 
| 180 | 
            +
            uration (see Table S2), the corresponding energy curves upon
         | 
| 181 | 
            +
            loading and unloading are no longer reversible. Compared to
         | 
| 182 | 
            +
            the Me-elastic, this sample achieves lower energy stable when
         | 
| 183 | 
            +
            it approaches the maximum indentation depth upon loading.
         | 
| 184 | 
            +
            When the indentation is released, it does not return to the orig-
         | 
| 185 | 
            +
            inal states, but maintains a relatively higher energy. Therefore,
         | 
| 186 | 
            +
            the whole deformation process is irreversible and plastic. The
         | 
| 187 | 
            +
            sample will be referred to Me-plastic from now on. It is also
         | 
| 188 | 
            +
            important to note that the deformation is strongly anisotropic.
         | 
| 189 | 
            +
            For the same Me sample, the deformations are brittle if the
         | 
| 190 | 
            +
            indentation is applied on other directions. Such a direction-
         | 
| 191 | 
            +
            dependence has also been observed in recent experiments16.
         | 
| 192 | 
            +
            Although several recent computational studies attempted to
         | 
| 193 | 
            +
            explain the observed mechanical properties, they were lim-
         | 
| 194 | 
            +
            ited to indirect simulations such as pure tensile and shear
         | 
| 195 | 
            +
            tests10,17–19. Here, our results provide the first direct evidence
         | 
| 196 | 
            +
            from atomistic modeling and reproduce the experiment obser-
         | 
| 197 | 
            +
            vations on their mechanical responses upon the bending de-
         | 
| 198 | 
            +
            formation. Compared to the simulation results, the elastic and
         | 
| 199 | 
            +
            plastic samples are found to bend under larger deformations in
         | 
| 200 | 
            +
            real experiments10. This is because that the material’s length
         | 
| 201 | 
            +
            on x-axis under the actual bending test can shrink to release
         | 
| 202 | 
            +
            the tensile stress. However, our simulation model still obeys
         | 
| 203 | 
            +
            the periodic boundary condition along the x-axis. Hence we
         | 
| 204 | 
            +
            expect that the degree of bending from our simulation is un-
         | 
| 205 | 
            +
             | 
| 206 | 
            +
            (a) Loading
         | 
| 207 | 
            +
            Pr: brittle
         | 
| 208 | 
            +
            0.4
         | 
| 209 | 
            +
            Et: elastic
         | 
| 210 | 
            +
            △E (kJ/mol)
         | 
| 211 | 
            +
            Me: elastic
         | 
| 212 | 
            +
            Me: plastic
         | 
| 213 | 
            +
            0.2
         | 
| 214 | 
            +
            0.0
         | 
| 215 | 
            +
            0
         | 
| 216 | 
            +
            4
         | 
| 217 | 
            +
            6
         | 
| 218 | 
            +
            8
         | 
| 219 | 
            +
            10
         | 
| 220 | 
            +
            (b) Unloading
         | 
| 221 | 
            +
            Me: elastic
         | 
| 222 | 
            +
            △E (kJ/mol)
         | 
| 223 | 
            +
            0.2
         | 
| 224 | 
            +
            Me: plastic
         | 
| 225 | 
            +
            0.0
         | 
| 226 | 
            +
            0
         | 
| 227 | 
            +
            2
         | 
| 228 | 
            +
            4
         | 
| 229 | 
            +
            6
         | 
| 230 | 
            +
            8
         | 
| 231 | 
            +
            10
         | 
| 232 | 
            +
            Indentation Depth (nm)3
         | 
| 233 | 
            +
            derestimated as compared to the real situation. We also tried
         | 
| 234 | 
            +
            to vary the strain rate. According to our attempts, it seems that
         | 
| 235 | 
            +
            increasing the strain rate by 10 times does not qualitatively
         | 
| 236 | 
            +
            change the results. However, an ultrafast strain rate (>200
         | 
| 237 | 
            +
            m/s) is likely to trigger some unrealistic phase transition thus
         | 
| 238 | 
            +
            changes the nature of deformation significantly. Regardless
         | 
| 239 | 
            +
            of these restrictions on parameter choices, our simulations are
         | 
| 240 | 
            +
            robust in capturing the main physics.
         | 
| 241 | 
            +
            0.0
         | 
| 242 | 
            +
            0.1
         | 
| 243 | 
            +
            Pr: brittle
         | 
| 244 | 
            +
            Et: elastic
         | 
| 245 | 
            +
            Me: plastic
         | 
| 246 | 
            +
            0.0
         | 
| 247 | 
            +
            0.1
         | 
| 248 | 
            +
            40
         | 
| 249 | 
            +
            20
         | 
| 250 | 
            +
            0
         | 
| 251 | 
            +
            20
         | 
| 252 | 
            +
            40
         | 
| 253 | 
            +
            0.0
         | 
| 254 | 
            +
            0.1
         | 
| 255 | 
            +
            Distribution
         | 
| 256 | 
            +
            Rotation (degree)
         | 
| 257 | 
            +
            FIG. 3. The simulated distribution of accumulated rotational angles
         | 
| 258 | 
            +
            (with respect to the initial configurations) for all materials upon the
         | 
| 259 | 
            +
            bending loads. For clarity, the Me-elastic data was omitted.
         | 
| 260 | 
            +
            While analyzing the dynamic trajectories, we observed that
         | 
| 261 | 
            +
            molecules rotate strongly upon bending. Fig. 1 defines the
         | 
| 262 | 
            +
            alignments (α, β, γ) for each molecule that can rotate along
         | 
| 263 | 
            +
            the x, y, z axes in the Cartesian coordinates. Fig. 3 plots
         | 
| 264 | 
            +
            the distribution of molecular rotations for all three directions.
         | 
| 265 | 
            +
            Given that indentation direction acts on the z-axis and the
         | 
| 266 | 
            +
            setup of three bending points aligns along the x-axis, we ex-
         | 
| 267 | 
            +
            pect that the rotational mode along y axis (β) is the primary
         | 
| 268 | 
            +
            motion under the loading. Indeed, Fig. 3 reveals that the rota-
         | 
| 269 | 
            +
            tion in β is more pronounced that other directions for all three
         | 
| 270 | 
            +
            molecules. According to the computed moments of rotational
         | 
| 271 | 
            +
            inertia in Table I, the molecules with smaller size are easier to
         | 
| 272 | 
            +
            rotate more. Therefore, Me has overall more rotational flexi-
         | 
| 273 | 
            +
            bility than Et and Pr in all directions.
         | 
| 274 | 
            +
            TABLE I. The computed moments of rotational inertia (Da· ˚A2) for
         | 
| 275 | 
            +
            each system.
         | 
| 276 | 
            +
            System
         | 
| 277 | 
            +
            Number of atoms
         | 
| 278 | 
            +
            Ixx
         | 
| 279 | 
            +
            Iyy
         | 
| 280 | 
            +
            Izz
         | 
| 281 | 
            +
            Pr
         | 
| 282 | 
            +
            44
         | 
| 283 | 
            +
            1707.95 4124.74 5606.78
         | 
| 284 | 
            +
            Et
         | 
| 285 | 
            +
            38
         | 
| 286 | 
            +
            2332.63 2311.36 3610.28
         | 
| 287 | 
            +
            Me
         | 
| 288 | 
            +
            32
         | 
| 289 | 
            +
            1911.78 1710.74 2854.21
         | 
| 290 | 
            +
            In Figs. S3-S531, we provided the detailed analysis on each
         | 
| 291 | 
            +
            simulation trajectory. Among them, it is mostly interesting
         | 
| 292 | 
            +
            to note that there is an obvious asymmetric distribution of β
         | 
| 293 | 
            +
            for the plastic deformation as shown in Fig. 3. To quest its
         | 
| 294 | 
            +
            origin, we plot a few representative structures from the cor-
         | 
| 295 | 
            +
            responding trajectory in Fig. 4. Unlike the elastic deforma-
         | 
| 296 | 
            +
            5.0
         | 
| 297 | 
            +
            7.5
         | 
| 298 | 
            +
            10.0
         | 
| 299 | 
            +
            Indentation depth (nm)
         | 
| 300 | 
            +
             (degree)
         | 
| 301 | 
            +
            β
         | 
| 302 | 
            +
            -30
         | 
| 303 | 
            +
            30
         | 
| 304 | 
            +
            0
         | 
| 305 | 
            +
            -15
         | 
| 306 | 
            +
            15
         | 
| 307 | 
            +
            FIG. 4.
         | 
| 308 | 
            +
            The list of representative snapshots from the simulation of
         | 
| 309 | 
            +
            Me-plastic deformation. The molecules are colored by the β angle
         | 
| 310 | 
            +
            values from red to blue. The domains of the secondary phase are
         | 
| 311 | 
            +
            highlighted by the red dotted eclipses. The red dotted arrows indicate
         | 
| 312 | 
            +
            the slip direction. The grey colored shapes represent the contacting
         | 
| 313 | 
            +
            locations in the three-point bending test.
         | 
| 314 | 
            +
            tion that all molecules are symmetrically aligned at the cen-
         | 
| 315 | 
            +
            tered yz plane, we found that the region near the indenter
         | 
| 316 | 
            +
            tip undergoes a phase transition through molecular rotation.
         | 
| 317 | 
            +
            This region is also evident from non-zero rotations of α and
         | 
| 318 | 
            +
            γ as shown in Fig. S5. This new domain, consisting of re-
         | 
| 319 | 
            +
            aligned molecules (denoted as the red dotted eclipse), can
         | 
| 320 | 
            +
            easily slip along its interface with the parent domain. Upon
         | 
| 321 | 
            +
            indentation, the molecules in the secondary domain, located
         | 
| 322 | 
            +
            on the upper surface of the slab, do not gain enough momen-
         | 
| 323 | 
            +
            tum to go downward as compared to other molecules due to
         | 
| 324 | 
            +
            the compressive stress from the bending forces. Therefore,
         | 
| 325 | 
            +
            the relative slipping direction of the secondary domain is up-
         | 
| 326 | 
            +
            ward and we observe the appearance of a bump near the in-
         | 
| 327 | 
            +
            denter tip. As the tip continues to go down, the secondary
         | 
| 328 | 
            +
            domain keeps climbing up until the bump reaches its maxi-
         | 
| 329 | 
            +
            mum. Upon further compression, the molecules at the bottom
         | 
| 330 | 
            +
            region are nearly flattened due to a large tensile stress, thus
         | 
| 331 | 
            +
            creating much empty space along the z-axis. Thus, the sec-
         | 
| 332 | 
            +
            ondary domain slips down to push the neighboring molecules
         | 
| 333 | 
            +
            down to fill the empty space. Clearly, this secondary domain
         | 
| 334 | 
            +
            serves as a buffer zone to help the system maintain a rela-
         | 
| 335 | 
            +
            tively low energy state and postpone the formation of crack.
         | 
| 336 | 
            +
            When the indentation is released, the process is supposed to
         | 
| 337 | 
            +
            be irreversible at low temperature since triggering the back
         | 
| 338 | 
            +
            transformation requires some energy barrier. Therefore, it is
         | 
| 339 | 
            +
            a plastic deformation. However, it is driven by the molecu-
         | 
| 340 | 
            +
            lar rotation, which is different from the plastic phenomenon
         | 
| 341 | 
            +
            in the metals that requires the migration of dislocations. Due
         | 
| 342 | 
            +
            to the phase transition driven by molecule rotation, the do-
         | 
| 343 | 
            +
            main of new phase may appear near the indenter and coexist
         | 
| 344 | 
            +
             | 
| 345 | 
            +
            4
         | 
| 346 | 
            +
            20
         | 
| 347 | 
            +
            10
         | 
| 348 | 
            +
            0
         | 
| 349 | 
            +
            10
         | 
| 350 | 
            +
            20
         | 
| 351 | 
            +
            30
         | 
| 352 | 
            +
            40
         | 
| 353 | 
            +
            R1 (degree)
         | 
| 354 | 
            +
            20
         | 
| 355 | 
            +
            10
         | 
| 356 | 
            +
            0
         | 
| 357 | 
            +
            10
         | 
| 358 | 
            +
            20
         | 
| 359 | 
            +
            30
         | 
| 360 | 
            +
            40
         | 
| 361 | 
            +
            R2 (degree)
         | 
| 362 | 
            +
            GM
         | 
| 363 | 
            +
            LM
         | 
| 364 | 
            +
            (a) Brittle
         | 
| 365 | 
            +
            20
         | 
| 366 | 
            +
            10
         | 
| 367 | 
            +
            0
         | 
| 368 | 
            +
            10
         | 
| 369 | 
            +
            20
         | 
| 370 | 
            +
            30
         | 
| 371 | 
            +
            40
         | 
| 372 | 
            +
            R1 (degree)
         | 
| 373 | 
            +
            20
         | 
| 374 | 
            +
            10
         | 
| 375 | 
            +
            0
         | 
| 376 | 
            +
            10
         | 
| 377 | 
            +
            20
         | 
| 378 | 
            +
            30
         | 
| 379 | 
            +
            40
         | 
| 380 | 
            +
            GM
         | 
| 381 | 
            +
            LM
         | 
| 382 | 
            +
            (b) Elastic
         | 
| 383 | 
            +
            20
         | 
| 384 | 
            +
            10
         | 
| 385 | 
            +
            0
         | 
| 386 | 
            +
            10
         | 
| 387 | 
            +
            20
         | 
| 388 | 
            +
            30
         | 
| 389 | 
            +
            40
         | 
| 390 | 
            +
            R1 (degree)
         | 
| 391 | 
            +
            20
         | 
| 392 | 
            +
            10
         | 
| 393 | 
            +
            0
         | 
| 394 | 
            +
            10
         | 
| 395 | 
            +
            20
         | 
| 396 | 
            +
            30
         | 
| 397 | 
            +
            40
         | 
| 398 | 
            +
            GM
         | 
| 399 | 
            +
            LM
         | 
| 400 | 
            +
            (c) Plastic
         | 
| 401 | 
            +
            10
         | 
| 402 | 
            +
            1
         | 
| 403 | 
            +
            100
         | 
| 404 | 
            +
            101
         | 
| 405 | 
            +
            102
         | 
| 406 | 
            +
            103
         | 
| 407 | 
            +
            104
         | 
| 408 | 
            +
            E (kJ/mol)
         | 
| 409 | 
            +
            FIG. 5. The potential energy surface as a function of molecular rotation for three crystals with different mechanical response: (a) Pr-brittle,
         | 
| 410 | 
            +
            (b) Et-elastic, and (c) Me-elastic/plastic deformations. The while region in (a) denotes the rotations leading to energy exceeding 104 kJ/mol.
         | 
| 411 | 
            +
            with the parent phase via a low-energy interface. The newly
         | 
| 412 | 
            +
            formed secondary phase can freely slide along the interface
         | 
| 413 | 
            +
            due to the external stress conditions. In the early stage, the
         | 
| 414 | 
            +
            upward movement of new phase results in a bump shape near
         | 
| 415 | 
            +
            the indenter. We note that such a bump has actually been
         | 
| 416 | 
            +
            found in the bending experiment10, but it was not discussed
         | 
| 417 | 
            +
            in the literature. Our simulation here suggests that the forma-
         | 
| 418 | 
            +
            tion of bump is a key characteristic of the plastic deformation
         | 
| 419 | 
            +
            driven by molecular rotation. If the external temperature is
         | 
| 420 | 
            +
            sufficiently high to cross the phase transition barrier, the pro-
         | 
| 421 | 
            +
            cess may become reversible, similar to the previously reported
         | 
| 422 | 
            +
            superelastic organic crystals4.
         | 
| 423 | 
            +
            So far, we have established the relation between molecular
         | 
| 424 | 
            +
            rotation and the observed mechanical responses. Clearly, the
         | 
| 425 | 
            +
            degree of freedom of molecular rotation is the key factor that
         | 
| 426 | 
            +
            determines the mechanical flexibility of organic crystals under
         | 
| 427 | 
            +
            bending. However, we are still unclear why some materials
         | 
| 428 | 
            +
            are more compliant than others and why we observed two dif-
         | 
| 429 | 
            +
            ferent deformation behaviors on the Me crystal with slightly
         | 
| 430 | 
            +
            different initial configurations. To quest their physical origins,
         | 
| 431 | 
            +
            it is necessary to examine the potential energy surface (PES)
         | 
| 432 | 
            +
            with respect to the molecular rotations. Therefore, we use the
         | 
| 433 | 
            +
            relaxed crystal structure as the reference and then systemat-
         | 
| 434 | 
            +
            ically rotate two groups of symmetrically-related molecules
         | 
| 435 | 
            +
            (colored in red and blue in Fig. S1) along the y-axis in the
         | 
| 436 | 
            +
            unit cell. For the Pr-crystal, each group has four molecules
         | 
| 437 | 
            +
            with the same alignment in β. For both Et and Me crystals,
         | 
| 438 | 
            +
            each group contains only one molecule. The computed poten-
         | 
| 439 | 
            +
            tial energy maps as the function of the rotation angles (R1 and
         | 
| 440 | 
            +
            R2) are summarized in Fig. 5.
         | 
| 441 | 
            +
            As shown in Fig.
         | 
| 442 | 
            +
            5a, Pr has a very stiff global mini-
         | 
| 443 | 
            +
            mum (GM) at (0, 0). This indicates that even a slight rota-
         | 
| 444 | 
            +
            tion can lead to a high energy penalty. The energy basin of
         | 
| 445 | 
            +
            GM is aligned diagonally, suggesting that the low energy rota-
         | 
| 446 | 
            +
            tion modes are synchronous due to the crystal symmetry con-
         | 
| 447 | 
            +
            straint. In this energy basin, the total energy of the whole sys-
         | 
| 448 | 
            +
            tem increase about 500 kJ/mol, when it reaches the (10, 10).
         | 
| 449 | 
            +
            However, such high energy penalty would eventually lead to
         | 
| 450 | 
            +
            the generation of crack. In addition, there is a local minimum
         | 
| 451 | 
            +
            (LM) centered around (20, 20). But this state is nearly impos-
         | 
| 452 | 
            +
            sible to reach due to a high energy barrier up to 104 kJ/mol.
         | 
| 453 | 
            +
            Overall, Pr has a rather limited rotational freedom, which is
         | 
| 454 | 
            +
            consistent with the fact that each molecule in Pr is surrounded
         | 
| 455 | 
            +
            by multiple types of molecular alignments.
         | 
| 456 | 
            +
            Compared to Pr, the Et sample (Fig. 5b) has more spreads
         | 
| 457 | 
            +
            around the GM (0, 0). Therefore, the molecules can rotate
         | 
| 458 | 
            +
            more under the mechanical load. As shown in Fig. 3, two
         | 
| 459 | 
            +
            rotational peaks are symmetrically distributed at ±20 degrees
         | 
| 460 | 
            +
            when the system reaches the elastic limit. According to Fig.
         | 
| 461 | 
            +
            5b, the rotation around (20, 20) would lead to a penalty energy
         | 
| 462 | 
            +
            of 500 kJ/mol. Therefore, the Et molecules can rotate more
         | 
| 463 | 
            +
            than Pr before the crack event starts. Similarly, Et has another
         | 
| 464 | 
            +
            LM around (30, 30), but it is unreachable due to a high energy
         | 
| 465 | 
            +
            barrier.
         | 
| 466 | 
            +
            On the other hand, the Me has a even flatter energy spread
         | 
| 467 | 
            +
            around the GM basin (Fig. 3c). Using 500 kJ/mol as the
         | 
| 468 | 
            +
            threshold, the computed area ratios are roughly 0.14 (Pr), 0.84
         | 
| 469 | 
            +
            (Et), 1.00 (Me). Hence, the Pr can sustain more elastic de-
         | 
| 470 | 
            +
            formation than other materials. These values are qualitatively
         | 
| 471 | 
            +
            consistent with our computed critical indentation depth val-
         | 
| 472 | 
            +
            ues as shown in Fig. 2, and even fits the experimental values
         | 
| 473 | 
            +
            better (given that Me is found to be significantly more elastic
         | 
| 474 | 
            +
            than Pr). In addition, Me is remarkable because there exists
         | 
| 475 | 
            +
            a low energy pathway that connects its LM at (30, 30). Under
         | 
| 476 | 
            +
            the mechanical load, there exist two scenarios. One is to con-
         | 
| 477 | 
            +
            tinue to expand in the GM basin and the system bends elasti-
         | 
| 478 | 
            +
            cally, as we found in our simulation starting with the perfectly
         | 
| 479 | 
            +
            equilibrated Me single crystal sample. Alternatively, it is also
         | 
| 480 | 
            +
            possible to reach the neighboring LM basin. While the latter
         | 
| 481 | 
            +
            case requires crossing a barrier on its PES map, it may be fa-
         | 
| 482 | 
            +
            cilitated by the pre-existing structural defects or activated due
         | 
| 483 | 
            +
            to kinetic reason. Indeed, we observed such a phase transition
         | 
| 484 | 
            +
            when the initial configuration is strained. And this eventually
         | 
| 485 | 
            +
            led to a plastic deformation as shown in Fig. 4. Correspond-
         | 
| 486 | 
            +
            ingly, the existence of molecules at the LM (30, 30) region
         | 
| 487 | 
            +
            resulted in a stronger peak around 30 degree as compared to
         | 
| 488 | 
            +
            the peak at -30 degree for the distribution of β in Fig. 3, In
         | 
| 489 | 
            +
            the real experiment, the latter scenario is more likely to occur
         | 
| 490 | 
            +
            since the defects are unavoidable. Although the deformation
         | 
| 491 | 
            +
            process is irreversible at low temperature upon the release of
         | 
| 492 | 
            +
             | 
| 493 | 
            +
            5
         | 
| 494 | 
            +
            indentation, it may become reversible at an elevated tempera-
         | 
| 495 | 
            +
            ture when it is sufficient to cross the barrier between LM and
         | 
| 496 | 
            +
            GM.
         | 
| 497 | 
            +
            In summary, we perform the first molecular dynamics sim-
         | 
| 498 | 
            +
            ulation to directly model the mechanical bending of organic
         | 
| 499 | 
            +
            crystals. Using three recently reported naphthalene diimide
         | 
| 500 | 
            +
            derivatives as the examples, our simulation successfully re-
         | 
| 501 | 
            +
            produced the experimentally observed mechanical behaviors
         | 
| 502 | 
            +
            from brittle fracture to elastic/plastic deformation upon me-
         | 
| 503 | 
            +
            chanical bending. By analyzing their atomistic trajectories,
         | 
| 504 | 
            +
            we found that molecular rotational freedom is the key factor
         | 
| 505 | 
            +
            to determine whether or not the materials are bendable. This
         | 
| 506 | 
            +
            phenomenon originates from the subtle interplay between ge-
         | 
| 507 | 
            +
            ometry packing and intermolecular interaction. Furthermore,
         | 
| 508 | 
            +
            we found the use of rotation-dependent potential energy sur-
         | 
| 509 | 
            +
            face map can be used clearly explain the origin of different
         | 
| 510 | 
            +
            mechanical responses for organic materials. Together with the
         | 
| 511 | 
            +
            recently proposed crystal packing screening model35, our re-
         | 
| 512 | 
            +
            sults can be used to guide the search for new mechanically
         | 
| 513 | 
            +
            flexible candidates with improved functionality for future de-
         | 
| 514 | 
            +
            vice applications.
         | 
| 515 | 
            +
            This research is sponsored by the NSF (DMR-2142570)
         | 
| 516 | 
            +
            and Sony Group Corporation. The computing resources are
         | 
| 517 | 
            +
            provided by ACCESS (TG-DMR180040).
         | 
| 518 | 
            +
            REFERENCES
         | 
| 519 | |
| 520 | 
            +
            1 P. Naumov, S. Chizhik, M. K. Panda, N. K. Nath,
         | 
| 521 | 
            +
            and
         | 
| 522 | 
            +
            E. Boldyreva, Chem. Rev. 115, 12440 (2015).
         | 
| 523 | 
            +
            2 S. Saha, M. K. Mishra, C. M. Reddy, and G. R. Desiraju, Acc.
         | 
| 524 | 
            +
            Chem. Res. 51, 2957 (2018).
         | 
| 525 | 
            +
            3 C. M. Reddy, K. A. Padmanabhan, and G. R. Desiraju, Cryst.
         | 
| 526 | 
            +
            Growth Des. 6, 2720 (2006).
         | 
| 527 | 
            +
            4 S. Takamizawa and Y. Miyamoto, Angew. Chem. Int. Ed. 53, 6970
         | 
| 528 | 
            +
            (2014).
         | 
| 529 | 
            +
            5 M. K. Panda, S. Ghosh, N. Yasuda, T. Moriwaki, G. D. Mukher-
         | 
| 530 | 
            +
            jee, C. M. Reddy, and P. Naumov, Nat. Chem. 7, 65 (2015).
         | 
| 531 | 
            +
            6 G. R. Krishna, R. Devarapalli, G. Lal, and C. M. Reddy, J. Am.
         | 
| 532 | 
            +
            Chem. Soc. 138, 13561 (2016).
         | 
| 533 | 
            +
            7 J. P. Yadav, R. N. Yadav, P. Uniyal, H. Chen, C. Wang, C. C. Sun,
         | 
| 534 | 
            +
            N. Kumar, A. K. Bansal, and S. Jain, Cryst. Growth Des. 20, 832
         | 
| 535 | 
            +
            (2019).
         | 
| 536 | 
            +
            8 M. K. Mishra and C. C. Sun, Cryst. Growth Des. 20, 4764 (2020).
         | 
| 537 | 
            +
            9 K. Zhang, C. C. Sun, Y. Liu, C. Wang, P. Shi, J. Xu, S. Wu, and
         | 
| 538 | 
            +
            J. Gong, Chem. Mater. 33, 1053 (2021).
         | 
| 539 | 
            +
            10 R. Devarapalli, S. B. Kadambi, C.-T. Chen, G. R. Krishna, B. R.
         | 
| 540 | 
            +
            Kammari, M. J. Buehler, U. Ramamurty, and C. M. Reddy, Chem.
         | 
| 541 | 
            +
            Mater. 31, 1391 (2019).
         | 
| 542 | 
            +
            11 S. E. Root, S. Savagatrup, A. D. Printz, D. Rodriquez, and D. J.
         | 
| 543 | 
            +
            Lipomi, Chem. Rev. 117, 6467 (2017).
         | 
| 544 | 
            +
            12 L. Li, P. Commins, M. B. Al-Handawi, D. P. Karothu, J. M. Ha-
         | 
| 545 | 
            +
            labi, S. Schramm, J. Weston, R. Rezgui, and P. Naumov, Chem.
         | 
| 546 | 
            +
            Sci. 10, 7327 (2019).
         | 
| 547 | 
            +
            13 T. Mutai, T. Sasaki, and S. Takamizawa, J. Photochem. Photobiol.
         | 
| 548 | 
            +
            C Photochem. Rev. , 100479 (2021).
         | 
| 549 | 
            +
            14 Y. Wang, L. Sun, C. Wang, F. Yang, X. Ren, X. Zhang, H. Dong,
         | 
| 550 | 
            +
            and W. Hu, Chem. Soc. Rev. 48, 1492 (2019).
         | 
| 551 | 
            +
            15 H. Liu, Z. Lu, Z. Zhang, Y. Wang, and H. Zhang, Angew. Chem.
         | 
| 552 | 
            +
            Int. Ed. 57, 8448 (2018).
         | 
| 553 | 
            +
            16 C. C. Sun, Pharm. Res. 34, 918 (2017).
         | 
| 554 | 
            +
            17 C. Wang and C. C. Sun, Mol. Pharmaceutics 16, 1732 (2019).
         | 
| 555 | 
            +
            18 Y. Ootani and M. Kubo, J. Phys. Chem. C 126, 10554 (2022).
         | 
| 556 | 
            +
            19 Y. V. Matveychuk, A. S. Yurchenko, A. E. Masunov, and E. V.
         | 
| 557 | 
            +
            Bartashevich, Cryst. Growth Des. 22, 6472 (2022).
         | 
| 558 | 
            +
            20 M. Bryant, A. Maloney, and R. Sykes, CrystEngComm 20, 2698
         | 
| 559 | 
            +
            (2018).
         | 
| 560 | 
            +
            21 W. Zhu, H. Wang, and W. Yang, Acta Mater. 60, 7112 (2012).
         | 
| 561 | 
            +
            22 J. J. Zhang, Y. D. Yan, X. Liu, T. Sun, and Y. C. Liang, J. Phys.
         | 
| 562 | 
            +
            D: Appl. Phys. 47, 195301 (2014).
         | 
| 563 | 
            +
            23 W. G. N¨ohring, J. J. M¨oller, Z. Xie, and E. Bitzek, Extreme Mech.
         | 
| 564 | 
            +
            Lett. 8, 140 (2016).
         | 
| 565 | 
            +
            24 X. Zhuo and H. Beom, Comput. Mater. Sci. 152, 331 (2018).
         | 
| 566 | 
            +
            25 K. C. Katakam and N. Yedla, Superlattice. Microst. 146, 106674
         | 
| 567 | 
            +
            (2020).
         | 
| 568 | 
            +
            26 Y. J. HE and B. MA, Trans. Nonferrous Met. Soc. China 32, 3687
         | 
| 569 | 
            +
            (2022).
         | 
| 570 | 
            +
            27 C. M. Reddy, G. R. Krishna, and S. Ghosh, CrystEngComm 12,
         | 
| 571 | 
            +
            2296 (2010).
         | 
| 572 | 
            +
            28 C. Wang and C. C. Sun, Cryst. Growth Des. 18, 1909 (2018).
         | 
| 573 | 
            +
            29 N. Mathew, C. R. Picu, and P. W. Chung, J. Phys. Chem. A 117,
         | 
| 574 | 
            +
            5326 (2013).
         | 
| 575 | 
            +
            30 I. A. Olson, A. G. Shtukenberg, B. Kahr, and M. D. Ward, Rep.
         | 
| 576 | 
            +
            Prog. Phys. 81, 096501 (2018).
         | 
| 577 | 
            +
            31 See Supplemental Material at http://link.aps.org/**** for a de-
         | 
| 578 | 
            +
            tailed description of molecular packing, model setup and molec-
         | 
| 579 | 
            +
            ular dynamics simulation results analysis for three naphthalenete-
         | 
| 580 | 
            +
            tracarboxylic diimide crystals.
         | 
| 581 | 
            +
            32 D. A. Case, K. Belfon, I. Y. Ben-Shalom, S. R. Brozell, D. S.
         | 
| 582 | 
            +
            Cerutti, T. E. Cheatham, III, V. W. D. Cruzeiro, T. A. Darden,
         | 
| 583 | 
            +
            R. E. Duke, G. Giambasu, M. K. Gilson, H. Gohlke, A. W.
         | 
| 584 | 
            +
            Goetz, R. Harris, S. Izadi, S. A. Izmailov, K. Kasavajhala, A. Ko-
         | 
| 585 | 
            +
            valenko, R. Krasny, T. Kurtzman, T. S. Lee, S. LeGrand, P. Li,
         | 
| 586 | 
            +
            C. Lin, J. Liu, T. Luchko, R. Luo, V. Man, K. M. Merz, Y. Miao,
         | 
| 587 | 
            +
            O. Mikhailovskii, G. Monard, H. Nguyen, A. Onufriev, F. Pan,
         | 
| 588 | 
            +
            S. Pantano, R. Qi, D. R. Roe, A. Roitberg, C. Sagui, S. Schott-
         | 
| 589 | 
            +
            Verdugo, J. Shen, C. L. Simmerling, N. R. Skrynnikov, J. Smith,
         | 
| 590 | 
            +
            J. Swails, R. C. Walker, J. Wang, L. Wilson, R. M. Wolf, X. Wu,
         | 
| 591 | 
            +
            Y. Xiong, Y. Xue, D. M. York, and P. A. Kollman, AMBER 2020
         | 
| 592 | 
            +
            (2020).
         | 
| 593 | 
            +
            33 A. Jakalian, B. L. Bush, D. B. Jack, and C. I. Bayly, J. Comput.
         | 
| 594 | 
            +
            Chem. 21, 132 (2000).
         | 
| 595 | 
            +
            34 S. Plimpton, J. Comput. Phys. 117, 1 (1995).
         | 
| 596 | 
            +
            35 Q. Zhu, W. Tang, and S. Hattori, Cryst. Growth Des. 22, 7308
         | 
| 597 | 
            +
            (2022).
         | 
| 598 | 
            +
             | 
| 599 | 
            +
            6
         | 
| 600 | 
            +
            Supplementary Online Materials:
         | 
| 601 | 
            +
            Bending Deformation Driven by Molecular Rotation
         | 
| 602 | 
            +
            A. Crystal structures
         | 
| 603 | 
            +
            In this study, we focused on three systems consisting of naphthalene diimide derivatives as shown in Fig. S1. The three molecules
         | 
| 604 | 
            +
            share the same backbone while differing only in the side chains. The brittle crystal consists of the molecules with the propyl
         | 
| 605 | 
            +
            group (Pr), featured by the orthorhombic space group Pbca with one molecule in the asymmetric unit. On the other hand, the
         | 
| 606 | 
            +
            elastic/plastic crystals have the ethyl/methyl groups, both adopting the monoclinic space group P21/c with half a molecule in
         | 
| 607 | 
            +
            the asymmetric unit. In all three cases, the weak interaction plane formed by alkyl groups is (001). In Fig. S1, each molecule in
         | 
| 608 | 
            +
            the unit cell is colored by the alignment along the y-axis. Clearly, the overall molecular packing in the brittle-Pr crystal are more
         | 
| 609 | 
            +
            complex. Since there exist eight different types of molecular alignments due to the mmm symmetry operations, the Pr crystal
         | 
| 610 | 
            +
            has molecules aligned in different ways within the same (001) layer. On the contrary, there are only two types of molecular
         | 
| 611 | 
            +
            alignments in the Et/Me crystals. And the (001) layer in Et/Me crystals has all molecules aligned in the same direction.
         | 
| 612 | 
            +
            FIG. S1. The crystal structures of (a) Pr, (b) Et (c) Me systems.
         | 
| 613 | 
            +
            Table S1 summarizes the crystallographic information of three molecular crystals. Among them, Pr denotes the brittle crystal
         | 
| 614 | 
            +
            with the CSD refcode of DAHLOQ; Et is the elastic crystal with the CSD refcode of BIYRIM01; and Me is the plastic crystal
         | 
| 615 | 
            +
            with the CSD refcode of DAHMUX. In addition to the experimental cell parameters, the equilibrium cell parameters from our
         | 
| 616 | 
            +
            Amber force field are also shown in the parentheses for a comparison. The excellent agreement between experiment and theory
         | 
| 617 | 
            +
            warrants the use of Amber force field in our following simulations.
         | 
| 618 | 
            +
            TABLE S1. The crystallographic information of three molecular crystals.
         | 
| 619 | 
            +
            System
         | 
| 620 | 
            +
            CSD Refcode
         | 
| 621 | 
            +
            Space Group
         | 
| 622 | 
            +
            Number of molecules
         | 
| 623 | 
            +
            a ( ˚A)
         | 
| 624 | 
            +
            b ( ˚A)
         | 
| 625 | 
            +
            c ( ˚A)
         | 
| 626 | 
            +
            β (◦)
         | 
| 627 | 
            +
            Pr
         | 
| 628 | 
            +
            DAHLOQ
         | 
| 629 | 
            +
            Pbca
         | 
| 630 | 
            +
            8
         | 
| 631 | 
            +
            6.96 (7.30) 17.24 (17.40) 27.58 (27.90) 90.0 (90.0)
         | 
| 632 | 
            +
            Et
         | 
| 633 | 
            +
            BIYRIM01
         | 
| 634 | 
            +
            P21/c
         | 
| 635 | 
            +
            2
         | 
| 636 | 
            +
            4.84 (5.07)
         | 
| 637 | 
            +
            7.74 (7.79)
         | 
| 638 | 
            +
            18.32 (19.07) 90.1 (90.3)
         | 
| 639 | 
            +
            Me
         | 
| 640 | 
            +
            DAHMUX
         | 
| 641 | 
            +
            P21/c
         | 
| 642 | 
            +
            2
         | 
| 643 | 
            +
            4.62 (4.58)
         | 
| 644 | 
            +
            8.02 (8.28)
         | 
| 645 | 
            +
            17.02 (18.40) 94.0 (93.9)
         | 
| 646 | 
            +
             | 
| 647 | 
            +
            (a)
         | 
| 648 | 
            +
            (b)
         | 
| 649 | 
            +
            (c)7
         | 
| 650 | 
            +
            B. Simulation Setup
         | 
| 651 | 
            +
            To enable the direct simulation of bending, we created the slab model as shown in Fig. S2. Both x and y-axes are under the
         | 
| 652 | 
            +
            constraint of periodic boundary conditions, while the c-axis is not periodic. To reproduce the experimental results10, we rotated
         | 
| 653 | 
            +
            the crystal structures with the matrix of [[0,0,1], [0,-1,0], [1,0,0]], and then built the super cell slab models according to Table
         | 
| 654 | 
            +
            S2. In each case, we added the vacuum to allow the materials bend sufficiently. The slab correction was applied to remove the
         | 
| 655 | 
            +
            slab-slab interactions from the periodic images. Due to the non-triclinic box restriction on the computation of slab correction,
         | 
| 656 | 
            +
            the β angles for the slabs of Et and Me were to be set to 90◦, which are slightly different from the ideal values. However, this
         | 
| 657 | 
            +
            compromise should not change the results largely.
         | 
| 658 | 
            +
            For Me, two models were considered, including (i) the supercell after the isobaric-isothermal equilibration; and (ii) the
         | 
| 659 | 
            +
            supercell with the experimental cell parameters. Although these two initial configurations only differ slightly, it has been found
         | 
| 660 | 
            +
            they led to different elastic/plastic deformation processes in the subsequent bending simulation.
         | 
| 661 | 
            +
            FIG. S2. The schematic setup of a bending simulation model.
         | 
| 662 | 
            +
            TABLE S2. The details of models used in the bending simulation.
         | 
| 663 | 
            +
            System
         | 
| 664 | 
            +
            Deformation
         | 
| 665 | 
            +
            Supercell
         | 
| 666 | 
            +
            Number of molecules
         | 
| 667 | 
            +
            a ( ˚A)
         | 
| 668 | 
            +
            b ( ˚A)
         | 
| 669 | 
            +
            c ( ˚A)
         | 
| 670 | 
            +
            Vacuum ( ˚A)
         | 
| 671 | 
            +
            Pr
         | 
| 672 | 
            +
            brittle
         | 
| 673 | 
            +
            18 × 4 × 5
         | 
| 674 | 
            +
            5760
         | 
| 675 | 
            +
            503.2
         | 
| 676 | 
            +
            69.9
         | 
| 677 | 
            +
            70.6
         | 
| 678 | 
            +
            120.0
         | 
| 679 | 
            +
            Et
         | 
| 680 | 
            +
            elastic
         | 
| 681 | 
            +
            27 × 4 × 5
         | 
| 682 | 
            +
            6480
         | 
| 683 | 
            +
            508.5
         | 
| 684 | 
            +
            63.6
         | 
| 685 | 
            +
            74.7
         | 
| 686 | 
            +
            120.0
         | 
| 687 | 
            +
            Me
         | 
| 688 | 
            +
            elastic
         | 
| 689 | 
            +
            29 × 8 × 15
         | 
| 690 | 
            +
            6960
         | 
| 691 | 
            +
            501.6
         | 
| 692 | 
            +
            65.2
         | 
| 693 | 
            +
            86.5
         | 
| 694 | 
            +
            120.0
         | 
| 695 | 
            +
            Me
         | 
| 696 | 
            +
            plastic
         | 
| 697 | 
            +
            30 × 8 × 15
         | 
| 698 | 
            +
            7200
         | 
| 699 | 
            +
            510.6
         | 
| 700 | 
            +
            64.2
         | 
| 701 | 
            +
            85.1
         | 
| 702 | 
            +
            120.0
         | 
| 703 | 
            +
            Along the non-periodic z-axis, a cylinderical indenter with the radius of 30 ˚A is applied on top of the slab center in the unit
         | 
| 704 | 
            +
            cell. To mimic two other contacting points in the three-points bending simulation, the last one layer of molecules in the bottom
         | 
| 705 | 
            +
            region were frozen in the entire simulation. In addition, the first columns of molecules on both left and right side of the unit
         | 
| 706 | 
            +
            cell are defined as the border. The rest atoms not belonging the frozen and border groups are set to the moible group that can
         | 
| 707 | 
            +
            move freely. To ensure a sufficient heat bath, we first perform Langevin thermostat on both mobile and border groups, followed
         | 
| 708 | 
            +
            by a second thermal equilibration on only the border atoms. The fully equilibrated sample will be used to perform three-points
         | 
| 709 | 
            +
            bending simulation with only the border atoms being under the Langevin thermostat to mimic the external temperature reservoir.
         | 
| 710 | 
            +
            Upon bending, the indenter will be used to push into the simulation slab in a flow with the rate of 10 m/s. When the system
         | 
| 711 | 
            +
            reaches the maximum indentation depth, the indenter will be kept for 300 ps to allow the system achieves thermal equilibrium.
         | 
| 712 | 
            +
            Afterwards, the indenter will move upward with the previous rate to mimic the release of indenter process.
         | 
| 713 | 
            +
             | 
| 714 | 
            +
            Z
         | 
| 715 | 
            +
            Border
         | 
| 716 | 
            +
            Frozen
         | 
| 717 | 
            +
            Mobile8
         | 
| 718 | 
            +
            C1. Deformation Analysis on Pr-Brittle
         | 
| 719 | 
            +
            To quest the origin of Pr-Brittle, we plot a few representative structures from the corresponding trajectory in Fig. S3. Upon
         | 
| 720 | 
            +
            deformation, we found that the sample continuously to bend from 0 to 3.0 nm (the first row of Fig. S3) and 4.0 nm (the second
         | 
| 721 | 
            +
            row of Fig. S3). The molecules barely rotate around the x (α) and z (γ) axis. However, the rotation on y-axis is more pronounced
         | 
| 722 | 
            +
            and it symmetrically distributed around the central indenter. When the indentation depth exceeds 4.2 nm (the last row of Fig.
         | 
| 723 | 
            +
            S3), the lower surface cracks due to a large tensile stress.
         | 
| 724 | 
            +
            2.5
         | 
| 725 | 
            +
            3.5
         | 
| 726 | 
            +
            4.5
         | 
| 727 | 
            +
            Indentation depth (nm)
         | 
| 728 | 
            +
             (degree)
         | 
| 729 | 
            +
            α
         | 
| 730 | 
            +
            -30
         | 
| 731 | 
            +
            30
         | 
| 732 | 
            +
            0
         | 
| 733 | 
            +
            -15
         | 
| 734 | 
            +
            15
         | 
| 735 | 
            +
             (degree)
         | 
| 736 | 
            +
            β
         | 
| 737 | 
            +
            -30
         | 
| 738 | 
            +
            30
         | 
| 739 | 
            +
            0
         | 
| 740 | 
            +
            -15
         | 
| 741 | 
            +
            15
         | 
| 742 | 
            +
             (degree)
         | 
| 743 | 
            +
            γ
         | 
| 744 | 
            +
            -30
         | 
| 745 | 
            +
            30
         | 
| 746 | 
            +
            0
         | 
| 747 | 
            +
            -15
         | 
| 748 | 
            +
            15
         | 
| 749 | 
            +
            Pr-brittle
         | 
| 750 | 
            +
            FIG. S3. The list of representative snapshots from the simulation of Pr-Brittle deformation.
         | 
| 751 | 
            +
             | 
| 752 | 
            +
            9
         | 
| 753 | 
            +
            C2. Deformation Analysis on Et-Elastic
         | 
| 754 | 
            +
            To quest the origin of Et-Elastic, we plot a few representative structures from the corresponding trajectory in Fig. S4. At a
         | 
| 755 | 
            +
            small indentation depth (4.0 nm as shown in the first row of Fig. S4), the molecules barely rotate around the x (α) and z (γ) axis,
         | 
| 756 | 
            +
            while the rotation on y-axes (β) is more pronounced and it symmetrically distributed around the central indenter. However, it
         | 
| 757 | 
            +
            is clear that the molecules around the center of y-axis do not rotate. Upon further indentation at 5.0 nm (the second row of Fig.
         | 
| 758 | 
            +
            S4) and 6.2 nm (the last row of Fig. S4), the molecules at the center of lower surface undergo a large rotation around the x and
         | 
| 759 | 
            +
            z due to a large compressive stress, but do not rotate around y. This suggests that molecules upon tension prefer a rotation on
         | 
| 760 | 
            +
            α and γ, rather than the primary rotation mode at β due to the anisotropic behavior of its potential energy landscape. Since the
         | 
| 761 | 
            +
            rotations are symmetrically distributed around the indenter, it is still an elastic deformation. When the indentation is released,
         | 
| 762 | 
            +
            the process is supposed to be reversible.
         | 
| 763 | 
            +
            4.0
         | 
| 764 | 
            +
            5.0
         | 
| 765 | 
            +
            6.0
         | 
| 766 | 
            +
            Indentation depth (nm)
         | 
| 767 | 
            +
             (degree)
         | 
| 768 | 
            +
            α
         | 
| 769 | 
            +
            -30
         | 
| 770 | 
            +
            30
         | 
| 771 | 
            +
            0
         | 
| 772 | 
            +
            -15
         | 
| 773 | 
            +
            15
         | 
| 774 | 
            +
             (degree)
         | 
| 775 | 
            +
            β
         | 
| 776 | 
            +
            -30
         | 
| 777 | 
            +
            30
         | 
| 778 | 
            +
            0
         | 
| 779 | 
            +
            -15
         | 
| 780 | 
            +
            15
         | 
| 781 | 
            +
             (degree)
         | 
| 782 | 
            +
            γ
         | 
| 783 | 
            +
            -30
         | 
| 784 | 
            +
            30
         | 
| 785 | 
            +
            0
         | 
| 786 | 
            +
            -15
         | 
| 787 | 
            +
            15
         | 
| 788 | 
            +
            Et-elastic
         | 
| 789 | 
            +
            FIG. S4. The list of representative snapshots from the simulation of Et-Elastic deformation.
         | 
| 790 | 
            +
             | 
| 791 | 
            +
            10
         | 
| 792 | 
            +
            C3. Deformation Analysis on Me-Plastic
         | 
| 793 | 
            +
            To quest the origin of Me-Plastic, we plot a few representative structures from the corresponding trajectory in Fig. S5. At
         | 
| 794 | 
            +
            the depth of 5.5 nm, we found that the molecules near the indenter tip (in the first row of Fig. S4) have alternative changes of
         | 
| 795 | 
            +
            α and γ angles, which is similar to that in Fig. S4. However, these molecule has non-zero β angles. Therefore, it is no longer
         | 
| 796 | 
            +
            symmetric and signals a phase transition trigger by the large compressive stress in the upper surface due to bending. This domain
         | 
| 797 | 
            +
            of new phases, consisting of realigned molecules (denoted as the red dotted eclipse), can easily slip along its interface with the
         | 
| 798 | 
            +
            parent domain. Upon indentation, the molecules in the secondary domain do not gain enough momentum to go downward as
         | 
| 799 | 
            +
            compared to other molecules. Therefore, the relative slipping direction of the secondary domain is upward and we observe the
         | 
| 800 | 
            +
            appearance of a bump near the indenter tip (in the second row of Fig. S3 at the indentation depth of 6.7 nm). As the tip continues
         | 
| 801 | 
            +
            to go down, the secondary domain keeps climbing up until the bump reaches its maximum. In the mean time, the the molecules
         | 
| 802 | 
            +
            at the center bottom region are nearly flattened, which can trigger another phase transition to form a new phase domain. Upon
         | 
| 803 | 
            +
            further compression, the flattened molecules at the center bottom region create much empty space along the z-axis. Thus, the
         | 
| 804 | 
            +
            secondary domain slips down to push the neighboring molecules down to fill the empty space (see the third row of Fig. S3 at
         | 
| 805 | 
            +
            the indentation depth of 9.5 nm). When the indentation is released, the process is supposed to be irreversible at low temperature
         | 
| 806 | 
            +
            since triggering the back transformation requires some energy barrier. Therefore, it is a plastic deformation.
         | 
| 807 | 
            +
            5.0
         | 
| 808 | 
            +
            7.5
         | 
| 809 | 
            +
            10.0
         | 
| 810 | 
            +
            Indentation depth (nm)
         | 
| 811 | 
            +
             (degree)
         | 
| 812 | 
            +
            α
         | 
| 813 | 
            +
            -30
         | 
| 814 | 
            +
            30
         | 
| 815 | 
            +
            0
         | 
| 816 | 
            +
            -15
         | 
| 817 | 
            +
            15
         | 
| 818 | 
            +
             (degree)
         | 
| 819 | 
            +
            β
         | 
| 820 | 
            +
            -30
         | 
| 821 | 
            +
            30
         | 
| 822 | 
            +
            0
         | 
| 823 | 
            +
            -15
         | 
| 824 | 
            +
            15
         | 
| 825 | 
            +
             (degree)
         | 
| 826 | 
            +
            γ
         | 
| 827 | 
            +
            -30
         | 
| 828 | 
            +
            30
         | 
| 829 | 
            +
            0
         | 
| 830 | 
            +
            -15
         | 
| 831 | 
            +
            15
         | 
| 832 | 
            +
            Me-plastic
         | 
| 833 | 
            +
            FIG. S5. The list of representative snapshots from the simulation of Me-plastic deformation.
         | 
| 834 | 
            +
             | 
    	
        _dAyT4oBgHgl3EQfdvdN/content/tmp_files/load_file.txt
    ADDED
    
    | The diff for this file is too large to render. 
		See raw diff | 
|  | 
    	
        atAyT4oBgHgl3EQf9_py/content/tmp_files/2301.00884v1.pdf.txt
    ADDED
    
    | @@ -0,0 +1,889 @@ | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | |
|  | 
|  | |
| 1 | 
            +
            Safety Filtering for Reinforcement
         | 
| 2 | 
            +
            Learning-based Adaptive Cruise Control
         | 
| 3 | 
            +
            Habtamu Hailemichael ∗ Beshah Ayalew ∗ Lindsey Kerbel ∗
         | 
| 4 | 
            +
            Andrej Ivanco ∗∗ Keith Loiselle ∗∗
         | 
| 5 | 
            +
            ∗ Automotive Engineering, Clemson University, Greenville, SC 29607,
         | 
| 6 | 
            +
            USA (hhailem, beshah, lsutto2)@clemson.edu.
         | 
| 7 | 
            +
            ∗∗ Allison Transmission Inc., One Allison Way, Indianapolis, IN,
         | 
| 8 | 
            +
            46222, USA (andrej.ivanco, keith.loiselle)@allisontransmission.com
         | 
| 9 | 
            +
            Abstract: Reinforcement learning (RL)-based adaptive cruise control systems (ACC) that
         | 
| 10 | 
            +
            learn and adapt to road, traffic and vehicle conditions are attractive for enhancing vehicle
         | 
| 11 | 
            +
            energy efficiency and traffic flow. However, the application of RL in safety critical systems such
         | 
| 12 | 
            +
            as ACC requires strong safety guarantees which are difficult to achieve with learning agents
         | 
| 13 | 
            +
            that have a fundamental need to explore. In this paper, we derive control barrier functions as
         | 
| 14 | 
            +
            safety filters that allow an RL-based ACC controller to explore freely within a collision safe
         | 
| 15 | 
            +
            set. Specifically, we derive control barrier functions for high relative degree nonlinear systems to
         | 
| 16 | 
            +
            take into account inertia effects relevant to commercial vehicles. We also outline an algorithm
         | 
| 17 | 
            +
            for accommodating actuation saturation with these barrier functions. While any RL algorithm
         | 
| 18 | 
            +
            can be used as the performance ACC controller together with these filters, we implement the
         | 
| 19 | 
            +
            Maximum A Posteriori Policy Optimization (MPO) algorithm with a hybrid action space that
         | 
| 20 | 
            +
            learns fuel optimal gear selection and torque control policies. The safety filtering RL approach
         | 
| 21 | 
            +
            is contrasted with a reward shaping RL approach that only learns to avoid collisions after
         | 
| 22 | 
            +
            sufficient training. Evaluations on different drive cycles demonstrate significant improvements
         | 
| 23 | 
            +
            in fuel economy with the proposed approach compared to baseline ACC algorithms.
         | 
| 24 | 
            +
            Keywords: Adaptive cruise control, Safe reinforcement learning, Safety filtering, Control
         | 
| 25 | 
            +
            barrier functions
         | 
| 26 | 
            +
            1. INTRODUCTION
         | 
| 27 | 
            +
            Adaptive cruise control (ACC) systems are one of the in-
         | 
| 28 | 
            +
            creasingly prevalent driver assistance systems for modern
         | 
| 29 | 
            +
            vehicles. An ACC system uses radar, computer vision, or
         | 
| 30 | 
            +
            laser to understand the vehicle’s surrounding and make
         | 
| 31 | 
            +
            control decisions. When another vehicle or object is not in
         | 
| 32 | 
            +
            the sensing range, ACC compensates for the road grade,
         | 
| 33 | 
            +
            friction, and aerodynamic resistances to maintain a speed
         | 
| 34 | 
            +
            set by the driver. When another car or object is in front,
         | 
| 35 | 
            +
            the ACC makes decisions to prevent collision and follow
         | 
| 36 | 
            +
            the preceding vehicle as close as possible to avoid cut-ins.
         | 
| 37 | 
            +
            ACC has been shown to decrease a driver’s workload, and
         | 
| 38 | 
            +
            make traffic flows efficient and safer (Marsden et al., 2001;
         | 
| 39 | 
            +
            Lang et al., 2014).
         | 
| 40 | 
            +
            An effective ACC system should balance the traffic condi-
         | 
| 41 | 
            +
            tion of the road, the vehicle performance, and the driver’s
         | 
| 42 | 
            +
            demanded velocity. Currently available PID-based ACC
         | 
| 43 | 
            +
            systems (Canale and Malan, 2003; Chamraz and Balogh,
         | 
| 44 | 
            +
            2018) and proposed MPC-based approaches (Naus et al.,
         | 
| 45 | 
            +
            2008; Yang et al., 2021) are often tuned to balance this
         | 
| 46 | 
            +
            trade-off for various operating environments. Although
         | 
| 47 | 
            +
            ’adaptive’ or gain-scheduled versions (Radke and Iser-
         | 
| 48 | 
            +
            mann, 1987) can be sought, the fixed structure of these
         | 
| 49 | 
            +
            approaches limits full adaptation throughout the lifetime
         | 
| 50 | 
            +
            of the vehicle. Furthermore, MPC-based ACC also has
         | 
| 51 | 
            +
            to find a reliable way of predicting the motion of the
         | 
| 52 | 
            +
            leading vehicle for the future horizon. On the other hand,
         | 
| 53 | 
            +
            data-driven reinforcement learning (RL) approaches offer
         | 
| 54 | 
            +
            a mechanism to continuously customize to traffic, road
         | 
| 55 | 
            +
            and vehicle conditions without a predefined control archi-
         | 
| 56 | 
            +
            tecture (Li and G¨orges, 2020). In this work, we consider
         | 
| 57 | 
            +
            applications of RL-based ACC to commercial vehicles. In
         | 
| 58 | 
            +
            addition, while traditional ACC is primarily about the two
         | 
| 59 | 
            +
            tasks of speed tracking and maintaining a safe gap, we
         | 
| 60 | 
            +
            consider RL-based ACC (RL ACC for short) to explicitly
         | 
| 61 | 
            +
            optimize fuel economy via gear selection and torque control
         | 
| 62 | 
            +
            policies.
         | 
| 63 | 
            +
            Despite the potential benefits of adaptability and im-
         | 
| 64 | 
            +
            proved performance, RL ACC faces critical safety chal-
         | 
| 65 | 
            +
            lenges. These derive from the needs of RL algorithms to
         | 
| 66 | 
            +
            explore in order to learn the optimal policies. RL learns
         | 
| 67 | 
            +
            how good the given state-action pair is after experiencing
         | 
| 68 | 
            +
            it, but for applications like vehicle control, exploration in
         | 
| 69 | 
            +
            an unsafe domain is unacceptable even during (on-road)
         | 
| 70 | 
            +
            training of the RL algorithms. However, thanks to recent
         | 
| 71 | 
            +
            progress in safe RL, different approaches are suggested
         | 
| 72 | 
            +
            to encourage or limit the exploration only in the safe
         | 
| 73 | 
            +
            domain. We briefly mention a few of them. Reward shaping
         | 
| 74 | 
            +
            approaches put large penalties into the performance objec-
         | 
| 75 | 
            +
            tive function if constraints are violated. On the other hand,
         | 
| 76 | 
            +
            constrained Markov decision process (CMDP) approaches
         | 
| 77 | 
            +
            assign safety constraint costs to each state-action pair and
         | 
| 78 | 
            +
            limit the total safety constraint cost of a trajectory to
         | 
| 79 | 
            +
            be lower than a certain threshold (Altman, 1999). The
         | 
| 80 | 
            +
            arXiv:2301.00884v1  [eess.SY]  2 Jan 2023
         | 
| 81 | 
            +
             | 
| 82 | 
            +
            reward shaping and CMDP approaches are implemented
         | 
| 83 | 
            +
            on the performance controller itself to encourage respect-
         | 
| 84 | 
            +
            ing safety constraints but they do not guarantee safety.
         | 
| 85 | 
            +
            Another set of approaches involve the use of safety filters
         | 
| 86 | 
            +
            that impose hard constraints. Such approaches separate
         | 
| 87 | 
            +
            the performance-oriented RL controller, whose only aim is
         | 
| 88 | 
            +
            to optimize the system’s performance objective function,
         | 
| 89 | 
            +
            from the safety filters, which project the unsafe actions
         | 
| 90 | 
            +
            proposed by the performance controller into the safe set.
         | 
| 91 | 
            +
            The safety filters determine the safety condition of the
         | 
| 92 | 
            +
            given state-action pair using the dynamical model of the
         | 
| 93 | 
            +
            system, or they use offline data to learn constraints (Dalal
         | 
| 94 | 
            +
            et al., 2018) and safety indexes (Thananjeyan et al., 2021;
         | 
| 95 | 
            +
            Srinivasan et al., 2020). In this paper, we pursue dynamical
         | 
| 96 | 
            +
            model-based safety guarantees to construct the safe set in
         | 
| 97 | 
            +
            such a way that gives the RL performance controller the
         | 
| 98 | 
            +
            freedom to explore within the safe boundaries. As its train-
         | 
| 99 | 
            +
            ing progresses, the RL performance controller eventually
         | 
| 100 | 
            +
            learns the safety boundaries and ceases to demand unsafe
         | 
| 101 | 
            +
            actions (Thananjeyan et al., 2021). Note that even though
         | 
| 102 | 
            +
            it does not interfere with the inner workings, the safety
         | 
| 103 | 
            +
            filter affects control performance by dictating where the
         | 
| 104 | 
            +
            performance controller can operate.
         | 
| 105 | 
            +
            Of the model-based approaches to designing safety filters,
         | 
| 106 | 
            +
            control barrier functions (CBFs) offer light computation
         | 
| 107 | 
            +
            and scalability (Li, 2021). A CBF guarantees safety by
         | 
| 108 | 
            +
            making the controller work in the invariant safe-set defined
         | 
| 109 | 
            +
            by a superlevel set of a continuously differentiable function
         | 
| 110 | 
            +
            h(x) : Rn → R. The actions selected by the performance
         | 
| 111 | 
            +
            controllers are projected into the safe set in such a manner
         | 
| 112 | 
            +
            that the proposed actions are modified minimally (Ames
         | 
| 113 | 
            +
            et al., 2019), and no unsafe actions are passed to the
         | 
| 114 | 
            +
            controlled system. Different approaches could be pursued
         | 
| 115 | 
            +
            to specify CBFs with their pros and cons. The intuitive
         | 
| 116 | 
            +
            one is to come up with a handcrafted CBF considering the
         | 
| 117 | 
            +
            dynamics of the system and the action bounds associated
         | 
| 118 | 
            +
            with it (Xu et al., 2018; Ames et al., 2014; Cheng et al.,
         | 
| 119 | 
            +
            2019). In collision avoidance problems, for instance, the
         | 
| 120 | 
            +
            CBF can be derived by considering the maximum decel-
         | 
| 121 | 
            +
            eration that the system could exert to close a distance
         | 
| 122 | 
            +
            gap. When possible, it is also desirable to progressively
         | 
| 123 | 
            +
            widen the safe set to get the maximal safe domain, a task
         | 
| 124 | 
            +
            currently possible with polynomial plant dynamics and
         | 
| 125 | 
            +
            polynomial CBFs via sum-of-squares (SOS) programming
         | 
| 126 | 
            +
            (Chamraz and Balogh, 2018). Another approach that is
         | 
| 127 | 
            +
            tailored to high relative degree nonlinear dynamical sys-
         | 
| 128 | 
            +
            tems such as those involving inertia effects is the use of
         | 
| 129 | 
            +
            exponential CBF (ECBF) (Nguyen and Sreenath, 2016).
         | 
| 130 | 
            +
            In this work, we derive ECBFs to work as safety filters with
         | 
| 131 | 
            +
            our RL-ACC controllers, thereby taking explicit consider-
         | 
| 132 | 
            +
            ations of inertia effects that are important for commercial
         | 
| 133 | 
            +
            vehicles that experience large changes in loading.
         | 
| 134 | 
            +
            The main contributions of this paper are then the deriva-
         | 
| 135 | 
            +
            tion and demonstration of CBF-based safe RL-ACC ap-
         | 
| 136 | 
            +
            proach for commercial vehicles that optimizes fuel econ-
         | 
| 137 | 
            +
            omy. While we derive ECBFs for safety certification, we
         | 
| 138 | 
            +
            note that straight ECBFs (or CBFs in general) assume
         | 
| 139 | 
            +
            unbounded actions, and in their natural form, they might
         | 
| 140 | 
            +
            request actions that are not feasible for the vehicle’s pow-
         | 
| 141 | 
            +
            ertrain to meet. We therefore put forward a method to
         | 
| 142 | 
            +
            provide a safety guarantee for a given parameters of ECBF
         | 
| 143 | 
            +
            within the vehicle action limits. Our performance RL-ACC
         | 
| 144 | 
            +
            coordinates traction torque control and gear decisions
         | 
| 145 | 
            +
            considering fuel consumption optimization objectives. The
         | 
| 146 | 
            +
            RL ACC augmented with the safety certificate is trained
         | 
| 147 | 
            +
            and evaluated on different driving cycles, and the vehicle
         | 
| 148 | 
            +
            performance is compared with an RL ACC with reward-
         | 
| 149 | 
            +
            shaping approach to safe RL, as well as with a conventional
         | 
| 150 | 
            +
            PID-based ACC.
         | 
| 151 | 
            +
            The rest of the paper is organized as follows. Section
         | 
| 152 | 
            +
            2 describes our derivation of the ECBF as safety filters
         | 
| 153 | 
            +
            for ACC and detail how we address actuation constraints
         | 
| 154 | 
            +
            within them. Section 3 describes the algorithmic details of
         | 
| 155 | 
            +
            our performance RL-ACC. Section 4 discusses results and
         | 
| 156 | 
            +
            discussions, and Section 5 concludes the paper.
         | 
| 157 | 
            +
            2. SAFETY FILTER FOR ACC
         | 
| 158 | 
            +
            We briefly review the definition of CBFs as follows. Details
         | 
| 159 | 
            +
            are given in Hsu et al. (2015). Consider a nonlinear control
         | 
| 160 | 
            +
            affine system:
         | 
| 161 | 
            +
            ˙x = f (x) + g (x) u,.
         | 
| 162 | 
            +
            (1)
         | 
| 163 | 
            +
            where f and g are locally Lipschitz, x ∈ Rn is the system
         | 
| 164 | 
            +
            state, u ∈ Rm is the control inputs. Assume a safe set
         | 
| 165 | 
            +
            defined by C = {x ∈ Rn|h (x) ≥ 0}, where h : Rn →
         | 
| 166 | 
            +
            R is a continuously differentiable function. Then h is a
         | 
| 167 | 
            +
            control barrier function (CBF) if there exists an extended
         | 
| 168 | 
            +
            class κ∞ function α such that for all x ∈ Int (C) =
         | 
| 169 | 
            +
            {x ∈ Rn : h (x) > 0} :
         | 
| 170 | 
            +
            sup
         | 
| 171 | 
            +
            u∈U
         | 
| 172 | 
            +
            [Lfh (x) + Lgh (x) u] ≥ −α (h (x)).
         | 
| 173 | 
            +
            (2)
         | 
| 174 | 
            +
            For high relative degree nonlinear affine systems, feedback
         | 
| 175 | 
            +
            linearization could be used to develop exponential CBFs
         | 
| 176 | 
            +
            (ECBF) as detailed in Nguyen and Sreenath (2016). This
         | 
| 177 | 
            +
            is accomplished by transforming (input-output linearizing)
         | 
| 178 | 
            +
            the high relative degree nonlinear systems into a virtual
         | 
| 179 | 
            +
            linear system with new state variable ηb := [h(x), ˙h(x), · ·
         | 
| 180 | 
            +
            ·, hr(x)]T , input µ and output h (x):
         | 
| 181 | 
            +
            ˙ηb = Fηb (x) + Gµ,
         | 
| 182 | 
            +
            h (x) = Cηb
         | 
| 183 | 
            +
            (3)
         | 
| 184 | 
            +
            where F and G are matrices representing an integrator
         | 
| 185 | 
            +
            chain, and C = [1, 0, · · · , 0]. A state feedback controller
         | 
| 186 | 
            +
            can be designed for the transformed system as: µ = −Kαηb
         | 
| 187 | 
            +
            with a suitable gain vector Kα that makes F − GKα
         | 
| 188 | 
            +
            Hurwitz. For a system with relative degree r, µ is also rth
         | 
| 189 | 
            +
            derivative of the output h(x), µ = Lr
         | 
| 190 | 
            +
            fh(x)+Lg�Lr−1
         | 
| 191 | 
            +
            f
         | 
| 192 | 
            +
            h(x)u.
         | 
| 193 | 
            +
            If there exists a state feedback gain Kα that makes µ ≥
         | 
| 194 | 
            +
            −Kαηb (x) for all states, then one can show that h(x) is
         | 
| 195 | 
            +
            an exponential control barrier function (see Nguyen and
         | 
| 196 | 
            +
            Sreenath (2016)).
         | 
| 197 | 
            +
            The ACC part of the present problem is modelled with the
         | 
| 198 | 
            +
            state variables of separation distance z, the velocity of the
         | 
| 199 | 
            +
            host vehicle vh and the velocity of the leading vehicle vl.
         | 
| 200 | 
            +
            The corresponding state equations are:
         | 
| 201 | 
            +
            ˙z = vl − vh
         | 
| 202 | 
            +
            (4a)
         | 
| 203 | 
            +
            ˙vl = al
         | 
| 204 | 
            +
            (4b)
         | 
| 205 | 
            +
            ˙vh =
         | 
| 206 | 
            +
            Tt
         | 
| 207 | 
            +
            rwmv
         | 
| 208 | 
            +
            − Fr (vh, mv, θ)
         | 
| 209 | 
            +
            mv
         | 
| 210 | 
            +
            (4c)
         | 
| 211 | 
            +
            Fr = ρAcdv2
         | 
| 212 | 
            +
            h
         | 
| 213 | 
            +
            2
         | 
| 214 | 
            +
            + mvgf cos θ + mvg sin θ
         | 
| 215 | 
            +
            (5)
         | 
| 216 | 
            +
             | 
| 217 | 
            +
            where Fr is the total resistance force including gravita-
         | 
| 218 | 
            +
            tional, rolling and aerodynamic resistances, and Tt is the
         | 
| 219 | 
            +
            traction torque at the wheels. The parameters cd, f, θ, mv ,
         | 
| 220 | 
            +
            ρ, Av, rw, al are aerodynamic coefficient, rolling resistance
         | 
| 221 | 
            +
            coefficient, road grade, mass of the vehicle, density of
         | 
| 222 | 
            +
            air, frontal area of the vehicle, radius of the wheels, and
         | 
| 223 | 
            +
            acceleration of the leading vehicle, respectively.
         | 
| 224 | 
            +
            We observe that the above model can be readily put in the
         | 
| 225 | 
            +
            control affine form (1). Given a collision safety objective,
         | 
| 226 | 
            +
            we seek the separation distance z to always be above a
         | 
| 227 | 
            +
            specified minimum inter-vehicle distance z0. To this end,
         | 
| 228 | 
            +
            we define the control barrier function (CBF) as the output
         | 
| 229 | 
            +
            h (x) = z − z0. Considering that the control actuation is
         | 
| 230 | 
            +
            the traction torque Tt, we have a control affine system of
         | 
| 231 | 
            +
            relative degree two. In physical terms, the safety objective
         | 
| 232 | 
            +
            is on position while traction torque directly manipulates
         | 
| 233 | 
            +
            acceleration. Inertia effects come into play and must be
         | 
| 234 | 
            +
            accounted for. The input-output linearization into the
         | 
| 235 | 
            +
            form (3) then gives:
         | 
| 236 | 
            +
            ˙h(x) = vl − vh,
         | 
| 237 | 
            +
            (6)
         | 
| 238 | 
            +
            µ = ¨h (x) = Fr (vh, mv, θ)
         | 
| 239 | 
            +
            mv
         | 
| 240 | 
            +
            + al −
         | 
| 241 | 
            +
            Tt
         | 
| 242 | 
            +
            mvrw
         | 
| 243 | 
            +
            ,
         | 
| 244 | 
            +
            (7)
         | 
| 245 | 
            +
            −Kαηb (x) = −kα1 (z − z0) − kα2 (vl−vh)
         | 
| 246 | 
            +
            (8)
         | 
| 247 | 
            +
            We now compute some bounds for the given control input
         | 
| 248 | 
            +
            µ considering actuation limits on the traction torque (Tmin
         | 
| 249 | 
            +
            and Tmax). For a given acceleration of the preceding
         | 
| 250 | 
            +
            vehicle (al) and velocity of the host (vh), the feasible
         | 
| 251 | 
            +
            bounds of µ are given as
         | 
| 252 | 
            +
            µTmin/max = al + Fr (vh, θ, mv)
         | 
| 253 | 
            +
            mv
         | 
| 254 | 
            +
            − Tmin/max
         | 
| 255 | 
            +
            mvrw
         | 
| 256 | 
            +
            (9)
         | 
| 257 | 
            +
            For a given gain vector Kα = [kα1, kα2], ECBF guar-
         | 
| 258 | 
            +
            antees safety if the proposed state feedback control,
         | 
| 259 | 
            +
            −kα1 (z − z0) − kα2 (vl − vh), is within the virtual linear
         | 
| 260 | 
            +
            system action bound [µT max, µT min]. In general appli-
         | 
| 261 | 
            +
            cation cases, however, this bound may not be respected.
         | 
| 262 | 
            +
            Nevertheless, if Kα is chosen so that the poles are placed
         | 
| 263 | 
            +
            sufficiently to the left in s-plane, the above ECBF could
         | 
| 264 | 
            +
            still bound the safe set. Safety assurance for such pole
         | 
| 265 | 
            +
            selections could be achieved by investigating the evolution
         | 
| 266 | 
            +
            of the CBF control term h (x) in worst-case situation where
         | 
| 267 | 
            +
            the linear virtual model is initialized with extreme possible
         | 
| 268 | 
            +
            η0,xrm, and then the possible limiting torque actions are
         | 
| 269 | 
            +
            applied. For a given minimum separation distance target
         | 
| 270 | 
            +
            and maximum downhill road grade, this is equivalent to
         | 
| 271 | 
            +
            applying the maximum possible traction torque output
         | 
| 272 | 
            +
            of the performance RL-ACC agent, with the host vehicle
         | 
| 273 | 
            +
            model (of largest loading) initialized in with the maximum
         | 
| 274 | 
            +
            possible velocity while the preceding vehicle is under its
         | 
| 275 | 
            +
            maximum deceleration. This extreme conditions gives the
         | 
| 276 | 
            +
            feasible µ bounds as µT min−xrm and µT max−xrm using
         | 
| 277 | 
            +
            equations (9).
         | 
| 278 | 
            +
            To capture the evolution of h (x) under these extreme
         | 
| 279 | 
            +
            conditions, a simulation rollout is discretized into timestep
         | 
| 280 | 
            +
            ∆t, and the action µ (saturated with µT min−xrm and
         | 
| 281 | 
            +
            µT max−xrm) held piecewise constant. Algorithm 1 shows
         | 
| 282 | 
            +
            how this is implemented by integrating the virtual system
         | 
| 283 | 
            +
            (3). If the h (x) from this simulation is positive at infinity
         | 
| 284 | 
            +
            (or after some finite time), the selected Kα guarantees
         | 
| 285 | 
            +
            safety. Otherwise, the Kα needs to be changed until this
         | 
| 286 | 
            +
            is satisfied.
         | 
| 287 | 
            +
            Algorithm 1 An algorithm to enforce system bounds on
         | 
| 288 | 
            +
            a virtual linear system
         | 
| 289 | 
            +
            η ← η0
         | 
| 290 | 
            +
            µ ← µ0
         | 
| 291 | 
            +
            while t ≤ t∞ do
         | 
| 292 | 
            +
            t ← t + ∆t
         | 
| 293 | 
            +
            if µ < µT max−xrm then
         | 
| 294 | 
            +
            µ ← µT max−xrm
         | 
| 295 | 
            +
            else if µ > µT min−xrm then
         | 
| 296 | 
            +
            µ ← µT min−xrm
         | 
| 297 | 
            +
            end if
         | 
| 298 | 
            +
            h (x(t)) ← C(eF ∆tη0 + eF ∆t � ∆t
         | 
| 299 | 
            +
            0
         | 
| 300 | 
            +
            e−F τGµd(τ))
         | 
| 301 | 
            +
            µ ← −kα1h (x) − kα2 ˙h (x)
         | 
| 302 | 
            +
            η0 ←
         | 
| 303 | 
            +
            �h (x)
         | 
| 304 | 
            +
            ˙h (x)
         | 
| 305 | 
            +
            �
         | 
| 306 | 
            +
            end while
         | 
| 307 | 
            +
            Once the suitable gain vector Kα is selected, the ECBF
         | 
| 308 | 
            +
            safety constraint enforces safety by projecting the action
         | 
| 309 | 
            +
            proposed by the outputs of the RL controller’s actor
         | 
| 310 | 
            +
            network Ta (s) (see next section) to the control traction
         | 
| 311 | 
            +
            torque Tt in a way that introduces minimal changes to it.
         | 
| 312 | 
            +
            This is done by posing and solving the quadratic program:
         | 
| 313 | 
            +
            T ∗
         | 
| 314 | 
            +
            t = arg min
         | 
| 315 | 
            +
            Tt
         | 
| 316 | 
            +
            1
         | 
| 317 | 
            +
            2 ∥Tt − Ta(s)∥2
         | 
| 318 | 
            +
            s.t.
         | 
| 319 | 
            +
            al + Fr (vh, mv, θ)
         | 
| 320 | 
            +
            mv
         | 
| 321 | 
            +
            −
         | 
| 322 | 
            +
            Tt
         | 
| 323 | 
            +
            mvrw
         | 
| 324 | 
            +
            ≥ −kα1 (z − z0)
         | 
| 325 | 
            +
            − kα2 (vl − vh)
         | 
| 326 | 
            +
            (10)
         | 
| 327 | 
            +
            3. VEHICLE ENVIRONMENT AND RL ACC
         | 
| 328 | 
            +
            The powertrain controller is modeled as Markov decision
         | 
| 329 | 
            +
            process (MDP) consisting of states s, actions a, a reward
         | 
| 330 | 
            +
            function r (s, a), and discounting factor γ. The probability
         | 
| 331 | 
            +
            of action choices is policy π(a|s, θ) where θ denotes the
         | 
| 332 | 
            +
            parameters of the deep neural network used to approxi-
         | 
| 333 | 
            +
            mate the policy. The host vehicle velocity vl, the relative
         | 
| 334 | 
            +
            velocity between the preceding and host vehicles vrel,
         | 
| 335 | 
            +
            the separation distance between the vehicles z, the gear
         | 
| 336 | 
            +
            ng, the mass of the vehicle mv, the road grade θ, the
         | 
| 337 | 
            +
            driver demanded velocity vset and a flag to show if the
         | 
| 338 | 
            +
            vehicle is in ACC sensor range f constitute the states
         | 
| 339 | 
            +
            of the RL agent, s = {vl, vrel, z, ng,mv, θ, vset, f}. The
         | 
| 340 | 
            +
            RL performance controller is designed to perform both
         | 
| 341 | 
            +
            traction torque Ta control and gear change selection ∆ng,
         | 
| 342 | 
            +
            i.e. a = {Ta, ∆ng}. As shown in Fig.1, the proposed Ta is
         | 
| 343 | 
            +
            filtered by the ECBF safety layer to safe traction torque
         | 
| 344 | 
            +
            demand Tt (10). The engine torque and engine speed that
         | 
| 345 | 
            +
            brings about this wheel traction torque are then calculated
         | 
| 346 | 
            +
            utilizing transmission ratios of the selected gear and the
         | 
| 347 | 
            +
            final drive, and the associated fuel rate is read from the
         | 
| 348 | 
            +
            fuel map. Notice that while the RL controller’s actions are
         | 
| 349 | 
            +
            Ta and ∆ng, the ECBF safety filter does not use ∆ng in
         | 
| 350 | 
            +
            the safety constraint. However, taking into account that
         | 
| 351 | 
            +
            gear selection is crucial for fuel economy and driver ac-
         | 
| 352 | 
            +
            commodation, it is an integral part of the RL performance
         | 
| 353 | 
            +
            controller.
         | 
| 354 | 
            +
            The filtered traction torque Tt and the gear change ∆ng
         | 
| 355 | 
            +
            actions are implemented in the vehicle environment, and
         | 
| 356 | 
            +
             | 
| 357 | 
            +
            Fig. 1. Training RL agent for ACC
         | 
| 358 | 
            +
            the suitability of the actions is measured by the reward
         | 
| 359 | 
            +
            function. The reward is designed to accomplish the in
         | 
| 360 | 
            +
            range and out of range tasks, and different performance
         | 
| 361 | 
            +
            objectives within each task are tuned by reward weights
         | 
| 362 | 
            +
            (w). When there is not a vehicle present in the sensing
         | 
| 363 | 
            +
            range (z > zsr), as shown in (11), the reward structure
         | 
| 364 | 
            +
            requires the vehicle to maintain the driver-set velocity and
         | 
| 365 | 
            +
            concurrently balances the fuel consumption and smooth
         | 
| 366 | 
            +
            torque change considerations. When there is a vehicle in
         | 
| 367 | 
            +
            the sensing range, on the other hand, the reward aims to
         | 
| 368 | 
            +
            maintain a close distance from the preceding vehicle, as
         | 
| 369 | 
            +
            shown in (12). In such proximity, in addition to smooth
         | 
| 370 | 
            +
            torque change and fuel consumption considerations, the
         | 
| 371 | 
            +
            reward ros discourages the host vehicle from overspeeding
         | 
| 372 | 
            +
            beyond the driver demanded velocity (vset). Gear hunting
         | 
| 373 | 
            +
            and the associated rough vehicle operation are mitigated
         | 
| 374 | 
            +
            by including a gear reward term weighted by wg.
         | 
| 375 | 
            +
            r = wv0.1
         | 
| 376 | 
            +
            |vh−vset|
         | 
| 377 | 
            +
            Vrel,max + wf0.1
         | 
| 378 | 
            +
            ˙
         | 
| 379 | 
            +
            mf
         | 
| 380 | 
            +
            mf,max + wT 0.1
         | 
| 381 | 
            +
            |∆Te|
         | 
| 382 | 
            +
            Te,max +
         | 
| 383 | 
            +
            wg0.1
         | 
| 384 | 
            +
            |∆ng|
         | 
| 385 | 
            +
            ng,max
         | 
| 386 | 
            +
            (11)
         | 
| 387 | 
            +
            r = wz0.1
         | 
| 388 | 
            +
            Z
         | 
| 389 | 
            +
            Zsr + wf0.1
         | 
| 390 | 
            +
            ˙
         | 
| 391 | 
            +
            mf
         | 
| 392 | 
            +
            mf,max + wT 0.1
         | 
| 393 | 
            +
            |∆Te|
         | 
| 394 | 
            +
            Te,max +
         | 
| 395 | 
            +
            wg0.1
         | 
| 396 | 
            +
            |∆ng|
         | 
| 397 | 
            +
            ng,max + ros
         | 
| 398 | 
            +
            (12)
         | 
| 399 | 
            +
            where ros = wos if vh ≤ vset, else : ros = wos0.1
         | 
| 400 | 
            +
            vh−vset
         | 
| 401 | 
            +
            vrel,max ,
         | 
| 402 | 
            +
            ˙mf is the fuel rate and Te is the engine torque.
         | 
| 403 | 
            +
            To accommodate the continuous traction torque and the
         | 
| 404 | 
            +
            discrete gear selection, Hybrid Maximum A Posteriori
         | 
| 405 | 
            +
            Policy Optimization (HMPO) is found to be a good fit
         | 
| 406 | 
            +
            for the RL training algorithm (Kerbel et al., 2022; Neunert
         | 
| 407 | 
            +
            et al., 2020; Abdolmaleki et al., 2018). In addition to being
         | 
| 408 | 
            +
            scalable and robust like state of the art Proximal Policy
         | 
| 409 | 
            +
            Optimization (PPO) (Schulman et al., 2017) and Trust-
         | 
| 410 | 
            +
            Region Policy Optimization (TRPO) (Schulman et al.,
         | 
| 411 | 
            +
            2015) algorithms, the fact that it is off-policy makes it
         | 
| 412 | 
            +
            data efficient to apply it to the real world RL ACC
         | 
| 413 | 
            +
            trainings. The RL agent comprises of an actor (parame-
         | 
| 414 | 
            +
            terized by θ) and a critic (parameterized by φ) networks,
         | 
| 415 | 
            +
            in which the former determines the control policy for
         | 
| 416 | 
            +
            a given state π (s|θ) and the latter evaluates these ac-
         | 
| 417 | 
            +
            tions by providing the associated action values Q (s, a|φ).
         | 
| 418 | 
            +
            The actor network outputs the mean and variance of
         | 
| 419 | 
            +
            a Gaussian distribution, from which traction torque is
         | 
| 420 | 
            +
            sampled (13). In addition to that, it uses softmax ac-
         | 
| 421 | 
            +
            tivation at the output layer with three choices for the
         | 
| 422 | 
            +
            gear change decision, analogous to the available gear
         | 
| 423 | 
            +
            changes ∆n = {1, 0, −1}(upshift, nochange, downshift).
         | 
| 424 | 
            +
            Categorical sampling is then used to obtain the gear
         | 
| 425 | 
            +
            change policy (14). Assuming independence between the
         | 
| 426 | 
            +
            continuous πT
         | 
| 427 | 
            +
            θ (Ta|s) and discrete πg
         | 
| 428 | 
            +
            θ(∆ng|s) policies, the
         | 
| 429 | 
            +
            total policy could be factorized as (15) for combine action
         | 
| 430 | 
            +
            a = {Ta, ∆ng}.
         | 
| 431 | 
            +
            πT
         | 
| 432 | 
            +
            θ(Ta|s) = N
         | 
| 433 | 
            +
            �
         | 
| 434 | 
            +
            µθ (s) , σ2
         | 
| 435 | 
            +
            θ (s)
         | 
| 436 | 
            +
            �
         | 
| 437 | 
            +
            (13)
         | 
| 438 | 
            +
            πg
         | 
| 439 | 
            +
            θ(∆ng|s) = Cat(αθ(s)), ∀s
         | 
| 440 | 
            +
            3
         | 
| 441 | 
            +
            �
         | 
| 442 | 
            +
            k=1
         | 
| 443 | 
            +
            αk,θ (s) = 1
         | 
| 444 | 
            +
            (14)
         | 
| 445 | 
            +
            πθ (a|s) = πT
         | 
| 446 | 
            +
            θ (Ta|s) πg
         | 
| 447 | 
            +
            θ(∆ng|s))
         | 
| 448 | 
            +
            (15)
         | 
| 449 | 
            +
            In the policy improvement phase, MPO samples from the
         | 
| 450 | 
            +
            Q-function for different actions and update the actor-
         | 
| 451 | 
            +
            network parameters to output actions that maximize the
         | 
| 452 | 
            +
            action values Q(s, a). This is accomplished by optimiz-
         | 
| 453 | 
            +
            ing the likelihood function of acting optimally using the
         | 
| 454 | 
            +
            expectation-maximization algorithm ( see Neunert et al.
         | 
| 455 | 
            +
            (2020); Abdolmaleki et al. (2018)). The policy evaluation
         | 
| 456 | 
            +
            phase of the training fits the Q-function Qθ (s, a, φ) of
         | 
| 457 | 
            +
            the critic network, with parameters φ, by minimizing the
         | 
| 458 | 
            +
            square loss of the current Qθ (s, a, φ) and a target defined
         | 
| 459 | 
            +
            by retrace sampling Qret
         | 
| 460 | 
            +
            t
         | 
| 461 | 
            +
            (Munos et al., 2016).
         | 
| 462 | 
            +
            min
         | 
| 463 | 
            +
            φ L (φ) = min
         | 
| 464 | 
            +
            φ E(s,a)∼R
         | 
| 465 | 
            +
            �
         | 
| 466 | 
            +
            Qθ (s, a|φ) − Qret
         | 
| 467 | 
            +
            t
         | 
| 468 | 
            +
            �2
         | 
| 469 | 
            +
            (16)
         | 
| 470 | 
            +
            4. RESULTS AND DISCUSSIONS
         | 
| 471 | 
            +
            The above RL ACC with the ECBF safety filter is applied
         | 
| 472 | 
            +
            to a model of medium duty truck in urban and highway
         | 
| 473 | 
            +
            driving conditions. The actor and critic networks are con-
         | 
| 474 | 
            +
            structed with three hidden layers, and each layer consists
         | 
| 475 | 
            +
            of 256 nodes. The simulation uses a 10-speed automated
         | 
| 476 | 
            +
            manual transmission (AMT) truck that has a 5 to 10
         | 
| 477 | 
            +
            tons weight range. The preceding vehicle follows Federal
         | 
| 478 | 
            +
            Test Procedure (FTP-75) drive cycle for the urban driv-
         | 
| 479 | 
            +
            ing training, while for highway driving, a combination of
         | 
| 480 | 
            +
            Highway Fuel Economy (HWFET) and ArtMw130 cycles
         | 
| 481 | 
            +
            are used in succession (Barlow et al., 2009). Once trained,
         | 
| 482 | 
            +
            we will use different drive cycles for evaluation as will be
         | 
| 483 | 
            +
            described below.
         | 
| 484 | 
            +
            In each simulation step, as shown in Fig.1, the actor
         | 
| 485 | 
            +
            network proposes the torque and the gear actions for a
         | 
| 486 | 
            +
            given state which will be filtered by the ECBF safety
         | 
| 487 | 
            +
            layer. The vehicle environment then executes the safe
         | 
| 488 | 
            +
            actions, and the associated rewards are calculated. To
         | 
| 489 | 
            +
            accommodate the different objectives of each task, the
         | 
| 490 | 
            +
            reward is structured with weights of [wv = 0.675, wf =
         | 
| 491 | 
            +
            0.175, wT = 0.075, wg = 0.075] for in range, and [wz =
         | 
| 492 | 
            +
            0.325, wf = 0.175, wos = 0.35, wT = 0.075, wg = 0.075]
         | 
| 493 | 
            +
            for out of range conditions. The state, action and rewards
         | 
| 494 | 
            +
            are stored in the memory buffer, and afterward, batches
         | 
| 495 | 
            +
            of these data are used to train the networks using the
         | 
| 496 | 
            +
            HMPO algorithm. In order to prevent RL from learning
         | 
| 497 | 
            +
            the specific drive cycles, the vehicles are initialized in
         | 
| 498 | 
            +
            random separation distance along with the addition of
         | 
| 499 | 
            +
            noise to the velocity profile of the preceding vehicle. The
         | 
| 500 | 
            +
            weight fluctuations are considered by varying the truck
         | 
| 501 | 
            +
            weight within and between training episodes.
         | 
| 502 | 
            +
             | 
| 503 | 
            +
            m
         | 
| 504 | 
            +
            ECBF filter
         | 
| 505 | 
            +
            Memory buffer
         | 
| 506 | 
            +
            Ta
         | 
| 507 | 
            +
            Load actor
         | 
| 508 | 
            +
            parameters
         | 
| 509 | 
            +
            RL
         | 
| 510 | 
            +
            Training
         | 
| 511 | 
            +
            △ng
         | 
| 512 | 
            +
            π(s) ={Ta,△ng}
         | 
| 513 | 
            +
            Load critic
         | 
| 514 | 
            +
            Q(s,a)
         | 
| 515 | 
            +
            parameters
         | 
| 516 | 
            +
            Actor
         | 
| 517 | 
            +
            network
         | 
| 518 | 
            +
            π(s)
         | 
| 519 | 
            +
            Critic
         | 
| 520 | 
            +
            networkDuring training, because of the careful choice of the gain
         | 
| 521 | 
            +
            vector Kα = [0.2, 5] as per section 2, the vehicle never
         | 
| 522 | 
            +
            crashes nor comes within safe distance z0. As the training
         | 
| 523 | 
            +
            progresses, the RL learns to operate near the driver set
         | 
| 524 | 
            +
            velocity when it is out of range and follows the preceding
         | 
| 525 | 
            +
            vehicle more and more closely when it is in range. Even
         | 
| 526 | 
            +
            though it is not provided with the engine efficiency map,
         | 
| 527 | 
            +
            as exhibited by the improvement of MPG with training,
         | 
| 528 | 
            +
            the RL network eventually learns the fuel optimal gear and
         | 
| 529 | 
            +
            torque actions.
         | 
| 530 | 
            +
            Table 1. Vehicle environment and RL hyperpa-
         | 
| 531 | 
            +
            rameter setting
         | 
| 532 | 
            +
            Vehicle Parameters
         | 
| 533 | 
            +
            MPO Hyperparameters
         | 
| 534 | 
            +
            Mass
         | 
| 535 | 
            +
            5 - 10 tons
         | 
| 536 | 
            +
            Actor, critic learning rate
         | 
| 537 | 
            +
            10−4, 10−5
         | 
| 538 | 
            +
            Au
         | 
| 539 | 
            +
            7.71m2
         | 
| 540 | 
            +
            Dual constraint
         | 
| 541 | 
            +
            0.1
         | 
| 542 | 
            +
            Cd
         | 
| 543 | 
            +
            0.08
         | 
| 544 | 
            +
            Retrace steps
         | 
| 545 | 
            +
            15
         | 
| 546 | 
            +
            rw
         | 
| 547 | 
            +
            0.498
         | 
| 548 | 
            +
            KL constraints ϵµ, ϵσ, ϵd
         | 
| 549 | 
            +
            0.1, 0.001, 0.1
         | 
| 550 | 
            +
            f
         | 
| 551 | 
            +
            0.015
         | 
| 552 | 
            +
            αd, αc
         | 
| 553 | 
            +
            10
         | 
| 554 | 
            +
            zsr
         | 
| 555 | 
            +
            350
         | 
| 556 | 
            +
            γ
         | 
| 557 | 
            +
            0.99
         | 
| 558 | 
            +
            Even if it is not practical for safety critical systems, a
         | 
| 559 | 
            +
            reward shaping approach of safeguarding safety is consid-
         | 
| 560 | 
            +
            ered to compare against the ECBF-based safety filtering.
         | 
| 561 | 
            +
            A penalty of rs = −1 is added to the reward function
         | 
| 562 | 
            +
            when the host approaches closer than the minimum safe
         | 
| 563 | 
            +
            distance limit z0 and, in the situation of a crash, the
         | 
| 564 | 
            +
            penalty is enlarged to rc = −10. Due to these safety
         | 
| 565 | 
            +
            violation penalties, unsafe actions reduce with training,
         | 
| 566 | 
            +
            and eventually, the agent learns to maximize the reward
         | 
| 567 | 
            +
            safely. In addition to the reward shaping approach, the
         | 
| 568 | 
            +
            conventional PID ACC is used as a baseline which, like
         | 
| 569 | 
            +
            in the case of RL, is designed by dividing the control into
         | 
| 570 | 
            +
            phases for the in range and out of range conditions (Canale
         | 
| 571 | 
            +
            and Malan, 2003). The traction torque Tt request is given
         | 
| 572 | 
            +
            by PID controller and an optimal gear is chosen based on
         | 
| 573 | 
            +
            the gear with the lowest fuel rate given the desired traction
         | 
| 574 | 
            +
            torque and vehicle velocity (Yoon et al., 2020; Kerbel et al.,
         | 
| 575 | 
            +
            2022).
         | 
| 576 | 
            +
            After the RL ACC with ECBF is trained, its performance
         | 
| 577 | 
            +
            is evaluated and compared with PID ACC and RL ACC
         | 
| 578 | 
            +
            with reward shaping counterparts on a 9-ton truck in
         | 
| 579 | 
            +
            urban and highway driving conditions. For the urban case,
         | 
| 580 | 
            +
            the preceding vehicle follows the ArtUrban drive cycle,
         | 
| 581 | 
            +
            and the driver demanded velocity vset is set to be 15 m/s.
         | 
| 582 | 
            +
            Similarly, a vset of 25 m/s is used for highway driving, and
         | 
| 583 | 
            +
            to better capture different velocity profiles in the highway
         | 
| 584 | 
            +
            situation, the preceding vehicle follows a combination of
         | 
| 585 | 
            +
            ArtRoad and ARTMw150. The initial separation distance
         | 
| 586 | 
            +
            between the vehicles is 1500 m in both cases.
         | 
| 587 | 
            +
            In both driving conditions, the RL ACC successfully
         | 
| 588 | 
            +
            meets the in range as well as out of range objectives
         | 
| 589 | 
            +
            and, most importantly, safety constraints are respected.
         | 
| 590 | 
            +
            Fig.2 shows the RL ACC has a similar velocity profile
         | 
| 591 | 
            +
            to its PID ACC counterpart for the most part of the
         | 
| 592 | 
            +
            simulation. However, when it comes to gear selection, the
         | 
| 593 | 
            +
            RL ACC tends to operate at higher gears. As summarised
         | 
| 594 | 
            +
            in Table 2, for highway driving, the RL ACC exhibited
         | 
| 595 | 
            +
            an MPG improvement of 8.3%, whereas, in the case of
         | 
| 596 | 
            +
            urban driving, it has 7.9% higher MPG than the PID
         | 
| 597 | 
            +
            ACC baseline. When the preceding vehicle is in range,
         | 
| 598 | 
            +
            the RL ACC is less susceptible to cut-in as it follows the
         | 
| 599 | 
            +
            preceding vehicle closer, shown by the lower mean in range
         | 
| 600 | 
            +
            Fig. 2. Simulation of separation distance, velocity, and gear
         | 
| 601 | 
            +
            profiles of RL and PID ACC controllers in a highway
         | 
| 602 | 
            +
            driving.
         | 
| 603 | 
            +
            separation distance zir. Moreover, it is possible to see that
         | 
| 604 | 
            +
            the RL ACC with ECBF filter and the RL ACC with
         | 
| 605 | 
            +
            reward shaping arrangements achieve equivalent levels of
         | 
| 606 | 
            +
            fuel economy and in range car following performances.
         | 
| 607 | 
            +
            Table 3 shows the performance comparison with weight
         | 
| 608 | 
            +
            fluctuation in which the vehicle’s weight ranges from 5 to
         | 
| 609 | 
            +
            10-tons. The RL ACC maintains higher MPG than the
         | 
| 610 | 
            +
            PID ACC throughout the given weight range, and the
         | 
| 611 | 
            +
            separation distance is not significantly influenced.
         | 
| 612 | 
            +
            Table 2. Performance comparison between PID
         | 
| 613 | 
            +
            ACC, RL ACC with ECBF and RL ACC with
         | 
| 614 | 
            +
            reward shaping
         | 
| 615 | 
            +
            Highway driving
         | 
| 616 | 
            +
            Urban driving
         | 
| 617 | 
            +
            ACC
         | 
| 618 | 
            +
            PID
         | 
| 619 | 
            +
            RL
         | 
| 620 | 
            +
            RL
         | 
| 621 | 
            +
            PID
         | 
| 622 | 
            +
            RL
         | 
| 623 | 
            +
            RL
         | 
| 624 | 
            +
            Safety
         | 
| 625 | 
            +
            layer
         | 
| 626 | 
            +
            -
         | 
| 627 | 
            +
            ECBF
         | 
| 628 | 
            +
            Reward
         | 
| 629 | 
            +
            shaping
         | 
| 630 | 
            +
            -
         | 
| 631 | 
            +
            ECBF
         | 
| 632 | 
            +
            Reward
         | 
| 633 | 
            +
            shaping
         | 
| 634 | 
            +
            MPG
         | 
| 635 | 
            +
            8.6
         | 
| 636 | 
            +
            (-)
         | 
| 637 | 
            +
            9.3
         | 
| 638 | 
            +
            (8.31%)
         | 
| 639 | 
            +
            9.31
         | 
| 640 | 
            +
            (8.37%)
         | 
| 641 | 
            +
            6.8
         | 
| 642 | 
            +
            (-)
         | 
| 643 | 
            +
            7.35
         | 
| 644 | 
            +
            (7.9%)
         | 
| 645 | 
            +
            7.38
         | 
| 646 | 
            +
            (8.4%)
         | 
| 647 | 
            +
            Zir(m)
         | 
| 648 | 
            +
            95
         | 
| 649 | 
            +
            74
         | 
| 650 | 
            +
            73
         | 
| 651 | 
            +
            42
         | 
| 652 | 
            +
            39
         | 
| 653 | 
            +
            38
         | 
| 654 | 
            +
            5. CONCLUSION
         | 
| 655 | 
            +
            In this paper, an exponential control barrier function-
         | 
| 656 | 
            +
            based safety filter is employed to instill safety into RL
         | 
| 657 | 
            +
            based ACC system by projecting the learning exploration
         | 
| 658 | 
            +
            to a safe set. Since practical systems operate with bounded
         | 
| 659 | 
            +
            actions, we proposed an approach to verify the safety of a
         | 
| 660 | 
            +
            given ECBF design by forward simulating in consideration
         | 
| 661 | 
            +
            of worst case scenarios. After being filtered by this ECBF,
         | 
| 662 | 
            +
            the traction torque and gear change actions proposed by
         | 
| 663 | 
            +
            the RL-based ACC are implemented on a simulated vehi-
         | 
| 664 | 
            +
            cle environment and the associated rewards are observed.
         | 
| 665 | 
            +
            The RL networks are trained using Hybrid Maximum A
         | 
| 666 | 
            +
            Table 3. Perandomizedof PID ACC and RL
         | 
| 667 | 
            +
            ACC with vehicle mass fluctuation
         | 
| 668 | 
            +
            Weight
         | 
| 669 | 
            +
            (tons)
         | 
| 670 | 
            +
            5
         | 
| 671 | 
            +
            6
         | 
| 672 | 
            +
            7
         | 
| 673 | 
            +
            8
         | 
| 674 | 
            +
            9
         | 
| 675 | 
            +
            10
         | 
| 676 | 
            +
            RL
         | 
| 677 | 
            +
            with
         | 
| 678 | 
            +
            ECBF
         | 
| 679 | 
            +
            MPG
         | 
| 680 | 
            +
            10.58
         | 
| 681 | 
            +
            (10.9%)
         | 
| 682 | 
            +
            10.38
         | 
| 683 | 
            +
            (11.6%)
         | 
| 684 | 
            +
            9.99
         | 
| 685 | 
            +
            (9.6%)
         | 
| 686 | 
            +
            9.61
         | 
| 687 | 
            +
            (8.3%)
         | 
| 688 | 
            +
            9.3
         | 
| 689 | 
            +
            (8.31%)
         | 
| 690 | 
            +
            8.95
         | 
| 691 | 
            +
            (7.6%)
         | 
| 692 | 
            +
            Zir(m) 67
         | 
| 693 | 
            +
            69
         | 
| 694 | 
            +
            73
         | 
| 695 | 
            +
            75
         | 
| 696 | 
            +
            74
         | 
| 697 | 
            +
            77
         | 
| 698 | 
            +
            PID
         | 
| 699 | 
            +
            MPG
         | 
| 700 | 
            +
            9.54
         | 
| 701 | 
            +
            9.3
         | 
| 702 | 
            +
            9.11
         | 
| 703 | 
            +
            8.87
         | 
| 704 | 
            +
            8.6
         | 
| 705 | 
            +
            8.32
         | 
| 706 | 
            +
            Zir(m) 95
         | 
| 707 | 
            +
            95
         | 
| 708 | 
            +
            94
         | 
| 709 | 
            +
            95
         | 
| 710 | 
            +
            95
         | 
| 711 | 
            +
            96
         | 
| 712 | 
            +
             | 
| 713 | 
            +
            RL with Reward-shaping
         | 
| 714 | 
            +
            PID
         | 
| 715 | 
            +
            Sensing range
         | 
| 716 | 
            +
            RL with CBF
         | 
| 717 | 
            +
            Distance (m)
         | 
| 718 | 
            +
            5000
         | 
| 719 | 
            +
            0
         | 
| 720 | 
            +
            25
         | 
| 721 | 
            +
            0
         | 
| 722 | 
            +
            10
         | 
| 723 | 
            +
            ear
         | 
| 724 | 
            +
            5
         | 
| 725 | 
            +
            G
         | 
| 726 | 
            +
            11
         | 
| 727 | 
            +
            0
         | 
| 728 | 
            +
            250
         | 
| 729 | 
            +
            500
         | 
| 730 | 
            +
            750
         | 
| 731 | 
            +
            1000
         | 
| 732 | 
            +
            1250
         | 
| 733 | 
            +
            1500
         | 
| 734 | 
            +
            1750
         | 
| 735 | 
            +
            2000
         | 
| 736 | 
            +
            Time (s)Posteriori Policy Optimization (HMPO) algorithm that
         | 
| 737 | 
            +
            accommodates the continuous traction torque and discrete
         | 
| 738 | 
            +
            gear change actions. Evaluation on a medium-duty truck
         | 
| 739 | 
            +
            shows that the RL ACC fulfilled the velocity objectives
         | 
| 740 | 
            +
            and, most importantly, respected the safety constraints.
         | 
| 741 | 
            +
            Compared to PID ACC, the RL ACC augments MPG by
         | 
| 742 | 
            +
            8.3% in highway driving conditions when the preceding
         | 
| 743 | 
            +
            vehicle follows a combination of ArtRoad and ARTMw150
         | 
| 744 | 
            +
            drive cycles, and by 7.9% in urban driving conditions when
         | 
| 745 | 
            +
            the preceding vehicle follows ArtUrban drive cycle. More-
         | 
| 746 | 
            +
            over, the RL ACC learns to handle weight fluctuations
         | 
| 747 | 
            +
            and maintains high performance throughout the vehicle’s
         | 
| 748 | 
            +
            weight range.
         | 
| 749 | 
            +
            The current algorithm training and evaluations are per-
         | 
| 750 | 
            +
            formed on standard driving cycles. Future work will focus
         | 
| 751 | 
            +
            on using randomized traffic data and measurement noise to
         | 
| 752 | 
            +
            assess the performance and robustness of RL ACC in even
         | 
| 753 | 
            +
            more realistic driving conditions. In addition, future work
         | 
| 754 | 
            +
            will also look at less conservative methods of accounting
         | 
| 755 | 
            +
            for uncertainties (not worst-case) in ECBF design.
         | 
| 756 | 
            +
            REFERENCES
         | 
| 757 | 
            +
            Abdolmaleki, A., Springenberg, J.T., Tassa, Y., Munos,
         | 
| 758 | 
            +
            R., Heess, N., and Riedmiller, M. (2018). Maximum a
         | 
| 759 | 
            +
            posteriori policy optimisation. 6th International Con-
         | 
| 760 | 
            +
            ference on Learning Representations.
         | 
| 761 | 
            +
            Altman, E. (1999).
         | 
| 762 | 
            +
            Constrained Markov Decision Pro-
         | 
| 763 | 
            +
            cesses .
         | 
| 764 | 
            +
            Ames, A.D., Coogan, S., Egerstedt, M., Notomista, G.,
         | 
| 765 | 
            +
            Sreenath, K., and Tabuada, P. (2019). Control barrier
         | 
| 766 | 
            +
            functions: Theory and applications. 2019 18th European
         | 
| 767 | 
            +
            Control Conference, ECC 2019, 3420–3431.
         | 
| 768 | 
            +
            Ames, A.D., Grizzle, J.W., and Tabuada, P. (2014). Con-
         | 
| 769 | 
            +
            trol barrier function based quadratic programs with
         | 
| 770 | 
            +
            application to adaptive cruise control.
         | 
| 771 | 
            +
            Proceedings of
         | 
| 772 | 
            +
            the IEEE Conference on Decision and Control, 2015-
         | 
| 773 | 
            +
            Febru(February), 6271–6278.
         | 
| 774 | 
            +
            Barlow, T.J., Latham, S., Mccrae, I.S., and Boulter, P.G.
         | 
| 775 | 
            +
            (2009). A reference book of driving cycles for use in the
         | 
| 776 | 
            +
            measurement of road vehicle emissions.
         | 
| 777 | 
            +
            Canale, M. and Malan, S. (2003).
         | 
| 778 | 
            +
            Robust design of
         | 
| 779 | 
            +
            PID based ACC S and G systems. IFAC Proceedings
         | 
| 780 | 
            +
            Volumes, 36(18), 333–338.
         | 
| 781 | 
            +
            Chamraz, S. and Balogh, R. (2018). Two approaches to
         | 
| 782 | 
            +
            the adaptive cruise control (ACC) design. Proceedings
         | 
| 783 | 
            +
            of the 29th International Conference on Cybernetics and
         | 
| 784 | 
            +
            Informatics, K and I 2018, 2018-Janua(2), 1–6.
         | 
| 785 | 
            +
            Cheng, R., Orosz, G., Murray, R.M., and Burdick, J.W.
         | 
| 786 | 
            +
            (2019). End-to-end safe reinforcement learning through
         | 
| 787 | 
            +
            barrier functions for safety-critical continuous control
         | 
| 788 | 
            +
            tasks. 33rd AAAI Conference on Artificial Intelligence,
         | 
| 789 | 
            +
            AAAI 2019, 3387–3395.
         | 
| 790 | 
            +
            Dalal, G., Dvijotham, K., Vecerik, M., Hester, T., Padu-
         | 
| 791 | 
            +
            raru, C., and Tassa, Y. (2018).
         | 
| 792 | 
            +
            Safe Exploration in
         | 
| 793 | 
            +
            Continuous Action Spaces.
         | 
| 794 | 
            +
            Hsu, S.C., Xu, X., and Ames, A.D. (2015). Control barrier
         | 
| 795 | 
            +
            function based quadratic programs with application to
         | 
| 796 | 
            +
            bipedal robotic walking. Proceedings of the American
         | 
| 797 | 
            +
            Control Conference, 2015-July, 4542–4548.
         | 
| 798 | 
            +
            Kerbel, L., Ayalew, B., Ivanco, A., and Loiselle, K. (2022).
         | 
| 799 | 
            +
            Driver Assistance Eco-driving and Transmission Control
         | 
| 800 | 
            +
            with Deep Reinforcement Learning.
         | 
| 801 | 
            +
            Lang, D., Stanger, T., Schmied, R., and del Re, L. (2014).
         | 
| 802 | 
            +
            Predictive Cooperative Adaptive Cruise Control: Fuel
         | 
| 803 | 
            +
            Consumption Benefits and Implementability. 163–178.
         | 
| 804 | 
            +
            Li, G. and G¨orges, D. (2020). Ecological Adaptive Cruise
         | 
| 805 | 
            +
            Control for Vehicles with Step-Gear Transmission Based
         | 
| 806 | 
            +
            on Reinforcement Learning.
         | 
| 807 | 
            +
            IEEE Transactions on
         | 
| 808 | 
            +
            Intelligent Transportation Systems, 21(11), 4895–4905.
         | 
| 809 | 
            +
            Li, Z. (2021). Comparison between safety methods control
         | 
| 810 | 
            +
            barrier function vs. reachability analysis. arXiv preprint
         | 
| 811 | 
            +
            arXiv:2106.13176.
         | 
| 812 | 
            +
            Marsden, G., McDonald, M., and Brackstone, M. (2001).
         | 
| 813 | 
            +
            Towards an understanding of adaptive cruise control.
         | 
| 814 | 
            +
            Transportation Research Part C: Emerging Technolo-
         | 
| 815 | 
            +
            gies, 9(1), 33–51.
         | 
| 816 | 
            +
            Munos,
         | 
| 817 | 
            +
            R.,
         | 
| 818 | 
            +
            Stepleton,
         | 
| 819 | 
            +
            T.,
         | 
| 820 | 
            +
            Harutyunyan,
         | 
| 821 | 
            +
            A.,
         | 
| 822 | 
            +
            and
         | 
| 823 | 
            +
            Bellemare, M.G. (2016).
         | 
| 824 | 
            +
            Safe and Efficient Off-
         | 
| 825 | 
            +
            Policy
         | 
| 826 | 
            +
            Reinforcement
         | 
| 827 | 
            +
            Learning.
         | 
| 828 | 
            +
            Advances
         | 
| 829 | 
            +
            in
         | 
| 830 | 
            +
            Neural
         | 
| 831 | 
            +
            Information
         | 
| 832 | 
            +
            Processing
         | 
| 833 | 
            +
            Systems,
         | 
| 834 | 
            +
            1054–
         | 
| 835 | 
            +
            1062.
         | 
| 836 | 
            +
            doi:10.48550/arxiv.1606.02647.
         | 
| 837 | 
            +
            URL
         | 
| 838 | 
            +
            https://arxiv.org/abs/1606.02647v2.
         | 
| 839 | 
            +
            Naus, G., Van Den Bleek, R., Ploeg, J., Scheepers, B., Van
         | 
| 840 | 
            +
            De Molengraft, R., and Steinbuch, M. (2008). Explicit
         | 
| 841 | 
            +
            MPC design and performance evaluation of an ACC
         | 
| 842 | 
            +
            stop and go.
         | 
| 843 | 
            +
            Proceedings of the American Control
         | 
| 844 | 
            +
            Conference, 224–229.
         | 
| 845 | 
            +
            Neunert, M., Abdolmaleki, A., Wulfmeier, M., Lampe,
         | 
| 846 | 
            +
            T., Springenberg, J.T., Hafner, R., Romano, F., Buchli,
         | 
| 847 | 
            +
            J., Heess, N., and Riedmiller, M. (2020). Continuous-
         | 
| 848 | 
            +
            Discrete Reinforcement Learning for Hybrid Control in
         | 
| 849 | 
            +
            Robotics. (CoRL).
         | 
| 850 | 
            +
            Nguyen, Q. and Sreenath, K. (2016). Exponential Con-
         | 
| 851 | 
            +
            trol Barrier Functions for enforcing high relative-degree
         | 
| 852 | 
            +
            safety-critical constraints. Proceedings of the American
         | 
| 853 | 
            +
            Control Conference, 2016-July(3), 322–328.
         | 
| 854 | 
            +
            Radke, F. and Isermann, R. (1987). A parameter-adaptive
         | 
| 855 | 
            +
            PID-controller with stepwise parameter optimization.
         | 
| 856 | 
            +
            Automatica, 23(4), 449–457.
         | 
| 857 | 
            +
            Schulman, J., Levine, S., Moritz, P., Jordan, M., and
         | 
| 858 | 
            +
            Abbeel, P. (2015).
         | 
| 859 | 
            +
            Trust region policy optimization.
         | 
| 860 | 
            +
            32nd International Conference on Machine Learning,
         | 
| 861 | 
            +
            ICML 2015, 3, 1889–1897.
         | 
| 862 | 
            +
            Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
         | 
| 863 | 
            +
            Klimov, O. (2017). Proximal Policy Optimization Algo-
         | 
| 864 | 
            +
            rithms. 1–12.
         | 
| 865 | 
            +
            Srinivasan, K., Eysenbach, B., Ha, S., Tan, J., and Finn,
         | 
| 866 | 
            +
            C. (2020). Learning to be Safe: Deep RL with a Safety
         | 
| 867 | 
            +
            Critic. 1–16.
         | 
| 868 | 
            +
            Thananjeyan, B., Balakrishna, A., Nair, S., Luo, M.,
         | 
| 869 | 
            +
            Srinivasan, K., Hwang, M., Gonzalez, J.E., Ibarz, J.,
         | 
| 870 | 
            +
            Finn, C., and Goldberg, K. (2021). Recovery RL: Safe
         | 
| 871 | 
            +
            Reinforcement Learning with Learned Recovery Zones.
         | 
| 872 | 
            +
            IEEE Robotics and Automation Letters, 6(3).
         | 
| 873 | 
            +
            Xu, X., Grizzle, J.W., Tabuada, P., and Ames, A.D.
         | 
| 874 | 
            +
            (2018).
         | 
| 875 | 
            +
            Correctness Guarantees for the Composition
         | 
| 876 | 
            +
            of Lane Keeping and Adaptive Cruise Control. IEEE
         | 
| 877 | 
            +
            Transactions on Automation Science and Engineering,
         | 
| 878 | 
            +
            15(3), 1216–1229.
         | 
| 879 | 
            +
            Yang, Z., Wang, Z., and Yan, M. (2021). An Optimization
         | 
| 880 | 
            +
            Design of Adaptive Cruise Control System Based on
         | 
| 881 | 
            +
            MPC and ADRC. Actuators 2021, Vol. 10, Page 110,
         | 
| 882 | 
            +
            10(6), 110.
         | 
| 883 | 
            +
            Yoon, D.D., Ayalew, B., Ivanco, A., and Loiselle, K.
         | 
| 884 | 
            +
            (2020).
         | 
| 885 | 
            +
            Predictive kinetic energy management for an
         | 
| 886 | 
            +
             | 
| 887 | 
            +
            add-on driver assistance eco-driving of heavy vehicles.
         | 
| 888 | 
            +
            IET Intelligent Transport Systems, 14(13), 1824–1834.
         | 
| 889 | 
            +
             | 
